create aws “read only” credentials-custom aws “read only” credentials-custom • sign-in...
TRANSCRIPT
Create AWS “Read Only” Credentials-Custom
• Sign-in into your Amazon AWS Management Console by right clicking here
• Click on IAM link.
• In the left Navigation pane, select Policies.
• Click on Create Policy
.
• Select Create Your Own Policy
• In Review Policy page, give Policy Name and Description as “Cloudamize Policy”. Copy the policy text from below box and paste in the Policy Document area. Finally click on Create Policy button in the lower right corner of the page.
{ "Version": "2012-10-17", "Statement": [ { "Action": [ "appstream:Get*", "autoscaling:Describe*", "cloudformation:DescribeStacks", "cloudformation:DescribeStackEvents", "cloudformation:DescribeStackResources", "cloudformation:GetTemplate", "cloudformation:List*", "cloudfront:Get*", "cloudfront:List*", "cloudtrail:DescribeTrails", "cloudtrail:GetTrailStatus", "cloudwatch:Describe*", "cloudwatch:Get*", "cloudwatch:List*", "directconnect:Describe*", "dynamodb:GetItem", "dynamodb:BatchGetItem", "dynamodb:Query", "dynamodb:Scan", "dynamodb:DescribeTable", "dynamodb:ListTables", "ec2:Describe*", "elasticache:Describe*", "elasticbeanstalk:Check*", "elasticbeanstalk:Describe*", "elasticbeanstalk:List*", "elasticbeanstalk:RequestEnvironmentInfo", "elasticbeanstalk:RetrieveEnvironmentInfo", "elasticloadbalancing:Describe*", "elastictranscoder:Read*", "elastictranscoder:List*", "iam:List*", "iam:Get*", "opsworks:Describe*", "opsworks:Get*", "route53:Get*", "route53:List*", "redshift:Describe*", "redshift:ViewQueriesInConsole", "rds:Describe*", "rds:ListTagsForResource", "s3:Get*", "s3:List*",
"sdb:GetAttributes", "sdb:List*", "sdb:Select*", "ses:Get*", "ses:List*", "sns:Get*", "sns:List*", "sqs:GetQueueAttributes", "sqs:ListQueues", "sqs:ReceiveMessage", "storagegateway:List*", "storagegateway:Describe*", "aws-portal:ViewUsage", "aws-portal:ViewBilling" ], "Effect": "Allow", "Resource": "*" } ] }
• Now from the left Navigation pane, select Users.
• Click Create New Users.
• Fill in the name of the user "CloudamizeUser". Make sure that the “Generate an access key” checkbox is selected. Click Create.
• You will receive a message that the user have been created successfully. Click on the “Download Credentials” button in the lower-right-hand corner of the message and save the CSV file on your disk. You will need these credentials when you set up your Cloudamize account.
• Close the window after the file is saved. • Select your user and click Attach User Policy.
• In the “Apply Policy” window select CloudamizePolicy and Click Apply Policy.
• To know more about IAM on Amazon AWS click here.
•