Managing Authorization with Amazon Verified Permissions

Managing Authorization with Amazon Verified Permissions
Managing Authorization with Amazon Verified Permissions

CLOUD LABS



Managing Authorization with Amazon Verified Permissions

In this Cloud Lab, you’ll learn to leverage Amazon Verified Permissions for streamlined application security through Cedar policies.

8 Tasks

intermediate

1hr 30m

Certificate of Completion

Desktop OnlyDevice is not compatible.
No Setup Required
Amazon Web Services

Learning Objectives

A solid understanding of Cedar policy language
The ability to draft Cedar policies to manage authorizations
Hands-on experience creating and testing Cedar policies within the AWS account
Hands-on experience using Verified Permissions for authorization within applications
Cloud Lab Overview

Managing access control in a dynamic application environment with varying user roles and document ownership presents challenges in maintaining security and scalability. Traditional static authorization methods are cumbersome to update and prone to error, hindering efficient management of permissions. Amazon Verified Permissions offers a solution by providing a flexible policy management system that allows control over access rights based on real-time attributes and user groups, ensuring secure authorization across different application scenarios.

In this Cloud Lab, you’ll learn about Amazon Verified Permissions, and use it to secure your application. You’ll start by learning about Cedar policies, a fundamental component of Verified Permissions. After that, you’ll use AWS Management Console to create a Verified Permissions policy store and then a Cedar policy within that store. You’ll also learn how you can test the Cedar policies using the AWS Management Console. You’ll then explore an application with built-in authorization. You’ll also make some changes in the authorization model of that application to get an overview of its demerits. After that, you’ll replace that authorization model with Verified Permissions and experience how simple and easy managing that model is as compared to the other one.

After completing this Cloud Lab, you’ll be adept at leveraging Amazon Verified Permissions to secure applications. You’ll be able to create Cedar policies for precise access control and replace complex authorization models with Verified Permissions for simplified and effective permission management.

Architecture diagram
Architecture diagram
Cloud Lab Tasks
1.Introduction
Getting Started
2.Getting Started with Amazon Verified Permissions
Cedar Policy
Policy Store
3.Integrate Verified Permissions in an Application
Explore the Legacy Application with Built-in Authorization
Create Cedar Policies for the Application
Integrate Verified Permissions in the Application
4.Conclusion
Clean Up
Wrap Up
Labs Rules Apply
Stay within resource usage requirements.
Do not engage in cryptocurrency mining.
Do not engage in or encourage activity that is illegal.
Hear what others have to say
Join 1.4 million developers working at companies like