{"id":1383,"date":"2021-07-14T10:57:34","date_gmt":"2021-07-14T09:57:34","guid":{"rendered":"https:\/\/www.easydeploy.io\/blog\/?p=1383"},"modified":"2021-07-16T11:04:25","modified_gmt":"2021-07-16T10:04:25","slug":"what-is-aws-identity-and-access-management-iam","status":"publish","type":"post","link":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/","title":{"rendered":"What is AWS Identity and Access Management (IAM)?"},"content":{"rendered":"<p>The evolution of Cloud Computing has changed the perspective of how we store and secure our data in the public cloud. While security is a major concern here, the first level of securing and restricting access to data is by implementing AWS Identity and Access Management.<\/p>\n<p>In this blog, we are going to discuss one of the core security and user management services of Amazon Web Services i.e Identity and Access Management (AWS IAM). We will also look at how to create an IAM user and give required access, CLI commands to interact with IAM and Best practices of IAM to getting the full benefits of this service.<\/p>\n<p class=\"graf graf--p\">As per the official definition, \u201c<em><strong>AWS Identity and Access Management (IAM)<\/strong><\/em> is a web service for securely controlling access to AWS services. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users and applications can access.\u201d<\/p>\n<figure class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image aligncenter\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/1*_LRu8SL0RgukRNVJHhC0gw.jpeg\" data-image-id=\"1*_LRu8SL0RgukRNVJHhC0gw.jpeg\" data-width=\"355\" data-height=\"142\" \/><\/figure>\n<p class=\"graf graf--p\">Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.<\/p>\n<p class=\"graf graf--p\"><strong><em>Before we start looking into the console let&#8217;s understand key aspects of IAM &#8211;\u00a0<\/em><\/strong><\/p>\n<ol class=\"postList\">\n<li class=\"graf graf--li\"><strong class=\"markup--strong markup--li-strong\"><em class=\"markup--em markup--li-em\">Users &#8211; <\/em><\/strong>AWS IAM User is an entity that you create in AWS to represent the person or application that uses it to interact with AWS.<\/li>\n<li class=\"graf graf--li\"><strong class=\"markup--strong markup--li-strong\"><em class=\"markup--em markup--li-em\">Roles &#8211; <\/em><\/strong>An IAM role is an entity with permissions to make AWS service requests. Roles are attached to AWS users say in account A through which they can access another account B or Roles are attached to AWS Services such as EC2 so that they can call (API calls) another service say S3.<\/li>\n<li class=\"graf graf--li\"><strong class=\"markup--strong markup--li-strong\"><em class=\"markup--em markup--li-em\">Policies &#8211; <\/em><\/strong>Roles are to access another account or service whereas, Policies are the permissions associated with a user. When a user tries to perform any action in any other account or service AWS evaluates the attached Policies and determines whether the request is allowed or not.<\/li>\n<\/ol>\n<figure class=\"graf graf--figure\">\n<h6 class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/1*08Vi7qlDP6rZpZkxhszyCA.jpeg\" data-image-id=\"1*08Vi7qlDP6rZpZkxhszyCA.jpeg\" data-width=\"1914\" data-height=\"633\" \/><\/h6>\n<\/figure>\n<h2 class=\"graf graf--p\"><strong>IAM users can access the AWS resources in two ways:<\/strong><\/h2>\n<ol class=\"postList\">\n<li class=\"graf graf--li\"><em class=\"markup--em markup--li-em\">Programmatic access <\/em>&#8211; User needs <strong class=\"markup--strong markup--li-strong\"><em class=\"markup--em markup--li-em\">access key ID<\/em><\/strong><em class=\"markup--em markup--li-em\"> and <\/em><strong class=\"markup--strong markup--li-strong\"><em class=\"markup--em markup--li-em\">secret access key<\/em> <\/strong>for using the AWS services via AWS API, CLI, SDK, and other development tools.<\/li>\n<li class=\"graf graf--li\"><em class=\"markup--em markup--li-em\">AWS Management Console access &#8211; <\/em>Needs a <strong class=\"markup--strong markup--li-strong\"><em class=\"markup--em markup--li-em\">password<\/em><\/strong> through which he can access the console and perform tasks as per given rights.<\/li>\n<\/ol>\n<h2 class=\"graf graf--p\"><strong>Steps to create an IAM user and give management console access with read-only access:<\/strong><\/h2>\n<ol class=\"postList\">\n<li class=\"graf graf--li\">Log in to your console as a root user (admin of the account) and go to the IAM console. Select User and give the Username and select AWS management console access.