Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS Certified Developer ??? Associate Guide

You're reading from   AWS Certified Developer ??? Associate Guide Your one-stop solution to passing the AWS developer's certification

Arrow left icon
Product type Paperback
Published in Sep 2017
Publisher Packt
ISBN-13 9781787125629
Length 600 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Bhavin Parmar Bhavin Parmar
Author Profile Icon Bhavin Parmar
Bhavin Parmar
Vipul Tankariya Vipul Tankariya
Author Profile Icon Vipul Tankariya
Vipul Tankariya
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. AWS Certified Developer – Associate Certification FREE CHAPTER 2. Introduction to Cloud Computing and AWS 3. Identity and Access Management 4. Virtual Private Clouds 5. Getting Started with Elastic Compute Cloud 6. Handling Application Traffic with Elastic Load Balancing 7. Monitoring with CloudWatch 8. Simple Storage Service, Glacier, and CloudFront 9. Other AWS Storage Options 10. AWS Relational Database Services 11. AWS DynamoDB - A NoSQL Database Service 12. Amazon Simple Queue Service 13. Simple Notification Service 14. Simple Workflow Service 15. AWS CloudFormation 16. Elastic Beanstalk 17. Overview of AWS Lambda 18. Mock Tests

IAM role


An IAM role is an AWS identity. Every IAM role has its own permission policy that defines what that role can do and what it cannot do. It is like an IAM user without a password or an access key and a secret key. An IAM policy can be associated with an IAM user or group, whereas an IAM role cannot be associated with a user or a group. It can be assumed by a user, application, or service to delegate access to an AWS resource within the same or another account. It dynamically generates a temporary access key and secret key, which can be assumed by an entity for authentication. Once a role is assumed, an entity can make API calls to AWS services permitted to the role assumed by the entity.

For example, a role can be assigned to an EC2 instance with permission to access DynamoDB and RDS databases. An application hosted on the EC2 can assume the role and make API calls to access DynamoDB or databases on RDS.

Similarly, if you want to allow your web or mobile application to access AWS resources...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image