Microsoft Access is a Database Management System (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and softwaredevelopment tools. It is a part of the Microsoft Office suite of applications, included in the professional and higher editions. This is an introductory tutorial that covers the basics of MS Access.
This tutorial is designed for those people who want to learn how to start working with Microsoft Access. After completing this tutorial, you will have a better understating of MS Access and how you can use it to store and retrieve data.
It is a simple and easy-to-understand tutorial. There are no set prerequisites as such, and it should be useful for any beginner who want acquire knowledge on MS Access. However it will definitely help if you are aware of some basic concepts of a database, especially RDBMS concepts.
A non-administrator account with a password that you know. For this tutorial, we created such an account, named testuser. In this tutorial, you test the end-user experience of configuring and using Microsoft Entra multifactor authentication.
A group that the non-administrator user is a member of. For this tutorial, we created such a group, named MFA-Test-Group. In this tutorial, you enable Microsoft Entra multifactor authentication for this group.
The recommended way to enable and use Microsoft Entra multifactor authentication is with Conditional Access policies. Conditional Access lets you create and define policies that react to sign-in events and that request additional actions before a user is granted access to an application or service.
In this tutorial, we create a basic Conditional Access policy to prompt for MFA when a user signs in. In a later tutorial in this series, we configure Microsoft Entra multifactor authentication by using a risk-based Conditional Access policy.
Now that the Conditional Access policy is created and a test group of users is assigned, define the cloud apps or actions that trigger the policy. These cloud apps or actions are the scenarios that you decide require additional processing, such as prompting for multifactor authentication. For example, you could decide that access to a financial application or use of management tools require an additional prompt for authentication.
Browse the list of available sign-in events that can be used. For this tutorial, select Microsoft Azure Management so that the policy applies to sign-in events. Then choose Select.
Next, we configure access controls. Access controls let you define the requirements for a user to be granted access. They might be required to use an approved client app or a device that's hybrid-joined to Microsoft Entra ID.
Conditional Access policies can be set to Report-only if you want to see how the configuration would affect users, or Off if you don't want to the use policy right now. Because a test group of users is targeted for this tutorial, let's enable the policy, and then test Microsoft Entra multifactor authentication.
The AWS account owner (AWS account root user) can grant IAM users and roles access to the AWS Billing and Cost Management data for their AWS account. The instructions in this tutorial help you set up a pretested scenario. This scenario helps you gain hands-on experience configuring billing permissions without concern for affecting your main AWS production account.
Record the AWS account number of your test account so that you can use it in the tutorial. In this tutorial we use the example account number 111122223333. Whenever a step uses that account number, replace it with your test account number.
In this scenario, you sign in to your test AWS account as the root user to grant IAM access to billing information. When you grant IAM access to billing information it allows IAM users and roles to access the AWS Billing and Cost Management console. This setting doesn't grant IAM users and roles the necessary permissions for these console pages, it enables access for IAM users or roles that have the required IAM policies. If policies are already attached to IAM users or roles, but this setting isn't enabled, the permissions granted by those policies aren't in effect.
Terry is part of your IT support department. Most of the time Terry doesn't require access to the billing console, but sometimes needs access to answer questions for employees in the finance department.
An IAM role is an IAM identity that you can create in your account that has specific permissions. An IAM role is similar to an IAM user, in that it's an AWS identity with permission policies that determine what the identity can and can't do in AWS. However, instead of being uniquely associated with one person, a role is intended to be assumable by anyone who needs it. Also, a role doesn't have standard long-term credentials such as a password or access keys associated with it. Instead, when you assume a role, it provides you with temporary security credentials for your role session. You can use roles to delegate access to users, applications, or services that don't normally have access to your AWS resources. In this scenario you create a role that Terry Whitlock can assume to access the billing console.
After you've completed the core tasks, you're ready to test the policy. Testing ensures that the policy works the way you want it to. By testing the access of each user you can compare the user experiences.
In this scenario, you sign in to your test AWS account as the root user to grant IAM access to billing information. When you grant access to billing information it allows IAM users and roles to access the AWS Billing and Cost Management console. This setting doesn't grant IAM users and roles the necessary permissions for these console pages, it just enables access for IAM users or roles that have the required IAM policies.
Your test AWS account doesn't have any identities defined except for the root user. To provide access to billing information we create additional identities to whom we can grant permission to access billing information.
If you have IAM Identity Center enabled, the AWS Management Console displays a reminder that it's best to manage users' access in IAM Identity Center. In this tutorial, the IAM users we create are to learn about providing access to billing information. If you have created users in IAM Identity Center you assign the Billing permission set to those users or groups using IAM Identity Center instead of IAM.
For more information about using policies to grant IAM users access to AWS Billing and Cost Management features, see Using identity-based policies (IAM policies) for AWS Billing in the AWS Billing User Guide.
You can use a role to grant IAM users access to the billing console. Roles provide temporary credentials that users can assume when needed. In this tutorial, the user twhitlock needs to be able to access billing information when a support request from the finance department requires he investigate an issue.
We recommend that you test access by signing in as the test users to learn what your users might experience. Use the following steps to sign in using both test accounts to see the difference between access rights.
You've now completed the steps necessary to provide IAM users access to the AWS Billing console. As a result, you've seen firsthand what your users billing console experience is like. You can now proceed to implement this logic in your production environment at your convenience.
This tutorial teaches you how to use a role to delegate access to resources in different AWS accounts that you own called Production and Development. You share resources in one account with users in a different account. By setting up cross-account access in this way, you don't have to create individual IAM users in each account. In addition, users don't have to sign out of one account and sign in to another account to access resources in different AWS accounts. After configuring the role, you see how to use the role from the AWS Management Console, the AWS CLI, and the API.
IAM roles and resource-based policies delegate access across accounts only within a single partition. For example, assume that you have an account in US West (N. California) in the standard aws partition. You also have an account in China (Beijing) in the aws-cn partition. You can't use an Amazon S3 resource-based policy in your account in China (Beijing) to allow access for users in your standard aws account.
In this tutorial, the Production account manages live applications. Developers and testers use the Development account as a sandbox to freely test applications. In each account, you store application information in Amazon S3 buckets. You manage IAM users in the Development account, where you have two IAM user groups: Developers and Testers. Users in both user groups have permissions to work in the Development account and access resources there. From time to time, a developer must update the live applications in the Production account. The developers store these applications in an Amazon S3 bucket called productionapp.
Developers can use the role in the AWS Management Console to access the productionapp bucket in the Production account. They can also access the bucket by using API calls authenticated by temporary credentials provided by the role. Similar attempts by a Tester to use the role fail.
In this section, you modify the IAM user group policy to deny Testers access to the UpdateApp role. Because Testers have PowerUser access in this scenario, and you must explicitly deny the ability to use the role.
Finally, as a Developer, you use the UpdateApp role to update the productionapp bucket in the Production account. You see how to access the role through the AWS console, the AWS CLI, and the API.
aa06259810