Questions in Security, Identity, & Compliance
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Similar to the Gen1 documentation below, is it possible to import an existing Cognito user pool into Amplify Gen2...
0
answers
0
votes
145
views
asked 3 days agolg...
I noticed that OKTA has a platform-SSO option for Mac OS. Does AWS have something similar?
Ideally I want to configure the Mac so the user would log into Identity Center; define the normal AWS...
1
answers
0
votes
95
views
asked 3 days agolg...
I have a codepipeline with some codebuild stages. When stage 1 of codebuild project finished, I can't see the output build artifact. The source artifact is available on S3. Problem is with build...
1
answers
0
votes
229
views
asked 3 days agolg...
Hi AWS, I have to add more than 50 Principals (IAM Roles) in S3 bucket policy as the bucket is shared across 50 accounts and the role name is exactly same just for the simplicity purpose. Knowing the...
2
answers
0
votes
266
views
asked 3 days agolg...
I have IAM users and I want them to manage their own MFA devices. Create them, list them and remove them. They may choose any name they'd like to identify the MFA devices.
I used to have a permission...
3
answers
0
votes
99
views
asked 4 days agolg...
Hello, AWS People
I wanted to limit access to s3 to vpcendpoint for iot credentials, so I configured it as follows on S3 bucket policy.
```
{
"Version": "2012-10-17",
"Id":...
4
answers
0
votes
288
views
asked 4 days agolg...
Hi, just to give you some context:
I have an organization and within the management account I created an Identity Center instance (**management-instance**), that instance has a tag called "Exclude"....
0
answers
0
votes
262
views
asked 4 days agolg...
Hi AWS, I have to implement a lambda function or set of functions across multiple AWS accounts that are part of the AWS Organization managed using Control Tower. What should be the best approach in...
3
answers
0
votes
310
views
asked 4 days agolg...
What are the steps that S3/KMS performs to de-crypt objects that have been encrypted with a short-living bucket key generated from a KMS key?
S3 Bucket keys are used for a time limited period within...
1
answers
0
votes
76
views
asked 5 days agolg...
In AWS IoT, by using a custom authorization policy, you can connect to IoT using mqtts:// with the ALPN tag 'mqtt', or using mqtts:// (WebSocket) to connect to IoT.
My Question is there's any way to...
0
answers
0
votes
101
views
asked 5 days agolg...
Hi,
When doing a test like it's advised in it's successful
https://repost.aws/knowledge-center/windows-activation-fails
```
Test-Netconnection 169.254.169.250 -port 1688
TcpTestSucceeded :...
2
answers
0
votes
47
views
asked 5 days agolg...
I can customise the style for the forgot password redirect link using the class "redirect-customizable", however the default style for anchor:hover is inherited from the bootstrap css file referenced...
0
answers
0
votes
199
views
asked 5 days agolg...