Authentication with IAM - A Review | Scribe

    Authentication with IAM - A Review

    • Hafeez Baig |
    • 5 steps |
    • 30 seconds
    information ordinal icon
    Refer to the following guide to learn how to use IAM in the cloud\ <https://scribehow.com/shared/How_to_Connect_to_an_AWS_EC2_Instance__czXjLrH1R1yAIXika6fGbA>
    1
    Sign in to **AWS Management Console** as an **IAM User** **Pre-requisite** - Ensure you have selected the AWS region closest to your location\ For this guide, we will be using us-east-2 (Ohio) as a preferred choice
    2
    Type **IAM** in the search bar and click on **IAM** to view the IAM Dashboard
    information ordinal icon
    **What is IAM in AWS?** IAM (Identity and Access Management) in AWS is a web service that enables you to manage access to AWS resources securely. It allows you to control who is authenticated (signed in) and authorized (has permissions) to use resources within your AWS account.
    3
    On the IAM Dashboard, navigate to the **Security recommendations** section and click on the **Add MFA** button on the right side
    information ordinal icon
    **What is an MFA in AWS IAM?** MFA stands for Multi-Factor Authentication. In the context of AWS IAM (Identity and Access Management), MFA adds an extra layer of security to user authentication. It requires users to present two or more forms of authentication factors to verify their identity.
    4
    **Select MFA device** wizard will open, give the **Device name**
    5
    Scroll to the **MFA device** section and select **MFA device** to authenticate with IAM
    information ordinal icon
    **What is an MFA device?** MFA devices are physical or virtual tools used to generate one-time passwords (OTPs) for Multi-Factor Authentication (MFA). These devices add an extra layer of security to the authentication process by requiring users to provide a temporary code along with their regular username and password. 1. **Authenticator App**: An authenticator app is a software application installed on a mobile device that generates one-time passwords (OTPs) for Multi-Factor Authentication (MFA). These OTPs are typically time-based and change periodically, providing an additional layer of security beyond just a username and password during the login process. 2. **Security Key**: A security key is a physical device used for Multi-Factor Authentication (MFA) authentication. It is often in the form of a USB device or a Bluetooth-enabled token. Security keys use public-key cryptography to authenticate users, offering a highly secure method for access control, especially for services and applications where strong security is essential. 3. **Hardware TOTP Token**: A hardware TOTP (Time-Based One-Time Password) token is a physical device that generates OTPs based on the TOTP algorithm. TOTP tokens typically have a small screen that displays the current OTP, and they synchronize their internal clocks with a server to ensure that the OTPs are valid within a specific time window.
    information ordinal icon
    Congratulations on completing the lab and reviewing Authentication with IAM! Good job!