ask 6:
T
1. Introduction to Amazon Relational Database Service (RDS) - SQL Server)
2. AWS Identity and Access Management (IAM) Task
WS Identity and Access Management (IAM) is a web service that enables Amazon Web
A
Services (AWS) customers to manage usersanduserpermissionsinAWS.WithIAM,youcan
centrallymanageusers,securitycredentialssuchasaccesskeys,andpermissionsthatcontrol
which AWS resources users can access.
Task1: Creating Users:
Step 1: Sign in to the AWS Management Console
1 . G o to the AWS Management Console at[Link]
2. Sign in with your AWS account credentials.
Step 2: Navigate to the IAM (Identity and Access Management) Service
1. I n the AWS Management Console, search forIAMin thesearch bar or find it under the
Security, Identity, & Compliancecategory.
2. Click onIAMto open the IAM dashboard.
Step 3: Create a New User
1 . I n the IAM dashboard, click onUsersin the left-handmenu.
2. Click onCreate User
Step 4: Configure the User Details
1 . E nter theUser name:User1
2. UnderSelect AWS access type, checkAWS ManagementConsole access.
o ForConsole password, chooseCustom password(Youcreate a password for the
User1 as User1@123).
3. Uncheck Require password resetto force the userto change their password upon first
login.
. Step 5: Set Permissions
1 . C lickNext: Permissions.
2. Choose the following options to set permissions for the user:
o Attach existing policies directly: Select policiesthat define the permissions for
the user.
Step 6: Review and Create the User
1 . C lickNext: Tagsto add optional tags for the user.
2. ClickNext: Reviewto review the user's details andpermissions.
3. ClickCreate userto finalize the process.
Click ondownload .csv file
Repeat above steps for to create User2 and User3
Task 2: Create UserGroups
(a) Create “EC2-Admin” UserGroup
Step 1: Navigate to the IAM (Identity and Access Management) Service
1. I n the AWS Management Console, search forIAMin thesearch bar or find it under the
Security, Identity, & Compliancecategory.
2. Click onIAMto open the IAM dashboard.
Step 2: Create a New User Group
1 . I n the IAM dashboard, click onUser groupsin theleft-hand menu.
2. Click onCreate group.
Step 3: Configure the Group Details
1 . E nterEC2-Adminas theGroup name.
2. ClickCreate groupto create the group without attachingany policies at this step.
Step 4: Attach an Inline Policy to the Group
1 . I n theUser groupslist, click on theEC2-Admingroup name.
2. Click on thePermissionstab.
3. ClickAdd permissionsand then selectCreate inlinepolicy.
Step 5: Define the Inline Policy
1 . I n theCreate policyeditor, switch to theJSONtab.
2. Paste the following policy JSON to allow view, start, and stop access to EC2 instances:
{
Version": "2012-10-17",
"
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:DescribeInstances",
"ec2:DescribeImages",
"ec2:DescribeVolumes",
"ec2:DescribeTags",
"ec2:DescribeSecurityGroups",
"ec2:DescribeKeyPairs",
"ec2:DescribeSnapshots"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ec2:StartInstances",
"ec2:StopInstances"
],
"Resource": "arn:aws:ec2:*:*:instance/*"
}
]
}
Step 7: Name and Attach the Policy
1 . E nter a name for the policy, such asEC2-ViewStartStopAccess.
2. ClickCreate policyto attach it to the group.
Step 8: Add Users to the Group
1 . I n theEC2-Admingroup page, click on theUserstab.
2. ClickAdd users.
3. Select theUser3to add to this group.
4. ClickAdd usersto finalize the process.
(b) Create “EC2-Support” UserGroups
Step 1: Navigate to the IAM Service
1. I n the AWS Management Console, search forIAMin thesearch bar or find it under the
Security, Identity, & Compliancecategory.
2. Click onIAMto open the IAM dashboard.
Step 2: Create a New User Group
1 . I n the IAM dashboard, click onGroupsin the left-handmenu.
2. Click onCreate New Group.
Step 3: Configure the Group Details
1 . E nterEC2-Supportas theGroup Name.
2. ClickNext Stepto proceed.
Step 4: Attach a Policy to the Group
1. O n theAttach Policypage, use the search bar to findtheAmazonEC2ReadOnlyAccess
policy.
2. Select the checkbox next toAmazonEC2ReadOnlyAccess.
3. ClickNext Stepto continue.
Step 5: Review and Create the Group
1 . R eview the group's name and attached policies.
2. ClickCreate Groupto finalize the process.
Step 6: Add Users to the Group (Optional)
1. T o add users, go to theGroupssection, selectEC2-Support,click on theGroup
Actionsdropdown, and chooseAdd Users to Group.
