Attribute Based Access Control with AWS SSO and Okta

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024
  • How to implement attribute-based access control model in AWS using identity federation with Okta Universal Directory and AWS SSO.
    Learn more at - amzn.to/2V4uMdW
    Subscribe:
    More AWS videos bit.ly/2O3zS75
    More AWS events videos bit.ly/316g9t4
    #AWS #AWSSSO #Okta #ABAC #AttributeBasesAccessControl #RBAC #attributes #directory #IdP #IdentityProvider

Комментарии • 5

  • @ericdalli2
    @ericdalli2 2 года назад +1

    Excellent demo Yuri. Congrats. 👏👏👏

  • @StephenRayner
    @StephenRayner 3 года назад +2

    What accent is this? Well explained thank you. Keep up the good work!

    • @DBMizrahi
      @DBMizrahi 3 года назад +1

      I think it's Russian accent or some close slavic language speaker's accent.

  • @StephenRayner
    @StephenRayner 3 года назад

    I would like to ensure all resource created via the AWS console are tagged and that the resource name is prefixed with;
    client-project-environment-resource
    Eg.
    google-chrome-qat-websitebucket

  • @StephenRayner
    @StephenRayner 3 года назад

    Would like to know how to use AWS SSO with AWS Amplify.