24-pcs-008
Lab 1: Introduction to AWS IAM
AIM:
To explore AWS Identity and Access Management (IAM) by managing users and groups,
inspecting policies ,adding users to groups based on job roles, and testing access
permissions through IAM sign-in.
PROCEDURE
1) Start Lab Session
i) Choose Start Lab to begin the lab session.
ii) Wait for the circle icon next to the AWS link to turn green.
iii) Click the AWS link to open the Management Console in a new tab.
2) Access IAM Service
i) In the AWS console, search for IAM and open it.
3) Explore the Pre-Created Users
i) In the left navigation pane, click Users.
ii) Observe three users:
● User-1
● User-2
● User-3
iii) Select User-1 to view its details:
● No permissions assigned.
● Not part of any group.
● Under Security credentials, user-1 has a console password.
4) Explore the Pre-Created Groups
i) In the left navigation pane, choose User Groups.
ii) Observe three groups:
● EC2-Admin
24-pcs-008
● EC2-Support
● S3-Support
iii) For each group:
1. Select the group.
2. Go to the Permissions tab.
3. Click + to expand policy details and note:
o EC2-Support: Managed Policy - AmazonEC2ReadOnlyAccess
o S3-Support: Managed Policy - AmazonS3ReadOnlyAccess
o EC2-Admin: Inline Policy - Allows Describe, Start, and Stop for EC2
5) Assign Users to Groups Based on Business Scenario
i) Add user-1 to S3-Support group:
● Go to User Groups > S3-Support > Users tab > Add users.
● Select user-1 and click Add users.
ii) Add user-2 to EC2-Support group:
● Follow similar steps for the EC2-Support group.
iii) Add user-3 to EC2-Admin group:
● Follow similar steps for the EC2-Admin group.
6) Verify Group Membership
i) Go to User Groups and ensure each group has 1 user listed.
7) Test User Permissions Using IAM Sign-in URL
i) In the IAM Dashboard, copy the Sign-in URL for IAM users.
ii) Open a private/incognito window in the browser.
iii) Paste the URL and test with the following users:
24-pcs-008
➤ Test user-1:
● Username: user-1
● Password: Lab-Password1
● Check:
o S3 access: Should be able to view buckets.
o EC2 access: Should receive a “not authorized” error.
➤ Test user-2:
● Log out user-1, then log in as user-2.
● Username: user-2
● Password: Lab-Password2
● Check:
o EC2 access: Can view instances (Read-Only), cannot stop them.
o S3 access: Should receive a “not authorized” error.
➤ Test user-3:
● Log out user-2, then log in as user-3.
● Username: user-3
● Password: Lab-Password3
● Check:
o EC2 access: Can view, start, and stop instances.
o S3 access: Not required to test.
8) Submit and End the Lab
24-pcs-008
i) Return to the lab instruction page.
ii) Click Submit.
iii) Finally, click End Lab to end your session.
SCREENSHOTS OF THE LAB EXERCISE :
Explore the IAM dashboard:
Exploring the pre-defined user:
24-pcs-008
ASSIGN USERS TO GROUPS BASED ON BUSINESS SCENARIO :
Add users to Support group
Add user-1 to S3-Support group
Add user-2 to EC2-Support group
24-pcs-008
Add user-3 to EC2-admin group
TEST USER PERMISSIONS USING IAM SIGN-IN URL :
Test User-1:
24-pcs-008
Stopping the lab-host
24-pcs-008
SUBMITTING THE WORK & GRADE POINTS SCORED:
Conclusion
This lab demonstrated how to manage AWS IAM by assigning users to groups, reviewing
permissions, and testing access. It enhanced our understanding of user and access control in
AWS.