Question
How to securely and effectively manage a user database and provide authentication and authorisation functionality in a cloud application?
Context
In cloud context, it is important to establish user identity and also control access to system’s resources in order to protect system and resources from unauthorised or malicious users.
Solution
A proper tool should be used to define and manage the roles and access privileges of individual application users and the circumstances in which users are granted (or denied) those privileges.
References
AWS Identity and Access Management (IAM) - aws.amazon.com
What is IAM? - aws.amazon.com
Identity and access management in cloud environment: Mechanisms and challenges - www.sciencedirect.com