EasyManua.ls Logo

AWS Snowball - Page 86

AWS Snowball
166 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
AWS Snowball User Guide
Authentication
4. Type a name for the user, and choose Create.
5. On the screen that appears, you can download security credentials for the IAM user that you just
created. Creating an IAM user generates an access key consisting of an access key ID and a secret
access key, which are used to sign programmatic requests that you make to AWS. If you want to
download these security credentials, choose Download. Otherwise, choose close to return to your
list of users.
Note
After this access step, your secret key is no longer available through the AWS Management
Console; you have the only copy. To protect your account, keep this information confidential
and never email it. Do not share it outside your organization, even if an inquiry appears to
come from AWS or Amazon.com. No one who legitimately represents Amazon will ever ask
you for your secret key.
6. To view the user details page, choose your user from the table.
7. Choose the Permissions tab, and then expand Inline Policy.
8. Choose the click here link to create a new inline policy.
9. Choose Custom Policy, and then choose Select to provide your own policy document.
10. Create a name you'll remember for your custom policy, like JobCreation.
11. Paste the following text into your custom Policy Document.
Note
If you're updating an existing user, review the following text carefully before you change
their permissions, as you might inadvertently grant or disable permissions that you didn't
intend to change.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:ListBucket",
"s3:GetBucketPolicy",
"s3:GetBucketLocation",
"s3:ListBucketMultipartUploads",
"s3:ListAllMyBuckets",
"s3:CreateBucket"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"kms:DescribeKey",
"kms:ListAliases",
"kms:ListKeys",
"kms:CreateGrant"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"iam:AttachRolePolicy",
"iam:CreatePolicy",
"iam:CreateRole",
"iam:ListRoles",
80

Table of Contents