官术网_书友最值得收藏!

Summary

This chapter covered some of the key, essential components when managing access to your resources, including users, groups, roles, and MFA. With an understanding of these components within IAM, you are now able to successfully and securely control access and boost your security. The policies that underpin the permissions that are assigned to the identity objects help tie together the authentication and authorization functions of your access control mechanisms.

In the next chapter, we will be focusing on these policies, and how to implement and change them to suit your security needs.

主站蜘蛛池模板: 固阳县| 新巴尔虎右旗| 河北区| 迁安市| 南江县| 黄山市| 云林县| 衡东县| 峨眉山市| 察哈| 梅河口市| 阳新县| 富平县| 安多县| 中方县| 象山县| 吴桥县| 东乌| 九寨沟县| 海南省| 宜良县| 阳泉市| 民乐县| 郸城县| 景谷| 蚌埠市| 西平县| 浏阳市| 扶沟县| 左云县| 兴业县| 阿勒泰市| 定安县| 日土县| 道真| 昆明市| 郑州市| 乌兰浩特市| 十堰市| 乌拉特后旗| 克山县|