Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Capterra carefully verified over 2 million reviews to bring you authentic software and services experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. Learn more.
Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software and service providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. Learn more.
Pros
Overall it was really very much good, you are not see any bug or production issue.
It's top-notch security and ease of setup without ambiguity. Even with little experience working with the AIM service is so seamless yet powerful.
The documentation is very extensive and answers most of the questions that were arising when working with IAM and granting accesses to specific services in the app.
Overall we are very happy with the IAM service since it comes pre-integrated with many AWS services that we use and support for the entire organization.
Cons
Otherwise you will have some very fiddly problems to solve where things fail unexpectedly. I would say this is most of the cost of implementation, just getting the permissions right as you build.
For example, if you only report errors via alarms then you need to make sure you're injecting faults in your tests.
In comparison to its competitors, AWS does not make things easily discoverable in the UI. You can do it through the CLI tools and consoles, but the learning curve can be very steep.
It does not work well with infrastructure outside AWS.
Showing Most Helpful
Showing 13 of 13 reviews
"This is what you supposed to use Everyday"
Pros: What I like most about AWS Identity and Access Management (IAM) is its granular control and security. With IAM, I can manage access to AWS resources with a high level of detail, specifying permissions at a very fine-grained level. This means that I can define exactly who can access what services and resources, under what conditions, and with which actions allowed (like read, write, or delete). This helps to minimize the risk of unauthorized access and enables me to apply the principle of least privilege effectively.
Cons: What I like least about AWS Identity and Access Management (IAM) is its complexity in managing permissions at scale. As the number of users, roles, and policies grows, it can become difficult to keep track of permissions, especially in large environments with many AWS services.
"A fantastic access control system"
Pros: I am going to choose two things because I can't choose between them. First is the ease of integration with other identity systems. It's fairly easy to get something like your HR system (Rippling in my case). The other is the truly granular access control which lets you give very specific access to custom roles for various automated systems to do what they need to and nothing more. If you keep on top of that as you go and don't grant `*` permissions, it makes going through compliance checks on the platform much easier because there's no need to worry about small components of your system going rogue, because they just can't.
Cons: Implementation can be challenging. AWS has better tools than they used to for checking permissions but if your code performs different actions on different paths then you really need to be thorough in your testing to make sure you have the permissions you need. For example, if you only report errors via alarms then you need to make sure you're injecting faults in your tests. Otherwise you will have some very fiddly problems to solve where things fail unexpectedly. I would say this is most of the cost of implementation, just getting the permissions right as you build.
"Compared to its competitors, usable, but not delightful"
Pros: In AWS there is always a way to get something done. When dealing with user, service principals and co. you will find a way.
Cons: In comparison to its competitors, AWS does not make things easily discoverable in the UI. You can do it through the CLI tools and consoles, but the learning curve can be very steep.
"ONE OF THE BEST RBAC (ROLE BASED ACCESS CONTROL)"
Overall: Overall it was really very much good, you are not see any bug or production issue.
Pros: IAM is one of the most advanced technology to give access to the users and some of the providers and vendors will only provide the access for users as per the applications but AWS managed in this way that if a service needs a resource we need to provide access for read as well as write both so it was too good when comes security
Cons: There is no AI BOT or assistent who hear the requirements and create role for the customers, clients or customers needs to create role test the application then only they will satisfied so it was just a good thing if they create a bot .
"Identity Management Per Excellence "
Overall: Top-Notch.
Pros: It's top-notch security and ease of setup without ambiguity. Even with little experience working with the AIM service is so seamless yet powerful.
Cons: It's simply and excellent tool with no issues based on the coverage of my usage.
"aws iam "
Pros: It's easy to create a user and attach pre-defined policies. For security, we have MFA and password policy, and many more things
Cons: We can't use the Access key on the same user with MFA enabled on the console
"Easily manage access between AWS Resources"
Overall: Very happy with AWS IAM. Without it, it would be very difficult to manage our AWS ecosystem in an efficient and secure way.
Pros: Able to create one user or service account in AWS that has access to all of the resources it needs to do its work. Whether, it's an individual, web application, reporting tool, or countless other uses, you are able to assign access to only what that user needs with access keys and quickly remove that access when it is no longer needed.
Cons: Requires the build out of Groups and Policies when not using the built in options. This can slow down user creation.
"Best AWS service for user identification, authentication & authorization"
Overall: Overall we are very happy with the IAM service since it comes pre-integrated with many AWS services that we use and support for the entire organization.
Pros: User groups, user provisioning, user authentication and authorization, access control, roles setup, single stop shop for billing administrator for reporting and audit.
Cons: Integration with AD can be improved. Works fine only for AWS services but lacks features for on-premise application outside AWS.
"Expensive and complicated but nothing else comes close."
Pros: Very complex and wide ranging set of tools.
Cons: Extensive training is needed to fully understand the product.
"IAM for managing identities of a Web App"
Pros: It integrates really smoothly with other AWS services including AWS Api Gateway. The documentation is very extensive and answers most of the questions that were arising when working with IAM and granting accesses to specific services in the app
Cons: It does not work well with infrastructure outside AWS
"IAM, la piedra angular para la seguridad en AWS"
Overall: En términos generales, IAM me ha brindado una excelente experiencia en la administración de accesos y permisos en AWS, ofreciendo una funcionalidad robusta y flexibilidad a la hora de cumplir con los requerimientos de los clientes finales.
Pros: IAM es un servicio robusto que permite brindar protección a los diferentes recursos que se encuentren desplegados en AWS, evitando el accesso y uso no autorizado de los mismos. Otro beneficio es la gran flexibilidad que brinda para adaptarse a los requerimientos de seguridad de diferentes clientes.
Cons: Considero que se necesita mejorar la interfaz para ser más intuitiva para los usuarios, además de que sería importante mejorar la funcionalidad de creación de políticas de IAM a través de un asistente virtual
"Chive per la sicurezza: Least Privilege Principle"
Overall: Lo utilizzo a lavoro nelle app di test che ho sviluppato per gestire quali utenti possono accedere a delle determinate risorse
Pros: Consente con precisione di decidere a cosa possono accedere utenti e servizi
Cons: Forse per i meno esperti può risultare complesso ma non mi sento di dire niente di negativo
"Ottima esperienza "
Pros: Granularità di profili, ruoli e policy, praticamente è possibile modellare qualsiasi diritto o crearne di nuovi, tutto quello di cui potresti aver bisogno puoi farlo.
Cons: L'unica pecca è la facilità d'uso, utilizzare le funzioni base è semplice ma per le funzioni avanzate dello strumento devi per forza fare un corso o guardarti qualche video tutorial.