<\/li>\n<\/ol>\n<figure class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/1*qDjk2LRdtUiAciuhxW3rlA.jpeg\" data-image-id=\"1*qDjk2LRdtUiAciuhxW3rlA.jpeg\" data-width=\"1503\" data-height=\"730\" \/><\/figure>\n<p class=\"graf graf--p\">\u00a0 \u00a0 \u00a02. Next &gt; Go to the permissions page and click attach existing policies (here we are only focusing on\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0users and policies so not creating any groups) and select ReadonlyAccess.<\/p>\n<figure class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/1*1Xoog_nlvh32b_ikG_Tb6A.jpeg\" data-image-id=\"1*1Xoog_nlvh32b_ikG_Tb6A.jpeg\" data-width=\"1534\" data-height=\"733\" \/><\/figure>\n<p class=\"graf graf--p\">\u00a0 \u00a0 3. Review the details and click Create user. A new user with Read-only access is now created and you\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0need to share the details with him\/her in order to access the console and start working.<\/p>\n<figure class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/1*TPe3VccQLhdFlO1mkJO1lA.jpeg\" data-image-id=\"1*TPe3VccQLhdFlO1mkJO1lA.jpeg\" data-width=\"1497\" data-height=\"735\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><em class=\"markup--em markup--p-em\"><strong>AWS IAM switch role<\/strong> &#8211;<\/em> Let us consider a scenario where your infosec team member needs to do some security test on each individual accounts and we are supposed to give him read access to these accounts. In this situation, we need to make use of the <strong class=\"markup--strong markup--p-strong\"><em class=\"markup--em markup--p-em\">switch role<\/em><\/strong> service and give the necessary account access so the user can perform the required activities.<\/p>\n<p class=\"graf graf--p\"><em>Moving on, we need to always make sure we adhere to the <strong>best practices of AWS IAM<\/strong> and they are listed below:<\/em><\/p>\n<ol class=\"postList\">\n<li class=\"graf graf--li\">Grant <a class=\"markup--anchor markup--li-anchor\" href=\"http:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/security-pillar\/permissions-management.html\" target=\"_blank\" rel=\"noopener\" data-href=\"http:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/security-pillar\/permissions-management.html\">least privilege access<\/a>: Establishing a principle of least privilege ensures that identities are only permitted to perform the most minimal set of functions necessary to fulfill a specific task, while balancing usability and efficiency.<\/li>\n<li class=\"graf graf--li\">Use <a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/console.aws.amazon.com\/organizations\/home\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/console.aws.amazon.com\/organizations\/home\">AWS Organizations<\/a>: Centrally manage and govern your environment as you scale your AWS resources. Easily create new AWS accounts, group accounts to organize your workflows, and apply policies to accounts or groups for governance.<\/li>\n<li class=\"graf graf--li\">Enable Identity federation: Manage users and access across multiple services from your preferred identity source. Using <a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/console.aws.amazon.com\/singlesignon\/home\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/console.aws.amazon.com\/singlesignon\/home\">AWS Single Sign-On <\/a>centrally manage access to multiple AWS accounts and provide users with single sign-on access to all their assigned accounts from one place.<\/li>\n<li class=\"graf graf--li\">Enable MFA: For extra security, we recommend that you require multi-factor authentication (MFA) for <a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/console.aws.amazon.com\/iam\/home?region=us-east-2#users\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/console.aws.amazon.com\/iam\/home?region=us-east-2#users\">all users<\/a>.<\/li>\n<li class=\"graf graf--li\"><a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/console.aws.amazon.com\/iam\/home?region=us-east-2#security_credentials\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/console.aws.amazon.com\/iam\/home?region=us-east-2#security_credentials\">Rotate credentials<\/a> regularly: Change your own passwords and access keys regularly, and make sure that all users in your account do as well.