❓ASK – iam afraid to lose hope | NewProxyLists

you are right dear, the same thing happened for me, I am still searching for anything new that lets me make some dollars daily but it’s really difficult to do that.
90% of the sites on the internet are trash and fake, you will lose not to gain.
I don’t know but in my opinion, the best way to make money is to use your skills and do services for people on Fiveer or Freelancer.
if you don’t have any skill, learn and study, don’t let your level bad, just study and be motivated


amazon rds – AWS RDS fine-grained access control using IAM authentication

Is it possible to limit a user's access to specific "databases" within an RDS DB cluster using IAM authentication?

Looking at this documentation, I don't see any obvious conditions that would allow this behavior.


For example:


Indicates whether the user is authorized to connect to the database db1 would be determined by the Condition statement in the IAM role attached to the EC2 instance.

amazon iam – aws AWSServiceRoleForClientVPN service role

I need the IAM role "AWSServiceRoleForClientVPN" to create the client VPN endpoint in aws.
but i don't have permission to "create a service role". So I have to ask the administrator to create AWSServiceRoleForClientVPN using the IAM console manually.

On the IAM console, I can't find which service and use case to select the creation of AWSServiceRoleForClientVPN. please tell me which service and use case should be selected.

Thank you.

How the first IAM page is found by SQL Server

Today, just out of curiosity, I was checking the logs when the first allocation for a new table in a new database is made.
fn_db_log for the database

I can see that GAM was used to find a free extension, then a page of that extension is allocated to be used as a data page. Lines 8-12.

And then it allocates another page which is not from the scope used before and uses this page as IAM. Line 13-16.

My question is, where does SQL Server find this page and make it as IAM. Why this page is not allocated from a scope that GAM is accessing.

Identity Management – AWS IAM Strategies That Differentiate Access to the Console and the Access Key

How can an AWS IAM policy be designed to differentiate access to a console (web) and an access key (API)?

Use cases:
Let's say I want to grant a certain group of users full IAM privileges via the console (Web) and read only IAM via an access key (API).

The specific use case is that I trust some AWS users with full IAM privileges because they have 2fa for console access. They do not practice 2fa for accessing access keys, and it is much easier to misuse them. Still, they still need access (read) to the access key (API), as they use audit tools and often use CLI.

The condition component in an AWS IAM strategy looks promising, I was able to use it effectively to enforce the use of IAM;

"Condition": {
                "BoolIfExists": {
                    "aws:MultiFactorAuthPresent": "false"

But I did not find any relevant conditions supported by AWS.

amazon web services – How to List All Private Images (IAM) in AWS Cloudformation Settings

How can I list all private AMIs in the dropdown menu of the service catalog.

AWSTemplateFormatVersion : 2010-09-09
Description: "simple web layer"
    Description: 'web Layer'
    Type: 'AWS::SSM::Parameter::Value'
    AllowedPattern: "^[a-zA-Z][-a-zA-Z0-9]*$"
    Default: ami-244333
    OwnerId: '836749474673'

Error: Invalid parameter property & # 39; ownerid & # 39;

What is the difference between IAM and the user. When to use IAM and when to use User?

When we access AWS resources, what should I use IAM or user?
If I am. What is the use of the user and when should it be used?

AWS Appsync authorization – why is IAM authorization safer than the API key approach

We are currently evaluating the type of authorization to use for our production AppSync APIs.

According to AWS documents (https://docs.aws.amazon.com/appsync/latest/devguide/security.html, https://aws.amazon.com/blogs/mobile/using-multiple-authorization-types-with -aws-appsync-graphql-apis /), AppSync supports multiple types of authorization – like based on API key (passing a static API key), based on IAM role.

My questions are about the differences between the API key based approach and the IAM based approach:

1) Why is using a static API key considered bad for production use cases if all calls to AppSync are based on HTTPS (which has good encryption) ?

2) Why can't we use our own short-lived token with the API key and validate this token in a resolver? This would bring a little dynamism because the token is short-lived, so even if someone hacks and obtains this token; by them the time of a re-reading arrives the token is already expired?

3) The previous manual token approach seems similar to using an IAM role for authorization. How much safer would it be to use IAM authentication from Amazon Cognito? roles for that to be that a manual token approach? Does the SIGV4 standard used by AWS help anyway here?

Kubernetes with kops in AWS – How to attach IAM policies to the IAM role used to create services?

Learn K8 with Kops in AWS (I think it's going to go in the AWS area), I'm working on setting up a simple service described in this article:
After deploying the service, an IAM permissions error (account number and domain name expurgated) is generated:

 Warning  SyncLoadBalancerFailed  19m                  service-controller  Error syncing load balancer: failed to ensure load balancer: Error creating load balancer: "AccessDenied: User: arn:aws:sts::${AWS::Account}:assumed-role/masters.myfirstcluster.kops.${domain_name}/i-08a3ce916f7e03e55 is not authorized to perform: iam:CreateServiceLinkedRole on resource: arn:aws:iam::${AWS::Account}:role/aws-service-role/elasticloadbalancing.amazonaws.com/AWSServiceRoleForElasticLoadBalancingntstatus code: 403, request id: c1a0598a-cd23-4e2a-9fd6-58904cbe76d5"

The AWS IAM role, created by the binary master kops, master my. The role is created by the kops binary during installation.

Is there an API kops method for defining the required policy on the role, or is it necessary to do so through the AWS API?

Identity Management – SCIM from ERP or IAM?

In our field, users are mastered in ERP. synchronization scripts are in place for inserting entries in the IAM. The scripts only pass a very small subset of attributes to the IAM. Some applications are notified by IAM using SCIM when a new user is added (see App 1), other apps only know new users when they use the service (see App 2) . There is now a new requirement for SCIM synchronization, but with fields outside the subset copied into IAM (see Annex 3).

If the data is synchronized from ERP via the script:
architecture diagram showing the 3 application connected to the synchronization script

Or should the subset change to include these details:
architecture diagram showing the App 3 connected to the IAM solution

and why?