Enabling a FIDO Security Key (Console)

 





To Enable a FIDO Security Key for Your Own IAM User (Console)

  • In order to sign-in to your IAM console, you can use your AWS account ID or account alias, your account IAM username, and your password.

  • You can choose your username and then My Security Credentials, in the navigation bar on the upper right.

  • Select Manage MFA Device in the MFA section on the AWS IAM Credentials tab.

  • Choose FIDO Security Key and then Continue in the Manage MFA device wizard,

  • Now insert the FIDO security key into your computer's USB port.

  • Tap the FIDO2 security key, and then choose Close when the setup is complete.

To Enable a FIDO Security Key for Another IAM User (Console)

  • You have to sign-in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/.

  • Choose Users in the navigation pane.

  • Now select the username to enable an MFA, and then the Security Credentials tab.

  • Choose Manage near the Assigned MFA device.

  • After that select the FIDO Security Key, and then Continue in the Manage MFA device wizard.

  • Insert the FIDO security key into your computer's USB port.

  • Lastly, tap the FIDO security key, and then Close when the setup is complete.


To Enable a FIDO Key for Your Root User (Console)

  • You have to sign-in to the IAM console as the account owner via Root user and enter your AWS account email address. Type your password on the next page.

  • Now select your account name and then My Security Credentials on the right side of the navigation bar. Select Continue to Security Credentials if necessary.

  • Expand the MFA section.

  • After that select Manage or Activate MFA, according to your preceding step.

  • Choose FIDO Security Key and then Continue in the wizard.

  • Insert the FIDO security key into your computer's USB port.

  • Lastly, tap the FIDO security key, and then Close when the setup is complete.











































Comments

Popular posts from this blog

Deployment (Part 3)

Project Resourcing (Part 2)

Design Planning (Part 3)