AWS IAM vs AWS Service Catalog vs Oathkeeper

Need advice about which tool to choose?Ask the StackShare community!

AWS IAM

1.2K
809
+ 1
26
AWS Service Catalog

20
47
+ 1
0
Oathkeeper

4
14
+ 1
0
Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More
Pros of AWS IAM
Pros of AWS Service Catalog
Pros of Oathkeeper
  • 23
    Centralized powerful permissions based access
  • 3
    Straightforward SSO integration
    Be the first to leave a pro
      Be the first to leave a pro

      Sign up to add or upvote prosMake informed product decisions

      Cons of AWS IAM
      Cons of AWS Service Catalog
      Cons of Oathkeeper
      • 1
        Cloud auth limited to resources, no apps or services
      • 1
        No equivalent for on-premise networks, must adapt to AD
        Be the first to leave a con
          Be the first to leave a con

          Sign up to add or upvote consMake informed product decisions

          - No public GitHub repository available -
          - No public GitHub repository available -

          What is AWS IAM?

          It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

          What is AWS Service Catalog?

          AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.

          What is Oathkeeper?

          A cloud native Identity & Access Proxy (IAP) which authenticates and authorizes incoming HTTP requests. Inspired by the BeyondCorp / Zero Trust white paper. Written in Go.

          Need advice about which tool to choose?Ask the StackShare community!

          What companies use AWS IAM?
          What companies use AWS Service Catalog?
          What companies use Oathkeeper?
            No companies found

            Sign up to get full access to all the companiesMake informed product decisions

            What tools integrate with AWS IAM?
            What tools integrate with AWS Service Catalog?
            What tools integrate with Oathkeeper?

            Sign up to get full access to all the tool integrationsMake informed product decisions

            What are some alternatives to AWS IAM, AWS Service Catalog, and Oathkeeper?
            Azure Active Directory
            It is a comprehensive identity and access management solution that gives you a robust set of capabilities to manage users and groups. You can get the reliability and scalability you need with identity services that work with your on-premises, cloud, or hybrid environment.
            Okta
            Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
            Auth0
            A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
            OAuth2
            It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
            Teleport
            Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements. Teleport replaces shared credentials with short-lived certificates and is completely transparent to client-side tools.
            See all alternatives