上QQ阅读APP看书,第一时间看更新
Summary
This chapter covered some of the key, essential components when managing access to your resources, including users, groups, roles, and MFA. With an understanding of these components within IAM, you are now able to successfully and securely control access and boost your security. The policies that underpin the permissions that are assigned to the identity objects help tie together the authentication and authorization functions of your access control mechanisms.
In the next chapter, we will be focusing on these policies, and how to implement and change them to suit your security needs.