2. Select theUser2and clickAdd Users.
(c) Create “S3-Support” UserGroup
Step 1: Navigate to the IAM (Identity and Access Management) Service
1. I n the AWS Management Console, search forIAMin thesearch bar or find it under the
Security, Identity, & Compliancecategory.
2. Click onIAMto open the IAM dashboard.
Step 2: Create a New User Group
1. In the IAM dashboard, click onUser groupsin theleft-hand menu.
2. Click onCreate group.
Step 3: Configure the User Group Details
1 . I n theGroup namefield, enterS3-Support.
2. ClickNext.
Step 4: Attach the S3 Read-only Access Policy
1 . O n theAttach policiespage, search forAmazonS3ReadOnlyAccess.
2. Check the box next to theAmazonS3ReadOnlyAccesspolicyto grant the group
read-only access to Amazon S3.
3. ClickNext.
Step 5: Review and Create the Group
1 . R eview the group name and attached policy on theReviewpage.
2. ClickCreate groupto finalize the process.
Step 6: Add Users to the Group (Optional)
1 . I n theUser groupspage, click on theS3-Supportgroupyou just created.
2. Click on theUserstab.
3. ClickAdd users.
4. Select theUser1 to add to this group, ClickAdd users.
ask 3: Create EC2 Instance named “MyServer” with Linux OS
T
Image
Task 4: Create S3 bucket and add some files to bucket
Task 5: Sign-In and Test Users
1. In the navigation pane on the left, chooseDashboard.
● A Sign-in URL for IAM users in this accountlink isdisplayed on the
right. It will look similar to:
[Link]
● This link can be used to sign-in to the AWS Account you are currently
using.
● Copy theSign-in URL for IAM users in this accountto a text editor.
2. Open a private (Incognito) window.
C
● hoose the ellipsis at the top-right of the screen
● SelectNew Incognito Window
3. Paste theIAM users sign-inlink into the addressbar of your private browser
session and pressEnter.
● Sign-in with:
o IAM user name:User1
o Password:User1@123
4. In the search box to the right ofServices, searchfor and chooseS3to open the S3
console.
● C hoose the name of the bucket that exists in the account and browse the
contents.
● Since your user1 is part of theS3-SupportGroup inIAM, they have permission
to view a list of Amazon S3 buckets and the contents.
Now, test whether they have access to Amazon EC2.
5. In the search box to the right ofServices, searchfor and chooseEC2to open the
EC2 console.
In the left navigation pane, chooseInstances.
●
● You cannot see any instances. Instead, you see a message that statesYou are
not authorized to perform this operation. This isbecause this user has not been
granted any permissions to access Amazon EC2.
6. At the top of the screen, chooseUser1
● ChooseSign Out
7. Now sign-in asUser2, who has been hired as yourAmazon EC2 support person.
● P aste theIAM users sign-inlink into your privatebrowser tab's address bar
and pressEnter.
● Sign-in with:
o IAM user name:User2
o Password:User2@123
8. In the search box totherightofServices,searchforandchooseEC2toopenthe
EC2 console.
● In the navigation pane on the left, chooseInstances.
● Y
ou are now able to see an Amazon EC2 instance “MyServer” because you
have Read only permissions.
● However, you will not be able to make any changes to Amazon EC2 resources.
9. Select the instance named ”MyServer”
● In theInstance statemenu above, selectStop instance.
● In theStop Instancewindow, selectStop.
● Y
ou will receive an error statingYou are not authorizedto perform this operation.
This demonstrates that the policy only allows you to view information, without
making changes.
● Choose the X to close theFailed to stop the instancemessage.
10. Next, check if User-2 can access Amazon S3.
● In the search box to the right ofServices, searchfor and chooseS3to open the
S3 console.
● Y
ou will see the message“Y
ou don't have permissionsto list buckets”
because User2 does not have permission to access Amazon S3.
● At the top of the screen, choose User-2
● ChooseSign Out
11. You will now sign-in as User3, who has been hired as your Amazon EC2
administrator.
● Sign-in with:
IAM user name:User3
o
o Password:User3@123
12. In the search box to the right ofServices, searchfor and chooseEC2to open the
EC2 console.
In the navigation pane on the left, chooseInstances.
●
● As an EC2 Administrator, you should now have permissions toStopthe Amazon
EC2 instance.
13. Select the instance named“MyServer”
In theInstance statemenu, chooseStop instance.
●
● In theStop instancewindow, chooseStop.
● The instance will enter thestoppingstate and willshutdown.