<\/li>\n<li class=\"graf graf--li\">Enable <a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/console.aws.amazon.com\/access-analyzer\/home\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/console.aws.amazon.com\/access-analyzer\/home\">IAM Access Analyzer<\/a>: Enable IAM Access Analyzer to analyze public, cross-account, and cross-organization access.<\/li>\n<\/ol>\n<h3 class=\"graf graf--p\"><strong><em class=\"markup--em markup--p-em\">CLI Commands for AWS IAM:<\/em><\/strong><\/h3>\n<ol class=\"postList\">\n<li class=\"graf graf--li\">Create IAM User\u200a\u2014\u200a\u201c<strong>aws iam create-user\u200a\u2014\u200auser-name xyz<\/strong>\u201d<\/li>\n<\/ol>\n<figure class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/0*2eBvosQaXZm1YgPK.jpeg\" data-image-id=\"0*2eBvosQaXZm1YgPK.jpeg\" data-width=\"1050\" data-height=\"268\" \/><\/figure>\n<p class=\"graf graf--p\">2. Create Access Key- \u201c<strong>aws iam create-access-key\u200a\u2014\u200auser-name xyz<\/strong>\u201d<\/p>\n<figure class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/0*2qO9IIjnSISieZ8O.jpeg\" data-image-id=\"0*2qO9IIjnSISieZ8O.jpeg\" data-width=\"1050\" data-height=\"250\" \/><\/figure>\n<p class=\"graf graf--p\">3. List AWS IAM Users\u200a\u2014\u200a\u201c<strong>aws iam list-users<\/strong>\u201d<\/p>\n<figure class=\"graf graf--figure\"><img decoding=\"async\" class=\"graf-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1200\/0*d-Gf-H91-KIhOCfs.jpeg\" data-image-id=\"0*d-Gf-H91-KIhOCfs.jpeg\" data-width=\"1050\" data-height=\"497\" \/><\/figure>\n<p class=\"graf graf--p\">Please refer to the official documentation on AWS IAM from Amazon in this link \u201c<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/docs.aws.amazon.com\/iam\/\" target=\"_blank\" rel=\"noopener nofollow\" data-href=\"https:\/\/docs.aws.amazon.com\/iam\/\">https:\/\/docs.aws.amazon.com\/iam\/<\/a>\u201d<\/p>\n<p class=\"graf graf--p\">AWS CLI reference \u201c<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/docs.aws.amazon.com\/cli\/latest\/reference\/iam\/\" target=\"_blank\" rel=\"noopener nofollow\" data-href=\"https:\/\/docs.aws.amazon.com\/cli\/latest\/reference\/iam\/\">https:\/\/docs.aws.amazon.com\/cli\/latest\/reference\/iam\/<\/a>\u201d<\/p>\n<h3 class=\"graf graf--p\"><strong class=\"markup--strong markup--p-strong\"><em class=\"markup--em markup--p-em\">AWS IAM FAQ\u2019s &#8211;\u00a0<\/em><\/strong><\/h3>\n<ol class=\"postList\">\n<li class=\"graf graf--li\">\u00a0Who is able to manage users for an AWS account?<br \/>\nThe AWS account holder can manage users, groups, security credentials, and permissions. In addition, you may grant permissions to individual users to place calls to IAM APIs in order to manage other users. For example, an administrator user may be created to manage users for a corporation &#8211; a recommended practice. When you grant a user permission to manage other users, they can do this via the IAM APIs, <a class=\"markup--anchor markup--li-anchor\" href=\"http:\/\/aws.amazon.com\/developertools\/AWS-Identity-and-Access-Management\/4143\" target=\"_blank\" rel=\"noopener\" data-href=\"http:\/\/aws.amazon.com\/developertools\/AWS-Identity-and-Access-Management\/4143\">AWS CLI<\/a>, or <a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/console.aws.amazon.com\/iam\/home\" target=\"_blank\" rel=\"noopener\" data-href=\"https:\/\/console.aws.amazon.com\/iam\/home\">IAM console<\/a>.<\/li>\n<li class=\"graf graf--li\">What kind of key rotation is supported for IAM users?<br \/>\nUser access keys and X.509 certificates can be rotated just as they are for an AWS account\u2019s root access identifiers. You can manage and rotate programmatically a user\u2019s access keys and X.509 certificates via the IAM APIs, AWS CLI, or IAM console.<\/li>\n<\/ol>\n<p>Look at the more faq&#8217;s here at <a href=\"https:\/\/aws.amazon.com\/iam\/faqs\/\">https:\/\/aws.amazon.com\/iam\/faqs\/.<\/a><\/p>\n<p class=\"graf graf--p\"><em>IAM is a feature of your AWS account offered at<strong><span style=\"color: #0000ff;\"> no additional charge<\/span>.<\/strong> You will be charged only for use of other AWS services by your users.<\/em><\/p>\n<p><strong>Let us know more about the Switch role, User Policies, Groups, and other Programmatic access of AWS in our next blogs.<\/strong><\/p>\n<h4 class=\"graf graf--p\"><strong><em class=\"markup--em markup--p-em\">Conclusion<\/em><\/strong><\/h4>\n<p class=\"graf graf--p\">AWS Identity and Access Management must become a mandatory use in your environment. Make the best use of it by fine-grained access control to AWS resources, Multi-factor authentication for highly privileged users, Analyze access and, Integrate it with your corporate directory.