AWS re:Invent 2022 - SaaS microservices deep dive: Simplifying multi-tenant development (SAS405)

preview_player
Показать описание
At some point in building a SaaS environment, the attention shifts to how multi-tenancy will influence how the builders on your team design and code their multi-tenant microservices. Multi-tenancy requires you to introduce new mechanisms to address authorization, data access, tenant isolation, metrics, billing, logging, and a host of other considerations. In this session, dive deep into multi-tenant microservices, looking at the various patterns and strategies that can be used to bring a multi-tenant microservice to life without imposing added complexity on your SaaS builders.


Subscribe:

ABOUT AWS
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.

AWS is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.

#reInvent2022 #AWSreInvent2022 #AWSEvents
Рекомендации по теме
Комментарии
Автор

Thank you Michael! Great, thorough, and useful info in this presentation!

mshannoncarver
Автор

Thank you Michael for sharing your knowledge, great presentation!

Mci
Автор

35:50 It is mentioned here that we can assign no permissions to the default identity, to prevent accidentally using a default identity that has more permissions. However, earlier it was mentioned that the session policy can only make permissions more restrictive than the default identity (to prevent privilege escalation)?

lkrhvsr
Автор

Thank you, a wonderful presentation. I especially enjoyed the part about the data isolation and the clear examples.

One thing bothers me though. This talk simultaneously promotes Cognito and talks about augmenting the access token with custom claims. As far as I know, this is not possible to do in Cognito.

mattimarttinen