Identity and Access Management (IAM) console
– Configure MFA authentication
– Configure authorisation for EC2 Linux instances to access S3 Buckets for data backups or manual file transfers
You will see below why it is a learning curve with Amazon AWS services.[/vc_wp_text]
MFA
From your Search menu you can type IAM, and click on the link to get there (you hover your mouse over the word “IAM” to get the link.)
From the Dashboard on the right hand side, use the Quick Links to go to My Security Credentials.
When you add to your smartphone app, you will then confirm the tokens with whatever one you currently see, and the one after that.
IAM User
We create an AIM user that gives authorisation to access S3 buckets.
Go to IAM > Access management > Users
With the orange button at the upper right, click “Create User”.
This takes a little getting used to, but we want to end up with these policies:
AdministratorAccess -> shown in the diagram below
AmazonS3FullAccess -> shown in the diagram below
AWSLambda_FullAccess -> just keep cycling through the entries until all done
CloudWatchFullAccess (and V2 is ok to include)
When created, go to the Users menu again and click on the new user, then find the menu to “Create access key”.
These keys can be changed, but it is a hassle if used in several places. AWS recommends short-term use per key, but I have not needed to.