Amazon EC2 uses SSH keys, Windows passwords, and security groups to control who has access to the operating system of specific Amazon EC2 instances. There’s no method in the IAM system to allow or deny access to the operating system of a specific instance.
I thought for sure it was A since A doesn’t really control who. Maybe Amazon can explain to me how a firewall based on IPs/Port numbers identifies a person? I mean, what about a proxy? If firewalls controlled who had access then you could just put in people’s names into the firewall and call it a day.
B, IAM System
WOW, who would have thought it
http://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UseCases.html
Amazon EC2 uses SSH keys, Windows passwords, and security groups to control who has access to the operating system of specific Amazon EC2 instances. There’s no method in the IAM system to allow or deny access to the operating system of a specific instance.
I thought for sure it was A since A doesn’t really control who. Maybe Amazon can explain to me how a firewall based on IPs/Port numbers identifies a person? I mean, what about a proxy? If firewalls controlled who had access then you could just put in people’s names into the firewall and call it a day.
1
0