Summary of AWS blogs for the week of Monday Jun 19

In the week of Mon Jun 19, 2023 AWS published 96 blog posts – here is an overview of what happened.

Topics Covered

Desktop and Application Streaming

Enhance Video Calls with Amazon WorkSpaces and Certificate Based Authentication

With Amazon WorkSpaces and Certificate-based Authentication (CBA), organizations can provide seamless authentication to their end user computing (EUC) services. Zoom has extended their support for virtual desktops with its Zoom plugin for Amazon WorkSpaces, enabling users to optimize their video experience when using Zoom with an Amazon WorkSpaces Windows client.

Optimizing Video Experience with Zoom Plugin for Amazon WorkSpaces

When starting a Zoom Meeting in an Amazon WorkSpaces session, the Zoom plugin establishes a secure connection with the Zoom Meeting client in the Amazon WorkSpaces session. The plugin also combines the audio and video streams from the Amazon WorkSpaces session into the Zoom Meeting, allowing users to start their video meeting with no extra setup.

Design Considerations with Certificate-Based Authentication

Organizations are increasingly standardizing on SAML 2.0 Identity Providers such as AWS IAM Identity Center and OKTA for their identity solution to access EUC services in AWS. With CBA, the logon experience to a virtual desktop includes the client authenticating with the domain controller through the Certificate Authority (CA). The CA checks the validity of the certificate and if valid, issues a token to the client which is used for authentication.

Cloud2: Helping with AWS Services

At Cloud2, we provide both professional and managed services to help customers with their AWS services. We are highly advanced in AWS and can provide specific solutions for customers, such as services for Amazon WorkSpaces and Certificate-Based Authentication. To read more about Cloud2 and our offerings, visit our website at https://www.cloud2.dk.

Read the full blog posts from AWS

AWS DevOps Blog

Policy-Based Access Control in Application Development with Amazon Verified Permissions

Access control is one of the most essential components of application security. Recently, policy-based access control (PBAC) has been gaining popularity, as it offers several advantages over traditional mechanisms such as role-based access control (RBAC) and access control lists (ACLs).

What is Policy-Based Access Control?

PBAC is a mechanism that provides a standardized way to define, manage and enforce access control across an organization. A policy-based access control system consists of a policy engine, a policy repository, and an enforcement engine. The policy engine is used to define the access control policies, while the policy repository stores them. Finally, the enforcement engine is responsible for enforcing the policies.

Benefits of PBAC

PBAC provides several benefits compared to traditional access control mechanisms. First, it enables increased flexibility and scalability by allowing access control to be managed at a granular level. This allows organizations to configure access to specific resources on an individual basis, as well as reducing the amount of manual work required to manage access control. Additionally, PBAC helps ensure that access control is consistent across the organization, as policies can be easily updated and enforced across multiple resources.

Amazon Verified Permissions

Amazon Verified Permissions (AVP) provides an easy-to-use policy-based access control system for Amazon Web Services (AWS). AVP allows developers to define and enforce policies for AWS resources in an automated way, using the AWS identity and access management (IAM) service. AVP provides a comprehensive set of features for creating, editing and managing policies, as well as for verifying their effectiveness.

AVP also enables users to quickly and easily set up and manage user access control policies for various AWS services. With AVP, users can define granular access control policies that ensure that only authorized users have access to the necessary resources. In addition, AVP can be used to ensure that access control policies are enforced consistently across multiple AWS services.

Cloud2 Can Help

At Cloud2, we understand the importance of access control in application development, and are experienced in helping customers implement policy-based access control with Amazon Verified Permissions. Our experts can help you develop an AVP policy that meets your security needs, creating an efficient and effective access control system for your AWS environment.

Read the full blog posts from AWS

Official Machine Learning Blog of Amazon Web Services

Unlock the Potential of Amazon SageMaker with Data Wrangler, FastAPI, Live Call Analytics, and More

Accelerate Time to Business Insights with the Amazon SageMaker Data Wrangler Direct Connection to Snowflake
Amazon SageMaker Data Wrangler is a powerful visual interface that lets you select and clean data, create features, and automate data preparation in machine learning (ML) workflows without writing any code. This reduces the time required to prepare data and perform feature engineering from weeks to minutes. SageMaker Data Wrangler supports Snowflake, a popular data warehouse solution that integrates with a range of services and databases. This integration allows users to visualize, detect anomalies, detect mismatched data points, and join data from different sources quickly and easily.

Deploy a Serverless ML Inference Endpoint of Large Language Models Using FastAPI, AWS Lambda, and AWS CDK
Deploying a locally trained machine learning (ML) model to the cloud for inference and use in other applications can be a significant challenge for data scientists. But with the right tools, such as

Scroll to Top