官术网_书友最值得收藏!

Summary

This chapter covered some of the key, essential components when managing access to your resources, including users, groups, roles, and MFA. With an understanding of these components within IAM, you are now able to successfully and securely control access and boost your security. The policies that underpin the permissions that are assigned to the identity objects help tie together the authentication and authorization functions of your access control mechanisms.

In the next chapter, we will be focusing on these policies, and how to implement and change them to suit your security needs.

主站蜘蛛池模板: 屯门区| 保靖县| 杭州市| 迭部县| 额敏县| 镇江市| 霞浦县| 上思县| 伊春市| 莱芜市| 博客| 神农架林区| 汾西县| 安平县| 大邑县| 丘北县| 固始县| 华亭县| 桐城市| 文安县| 翼城县| 静宁县| 勃利县| 田东县| 布尔津县| 芦山县| 彭泽县| 文山县| 舒城县| 临洮县| 崇明县| 定陶县| 康乐县| 将乐县| 达日县| 澄城县| 广宗县| 盘山县| 嘉荫县| 乌兰浩特市| 九龙城区|