Lab 1 Introduction To AWS IAM
Lab 1 Introduction To AWS IAM
Topics covered
This lab will demonstrate:
7. Click user-1.
This will bring to a summary page for user-1. The Permissions tab will be
displayed.
8. Notice that user-1 does not have any permissions.
9. Click the Groups tab.
user-1 also is not a member of any groups.
10. Click the Security credentials tab.
user-1 is assigned a Console password
11. In the navigation pane on the left, click Groups.
The following groups have already been created for you:
Ο EC2-Admin
Ο EC2-Support
Ο S3-Support
12. Click the EC2-Support group.
This will bring you to the summary page for the EC2-Support group.
13. Click the Permissions tab.
This group has a Managed Policy associated with it,
called AmazonEC2ReadOnlyAccess. Managed Policies are pre-built
policies (built either by AWS or by your administrators) that can be
attached to IAM Users and Groups. When the policy is updated, the
changes to the policy are immediately apply against all Users and Groups
that are attached to the policy.
14. Under Actions, click the Show Policy link.
A policy defines what actions are allowed or denied for specific AWS
resources. This policy is granting permission to List and Describe
information about EC2, Elastic Load Balancing, CloudWatch and Auto
Scaling. This ability to view resources, but not modify them, is ideal for
assigning to a Support role.
The basic structure of the statements in an IAM Policy is:
Ο Effect says whether to Allow or Deny the permissions.
Ο Action specifies the API calls that can be made against an AWS Service
(eg cloudwatch:ListMetrics).
Ο Resource defines the scope of entities covered by the policy rule (eg a
specific Amazon S3 bucket or Amazon EC2 instance, or which means any
resource*).
15. Close the Show Policy window.
16. In the navigation pane on the left, click Groups.
17. Click the S3-Support group.
The S3-Support group has the AmazonS3ReadOnlyAccess policy
attached.
18. Below the Actions menu, click the Show Policy link.
This policy has permissions to Get and List resources in Amazon S3.
19. Close the Show Policy window.
20. In the navigation pane on the left, click Groups.
21. Click the EC2-Admin group.
This Group is slightly different from the other two. Instead of a Managed
Policy, it has an Inline Policy, which is a policy assigned to just one User
or Group. Inline Policies are typically used to apply permissions for one-off
situations.
22. Under Actions, click Show Policy to view the policy.
This policy grants permission to view (Describe) information about
Amazon EC2 and also the ability to Start and Stop instances.
23. At the bottom of the screen, click Cancel to close the policy.
Business Scenario
For the remainder of this lab, you will work with these Users and Groups to
enable permissions supporting the following business scenario:
Your company is growing its use of Amazon Web Services, and is using many
Amazon EC2 instances and a great deal of Amazon S3 storage. You wish to
give access to new staff depending upon their job function:
Google Chrome
Microsoft Edge
35. Paste the IAM users sign-in link into your private window and
press Enter.
You will now sign-in as user-1, who has been hired as your Amazon S3
storage support staff.
36. Sign-in with:
IAM user name: user-1
Password: lab-password
42. Paste the IAM users sign-in link into your private window and
press Enter.
This links should be in your text editor.
43. Sign-in with:
IAM user name: user-2
Password: lab-password
44. In the Services menu, click EC2.
45. In the navigation pane on the left, click Instances.
You are now able to see an Amazon EC2 instance because you have Read
Only permissions. However, you will not be able to make any changes to
Amazon EC2 resources.
If you cannot see an Amazon EC2 instance, then your Region may be
incorrect. In the top-right of the screen, pull-down the Region menu and select
the region that you noted at the start of the lab (eg Oregon).
You will receive an error stating You are not authorized to perform this
operation. This demonstrates that the policy only allows you to
information, without making changes.
48. At the Stop Instances window, click Cancel.
Next, check if user-2 can access Amazon S3.
49. In the Services, click S3.
You will receive an Error Access Denied because user-2 does not
permission to use Amazon S3.
You will now sign-in as user-3, who has been hired as your Amazon EC2
administrator.
50. Sign user-2 out of the AWS Management Console by configuring the
following:
At the top of the screen, click user-2
Click Sign Out
51. Paste the IAM users sign-in link into your private window and
press Enter.
52. Paste the sign-in link into your web browser address bar again. If it is not
in your clipboard, retrieve it from the text editor where you stored it earlier.
53. Sign-in with:
Lab Complete
Congratulations! You have completed the lab.
59. Click End Lab at the top of this page and then click Yes to confirm that you
want to end the lab.
A panel will appear, indicating that "DELETE has been initiated... You may
close this message box now."
60. Click the X in the top right corner to close the panel.
Conclusion
Congratulations! You now have successfully:
Explored pre-created IAM users and groups
Inspected IAM policies as applied to the pre-created groups
Followed a real-world scenario, adding users to groups with specific
capabilities enabled
Located and used the IAM sign-in URL
Experimented with the effects of policies on service access