<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>iam</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/49/feed"/>
    <updated>2026-05-07T00:07:27+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/49/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/428</id>
            <title type="text"><![CDATA[https://github.com/ballerine-io/ballerine]]></title>
            <link rel="alternate" href="https://github.com/ballerine-io/ballerine" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/428"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-source infrastructure and data orchestration platform for risk decisioning - ballerine-io/ballerine]]>
            </summary>
            <updated>2025-12-07T04:00:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/392</id>
            <title type="text"><![CDATA[Federate Kubernetes with AWS IAM using OIDC · reecetech]]></title>
            <link rel="alternate" href="https://reece.tech/posts/oidc-k8s-to-aws/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/392"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-23T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/227</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security+%26+Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_centralize_automate_IAM&amp;amp;linkId=62045363]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&amp;sc_publisher=TWITTER&amp;sc_country=Security+%26+Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_centralize_automate_IAM&amp;linkId=62045363" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/227"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[To keep pace with AWS innovation, many customers allow their application teams to experiment with AWS services in sandbox environments as they move toward production-ready architecture. These teams need timely access to various sets of AWS services and resources, which means they also need a mechanism to help ensure least privilege is granted. In other […]]]>
            </summary>
            <updated>2025-12-27T02:00:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/146</id>
            <title type="text"><![CDATA[https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=iamresourcebasedpolicies&amp;amp;sc_category=AWS_Identity_and_Access_Management&amp;amp;linkId=46974513]]></title>
            <link rel="alternate" href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=iamresourcebasedpolicies&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46974513" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/146"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Define permissions on a resource in order to grant IAM users access to resources in other AWS accounts.]]>
            </summary>
            <updated>2026-03-18T08:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/79</id>
            <title type="text"><![CDATA[Keycloak]]></title>
            <link rel="alternate" href="https://www.keycloak.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/79"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-21T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/27</id>
            <title type="text"><![CDATA[AWS Policy Generator]]></title>
            <link rel="alternate" href="https://awspolicygen.s3.amazonaws.com/policygen.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/27"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS Policy Generator]]>
            </summary>
            <updated>2026-04-04T06:00:11+10:00</updated>
        </entry>
    </feed>
