Skip to content

Latest commit

 

History

History
31 lines (28 loc) · 1.35 KB

File metadata and controls

31 lines (28 loc) · 1.35 KB

Identity Federation

  • Return to table of contents

  • Useful Links:

  • Exam Tips:

    • Access console as well as cli and api:
      • Use AssumeRoleWithSAML
    • SAML 2.0:
      • Indirectly use on-premises IDs with AWS (Console and CLI).
      • Used when using an Enterprise Identity Provider that is also SAML 2.0 compatible.
      • Existing identity management team.
      • Desire single source of truth for users, and/or more than 5,000 users.
      • If a question mentions Google, Facebook, Web, etc, SAML 2.0 is NOT the correct option.
      • Assumes a IAM Role and used AWS Temporary Credentials which have 12 hour validity.
    • AWS SSO:
      • Flexible Identity source.
      • Has a built-in identity store.
      • On-Prem AD (Two way trust or AD connector)
      • Preferred by AWS to SAML 2.0.
      • Work place vs customer identities:
        • Customer - Web Apps, Google, Twitter - Cognito
        • Workplace - AWS SSO
      • Requires an Organization.
    • Cognito:
      • For customers.
      • Cognito handles the exchange of Cognito credentials with AWS credentials.
        • Generated via a role assumption.