Home/ Identity and Access Management (IAM)/ AWS IAM/ Reviews
88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
Protection for entire AWS environment
69.9%
26.3%
0%
3%
0.8%
Granular Access Control, Extensive Integrations, Role-Based Access Control, Centralized User Management
Complex Policy Management, Steep Learning Curve, Confusing User Interface, Limited Cross-Platform Compatibility
Users find AWS Identity and Access Management (IAM) easy to use and appreciate its fine-grained control over permissions and access. It is praised for its strong security features, including multi-factor authentication and role-based access control. Additionally, IAM's integration with other AWS services is a major advantage. However, some users have reported issues with the complexity of the platform and occasional difficulties in setting up and managing policies. Overall, AWS IAM is a powerful and secure tool for managing access and permissions, favored for its ease of use and integration with other AWS services.
AI-Generated from the text of User Reviews
IAM is great service to restrict permissions to users who use my AWS account. Permissions are extremely at granular level which means I can restrict others to limited services and also to limited operations on those services who use my aws account .
Using AWS CLI also we can give permissions to users which is very useful.
As a beginner to AWS I didn't found any disadvantages in AWS IAM.
By providing granular level permissions to users and restricting others to misuse with my account . I can control what others can do with my account.
it helps to implement different level of security and access to different users
IAM offers powerful security, but mastering it requires patience and navigating some bumps.
Its helps to distribute the access to different users as well root user is seperate to the rest
Cloud Security prevent Infrastructure from unauthorised access and fraud
Something integration with third-party products not easy
Prevent Infrastructure from unauthorised access
Centralised service to manage all of your consol and programmatic access for users, principles and services for RBAC using granular policies.
Cannot think of anything right now. Everything seems to be perfect here.
It solves the need to put granular access for RBAC assigned to users or principles for either console based access or programmatic access to various AWS services across accounts and regions.
The information availability is great and it very much concise and elaborated when explored into various expects of AWS Adminstrations.
For beginners it could be overwhelming but after a good training. Anyone can start exploring the platform better.
It is used better user management and access levels to AWS Secure environment.
the best part of IAM I liked while integration with AWS API gateway auth as IAM, that I can sign with social identities with Cognito IDP and helps my user to grant role-based access for some of my AWS resources
so far no dislike IAM, it's really too easy to use and pretty simple to understand each and every term within IAM
IAM helps us to grant role-based access to out AWS resources, also apart from this we can also configure openID such as Salesforce. It helps us to know who is going to use what sort of aws resources with defined policies.
In cloud environment where security is one of the major concern and need today aws iam is like a blessing where you can provide access to a user as per the needs i.e. provide access only on those services which are needed instead of providing generalised access.
The best part is you can provide policy based access to the user by adding specific policies to the role.
The only drawback I fell in aws IAM is that a user cannot add more than 10 policies to a role i.e a role cannot have more than 10 permissions. I believe this should be improved because there are use cases where a role may have more than 10 policies attached.
Problem IAM solving:- The basic problem iam is solving is of security by providing a user or role access only on the needful services instead of on all services.
Consider an example where a user need access only on Lambda service using IAM we can restrict the user to have access only on Lambda service instead of providing access on all services.
IAM is benefiting me by adding one more layer of security to my cloud aws account.
IAM access management is easy to use once you get the basics of Roles, & Policies. They can be customized to cater to any Organization. They can be easily integrated with SAML and supports federated sign-ins as well.
It might get a bit tricky to use at first. Azure's RBAC offers a similar experience which is more user-friendly. But once one understands the nuances it can be very well catered.
Controls access to services. It can be restricted to work in a specific region. You can apply them to the root account and the rules can then trickle down to the other groups using SCP's
AWS Identity and Access Management (IAM) provides fine-grained access control across all of AWS. With IAM, you can specify who can access which services and resources and uder which conditions. With IAM you can manage permissions to your workforce and systems to ensure least-privilage permissions.
It is a bit less complete than other solutions specialized on identity management and sometimes its hard to find the right documantation and Moreover MFA will expire in one day.Easy users
Easy Users and Groups management, Identity Providers, 2Fa, keep track of their .csv files.
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.
It provides a centralized location to manage user identities, groups, roles, and permissions across an AWS environment.
In certain scenarios, managing permissions inheritance and overrides across different levels of IAM entities (users, groups, roles) can be tricky.
It provides a centralized location to manage user identities, groups, roles, and permissions across AWS services.
This centralized management streamlines administration ensures consistency in access policies, and simplifies user provisioning and de-provisioning processes. This benefit saves time.