Approaches for authenticating external applications in a machine-to-machine scenario

Determining the best approach Let’s start by looking at possible authentication mechanisms that AWS supports in the following table. I’ll first identify the AWS service or services where the authentication can be set up—called the AWS front-end service.

Read full article on AWS Security Blog

 


Date:

Categorie(s):