Skip to content

Commit

Permalink
Move IAM CLI documentation to tutorial.
Browse files Browse the repository at this point in the history
  • Loading branch information
dkocher committed Sep 3, 2024
1 parent 7f7d2a9 commit b2ec1af
Show file tree
Hide file tree
Showing 3 changed files with 25 additions and 21 deletions.
3 changes: 1 addition & 2 deletions protocols/s3/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ Amazon S3
:titlesonly:
alibaba
digitalocean
iam
linode
oraclecloud
providers
Expand Down Expand Up @@ -34,7 +33,7 @@ You must obtain the login credentials (Access Key ID and Secret Access Key) of y

### IAM User

You can also connect using [IAM](iam.md) credentials that have the `Amazon S3 Full Access` template policy permissions attached and optionally the `CloudFront Full Access`.
You can also connect using [IAM](../../tutorials/iam.md) credentials that have the `Amazon S3 Full Access` template policy permissions attached and optionally the `CloudFront Full Access`.

### Generic S3 Profiles

Expand Down
38 changes: 19 additions & 19 deletions protocols/s3/iam.md → tutorials/iam.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,25 +9,25 @@ You can manage IAM users using the [AWS Console](https://console.aws.amazon.com/

## IAM Tools Setup

- Download the [IAM Command Line Toolkit](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/iam/index.html). Unzip the download and move the folder `IAMCli-1.2.0` into the `bin` folder in your user home directory.
- In a Terminal.app window, set the home environment for IAM
```
echo 'export JAVA_HOME=`/usr/libexec/java_home`' >> ~/.bash_profile
echo 'export AWS_IAM_HOME=~/bin/IAMCli-1.2.0' >> ~/.bash_profile
```
- Set the environment variable to point to the credentials file.
```
echo 'export AWS_CREDENTIAL_FILE=$AWS_IAM_HOME/aws-credential.template' >> ~/.bash_profile
```
- Add the path to the IAM programs to your path
```
echo 'export PATH=$AWS_IAM_HOME/bin:$PATH' >> ~/.bash_profile
```
- Update the environment of the current shell (alternatively open a new Terminal.app window).
```
. ~/.bash_profile
```
- Edit the credentials file `aws-credential.template` with your AWS identifiers.
1. Download the [IAM Command Line Toolkit](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/iam/index.html). Unzip the download and move the folder `IAMCli-1.2.0` into the `bin` folder in your user home directory.
1. In a Terminal.app window, set the home environment for IAM
```
echo 'export JAVA_HOME=`/usr/libexec/java_home`' >> ~/.bash_profile
echo 'export AWS_IAM_HOME=~/bin/IAMCli-1.2.0' >> ~/.bash_profile
```
1. Set the environment variable to point to the credentials file.
```
echo 'export AWS_CREDENTIAL_FILE=$AWS_IAM_HOME/aws-credential.template' >> ~/.bash_profile
```
1. Add the path to the IAM programs to your path
```
echo 'export PATH=$AWS_IAM_HOME/bin:$PATH' >> ~/.bash_profile
```
1. Update the environment of the current shell (alternatively open a new Terminal.app window).
```
. ~/.bash_profile
```
1. Edit the credentials file `aws-credential.template` with your AWS identifiers.
## Create a new IAM User
Expand Down
5 changes: 5 additions & 0 deletions tutorials/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,14 @@ Tutorials
:hidden:
:titlesonly:
custom_oauth_client_id
iam
:::

Find detailed step-by-step instructions for setup, connecting and most common use-cases as well as tutorials for more complicated workarounds.

## [Setup a Custom OAuth Client ID for Google Drive & Google Cloud Storage](custom_oauth_client_id.md)
Workaround to register your own Custom OAuth 2.0 Client ID for [Google Cloud Storage](../protocols/googlecloudstorage.md) and [Google Drive](../protocols/googledrive.md) and use it with a custom connection profile instead when encountering `This app is blocked` error when accessing Google Drive or Google Cloud Storage.


## [AWS Identity & Access Management (IAM)](iam.md)
IAM allows you to create credentials for third parties accessing your S3 account with permission constraints.

0 comments on commit b2ec1af

Please sign in to comment.