DEV Community

# iam

Identity and Access Management principles, technologies, and best practices.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Resources for Catching Up on OAuth2 and OIDC

Resources for Catching Up on OAuth2 and OIDC

1
Comments
4 min read
Basics of Authentication and Authorization

Basics of Authentication and Authorization

1
Comments
3 min read
Understanding Identity and Access Management (IAM) Architecture in Oracle Cloud Infrastructure

Understanding Identity and Access Management (IAM) Architecture in Oracle Cloud Infrastructure

Comments
3 min read
AWS IAM + S3 Demystified: Map Every S3 CLI Command to Its Required Permission

AWS IAM + S3 Demystified: Map Every S3 CLI Command to Its Required Permission

Comments
4 min read
AWS Authentication: IAM Identity Center (SSO) - The right way in 2026

AWS Authentication: IAM Identity Center (SSO) - The right way in 2026

1
Comments
5 min read
IAM role assumption across AWS accounts: the right way (with working Terraform)

IAM role assumption across AWS accounts: the right way (with working Terraform)

1
Comments
2 min read
Securing Non-Human Identities in Cloud Environments

Securing Non-Human Identities in Cloud Environments

Comments
7 min read
Cost-Effective IAM Lab Infrastructure for Enterprise-Scale Testing

Cost-Effective IAM Lab Infrastructure for Enterprise-Scale Testing

1
Comments
8 min read
GitHub Actions OIDC with AWS: complete zero-credential setup

GitHub Actions OIDC with AWS: complete zero-credential setup

6
Comments
1 min read
AWS IAM Explained Without Making Your Head Hurt

AWS IAM Explained Without Making Your Head Hurt

1
Comments
3 min read
AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk

AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk

1
Comments
6 min read
How to Audit Your Own Service Accounts: A Step-by-Step Guide to Non-Human Identity Security

How to Audit Your Own Service Accounts: A Step-by-Step Guide to Non-Human Identity Security

Comments
9 min read
Identity-First Security Strategy

Identity-First Security Strategy

1
Comments
4 min read
The First Password Breach Wasn’t a Hacker — It Was OperationsQuestion for IAM/PAM folks:

The First Password Breach Wasn’t a Hacker — It Was OperationsQuestion for IAM/PAM folks:

Comments 1
1 min read
Architecting Zero Trust for Autonomous Agents

Architecting Zero Trust for Autonomous Agents

7
Comments 3
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.