Which two approaches can satisfy these objectives?

1 Comment

  1. Theresa
    Author

    In my opinion, the answer is:
    The application authenticates against LDAP and retrieves the name of an IAM role associated with the user. The application then calls the IAM Security Token Service to assume that IAM role. The application can use the temporary credentials to access the appropriate S3 bucket.

Leave a Reply to Theresa Cancel reply

Your email address will not be published. Required fields are marked *

eleven + eleven =