Amazon EC2 Cookbook by Unknown
Author:Unknown
Language: eng
Format: epub, pdf
Publisher: Packt Publishing
The machine running the client application should be a domain-joined machine. In the client application, you call proxy service to get the temporary credentials and access the S3 data from user folder.
Configuring AWS multifactor authentication
AWS multifactor authentication (MFA) adds an extra layer of security for your AWS users. MFA verifies your identity through something you know (user ID and password) and something you have with you (hardware device or software token). In addition to the user name and password, the user will need to enter a one-time authentication code while logging into the AWS console. As a best practice always configure multifactor authentication for the root account and other highly privileged IAM users. MFA is also used to control access to a specific resource and to AWS service API calls.
Using conditions in the policy, you can specifically allow a user access to a set of services only if the user was authenticated using the MFA code. For example, you can specify a condition that a user is allowed to create or terminate EC2 instances in the production environment only if they are authenticated using MFA.
There are two types of MFA—virtual and hardware. The virtual MFA device uses an application to generate an authentication code that is compatible with time-based one-time password (TOPT) standard. There are several different virtual MFA apps that you can use however note that AWS requires the virtual MFA app to generate a six-digit code. Virtual MFA is free to use, and you will need to either download the official MFA app or use Google Authenticator from your smartphone to implement MFA.
In case you want to implement hardware-based MFA, then you will need to purchase the hardware MFA device from third-party vendors such as Gemalto.
In this recipe, we configure a virtual MFA device (Google Authenticator) with AWS IAM.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26811)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20678)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20453)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20450)
The Fifty Shades Trilogy & Grey by E L James(19320)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19270)
Shot Through the Heart by Mercy Celeste(19135)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17300)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17235)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17082)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17004)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16622)
The Subtle Art of Not Giving a F*ck by Mark Manson(14624)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14317)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13983)
Scorched Earth by Nick Kyme(12969)
Drei Generationen auf dem Jakobsweg by Stein Pia(11153)
Suna by Ziefle Pia(11081)
Scythe by Neal Shusterman(10561)