Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add note for Anonymous login #476

Merged
merged 2 commits into from
Mar 25, 2024
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion mountainduck/installation/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ You can distribute Mountain Duck with the help of Active Directory or a system m

### Defaults
- Add preconfigured connection profiles and bookmarks this way by copying the connection profile file (`.cyberduckprofile`) into the *Profiles* folder or the bookmark file (`.duck`) into the *Bookmarks* folder within the [application support folder](../support.md#application-support-folder).
- Share default settings by using the [default.properties file](../preferences#hidden-configuration-options).
- Share default settings by using the [default.properties file](../preferences.md#hidden-configuration-options).

## Uninstall

Expand Down
Binary file added protocols/s3/_images/S3_Anonymous_Login.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
13 changes: 12 additions & 1 deletion protocols/s3/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -216,7 +216,7 @@ You can also do this for a specific profile by adding `--profile myProfile` to t

#### Connecting Using AssumeRole from AWS Security Token Service (STS)

Instead of providing Access Key ID and Secret Access Key, authenticate using temporary credentials from AWS Security Token Service (STS) with optional Multi-Factor Authentication (MFA). Refer to U[sing IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html).
Instead of providing Access Key ID and Secret Access Key, authenticate using temporary credentials from AWS Security Token Service (STS) with optional Multi-Factor Authentication (MFA). Refer to [Using IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html).

![MFA Token Prompt](_images/MFA_Token_Prompt.png)

Expand All @@ -238,6 +238,17 @@ Refer to [Assuming a Role](https://docs.aws.amazon.com/cli/latest/userguide/cli-

When editing a bookmark, the *Access Key ID* is set from the `default` profile in the credentials file located at `~/.aws/credentials` on macOS or `%USERPROFILE%\.aws\credentials` on Windows if such a profile exists.

### Connecting without using AWS credentials

Use the *S3 (HTTPS)* connection profile to access public data sets on [AWS Open Data](https://registry.opendata.aws/) without using access keys by using the *Anonymous Login* option in the bookmark configuration.

```{image} _images/S3_Anonymous_Login.png
:alt: S3 Anonymous Login
:width: 400px
```

- {download}`Download<https://profiles.cyberduck.io/S3%20(HTTPS).cyberduckprofile>` the *S3 (HTTPS) profile* for preconfigured settings

## Cyberduck CLI

List all buckets with [Cyberduck CLI](https://duck.sh/) using
Expand Down
Loading