P11 Introduction To AWS IAM 1 PDF
P11 Introduction To AWS IAM 1 PDF
AWS Identity and Access Management (IAM) is a web service that enables Amazon Web
Services (AWS) customers to manage users and user permissions in AWS. With IAM, you
can centrally manage users, security credentials such as access keys,
and permissions that control which AWS resources users can access.
Topics covered
This lab will demonstrate:
Duration
This lab takes approximately 40 minutes to complete.
A Start Lab panel opens displaying the lab status. In the Start Lab dialog box
that opens, note the AWS Region, as you will need to refer to it later in this
lab.
2. Wait until you see the message "Lab status: ready", then click the X to close
the Start Lab panel.
3. At the top of these instructions, click AWS
This will open the AWS Management Console in a new browser tab. The
system will automatically log you in.
Tip: If a new browser tab does not open, there will typically be a banner or
icon at the top of your browser indicating that your browser is preventing the
site from opening pop-up windows. Click on the banner or icon and choose
"Allow pop ups."
4. Arrange the AWS Management Console tab so that it displays along side
these instructions. Ideally, you will be able to see both browser tabs at the
same time, to make it easier to follow the lab steps.
o user-1
o user-2
o user-3
7. Click user-1.
This will bring to a summary page for user-1. The Permissions tab will be
displayed.
o EC2-Admin
o EC2-Support
o S3-Support
12. Click the EC2-Support group.
This will bring you to the summary page for the EC2-Support group.
A policy defines what actions are allowed or denied for specific AWS
resources. This policy is granting permission to List and Describe information
about EC2, Elastic Load Balancing, CloudWatch and Auto Scaling. This ability
to view resources, but not modify them, is ideal for assigning to a Support
role.
18. Below the Actions menu, click the Show Policy link.
This policy has permissions to Get and List resources in Amazon S3.
This Group is slightly different from the other two. Instead of a Managed
Policy, it has an Inline Policy, which is a policy assigned to just one User or
Group. Inline Policies are typically used to apply permissions for one-off
situations.
23. At the bottom of the screen, click Cancel to close the policy.
Business Scenario
For the remainder of this lab, you will work with these Users and Groups to enable
permissions supporting the following business scenario:
Your company is growing its use of Amazon Web Services, and is using many
Amazon EC2 instances and a great deal of Amazon S3 storage. You wish to give
access to new staff depending upon their job function:
In the Users tab you will see that user-1 has been added to the group.
29. Using similar steps to the ones above, add user-2 to the EC2-Support group.
30. Using similar steps to the ones above, add user-3 to the EC2-Admin group.
If you do not have a 1 beside each group, revisit the above instructions above
to ensure that each user is assigned to a Group, as shown in the table in the
Business Scenario section.
This link can be used to sign-in to the AWS Account you are currently using.
Mozilla Firefox
Google Chrome
Microsoft Edge
You will now sign-in as user-1, who has been hired as your Amazon S3
storage support staff.
Since your user is part of the S3-Support Group in IAM, they have permission
to view a list of Amazon S3 buckets and their contents.
You cannot see any instances! Instead, it says You do not have any instances
in this region. This is because your user has not been assigned any
permissions to use Amazon EC2.
You will now sign-in as user-2, who has been hired as your Amazon EC2
support person.
41. Sign user-1 out of the AWS Management Console by configuring the
following:
o At the top of the screen, click user-1
o Click Sign Out
42. Paste the IAM users sign-in link into your private window and press Enter.
You are now able to see an Amazon EC2 instance because you have Read
Only permissions. However, you will not be able to make any changes to
Amazon EC2 resources.
If you cannot see an Amazon EC2 instance, then your Region may be
incorrect. In the top-right of the screen, pull-down the Region menu and select
the region that you noted at the start of the lab (e.g., N. Virginia).
You will receive an error stating You are not authorized to perform this
operation. This demonstrates that the policy only allows you to view
information, without making changes.
You will receive an Error Access Denied because user-2 does not
permission to use Amazon S3.
You will now sign-in as user-3, who has been hired as your Amazon EC2
administrator.
50. Sign user-2 out of the AWS Management Console by configuring the
following:
o At the top of the screen, click user-2
o Click Sign Out
51. Paste the IAM users sign-in link into your private window and press Enter.
52. Paste the sign-in link into your web browser address bar again. If it is not in
your clipboard, retrieve it from the text editor where you stored it earlier.
53. Sign-in with:
o IAM user name: user-3
o Password: Lab-Password3
54. In the Services menu, click EC2.
55. In the navigation pane on the left, click Instances.
If you cannot see an Amazon EC2 instance, then your Region may be
incorrect. In the top-right of the screen, pull-down the Region menu and select
the region that you noted at the start of the lab (eg Oregon).
Lab Complete
Congratulations! You have completed the lab.
59. Click End Lab at the top of this page and then click Yes to confirm that you
want to end the lab.
A panel will appear, indicating that "DELETE has been initiated... You may
close this message box now."
60. Click the X in the top right corner to close the panel.
Conclusion
Congratulations! You now have successfully:
• Explored pre-created IAM users and groups
• Inspected IAM policies as applied to the pre-created groups
• Followed a real-world scenario, adding users to groups with specific capabilities
enabled
• Located and used the IAM sign-in URL
• Experimented with the effects of policies on service access