<\/p>\n<p class=\"graf graf--p\">As IAM ensures security and data privacy always make sure you adhere to the best practices of IAM. When all aspects are covered your data is safe, secure, and reliable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The evolution of Cloud Computing has changed the perspective of how we store and secure our data in the public cloud. While security is a major concern here, the first level of securing and restricting access to data is by implementing AWS Identity and Access Management. In this blog, we are going to discuss one [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1452,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2],"tags":[316,318,346,319,344,343,345,315,317,341,342],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is AWS Identity and Access Management (IAM)?<\/title>\n<meta name=\"description\" content=\"In this blog, we are going to discuss one of the core security and user management services of Amazon Web Services i.e Identity and Access Management (AWS IAM).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is AWS Identity and Access Management (IAM)?\" \/>\n<meta property=\"og:description\" content=\"In this blog, we are going to discuss one of the core security and user management services of Amazon Web Services i.e Identity and Access Management (AWS IAM).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/\" \/>\n<meta property=\"og:site_name\" content=\"easydeploy.io\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-14T09:57:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-16T10:04:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"990\" \/>\n\t<meta property=\"og:image:height\" content=\"598\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Siranjeevi R\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Siranjeevi R\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/\"},\"author\":{\"name\":\"Siranjeevi R\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c\"},\"headline\":\"What is AWS Identity and Access Management (IAM)?\",\"datePublished\":\"2021-07-14T09:57:34+00:00\",\"dateModified\":\"2021-07-16T10:04:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/\"},\"wordCount\":1083,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png\",\"keywords\":[\"Access Management\",\"Amazon Web Services\",\"aws console iam login\",\"AWS IAM\",\"aws iam best practices\",\"aws iam console\",\"aws iam roles\",\"AWS Identity\",\"IAM\",\"iam aws\",\"iam in aws\"],\"articleSection\":[\"Amazon Web Services\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/\",\"name\":\"What is AWS Identity and Access Management (IAM)?\",\"isPartOf\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png\",\"datePublished\":\"2021-07-14T09:57:34+00:00\",\"dateModified\":\"2021-07-16T10:04:25+00:00\",\"description\":\"In this blog, we are going to discuss one of the core security and user management services of Amazon Web Services i.e Identity and Access Management (AWS IAM).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png\",\"contentUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png\",\"width\":990,\"height\":598,\"caption\":\"AWS Identity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.easydeploy.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is AWS Identity and Access Management (IAM)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#website\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/\",\"name\":\"easydeploy.io\",\"description\":\"A Cloud Architect Company\",\"publisher\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.easydeploy.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#organization\",\"name\":\"EasyDeploy Technologies Pvt Ltd\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png\",\"contentUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png\",\"width\":536,\"height\":100,\"caption\":\"EasyDeploy Technologies Pvt Ltd\"},\"image\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c\",\"name\":\"Siranjeevi R\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g\",\"caption\":\"Siranjeevi R\"},\"url\":\"https:\/\/www.easydeploy.io\/blog\/author\/siru\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is AWS Identity and Access Management (IAM)?","description":"In this blog, we are going to discuss one of the core security and user management services of Amazon Web Services i.e Identity and Access Management (AWS IAM).