So you’ve pushed your AWS credentials on GitHub…

learn more

How to completely eliminate the risk of somebody stealing your secrets and access keys that you use to develop on AWS? And what to do in case you’ve pushed your AWS admin credentials on GitHub?

Developing a DevOps tool for SSO with G Suite on AWS

learn more

How many little repetitive things do you do every day in your AWS Developer job? And how many different AWS accounts to deal with? We developed a tiny tool that leverages G Suite Single Sign-On to securely manage programmatic access to AWS resources distributed among several AWS accounts.

Creative idea: Single sign-on with G Suite for development clients!

learn more

Access to the web console only covers some of the needs of people who work with AWS every day. Developers almost always require an access key/secret key pair on their PCs to use the AWS CLI, to call single AWS APIs, and to be able to use all the desktop applications which in turn use the AWS APIs.

That’s why your AWS restored snapshot is not starting

learn more

Ever tried to restore a snapshot only to find out that the instance won’t start? This occurrence is not so common, but every time it happens it leaves you wondering what in the world went wrong… and a few steps later someone finds you yelling at the Cloud. Fear not, we are here to clear things out.

Do you really need a Disaster Recovery plan? Let’s debunk some common myths!

learn more

As Werner says, “Everything fails, all the time”. And working in IT is the best way to learn the lesson, isn’t it? You now have two different possibilities: resign yourself (and wait for it…) or read further and learn more about Disaster Recovery.

Single-sign-on with G Suite on the Amazon Web Services console

learn more

Which AWS console user has never run into the age-old problem of managing multiple users on multiple accounts, having to create different IAM users — with complex passwords for each of them — on top of the highly fundamental (but, let’s be honest, decidedly inconvenient) two-factor-authentication?

Show all