Methods for accessing cloud services
After a couple of days, the Cloud team meets again around the coffee machine.
Berta: What a shame. We completely forgot about securing our services.
Charles: I think it is a serious mistake. Fortunately, we discovered it pretty soon. What do we have as a start?
Raj: I’ve been reading lots of documentation about IAM – remember, access and management. The service takes care of identity, which means proving who you are. And then it takes care of access, which is what you can do once you are identified – that is, your permissions.
Charles: I’m taking note of this important difference:
Identity |
Who you are |
Authentication, Identification |
Access |
What can you do | ...