Every application needs to manage permissions that determine what data and features users are permitted to access. Building a bespoke permissions system can be time-intensive and costly. In this session, discover how Amazon Verified Permissions provides developers with a prebuilt service to manage and evaluate application permissions, expressed as policies. Learn how to scope a permissions model based on principals, actions, resources, and context, and how to define attribute- and role-based policies using the Cedar language. The session also covers integration models with identity providers and services such as Amazon API Gateway.
Learn more about AWS re:Inforce at .
Subscribe:
More AWS videos:
More AWS events videos:
ABOUT AWS
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.
AWS is the world's most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
#reInforce2023 #AWSEvents