<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    create AWS IAM user

    As you learned in the lecture, you should not use your AWS account root user credentials to access AWS. Instead, create an AWS IAM user and assign permissions only necessary for the work done by the user. In this exercise, you will create an AWS IAM user, attach a customer managed AWS IAM policy to the user and set up access keys for the AWS IAM user.

  • An AWS IAM user is an entity that you create in AWS to represent the person or service that uses it to interact with AWS. You attach permission policies to the IAM user that determine what the user can and cannot do in AWS.
  • Access keys are a combination of an access key ID and a secret access key that are assigned to a user. These can be used to make programmatic calls to AWS when using the API in program code or at a command prompt when using the AWS CLI.
  • For all subsequent exercises, make sure to log in with the AWS IAM user credentials you create in this exercise, rather than the root user credentials.

    You will also create an Amazon EC2 instance, SSH into the instance, and configure AWS CLI to explore the AWS CLI commands. Then you will install Boto 3 on the instance and try out some Python scripting on the terminal. Boto 3 is the AWS SDK for Python, making it easier to integrate your Python application, library, or script with AWS services.

    To begin, follow the instructions below.

    1. Create an AWS IAM policy.

    In this section, you will create an AWS IAM customer-managed policy. Customer-managed policies provide more precise control over your policies than AWS managed policies. This policy will have permissions specific to the AWS resources needed for the application you will build in this course.

    • In the AWS Management Console, click Services, then click IAM to open the IAM dashboard.
    • In the left navigation menu, click Policies.
    • Click Create policy.
    • Click the JSON tab.
    • In the editor textbox, completely replace the sample policy with the following.
    • {
          "Version": "2012-10-17",
          "Statement": [
              {
                  "Sid": "Sid1",
                  "Effect": "Allow",
                  "Action": [
                      "iam:*",
                      "rds:*",
                      "sns:*",
                      "cloudformation:*",
                      "rekognition:*",
                      "ec2:*",
                      "cognito-idp:*",
                      "sqs:*",
                      "xray:*",
                      "s3:*",
                      "elasticloadbalancing:*",
                      "cloud9:*",
                      "lambda:*",
                      "tag:GetResources",
                      "logs:*",
                      "kms:ListKeyPolicies",
                      "kms:GenerateRandom",
                      "kms:ListRetirableGrants",
                      "kms:GetKeyPolicy",
                      "kms:ListResourceTags",
                      "kms:ReEncryptFrom",
                      "kms:ListGrants",
                      "kms:GetParametersForImport",
                      "kms:ListKeys",
                      "kms:GetKeyRotationStatus",
                      "kms:ListAliases",
                      "kms:ReEncryptTo",
                      "kms:DescribeKey"
                  ],
                  "Resource": "*"
              }
          ]
      }
      
    • Click Review Policy.
    • For Name, type edXProjectPolicy
    • Click Create policy.

      You have successfully created an AWS IAM policy with full access to AWS IAM, Amazon EC2, Amazon S3, Amazon RDS, Amazon SNS, Amazon SQS, Amazon Rekognition, AWS Lambda, Amazon Cognito, AWS Cloud9, AWS X-Ray, and AWS CloudFormation. When you create IAM policies, follow the standard security advice of granting least privilege - that is, granting only the permissions required to perform a task. Determine what users need to do and then craft policies for them that let the users perform only those tasks.

    2. Create an AWS IAM user, attach a policy to the user, and generate access keys.

    In this section, you will create an AWS IAM user and attach the policy you just created to the user. You will then generate the access keys for the user. Those access keys will be used to make programmatic calls to AWS services via AWS CLI or APIs. If you are familiar with AWS IAM users, you may want to attempt to complete this section before reading the step-by-step instructions.

    AWS IAM user name: edXProjectUser
    Access type: Programmatic access and AWS Management Console access
    Policy: edXProjectPolicy 
    Important: Download the .csv file with the access keys after creating the user. Also, make sure to click the Send email link to get the email instructions for signing in to the AWS Management Console as edXProjectUser. 

    Reminder! Be sure to protect your AWS account access keys like you would your credit card numbers or any other sensitive secret.

