AWS Security Blog
Category: HAQM Verified Permissions
Build an entitlement service for business applications using HAQM Verified Permissions
HAQM Verified Permissions is designed to simplify the process of managing permissions within an application. In this blog post, we aim to help customers understand how this service can be applied to several business use cases. Companies typically use custom entitlement logic embedded in their business applications. This is the most common approach, and it […]
How we designed Cedar to be intuitive to use, fast, and safe
This post is a deep dive into the design of Cedar, an open source language for writing and evaluating authorization policies. Using Cedar, you can control access to your application’s resources in a modular and reusable way. You write Cedar policies that express your application’s permissions, and the application uses Cedar’s authorization engine to decide which […]
Simplify fine-grained authorization with HAQM Verified Permissions and HAQM Cognito
July 20, 2023: This post had been updated on the code samples to match the most recent documentation for the JavaScript SDK and the Verified Permissions API. June 28, 2023: The article has been updated to make the console example and documentation consistent. AWS customers already use HAQM Cognito for simple, fast authentication. With the […]