Which technique can be used to integrate AWS IAM (Identity and Access Management) with an on-premises LDAP (Lightweight Directory Access Protocol) directory service for single sign-on access to AWS console?
Click on the arrows to vote for the correct answer
A. B. C. D.Answer - B.
According to https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html, you can use SAML to provide your users with federated single sign-on (SSO) to the AWS Management Console or federated access to call AWS API operations.
Options A, C and D are all incorrect because all of these options cannot help you to enable single sign-on.
The correct answer to the question is B: Use SAML (Security Assertion Markup Language) to enable single sign-on between AWS and LDAP.
Explanation:
AWS IAM (Identity and Access Management) is a web service that helps to securely control access to AWS resources. It allows administrators to manage users, groups, and permissions to access the AWS console and other AWS services. On the other hand, LDAP (Lightweight Directory Access Protocol) is a protocol for accessing and managing distributed directory information services over an IP network. LDAP is commonly used to authenticate and authorize users to access corporate resources, such as email, VPN, and applications.
To integrate AWS IAM with an on-premises LDAP directory service for single sign-on access to AWS console, SAML can be used. SAML (Security Assertion Markup Language) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider (in this case, the on-premises LDAP directory service) and a service provider (in this case, AWS).
Here are the high-level steps to configure SAML-based single sign-on between AWS and LDAP:
Option A is incorrect because IAM policies cannot directly reference LDAP account identifiers. Option C is incorrect because AWS STS is used to grant temporary credentials, and it does not integrate with LDAP for single sign-on. Option D is incorrect because IAM roles are used to delegate permissions to AWS resources and do not directly relate to LDAP credentials.