    At the end of this exercise, you will not be using the access keys again. It is a security best practice to remove IAM user credentials that are not needed. After this exercise, make sure to remove the access keys only (not the AWS Console password) for the IAM user - edXProjectUser. See more IAM Best Practices.

    • In the AWS Console, click Services, then click IAM to go to the IAM dashboard.
    • In the left navigation menu, click Users.
    • Click Add user.
    • In the User name text box, type edXProjectUser
    • For Access type, select Programmatic access and AWS Management Console access.
    • For Console password, you may choose either Autogenerated password or Custom password. If you choose Autogenerated, you will be prompted to change your console password when you log in to the AWS Console as the edXProjectUser user. Make sure you take a note of the password created.
    • Click Next: Permissions.
    • Under Set permissions for edXProjectUser section, click Attach existing policies directly.
    • In the search text box for Filter, type edXProjectPolicy. Select edXProjectPolicy from the filtered list.
    • Click Next: Review.
    • Review the information and click Create user. You should see a success message.
    • Click Download .csv to download the access key ID and secret access key. 
      Note: This is your only chance to download these credentials.
    • In the Email login instructions column, click Send email. You can send an email to an email address of your choice. This email contains the instructions to sign in to your AWS account with the edXProjectUser AWS IAM user credentials. 
    • Click Close to return to the console.
    • In the left navigation menu, click Dashboard.
    • Note the IAM users sign-in link. This is a special URL for IAM users, which includes your account ID. You will see the same URL in the email you just created.
    • Sign out of the console, and follow the instructions provided in the email you just received to sign in to the AWS Console as the edXProjectUser AWS IAM user.

    3. Create an Amazon EC2 instance and configure AWS CLI with the access keys of the AWS IAM user edXProjectUser.

    • Sign-in to your AWS account as the edXProjectUser AWS IAM user.
    • Create an Amazon EC2 instance using the properties below. If you are familiar with Amazon EC2, you may want to attempt to complete this portion before reading the step-by-step instructions.

      Region: Oregon (us-west-2) 
      Amazon Machine Image (AMI): Amazon Linux AMI 
      Instance Type: t2.micro 
      Network VPC: edx-build-aws-vpc 
      Subnet: edx-subnet-public-a 
      Tag: Ex4WebServer 
      Security group name: Use the security group created in the third exercise, exercise3-sg. 
      Key Pair: Use the key pair created in the third exercise. 

      • In the AWS Console, click Services, then click EC2 to go to the EC2 dashboard.
      • Make sure you are in the Oregon region.
      • From the EC2 dashboard, click Launch Instance.
      • On the Choose an Amazon Machine Image (AMI) page, select the Amazon Linux AMI. This AMI is free-tier eligible.
      • On the Choose an Instance Type page, select t2.micro.
      • Click Next: Configure Instance Details.
      • For Network, select edx-build-aws-vpc.
      • For Subnet, select edx-subnet-public-a in the us-west-2a availability zone.
      • Click Next: Add Storage. Skip through this page and click Next: Add Tags.
      • Click Add Tag.
      • In the Key textbox, type Name.
      • In the Value textbox, type Ex4WebServer.
      • Click Next: Configure Security Group. Select the Select an existing security group option.
      • From the list of security groups, select exercise3-sg.
      • Click Review and Launch.
      • On the Review Instance Launch page, review the details and click Launch.
      • When prompted for a key pair, select Choose an existing key pair, and then choose the key pair you created in the third exercise.
      • Select the acknowledgement check box, and then click Launch Instances.
      • Click View Instances to return to the instances page.
      • On the Instances page, you can view the status of the launch. It can take a few minutes for the instance to be ready so that you can connect to it. Check that your instance has passed its status checks. You can view this information in the Status Checks column. 
      • Once the instance is ready, select the instance and note down the IPv4 Public IP found in the Descriptions tab at the bottom.

    • Connect to the instance using SSH. You may refer to the instructions in the third exercise for connecting to the instance.
    • Open the credentials.csv file that you downloaded earlier. Find the entry for edXProjectUser, and note the values for Access Key Id and Secret Access Key.
    • On the instance terminal, type the below command.
    • aws configure

    • Follow the prompts on the screen and paste in the values for Access Key Id and Secret Access Key.
    • For Region, type us-west-2.
    • For Default output format, press ENTER. 
      You have now configured the AWS CLI so that any CLI calls will operate with the credentials of the AWS IAM user edXProjectUser.
    • Now query the information about the Amazon EC2 instances in your account. Type the command below.

      aws ec2 describe-instances

      You should see a JSON output with all the information of the Amazon EC2 instances in your account. This means that you were able to successfully execute the AWS CLI command with the permissions attached to the edXProjectUser.

