Federated access and authorisation made simple

July 2, 2020
In this session, learn how to implement attribute-based access control with role-based access control. We discuss how you can use this strategy to ensure that people have the right access to the things they need in their role, and we show you how to simplify their IAM policies in the process. Also learn how automation can deliver the consistency of access and authorisation, and how you can apply this to your environment. AWS Summit Online 2020
Previous Video
How Xinja built a neobank on the cloud
How Xinja built a neobank on the cloud

Xinja is a 100-percent digital cloud-based neobank composed of a microservices architecture built with Kube...

Next Video
Fraud detection: Using ML to identify and manage fraudulent activities
Fraud detection: Using ML to identify and manage fraudulent activities

Amazon Fraud Detector is a fully managed service that you can use to identify potentially fraudulent online...