Explore >> Select a destination


You are here

blog.ryanjarv.sh
| | memo.mx
23.7 parsecs away

Travel
| | In AWS, in order to access resources in other accounts without creating new users or handling passwords, you can use sts:AssumeRole. Let's say that you have some resources in AccountA (AWS Managed Prometheus for example) that you want to access from AccountB Account A In AccountA create a role account_a_role that has 2 types of policies: a Trust Relationship that define which entities can assume this role { "Version": "2012-10-17", "Statement": [ { "Sid": "AllowAssumeRoleFromAccountB", "Effect": "Allow",...
| | src-bin.com
22.2 parsecs away

Travel
| | In You should have lots of AWS accounts, I made a case for isolating environments and even services in their own accounts to reap all sorts of security, reliability, and compliance benefits. With the right tools in hand (Substrate, for one), operating lots of accounts can be just as efficient
| | jrott.com
19.9 parsecs away

Travel
| | This is my new hugo site
| | gouthamanbalaraman.com
85.8 parsecs away

Travel
| This post will give a basic discussion on securing authentication tokens that can be used with Flask-Login.