Creating an IAM user in your AWS account (part 1)

 




To read part 2, please click here




Creating IAM Users (Console)

If you want to create on or more IAM users (console), then, you have to-
  • Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/.

  • Select Users and Add users in the navigation pane.

  • Now you can type the user name for the new user (i.e. sign in name for AWS) and you can also add up to 10 users at a time by choosing Add another user for each additional user.

  • After that you can pick any of the following types of accesses for the set of users:

  1. Programmatic Access helps the users to get access to the API, AWS CLI, or Tools for Windows PowerShell creating access keys for each one them that can also viewed or downloaded at the Final page.
  2. AWS Management Console Access enable the users to acquires access to the AWS Management Console creating a password for each user. 

  • Now you can choose Next: Permissions.

  • Next, the Set permissions page will allow you to specify permissions for the new users with the help of following options: 

  1. Add user to group helps you to assign the users to one or more groups already having permission policies.
  2. Copy permissions from existing users enable you to copy all the group memberships, attached managed policies, embedded inline policies, and any existing permissions boundaries from an existing user to the new ones.
  3. Attach existing policies directly will show you a list of the AWS managed and customer managed policies in your account.  

  • Now, you can set a permission boundary, which is an advanced feature and optional too.

  • Choose Next: Tags.

  • You can also add metadata to the user by attaching tags with key-value pairs. (optional)

  • If you want to view all the choices made till now, you can select Next: Review and then Create user.

  • Choose Show next to each of the user's password and access keys if you want to see them and Download.csv in order to save them to a safe location.

  • Now each user can be provided with his or her user credentials. Send email can be chosen on the final page and the template includes details of the user name and URL to the account sign-in page for each user.






To read part 2, please click here













































Comments

Popular posts from this blog

Deployment (Part 3)

Project Resourcing (Part 2)

Design Planning (Part 3)