 
      
    | You are here | blog.ryanjarv.sh | ||
| | | | | memo.mx | |
| | | | | In AWS, in order to access resources in other accounts without creating new users or handling passwords, you can use sts:AssumeRole. Let's say that you have some resources in AccountA (AWS Managed Prometheus for example) that you want to access from AccountB Account A In AccountA create a role account_a_role that has 2 types of policies: a Trust Relationship that define which entities can assume this role { "Version": "2012-10-17", "Statement": [ { "Sid": "AllowAssumeRoleFromAccountB", "Effect": "Allow",... | |
| | | | | src-bin.com | |
| | | | | In You should have lots of AWS accounts, I made a case for isolating environments and even services in their own accounts to reap all sorts of security, reliability, and compliance benefits. With the right tools in hand (Substrate, for one), operating lots of accounts can be just as efficient | |
| | | | | jrott.com | |
| | | | | This is my new hugo site | |
| | | | | gouthamanbalaraman.com | |
| | | This post will give a basic discussion on securing authentication tokens that can be used with Flask-Login. | ||