    4. Install Boto 3 on the instance and explore Boto 3 APIs.

    • First install Python 3 and the Boto 3 SDK. On the Amazon EC2 instance terminal, type the commands below.
    • sudo yum -y install python36
      sudo pip-3.6 install boto3
      

    • To start using Boto 3, type python3 on the instance terminal and press ENTER. You should now be able to execute Python commands from your instance terminal.
    • Import boto3 and create a client for the corresponding AWS service you wish to use. In this case, you can explore the EC2 APIs for Boto 3 by creating the EC2 client. Type the following.

      import boto3
      client = boto3.client('ec2')
      client.describe_instances()

      You should see a JSON output similar to the one given by the AWS CLI command.
    • Now, type the command below.
    • client.describe_key_pairs()

      You should see a JSON output with the information about the key pairs in your account.
    • Press Ctrl-D to exit the python interpreter.

    Optional Challenge

    In this exercise, you configured an access key (access key ID and secret access key) on your EC2 instance. Later in the course, we will introduce IAM roles. You may want to read ahead a little, and look at IAM Roles for Amazon EC2.

    Can you see a way to complete this exercise using an IAM role on the instance, rather than the access keys you just used?

    5. Terminate the Amazon EC2 instance.

    In this section, you will terminate the Amazon EC2 instance by selecting the instance in the Amazon EC2 dashboard and clicking Actions -> Instance State -> Terminate .


    • In the console, click Services, then click EC2 to open the EC2 dashboard.
    • In the navigation pane, click Instances. In the list of instances, select the Ex4WebServer instance.
    • Click Actions, Instance State, Terminate.
    • Click Yes, Terminate when prompted for confirmation.
    • Amazon EC2 shuts down and terminates your instance. After your instance is terminated, it remains visible on the console for a short while, and then the entry is deleted.



    眼鏡蛇

    posted on 2018-04-19 11:12 眼鏡蛇 閱讀(184) 評論(0)  編輯  收藏 所屬分類: AWS

    <2025年5月>
    27282930123
    45678910
    11121314151617
    18192021222324
    25262728293031
    1234567

    導航

    統計

    常用鏈接

    留言簿(6)

    隨筆分類

    隨筆檔案

    文章分類

    文章檔案

    搜索

    最新評論

    閱讀排行榜

    評論排行榜

    主站蜘蛛池模板: 日本zzzzwww大片免费| 亚洲黄色三级视频| 亚洲va乱码一区二区三区| 精品国产污污免费网站| 国产日韩成人亚洲丁香婷婷| 黄页视频在线观看免费| 免费在线不卡视频| 免费人成大片在线观看播放电影 | 久青草视频97国内免费影视| 国产成人免费手机在线观看视频 | 亚洲男人的天堂www| 中文字幕高清免费不卡视频| 亚洲精品少妇30p| 亚洲一区二区在线免费观看| 亚洲成AV人片在| 57pao一国产成视频永久免费| 亚洲另类小说图片| 成年网站免费视频A在线双飞| 亚洲s码欧洲m码吹潮| 少妇亚洲免费精品| 91视频免费观看高清观看完整| 亚洲国产另类久久久精品| 在线免费观看一级片| 久香草视频在线观看免费| 亚洲色偷偷偷鲁综合| 欧洲美熟女乱又伦免费视频| 直接进入免费看黄的网站| 亚洲老妈激情一区二区三区| 免费看国产成年无码AV片| 男女猛烈激情xx00免费视频| 亚洲乱码卡一卡二卡三| 亚洲AV午夜福利精品一区二区 | 日本永久免费a∨在线视频| 精品亚洲成A人无码成A在线观看| 亚洲一区精品无码| vvvv99日韩精品亚洲| 日本免费人成视频播放 | 免费无码成人AV在线播放不卡| 亚洲国产美女福利直播秀一区二区 | 亚洲精品在线免费看| 日本黄色免费观看|