Uncategorized
Atlassian Jira Administrator ACP-100 – Introduction and the Jira Atmosphere
How to Create Screen Schemes Screen schemes map the screens a user sees when they perform an issue operation. Before we start talking about how to create screen schemes, let’s talk about issue operations. Issue operations are actions a user takes when working with an issue. They include Create, when a user creates a brand new issue, edit when a user edits an existing issue, and View, when a user views an existing issue. In Jira, when you create, edit, or view an issue, you see a specific screen. As…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 16
Troubleshooting Answers – Solution 02 Hey run and welcome back. Now, in the previous video we looked into the troubleshooting solution associated with the policy one. Now in today’s video we’ll dedicate it with the policy two over here. All right? So let’s do one thing. Let’s copy this policy and within the Im console let’s go ahead and paste it over here. Now, once I do that, let’s click on review. And now you see it is not giving us any error. Now, one of the things that might…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 15
S3 – Cross Region Replication Hey everyone and welcome back to the Knowledge Portal video series. Now today’s topic is Cross Region Replication. Now if you go in properties we are slowly, slowly covering lot of things like versioning lifecycle policies etcd. And today we will be specifically speaking about the Cross Region replication related feature. Now if you remember in the previous lecture we were speaking about the durability concept where if the region itself goes down then independent upon the availability and the durability that AWS offers, your…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 14
Canned ACL’s Hey everyone and welcome back. In today’s video we will be discussing about canned ACL and we will look into its importance as far as the Cross account HC bucket policies are concerned. So let’s go ahead and begin understanding about cand ACLs. Now as the initial start just to have a right base, we should remember that every bucket and the objects that we upload within that bucket has an ACL which is associated with them. Now, whenever a request is received to the object within s…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 13
IAM & S3 Hi everyone and welcome back to the Knowledge Put in video series. And in today’s lecture we’ll understand the role that I am plays in granting access to the S Three base buckets. Now again, let’s take a very simple example where we have three IAM users and use Sarah and Mike, and there are two S Three buckets. One is design and one is finance. So basically, Andrew belongs to the finance team, sarah belongs to the HR team and the Mike belongs to the design…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 12
Understanding Active Directory Hey everyone and welcome back to the Knowledge Pool video series. And in today’s lecture we’ll have a highlevel overview about Active Directory. Now, I am very sure that most of you have heard about Active Directory because it is generally used in most of the organizations, specifically the enterprises. So let’s look into the Active Directory with a simple use case. So let’s look into a traditional way where you have an organization and within the organization you have different applications. So let’s assume this is…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 11
Choosing a right IdP Hey everyone and welcome to the KP Labs again. Now, in today we’ll look into how we can select a right identity provider for our environment. Now, we have already seen that for a SSO to happen, we need two things we need the IDP and we need a service provider. Service Provider we are already logged in as AWS, so this is something that we cannot change. However, when we talk about IDP, there are a lot of IDPs that we can choose from. Although…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 10
Capturing SAML Assertion Packets with Tracer Hey everyone and welcome back. Now in the early lecture we saw that we logged into JumpCloud, we clicked on the AWS icon and we were automatically logged into the AWS management console. Now the question is how? We also discussed the entire flow related to how a single sign on with SAML would really work. However, we did not really look into the packet trace on how that would really look like. So in today’s lecture we’ll go in more depth and the…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 9
Understanding Federation – Part 02 Hi everyone and welcome back to the second lecture of federation. So let’s go ahead and understand federation in more detail. So talking about a definition of federation, federation basically allows external identities to have a secure access in your AWS account without having to create any im users. So this, this is a very simple definition. Now when we speak about delegation, in the previous lecture we had the users which were present in the IAM and from IAM they used to do a…
Amazon AWS Certified Security Specialty – Domain 4 – Identity & Access Management part 8
AWS STS – Architecturing IAM user keys the right way – Part 3 Hey everyone and welcome back to the Knowledge Portal video series. Now, in the past few lectures we have been discussing more about the AWS Sts service and today we will look into how we can implement the Sts service for the user management. So let’s go ahead and understand on what I mean here with the use case. So the use case is, Matthew is a developer and he’s testing his code on the local environment…