# AWS Identity and Access Management Documentation

AWS Identity and Access Management (IAM) is a web service for securely controlling access to AWS services. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users and applications can access.

## IAM

- [IAM User Guide](/IAM/latest/UserGuide/): Introduces you to AWS Identity and Access Management, helps you set up users and groups, and shows you how to protect your resources with access control policies. Also shows how to connect to other identity services to grant external users access to your AWS resources.
- [IAM API Reference](/IAM/latest/APIReference/): Describes all the API operations for AWS Identity and Access Management in detail. Also provides sample requests, responses, and errors for the supported web services protocols.
- [IAM in the AWS CLI Reference](/cli/latest/reference/iam/): Describes the AWS CLI commands that you can use to administer IAM. Provides syntax, options, and usage examples for each command.
- [Service Authorization Reference](/service-authorization/latest/reference/): Provides a list of the actions, resources, and condition keys supported by each AWS service that can be used in an IAM policy.
- [AWS Managed Policy Reference](/aws-managed-policy/latest/reference/): Provides details of AWS managed policies. Use these policies, created and administered by AWS, to assign permissions to users, groups, and roles.

## STS

- [AWS STS API Reference](/STS/latest/APIReference/): Describes all the API operations for AWS STS in detail. Also provides sample requests, responses, and errors for the supported web services protocols.
- [AWS STS in the AWS CLI Reference](/cli/latest/reference/sts/): Describes the AWS CLI commands that you can use to generate temporary security credentials. Provides syntax, options, and usage examples for each command.

## IAM Access Analyzer

- [IAM Access Analyzer API Reference](/access-analyzer/latest/APIReference/): Describes the API operations for IAM Access Analyzer. Also provides sample requests, responses, and errors for the supported web services protocols.
- [IAM Access Analyzer in the AWS CLI Reference](/cli/latest/reference/accessanalyzer/): Describes the AWS CLI commands that you can use to administer IAM Access Analyzer. Provides syntax, options, and usage examples for each command.

## IAM Roles Anywhere

- [IAM Roles Anywhere User Guide](/rolesanywhere/latest/userguide/): Provides conceptual overviews of IAM Roles Anywhere and explains how to use it.
- [IAM Roles Anywhere API Reference](/rolesanywhere/latest/APIReference/): Describes the API operations for IAM Roles Anywhere. Also provides sample requests, responses, and errors for the supported web services protocols.
- [IAM Roles Anywhere in the AWS CLI Reference](/cli/latest/reference/rolesanywhere/): Describes the AWS CLI commands that you can use to administer IAM Roles Anywhere. Provides syntax, options, and usage examples for each command.

## Best Practices

Use best practice guidance from AWS experts—AWS Solutions Architects, Professional Services Consultants, and Partners—to develop your architecture.

- [Architecture Center: Best Practices for Security, Identity, & Compliance](https://aws.amazon.com/architecture/security-identity-compliance/): Learn how to meet your security and compliance goals using AWS infrastructure and services.
- [Security best practices in IAM](https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html): Learn about the best practices for using IAM to help secure your AWS resources.

---

## Related Links

- [AWS Glossary](http://docs.aws.amazon.com/general/latest/gr/glos-chap.html)
- [Getting Started with AWS](https://aws.amazon.com/documentation/gettingstarted/)
- [SDKs & Tools](https://aws.amazon.com/tools/)
- [AWS General Reference](http://docs.aws.amazon.com/general/latest/gr/Welcome.html)
- [AWS Training](https://aws.amazon.com/training/)
- [AWS Case Studies](https://aws.amazon.com/solutions/case-studies/)
- [AWS Whitepapers](https://aws.amazon.com/whitepapers/)
- [Architecture Center: Security, Identity, & Compliance](https://aws.amazon.com/architecture/security-identity-compliance/?docsiam_rl1)

