JonatanSelsing Profile Banner
Jonatan Selsing Profile
Jonatan Selsing

@JonatanSelsing

Followers
151
Following
551
Media
14
Statuses
224

Lead Cloud Engineer at Novo Nordisk, enabling information fueled chronic disease treatment. Ex astrophysicist, all human.

Copenhagen, Denmark
Joined March 2015
Don't wanna be here? Send us removal request.
@JonatanSelsing
Jonatan Selsing
1 year
Is it really not possible to federate to an IAM role, from a Cognito client credential flow access token? Due to missing audience claim. Paging knowledgeable @ben11kehoe @__steele.
1
0
1
@JonatanSelsing
Jonatan Selsing
2 years
Yay, great to see this out! We describe how to enforce data and service access control at scale, without constraining developer velocity(too much). For us it turned out to be a mix of RBAC and ABAC and combinations of the two. Mixing #okta and #aws is a great for authn and authz.
@anrizal
Anwar Rizal
2 years
My third blog of the year: @JonatanSelsing.
0
0
1
@JonatanSelsing
Jonatan Selsing
3 years
0
0
1
@JonatanSelsing
Jonatan Selsing
3 years
We wrote a bit on how we approach application design when thinking about data management at scale! Give it a read, and provide comments/feedback
Tweet card summary image
aws.amazon.com
Novo Nordisk is a leading global pharmaceutical company, responsible for producing life-saving medicines that reach more than 34 million patients each day. They do this following their triple bottom...
2
1
4
@JonatanSelsing
Jonatan Selsing
3 years
RT @AWSBlogs: New Big Data post by Alessandro Fior, Anwar Rizal, Hassen Riahi, Jonatan Selsing, Kumari Ramar and Moses Arthur:. How Novo No….
Tweet card summary image
aws.amazon.com
Novo Nordisk is a leading global pharmaceutical company, responsible for producing life-saving medicines that reach more than 34 million patients each day. They do this following their triple bottom...
0
3
0
@JonatanSelsing
Jonatan Selsing
3 years
Fantastic experience working with @aws to fix #bugs. I found that #EventBridge API destination client credential flow using AWS #Cognito to hit #AppSync, was not working. The teams were responsive and fixed the issue within weeks👏. Now we have async AppSync invocations in EDAs.
0
0
1
@JonatanSelsing
Jonatan Selsing
3 years
This is fantastic. The tie to the credential process functionality means that in cases where the PKI infrastructure is already setup, this becomes an extremely convenient way to federate. Even for laptops. I very much look forward to digging into this! Well done, #AWS.
@AWSBlogs
AWS Blogs (Unofficial)
3 years
New Security, Identity & Compliance post by Faraz Angabini:. Extend AWS IAM roles to workloads outside of AWS with IAM Roles Anywhere.
0
0
0
@JonatanSelsing
Jonatan Selsing
3 years
Is there a good way to get success/failure-type responses in event-driven architectures across service boundaries that crosses accounts, without having to build a response messaging flow? Or are there other ways to track message effects in larger systems. @donkersgood @boyney123.
1
0
2
@JonatanSelsing
Jonatan Selsing
3 years
We have switched over to #oauth client credential flow, which works like a charm, but most guides are based on the other pattern. Which will get you in bind.
0
0
0
@JonatanSelsing
Jonatan Selsing
3 years
Using API key as auth for #EventBridge API destination is basically built for breakage if you provision with IaC. There is no good way to rotate key used - especially when the key itself is generated by something like #appsync. This feel like it could use polishing #awswishlist.
1
0
0
@JonatanSelsing
Jonatan Selsing
3 years
Fantastic updates from the AppSync team. GraphQL is so powerful, but the developer experience is one of the hardest parts! More of this, please!.
@ednergizer
Ed Lima
3 years
Check out some great new VTL utils now available in AppSync: automatically generate KSUIDs and send data to CloudWatch Logs in order to help troubleshoot and debug GraphQL resolver code. There's also a blog post with my favortite utils, what are yours?
0
2
7
@JonatanSelsing
Jonatan Selsing
3 years
Thanks a lot @jeffbarr for spending your time with us in the Copenhagen AWS user group. Really fantastic to hear your perspective on blogging and the #aws leadership principles. And thanks Antonio Lagrotteria for organising!.
0
0
1
@JonatanSelsing
Jonatan Selsing
3 years
Tweet media one
0
0
2
@JonatanSelsing
Jonatan Selsing
3 years
Had a blast at #awssummitstockholm. I got to speak at a large stage, talk to great vendors, order coffee from #ServerlessEspresso and chat with @NMoutschen about using EventBridge and API destinations with rule transforms. Thanks a lot for a great event, #aws.
3
0
6
@JonatanSelsing
Jonatan Selsing
3 years
Come and join me and Stefan Krist when we talk a bit about how you can think about data at scale, tomorrow at #AWSSummit Stockholm in session AN-01. The room fits … quite a few people …
Tweet media one
1
1
6
@JonatanSelsing
Jonatan Selsing
3 years
RT @theburningmonk: The no. 1 question I get about #serverless is around testing - how should I test these cloud-hosted functions? Should I….
0
129
0
@JonatanSelsing
Jonatan Selsing
3 years
I’m am once again fighting with ABAC and #awscognito. It would be fantastic if principal tags could be applied dynamically with pretokengeneration hook, instead of more static resolutions from cognito attribute maps. #awswishlist.
0
0
2
@JonatanSelsing
Jonatan Selsing
3 years
I’m restarting my speaking career, after leaving academia. Come to #stockholm #awssummit to hear me and Stefan talk how data and AWS go hand in hand. I will present how we @novonordisk think about data at scale!
Tweet media one
0
0
4
@JonatanSelsing
Jonatan Selsing
3 years
Also, is this not one of the lowest bars for executing code in an AWS account using a IAM principal for the session? Using this should be treated with some care.
1
0
0
@JonatanSelsing
Jonatan Selsing
3 years
Hmm, lambda function URLs #FURLs. I think this will probably open avenues of mistakes that have previously been protected behind “how you publish” lambda execution functionality. I hope adequate proactive protection is on accounts from AWS side.
1
0
2