Let's take a quick look at what happened in AWS-land last week:Tuesday, September 11 |
|
Wednesday, September 12 |
|
Thursday, September 13 |
|
SOURCE
Tuesday, September 11 |
|
Wednesday, September 12 |
|
Thursday, September 13 |
|
Access and manage Amazon’s growing suite of infrastructure web services through a simple and intuitive, web-based user interface. The AWS Management Console provides convenient management of your compute, storage, and other cloud resources.
Consider this as a "POWER USER LOGIN" (this is a term coined by me to set perspective and not by AWS)
A user can sign in using the typical AWS Console login URL. The user must use email-address using which the account is created and password provided.
This way of sign in allows the user complete control over the AWS services, resources and account management.In this guide we will be concentrating more on Account-level login to the AWS Management Console.
Consider this as a "ACCESS CONTROLLED USERs"(this is a term coined by me to set perspective and not by AWS)
In case there is need of more than 1 user to login to the AWS account, you can use the IAM Service. Each user may have same or different access controls over the various AWS services and resources. The users can sign into the console using a different alias, specific to your account and using specific user login name & password. These privilieges are not only applicable to the AWS Management Console. The same can be applied to the use of SDKs and APIs. This can be achieved by creating user specific Access Keys and Secret Keys.
IAM also enables identity federation between your corporate directory and AWS services.
I'm NOT covering IAM user login in this tutorial, but I will surely write a guide on the topic and provide updated links.