Chapter 11: Bringing Your Users into AWS
In the previous chapter, we implemented the authentication and authorization components of the administrative user model, which we initially conceptualized back in Chapter 8, An Ounce of Prevention – Planning Your Administrative Model. We accomplished our objectives through a combination of service control policies from AWS Organizations, AWS Single Sign-On (SSO) permission sets, and group-based access controlled by an external identity provider (IDP). Our requirements for administrative user access focused on gaining access to AWS accounts and the resources within those accounts. However, what are our options for providing user identity information to those applications that our organization intends to host on AWS?
In this chapter, we will review how administrative and non-administrative identity use cases differ, examine several possible solution architectures to solve this challenge (some using AWS services and some not), and then...