Documentation

Amazon Verified Permissions User Guide

This guide provides a conceptual overview of Verified Permissions and explains how to use it to define policies as permissions within your application.

API Reference Guide

This guide provides details about using the actions, data types, and API requests that can be made with Verified Permissions.

Cedar policy

This documentation provides a detailed overview of the Cedar policy language for access control. This guide helps you understand how to define principals, actions, resource types, and conditions for your schema and policies.

Designing an authorization model

This guide shares key considerations and criteria to consider when designing an authorization model for your application.

Workshop and sample application

Workshop

Get hands-on experience with Verified Permissions

Check out the workshop

Sample Application

Try out Verified Permissions in a sample pet store application.

Check out the sample application

Videos

Demo: Amazon Verified Permissions for fine-grained authorization in applications (15:19)
How to use Amazon Verified Permissions for authorization inside apps (47:39)
Modernize authorization: Lessons from cryptography and authentication (53:18)
Build verifiable and effective application authorization in 40 minutes (59:16)
Fine-grained authorization for applications, featuring Panasonic Avionics (58:34)
From The Field | Verified Permissions (52:39)
Using policies to manage permissions with Amazon Verified Permissions (53:35)
AWS On Air live at AWS re:Inforce (20:29)

Blog posts

  • Date

No items returned.

1
Read the AWS Outposts FAQs
Contact us

Learn more about AWS Verified Permissions by contacting us directly.

Contact us 
Sign up for a free AWS account
Sign up for a free account

Instantly get access to the AWS Free Tier. 

Sign up 
Start building with AWS Outposts
Start building in the console

Get started with AWS Outposts in the AWS Management Console.

Sign in