O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identity federation

Here, we create an identity broker that works as an intermediary between corporate users and AWS services to grant the authentication and authorization process without creating the users in IAM.

Here, our corporate users log in to the identity broker application, which authenticates users with a local identity store. The identity broker application has access to the AWS Security Token Service (STS), which is used to request temporary security credentials. Then, it directs users to a temporary URL to access the AWS Management Console. Microsoft Active Directory is an example of an identity broker application.

Let's understand the flow of identity federation. Assume we have an application run-in on premise infrastructure, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required