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/","og_locale":"en_GB","og_type":"article","og_title":"What is AWS Identity and Access Management (IAM)?","og_description":"In this blog, we are going to discuss one of the core security and user management services of Amazon Web Services i.e Identity and Access Management (AWS IAM).","og_url":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/","og_site_name":"easydeploy.io","article_published_time":"2021-07-14T09:57:34+00:00","article_modified_time":"2021-07-16T10:04:25+00:00","og_image":[{"width":990,"height":598,"url":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png","type":"image\/png"}],"author":"Siranjeevi R","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Siranjeevi R","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#article","isPartOf":{"@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/"},"author":{"name":"Siranjeevi R","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c"},"headline":"What is AWS Identity and Access Management (IAM)?","datePublished":"2021-07-14T09:57:34+00:00","dateModified":"2021-07-16T10:04:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/"},"wordCount":1083,"commentCount":0,"publisher":{"@id":"https:\/\/www.easydeploy.io\/blog\/#organization"},"image":{"@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png","keywords":["Access Management","Amazon Web Services","aws console iam login","AWS IAM","aws iam best practices","aws iam console","aws iam roles","AWS Identity","IAM","iam aws","iam in aws"],"articleSection":["Amazon Web Services"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/","url":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/","name":"What is AWS Identity and Access Management (IAM)?","isPartOf":{"@id":"https:\/\/www.easydeploy.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage"},"image":{"@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png","datePublished":"2021-07-14T09:57:34+00:00","dateModified":"2021-07-16T10:04:25+00:00","description":"In this blog, we are going to discuss one of the core security and user management services of Amazon Web Services i.e Identity and Access Management (AWS IAM).","breadcrumb":{"@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#primaryimage","url":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png","contentUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2021\/07\/Untitled-4.png","width":990,"height":598,"caption":"AWS Identity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.easydeploy.io\/blog\/what-is-aws-identity-and-access-management-iam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.easydeploy.io\/blog\/"},{"@type":"ListItem","position":2,"name":"What is AWS Identity and Access Management (IAM)?"}]},{"@type":"WebSite","@id":"https:\/\/www.easydeploy.io\/blog\/#website","url":"https:\/\/www.easydeploy.io\/blog\/","name":"easydeploy.io","description":"A Cloud Architect Company","publisher":{"@id":"https:\/\/www.easydeploy.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.easydeploy.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.easydeploy.io\/blog\/#organization","name":"EasyDeploy Technologies Pvt Ltd","url":"https:\/\/www.easydeploy.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png","contentUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png","width":536,"height":100,"caption":"EasyDeploy Technologies Pvt Ltd"},"image":{"@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c","name":"Siranjeevi R","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g","caption":"Siranjeevi R"},"url":"https:\/\/www.easydeploy.io\/blog\/author\/siru\/"}]}},"_links":{"self":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts\/1383"}],"collection":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/comments?post=1383"}],"version-history":[{"count":10,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts\/1383\/revisions"}],"predecessor-version":[{"id":1491,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts\/1383\/revisions\/1491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/media\/1452"}],"wp:attachment":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/media?parent=1383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/categories?post=1383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/tags?post=1383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}