Keith CaseyforPangea Blogpangea.cloud·Mar 6, 2024Introducing Passkeys from PangeaIn today's app-centric landscape, security is fundamental. While there isn't a single portion of our life untouched by technology, we're still stuck with the decades-old security practices of passwords. At Pangea, we're excited to improve our custome...Discuss·1 like·69 readspasskeys
Taegu Kangktg0210.hashnode.dev·Feb 19, 2024using AWS CLI under MFAoutline Using AWS CLI under MFA, you need session token and temporary AWS Access key and Secret key. how-to # aws sts get-session-token --duration-seconds 10000 --serial-number "arn:aws:iam::111111111:mfa/mfa_user" --token-code 123456 { "C...Discusssession token
Manish Kumarmaxmanishcosta.hashnode.dev·Jan 27, 2024Identity and Access Management (IAM) service in AWS. (Day 6)Identity and Access Management (IAM) IAM is used for security purpose, with IAM we can control entire AWS resources centrally. IAM is global and it is free. There are two type of users/account Root User Root user have full permission, login with e...DiscussAWS
Kris FProkrisfeher.com·Jan 24, 2024Essential tips for securing your first AWS accountAt account creation A secure password At account creation make sure you pick a strong password. Understandably "strong password" is a vague explanation, but you type in something similar to a service like this:https://bitwarden.com/password-strength/...DiscussAWS
Keith CaseyforPangea Blogpangea.cloud·Jan 2, 2024Using IPs, Domains, and Geolocation to secure your AuthenticationWhen I say “secure authentication,” what comes to mind? You probably think of SSL, password policies, and MFA. Those are a good starting point but what if we could look into the authentication request itself? What if we could use that request context...Discuss·82 readsauthentication
Vipul Chaudharyvipulblog.hashnode.dev·Dec 22, 2023AWS IAM Essentials: Policies, Users, and MoreIAM Introduction IAM: Identity and access management, It's a global service. User: Users are people within your organization. Group: The group only contains users. A user can be part of multiple groups. IAM Permissions: Can be assigned JSON Documents...Discuss·4 likes·79 readsAWS
Simon AsikaforUniAuth Blogblog.uniauth.com·Nov 27, 2023[Secure 101] What are 2FA and MFA? Does My Website Need These Features?As digitalization becomes increasingly prevalent, we rely more on websites for various aspects of life and work, including shopping, banking, and social media. However, this convenience also brings many security risks. We often see news about online ...Discuss·28 readsTwo-factor authentication (2FA)
Simon AsikaforUniAuth Blogblog.uniauth.com·Nov 27, 2023[Secure 101] Is It Really Safe to Change Passwords Every 90 Days or Regularly?Traditional Idea: Users Should Change Passwords Frequently In the digital world, protecting personal and corporate information security is a crucial aspect of our daily lives. Over the years, corporate security policies have often advised us to regul...Discuss·119 readspasswords
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 31, 2023AWS CloudFormation Template -Multi-Factor Authentication (MFA) for AWS IAM usersIntroduction: The provided #AWS CloudFormation template is a powerful tool for enforcing #Multi-Factor Authentication (MFA) policies within an #Amazon Web Services (AWS) Identity and #Access Management (IAM) environment. MFA is a critical security me...DiscussAWS
FXamel.hashnode.dev·Oct 22, 2023configure ssh with mfasudo apt install libpam-google-authenticator google-authenticator PAM (Pluggable Authentication Module) offers two types of tokens: sequential-based and time-based. Sequential-based tokens start at a certain point and increase after each use, whil...Discuss·3 likes·26 readsssh