Which two approaches can satisfy these objectives?

A corporate web application is deployed within an Amazon Virtual Private Cloud (VPC) and is connected to the
corporate data center via an iPsec VPN. The application must authenticate against the on-premises LDAP
server. After authentication, each logged-in user can only access an Amazon Simple Storage Space (S3)
keyspace specific to that user.
Which two approaches can satisfy these objectives? (Choose 2 answers)

A corporate web application is deployed within an Amazon Virtual Private Cloud (VPC) and is connected to the
corporate data center via an iPsec VPN. The application must authenticate against the on-premises LDAP
server. After authentication, each logged-in user can only access an Amazon Simple Storage Space (S3)
keyspace specific to that user.
Which two approaches can satisfy these objectives? (Choose 2 answers)

A.
Develop an identity broker that authenticates against IAM security Token service to assume a IAM role in
order to get temporary AWS security credentials The application calls the identity broker to get AWS
temporary security credentials with access to the appropriate S3 bucket.

B.
The application authenticates against LOAP and retrieves the name of an IAM role associated with the user.
The application then cails the IAM Security Token Service to assume that IAM role The application can use the
temporary credentials to access the appropriate S3 bucket.

C.
Develop an identity broker that authenticates against LDAP and then calls IAM Security Token Service to get
IAM federated user credentials The application calls the identity broker to get IAM federated user credentials
with access to the appropriate S3 bucket.

D.
The application authenticates against LDAP the application then calls the AWS identity and Access
Management (IAM) Security service to log in to IAM using the LDAP credentials the application can use the
IAM temporary credentials to access the appropriate S3 bucket.

E.
The application authenticates against IAM Security Token Service using the LDAP credentials the application
uses those temporary AWS security credentials to access the appropriate S3 bucket.



Leave a Reply 10

Your email address will not be published. Required fields are marked *


Chef

Chef

I think its A and E.

donkeynuts

donkeynuts

You dont authenticate againts STS with LDAP credentials, you authenticate against the LDAP with LDAP credentials

Youngjin Kim

Youngjin Kim

It’s 99.99% B and C. I’m pretty sure.

siva

siva

User should authenticate against LDAP first; A and E are ruled out.
B: Application cannot get IAM role from LDAP; ruled out.
C and D are correct options

Bonnu

Bonnu

Yes C and D are the right options

krish

krish

C & D

donkeynuts

donkeynuts

You dont log into IAM thats wrong