IAM Authentication

Length: 00:05:03

Lesson Summary:

In this lesson, we're going to talk about IAM authentication in EKS.

Some of the topics we'll be covering are:

  • How EKS authentication and authorization work
  • Granting IAM users access to an EKS cluster


This lesson is only available to Linux Academy members.

Sign Up To View This Lesson
Or Log In

Looking For Team Training?

Learn More