1/18/2024 0 Comments Pinpoint security servicesWhere possible, we recommend relying on temporary credentials instead of creating IAM users who have long-term credentials such as passwords and access keys. For the complete list of tasks that require you to sign in as the root user, see Tasks that require root user credentials in the IAM User Guide.Īn IAM user is an identity within your AWS account that has specific permissions for a single person or application. Perform the tasks that only the root user can perform. Safeguard your root user credentials and use them to Strongly recommend that you don't use the root user for your everyday tasks. Signing in with the email address and password that you used to create the account. This identity is called the AWS account root user and is accessed by When you create an AWS account, you begin with one sign-in identity that has complete access to all AWS servicesĪnd resources in the account. To learn more, see Multi-factor authentication in theĪWS IAM Identity Center User Guide and Using multi-factor authentication (MFA) in AWS in the IAM User Guide. For example, AWS recommends that you use multi-factorĪuthentication (MFA) to increase the security of your account. Regardless of the authentication method that you use, you might be required to provideĪdditional security information. For more information about using the recommended method to sign requests yourself, see Interface (CLI) to cryptographically sign your requests by using your credentials. If you access AWS programmatically, AWS provides a software development kit (SDK) and a command line For more information about signing in to AWS, see How to sign in to your AWS account When you access AWS by using federation, you are indirectly assuming a role.ĭepending on the type of user you are, you can sign in to the AWS Management Console or the AWS access When you sign in as a federated identity, your administrator previously set up identity federation using IAM roles. You can sign in to AWS as a federated identity by using credentials provided through an identity source.ĪWS IAM Identity Center (IAM Identity Center) users, your company's single sign-on authentication, and your Google or FacebookĬredentials are examples of federated identities. You must beĪuthenticated (signed in to AWS) as the AWS account root user, as an Authenticating with identitiesĪuthentication is how you sign in to AWS using your identity credentials. To view example Amazon Pinpoint identity-based policies that you can use in IAM, see Amazon Pinpoint identity-based Write policies to manage access to Amazon Pinpoint. IAM administrator – If you're an IAM administrator, you might want to learn details about how you can To learn more about how your company can use IAM with Amazon Pinpoint, see How Amazon Pinpoint works with IAM. Review the information on this page to understand theīasic concepts of IAM. Submit requests to your IAM administrator to change the permissions of your service users. It's your job to determine which Amazon Pinpoint features and resources your service users should access. Service administrator – If you're in charge of Amazon Pinpoint resources at your company, you probably haveįull access to Amazon Pinpoint. If you cannot access a feature inĪmazon Pinpoint, see Troubleshooting Amazon Pinpoint identity and Understanding how access is managed can help you request the right permissions from your administrator. As you use more Amazon Pinpoint features to do your work, you might need additional permissions. With the credentials and permissions that you need. Service user – If you use the Amazon Pinpoint service to do your job, then your administrator provides you How you use AWS Identity and Access Management (IAM) differs, depending on the work that you do in Amazon Pinpoint. Troubleshooting Amazon Pinpoint identity and.IAM roles for common Amazon Pinpoint tasks.Amazon Pinpoint actions for IAM policies.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |