AWS - IAM Identity Center

IAM vs IAM Identity Center

We have already familiar with IAM, and have little hands on experience with it. But there is another service called IAM Identity Center previously known as AWS Single-Sign-On (SSO). 

What is SSO ?

SSO is a method that allows users to authenticate once and access multiple applications without being prompted to enter their credentials again. This is typically done by an identity provider (IdP) that issues a token to the user, which is then passed to the different applications the user wants to access. So basically lets consider the scenario that as company IT engineer you want to provide access of Meta workplace, office365, SAP platforms to company users. But instead of typing their set of credentials for each of these services you implement company SSO. So once they logged in to company's portal, they will be granted access to all integrated platforms without needing to log in again.

So basically IAM Identity Center is providing centralized permissions management and SSO.

You can connect IAM Identity Center to your self-managed AD (Active Directory) via AD connector and other applications which supports this functionality (office365, Adobe AEM etc.).

IAM Identity Center simplifies granting users access to multiple AWS accounts or multiple applications. That is the main difference between IAM and IAM Identity Center. While IAM provides fine-grained access to AWS resources, IAM Identity Center provides centralized authorization mainly.  


IAM :

  •  Can use external Identity Providers for SSO to AWS services
  •  Managing AWS resources and permissions
  •  Creating and managing users, groups and roles
  •  Programmatic Access management possible (cli, API)
  •  Fine-grained access control


IAM Identity Center :

  • Providing SSO access to AWS and non-AWS applications
  • Centrilizing identity management across multiple AWS accounts
  • Integrating with external directory services (Active Directory)

Let's try IAM identity center 

Let's imagine that company employed new professionals to do some security audits. As you might guess we should grant limited access to the resources. Read-only access to be specific. 

  1. Search IAM identity center on the search bar.
       


2. Initially it asks if we are creating organization or doing some testing.

3. Let's create new user for our organization
4.  


5. New user must accept the invitation sent to his email. He might use the link below to login whenever he wants.


6. Since we didn't provide any permission to our new user. After login dashboard will look like this.

7. Let's add specific permission to our new user.

 8. Here I used pre-defined permission set, since there was "Security auditor" permission set. But you can provide "AdministratorAccess" permission to that user too, it really depends on the use cases.

9. 

10. Let's create a group too. Or we can directly attach newly created permission set to our user.


11. Okay, we did almost all, lets attach our user to the group and this group to our organization.


12. Add permission to our newly created group.

13. Let's finish.

14. If we log in to account of newly created user. We will see the our user's access granted. Let's click to SecurityAudit link.
15.  That is it user has read-only access to our security related resources. 


Comments

Popular posts from this blog

Identity Access Management - How to create user in IAM ?!

AWS pricing fundamentals

IAM - Roles