ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 399 - SCS-C01 discussion

Report
Export

Your company is planning on developing an application in AWS. This is a web based application. The application users will use their facebook or google identities for authentication. You want to have the ability to manage user profiles without having to add extra coding to manage this. Which of the below would assist in this.

Please select:

A.
Create an OlDC identity provider in AWS
Answers
A.
Create an OlDC identity provider in AWS
B.
Create a SAML provider in AWS
Answers
B.
Create a SAML provider in AWS
C.
Use AWS Cognito to manage the user profiles
Answers
C.
Use AWS Cognito to manage the user profiles
D.
Use IAM users to manage the user profiles
Answers
D.
Use IAM users to manage the user profiles
Suggested answer: B

Explanation:

The AWS Documentation mentions the following

The AWS Documentation mentions the following

OIDC identity providers are entities in IAM that describe an identity provider (IdP) service that supports the OpenID Connect (OIDC) standard. You use an OIDC identity provider when you want to establish trust between an OlDC-compatible IdP—such as Google, Salesforce, and many others—and your AWS account This is useful if you are creating a mobile app or web application that requires access to AWS resources, but you don't want to create custom sign-in code or manage your own user identities Option A is invalid because in the security groups you would not mention this information/ Option C is invalid because SAML is used for federated authentication Option D is invalid because you need to use the OIDC identity provider in AWS For more information on ODIC identity providers, please refer to the below Link:

https://docs.aws.amazon.com/IAM/latest/UserGuide/id roles providers create oidc.htmllThe correct answer is: Create an OIDC identity provider in AWS

asked 16/09/2024
Johnny Tien
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first