IAM Authentication

Length: 00:05:03

Lesson Summary:

In this lesson, we're going to talk about IAM authentication in EKS.

Some of the topics we'll be covering are:

  • How EKS authentication and authorization work
  • Granting IAM users access to an EKS cluster

This lesson is only available to Linux Academy members.

Sign Up To View This Lesson

Or Log In

Looking For Team Training?

Learn More