Cyberduck Mountain Duck CLI

Changes between Version 1 and Version 2 of help/en/howto/iam


Ignore:
Timestamp:
Feb 27, 2011 5:59:30 PM (9 years ago)
Author:
dkocher
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • help/en/howto/iam

    v1 v2  
    33= [wiki:help/en Cyberduck Help] / [wiki:help/en/howto Howto] / AWS Identity & Access Management (IAM) =
    44
    5 '''Notes on using IAM with Cyberduck'''
     5'''Notes on using IAM credentials to access S3 with Cyberduck'''. IAM allows you to create credentials for third parties accessing your S3 account with permission constraints.
     6
     7== IAM Tools Setup ==
     8 * Download the [http://aws.amazon.com/developertools/AWS-Identity-and-Access-Management/4143 IAM Command Line Toolkit]. Unzip the download and move the folder `IAMCli-1.2.0` into the `bin` folder in your user home directory.
     9
     10 * In a ''Terminal.app'' window, set the home environment for IAM
     11
     12{{{
     13echo 'export AWS_IAM_HOME=~/bin/IAMCli-1.2.0' >> ~/.bash_profile
     14}}}
     15
     16 * Set the environment variable to point to the credentials file.
     17{{{
     18echo 'export AWS_CREDENTIAL_FILE=$AWS_IAM_HOME/aws-credential.template' >> ~/.bash_profile
     19}}}
     20
     21 * Add the path to the IAM programs to your path
     22
     23{{{
     24echo 'export PATH=$AWS_IAM_HOME/bin:$PATH' >> ~/.bash_profile
     25}}}
     26
     27 * Update the environment of the current shell (alternatively open a new Terminal.app window).
     28
     29{{{
     30. ~/.bash_profile
     31}}}
     32
     33 * Edit the credentials file `aws-credential.template` with your AWS identifiers.
     34
     35== Create a new IAM user ==
     36 * Add a new IAM user and generate the access credentials. This will print out the ''Access Key ID'' and ''Secret Access Key''.
     37
     38{{{
     39iam-usercreate -u davidkocher;iam-useraddkey -u davidkocher
     40}}}
     41
     42
     43 * Add a new policy for the user. This example gives the user access to all of your S3 resources.
     44
     45{{{
     46iam-useraddpolicy  -u davidkocher -e Allow -a s3:* -r arn:aws:s3:::* -o -p `uuidgen`
     47}}}
     48
     49
swiss made software