IAM (Pt. 2) Flashcards

1
Q

The basic steps to grant an app temporary access to AWS resources (via user credentials) are:

  1. __________
  2. Identity broker always authenticates with LDAP first, then with STS.
  3. App then gets temporary access to AWS resources allowed by the IAM user’s permissions.
A

Develop an identity broker to communicate with LDAP and STS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a new user have access to after it’s first created?

A

Nothing. Access must be granted through policies applied to the specific user or groups the user belongs to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: A user can log into the AWS console with their access key id and secret access key.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does STS stand for?

A

Security Token Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the three-step process for using Web Identity Federation.

A
  1. Authenticate with identity provider.
  2. Obtain temporary security credentials.
  3. Access AWS resource.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using Active Directory to authenticate to AWS, what are the correct steps performed?

  1. User navigates to ADFS webserver.
  2. User enters SSO credentials.
  3. __________
  4. User’s browser POSTs SAML assertion to the AWS SAML endpoint, and the AssumeRoleWithSAML API request to get temporary security credentials.
A

User’s browser receives SAML assertion from AD server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a “root account?” What access does it have?

A

The account created when first setting up an AWS account. It has complete admin access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four pillars of IAM?

A

Users, groups, roles, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Combining or joining a list of users in IAM with a list of users in Active Directory is an example of __________.

A

Federation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The basic steps to grant an app temporary access to AWS resources (by assuming a role) are:

  1. Develop an identity broker to communicate with LDAP and STS.
  2. Identity broker always authenticates with LDAP first, then gets an IAM role associated with a user.
  3. __________
  4. App uses that IAM role to interact with AWS resources as allowed by the role.
A

App then authenticates with STS and assumes the IAM role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

New users are assigned __________ and a secret access key when first created.

A

An access key id.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user’s access key id and secret access key are used for __________ access to AWS resources.

A

Programmatic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does IAM stand for?

A

Identity and Access Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which region is IAM in?

A

The Global region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The basic steps to grant an app temporary access to AWS resources (by assuming a role) are:

  1. Develop an identity broker to communicate with LDAP and STS.
  2. __________
  3. App then authenticates with STS and assumes the IAM role.
  4. App uses that IAM role to interact with AWS resources as allowed by the role.
A

Identity broker always authenticates with LDAP first, then gets an IAM role associated with a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: IAM is restricted to specific regions.

A

False. IAM is universal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Web Identity Federation?

A

Allows a developer to federate their application from Facebook, Google, or Amazon with their AWS account, allowing their end users to authenticate with one of these Identity Providers and receive temporary AWS credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an identity store?

A

A service that holds information that uniquely describes individuals or machine entities (e.g. - Active Directory, Facebook, Google).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: A user’s access key id and secret access key may be used to log into the AWS console.

A

False.

20
Q

True or False: A user can use their access key id and secret access key to access AWS via the APIs and command line interface.

A

True.

21
Q

When using Active Directory to authenticate to AWS, what are the correct steps performed?

  1. User navigates to ADFS webserver.
  2. __________
  3. User’s browser receives SAML assertion from AD server.
  4. User’s browser POSTs SAML assertion to the AWS SAML endpoint, and the AssumeRoleWithSAML API request to get temporary security credentials.
A

User enters SSO credentials.

22
Q

What is an identity broker?

A

A service that allows you to take an identity from one domain and join it to another domain.

23
Q

What is the API call used to obtain temporary security credentials when authenticating using Web Identity Federation?

A

AssumeRoleWithWebIdentity.

24
Q

A service that allows you to take an identity from one domain and join it to another domain is called __________.

A

An identity broker.

25
Q

When using Active Directory to authenticate to AWS, what are the correct steps performed?

  1. User navigates to ADFS webserver.
  2. User enters SSO credentials.
  3. User’s browser receives SAML assertion from AD server.
  4. __________
A

User’s browser POSTs SAML assertion to the AWS SAML endpoint, and the AssumeRoleWithSAML API request to get temporary security credentials.

26
Q

When using Web Identity Federation to allow a user to access an AWS service, what is the correct order of steps?

A
  1. User authenticates with identity provider and receives an ID token.
  2. The ID token is used with the AssumeRoleWithWebIdentity API to obtain temporary security credentials.
27
Q

What standard is used to exchange auth information with Active Directory?

A

SAML 2.

28
Q

True or False: An app authenticates to Active Directory first, then it receives a temporary security credential from AWS.

A

True.

29
Q

New users are assigned an access key id and __________ when first created.

A

A secret access key.

30
Q

What does federation mean?

A

Combining or joining a list of users in one domain with a list of users in another domain.

31
Q

Users have __________ permissions when first created.

A

No.

32
Q

What does IAM allow you to do?

A

Manage users and their level of access to the AWS console.

33
Q

The basic steps to grant an app temporary access to AWS resources (via user credentials) are:

  1. Develop an identity broker to communicate with LDAP and STS.
  2. __________
  3. App then gets temporary access to AWS resources allowed by the IAM user’s permissions.
A

Identity broker always authenticates with LDAP first, then with STS.

34
Q

What things can policy documents be applied to?

A

Users, groups, and roles.

35
Q

The basic steps to grant an app temporary access to AWS resources (via user credentials) are:

  1. Develop an identity broker to communicate with LDAP and STS.
  2. Identity broker always authenticates with LDAP first, then with STS.
  3. __________
A

App then gets temporary access to AWS resources allowed by the IAM user’s permissions.

36
Q

What does SAML stand for?

A

Security Assertion Markup Language.

37
Q

What is the purpose of STS?

A

To grant users limited and temporary access to AWS resources.

38
Q

What mechanism in STS allows users to authenticate with Facebook, Google, and Amazon and receive temporary AWS credentials?

A

Web Identity Federation.

39
Q

What is the name of the API call to request temporary security credentials from the AWS platform when federating with Active Directory?

A

AssumeRoleWithSAML.

40
Q

The AWS sign-in endpoint for SAML is https://__________.

A

signin.aws.amazon.com/saml

41
Q

To gain programmatic access to AWS resources, a user must use their __________ and __________.

A

Access key id. Secret access key.

42
Q

True or False: An app receives a temporary security credential from AWS first, then authenticates to Active Directory.

A

False.

43
Q

When using Active Directory to authenticate to AWS, what are the correct steps performed?

  1. __________
  2. User enters SSO credentials.
  3. User’s browser receives SAML assertion from AD server.
  4. User’s browser POSTs SAML assertion to the AWS SAML endpoint, and the AssumeRoleWithSAML API request to get temporary security credentials.
A

User navigates to ADFS webserver.

44
Q

Which Amazon service is used to grant users limited and temporary access to AWS resources?

A

Security Token Service (STS).

45
Q

The basic steps to grant an app temporary access to AWS resources (by assuming a role) are:

  1. __________
  2. Identity broker always authenticates with LDAP first, then gets an IAM role associated with a user.
  3. App then authenticates with STS and assumes the IAM role.
  4. App uses that IAM role to interact with AWS resources as allowed by the role.
A

Develop an identity broker to communicate with LDAP and STS.

46
Q

The basic steps to grant an app temporary access to AWS resources (by assuming a role) are:

  1. Develop an identity broker to communicate with LDAP and STS.
  2. Identity broker always authenticates with LDAP first, then gets an IAM role associated with a user.
  3. App then authenticates with STS and assumes the IAM role.
  4. __________
A

App uses that IAM role to interact with AWS resources as allowed by the role.

47
Q

New __________ are assigned an access key id and a secret access key when first created.

A

Users.