Alex EagleforAspect Blogblog.aspect.build·Dec 17, 2024Self-hosting your CI/CD infraAspect Workflows is the Software-as-a-Service product that runs Bazel developer workflows, such as continuous integration and delivery, with the speed and cost benefits promised by this advanced tool. But it’s not like most Cloud-hosted SaaS that run...56 readsSaaS
SUJIT KUMAR SAHOOsujittulu.hashnode.dev·Dec 12, 2024Microsoft Entra MFA: Managing Reauthentication Alerts and Session LifetimesHello Connections, It has come to my mind to share something which is useful for the security prospectus. Where we will ensure that being an IAM engineer you have placed the right protection to your organization. So, let’s talk about the benefits tha...MFA
phil otienosalesforce-sso-with-azure-ad.hashnode.dev·Dec 11, 2024Salesforce Single Sign-On (SSO) with Microsoft Entra IDIntroduction Integrating Salesforce with Microsoft Entra ID offers a seamless, secure single sign-on (SSO) experience. This powerful integration eliminates the need for multiple logins, enhancing user productivity and reducing the risk of security br...10 likesAzure
Gedion Danielblog.gediondaniel.dev·Dec 1, 2024AWS S3: Your Complete Guide to Cloud StorageEver wondered where companies store their millions of files, images, and videos? Many of them use Amazon S3, a service so reliable that even Netflix uses it to store their video content. Let's explore what makes S3 special and how you can use it for ...AWS
Ahmed Salaumedon.hashnode.dev·Nov 29, 2024Cloud Security Best Practices with AWS IAMEnsuring robust security in the cloud is essential for managing resources efficiently and protecting sensitive data. AWS Identity and Access Management (IAM) offers a powerful way to implement fine-grained access control for your cloud environment. I...27 readsAWS
Harshit Sahuharshitsahu2311.hashnode.dev·Nov 24, 2024IAM Service in AWSAWS Identity and Access Management is a web service that helps you securely, control access to AWS resources. You use IAM to control who is authenticated (signed-in) and authorized (has permission). Important Points - When you first create an AWS a...77 readsAWSAWS
Hridhi Kumarikumari-hridhi.hashnode.dev·Nov 18, 2024IAM TasksTask 1: Create a VM on GCP and Host a Website Steps: Log in to GCP Console: Go to Google Cloud Console. Create a New VM: Navigate to Compute Engine > VM instances. Click Create Instance. Fill in the instance details: Name: Give it a unique...IAM,MFA,Access key ID,Secret access key
Daniel Olasupodanielolasupo.hashnode.dev·Nov 7, 2024Step-by-Step Guide to Creating IAM Users and Groups on AWS# Introduction In this guide, I’ll walk you through setting up and managing IAM users and groups in AWS, a crucial part of securing your AWS environment. By using IAM (Identity and Access Management), you can grant specific permissions to users, redu...11 likes·130 readsAWS IAM
Aravind Satturaravind1.hashnode.dev·Oct 25, 2024A Guide to AWS Administrative Tools for Seamless Cloud OperationsManagement Tools Amazon CloudWatch CloudWatch is a monitoring service for AWS that tracks various services and provides detailed information about applications, including logs and metrics. Users can set up alarms to ensure their applications operate ...1 likeSWF
Vishnu Rachapuditechnodiaryvishnu.hashnode.dev·Oct 17, 2024AWS Identity and Access Management (IAM): The Cornerstone of Secure Access ControlAWS Identity and Access Management (IAM) is essential for controlling access to your AWS resources. It allows you to define who can access what, under which conditions. Whether managing permissions for users, applications, or services, understanding ...AWS Security SeriesAWS