ITIQ enables you to securely control access to ITIQ services and resources for your users. Using IAM, you can create and manage ITIQ users and groups, and use permissions to allow and deny their access to ITIQ resources.
Manage users and their access – You can create users in ITIQ, assign them individual security credentials (in other words, access keys, passwords, and multi-factor authentication devices), or request temporary security credentials to provide users access to ITIQ services and resources. You can manage permissions in order to control which operations a user can perform.
Manage roles and their permissions – You can create roles in IAM and manage permissions to control which operations can be performed by the entity, or ITIQ service, that assumes the role. You can also define which entity is allowed to assume the role.
Manage federated users and their permissions – You can enable identity federation to allow existing identities (users, groups, and roles) in your enterprise to access the ITIQ Management Console, call ITIQ APIs, and access resources, without the need to create a user for each identity.