StackShareStackShare
Follow on
StackShare

Discover and share technology stacks from companies around the world.

Product

  • Stacks
  • Tools
  • Companies
  • Feed

Company

  • About
  • Blog
  • Contact

Legal

  • Privacy Policy
  • Terms of Service

© 2025 StackShare. All rights reserved.

API StatusChangelog
AWS IAM
ByAWS IAMAWS IAM

AWS IAM

#2in Authentication
Discussions1
Followers819
OverviewDiscussions1

What is AWS IAM?

It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

AWS IAM is a tool in the Authentication category of a tech stack.

Key Features

Manage IAM users and their access - You can create users in IAM, assign them individual security credentials (i.e., access keys, passwords, and Multi-Factor Authentication devices) or request temporary security credentials to provide users access to AWS services and resources.Manage IAM roles and their permissions - You can create roles in IAM, and manage permissions to control which operations can be performed by the entity, or AWS service, that assumes the role. You can also define which entity is allowed to assume the role.Manage federated users and their permissions - You can enable identity federation to allow existing identities (e.g. users) from your corporate directory or from a 3rd party such as Login with Amazon, Facebook, and Google to access the AWS Management Console, to call AWS APIs, and to access resources, without the need to create an IAM user for each identity.

AWS IAM Pros & Cons

Pros of AWS IAM

  • ✓Centralized powerful permissions based access
  • ✓Straightforward SSO integration

Cons of AWS IAM

  • ✗Cloud auth limited to resources, no apps or services
  • ✗No equivalent for on-premise networks, must adapt to AD

AWS IAM Alternatives & Comparisons

What are some alternatives to AWS IAM?

Teleport

Teleport

Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements. Teleport replaces shared credentials with short-lived certificates and is completely transparent to client-side tools.

SailPoint

SailPoint

It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

HashiCorp Boundary

HashiCorp Boundary

Simple and secure remote access — to any system anywhere based on trusted identity. It enables practitioners and operators to securely access dynamic hosts and services with fine-grained authorization without requiring direct network access.

AWS Service Catalog

AWS Service Catalog

AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.

Infra

Infra

It enables you to discover and access infrastructure (e.g. Kubernetes, databases). We help you connect an identity provider such as Okta or Azure active directory, and map users/groups with the permissions you set to your infrastructure.

BeyondTrust

BeyondTrust

It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems.

AWS IAM Integrations

Meldium, Amazon MQ, Datomic Cloud, Amazon EKS, SignalFx and 7 more are some of the popular tools that integrate with AWS IAM. Here's a list of all 12 tools that integrate with AWS IAM.

Meldium
Meldium
Amazon MQ
Amazon MQ
Datomic Cloud
Datomic Cloud
Amazon EKS
Amazon EKS
SignalFx
SignalFx
Commandeer
Commandeer
Flood IO
Flood IO
AWS CodeArtifact
AWS CodeArtifact
Nimbella
Nimbella
AutoCloud
AutoCloud
Amazon ECR
Amazon ECR
Amazon Location Service
Amazon Location Service

AWS IAM Discussions

Discover why developers choose AWS IAM. Read real-world technical decisions and stack choices from the StackShare community.

StackShare Editors
StackShare Editors

May 10, 2014

How Slack uses Amazon Web Services (AWS)

Needs adviceonAWS IAMAWS IAMAWS EC2AWS EC2

In a 2015 AWS case study, Richard Crowley, Director of Operations said “with traditional IT, it would take weeks or months to contend with hardware lead times to add more capacity. Using AWS, we can look at user metrics weekly or daily and react with new capacity in 30 seconds.”

Slack needed to pick an infrastructure partner that could support the exponential growth they were experiencing. AWS is the cloud provider that supplied them with i2.xlarge Amazon Elastic Compute Cloud (Amazon EC2) instances for their LAMP stack, Amazon Simple Storage Service (Amazon S3) for user's file uploads and static assets, and ELB to Load Balance workloads across their EC2 instances.

For security, Slack went with Amazon Virtual Private Cloud (VPC) for controlling security groups and firewall rules and AWS Identity and Access Management (IAM) for controlling user credentials and roles.

In 2018, Slack signed an agreement with AWS to spend at least $50 million a year over five years, for a total of at least $250 million, according to the company’s filing with the SEC for a public stock listing (via CNBC)

0 views0
Comments

Try It

Visit Website

Adoption

On StackShare

Companies
371
9MOSCV+365
Developers
855
FAMEMR+849