Update 019/master from study-template #42

Merged
merged 3 commits into from Aug 2, 2017
File filter...
Filter file types
Jump to file or symbol
Failed to load files and symbols.
+46 −8
Diff settings

Always

Just for now

Copy path View file
@@ -51,25 +51,50 @@ Identities are how we grant access to AWS APIs.

In the [IAM](https://console.aws.amazon.com/iam) tab:

*Getting to the IAM tab:*

![image](https://git.generalassemb.ly/storage/user/5688/files/96f5ca72-52c3-11e7-8d1f-03c42a2df2b4)

![image](https://git.generalassemb.ly/storage/user/5688/files/98790210-52c3-11e7-8fe3-3e56ff1253b2)

*Identity and Access Management (IAM)*
![image](https://git.generalassemb.ly/storage/user/5688/files/9dc1e764-52c3-11e7-84b5-c743f27294e0)

1. Select `Users` in the left sidebar.
![image](https://git.generalassemb.ly/storage/user/5688/files/9ee48afc-52c3-11e7-9f5c-fa9d9148317b)


1. Click `Add User` near the top of the page.

1. Enter `wdi-upload` into the text box.
![image](https://git.generalassemb.ly/storage/user/5688/files/a1a3a6ec-52c3-11e7-81bb-81f3c59556d7)

1. Under access type, check `Programmatic Access`
1. Click Next
![image](https://git.generalassemb.ly/storage/user/5688/files/a3047660-52c3-11e7-9698-fcd3201739bb)

1. Click Next: Permissions

1. Highlight Add User to Group
1. Click Next
![image](https://git.generalassemb.ly/storage/user/5688/files/a4738e78-52c3-11e7-838e-908804d66370)

1. Click Next: Review
![image](https://git.generalassemb.ly/storage/user/5688/files/a5f1e902-52c3-11e7-9ce2-c574affeeadd)

1. Click create User
_Then_
![image](https://git.generalassemb.ly/storage/user/5688/files/a6d9e0c2-52c3-11e7-81f6-39468e735eeb)

1. Click on your newly created user.
1. Click on the security credentials tab.
1. Click the small `x` to the right of your existing access key to delete it.
- Make sure `wdi-upload` is checked.
- Click directly on `wdi-upload`
![image](https://git.generalassemb.ly/storage/user/5688/files/a9c3165a-52c3-11e7-8d89-262fca9e927c)
9. Click on the security credentials tab.
10. Click the small `x` to the right of your existing access key to delete it.
1. Click `Create access key`
1. When complete, click `download .csv file` and save the CSV to this repository.(this is
1. When you recieve a `Success` response, click `download .csv file` and save the CSV to your `wdi` folder. (this is
the only time you'll be able to see your access key, but you can generate a new one anytime
and are encouraged to rotate them frequently)
1. Click `Close`
1. Click on the newly created user.
1. Copy the `User ARN` _(Amazon Resource Name)_ at the top of the page and save it in [arn.txt](arn.txt).

We'll need the User ARN to grant access to an S3 bucket we'll use for uploads.
@@ -88,15 +113,18 @@ S3 stores files you upload in `buckets`. A bucket is a top-level namespace
for your files.

In the [S3](https://console.aws.amazon.com/s3) tab:

![image](https://git.generalassemb.ly/storage/user/5688/files/aafc6ab2-52c3-11e7-8351-04e5c253c092)
1. Click `Create Bucket`.
This opens the `Create a Bucket - Select a Bucket Name and Region` modal.
1. Enter a name in the `Bucket Name` box. It must be unique among all S3
buckets and in all lowercase characters.
1. Select `US East (N. Virginia)` for the `Region`.
1. Click `Create`.
1. Highlight your bucket and select the `Permissions` tab.
![image](https://git.generalassemb.ly/storage/user/5688/files/e3352baa-5433-11e7-8951-7bbf1e8b7f57)

1. Click `Bucket policy` near the bottom of the `Permissions` tab.
![image](https://git.generalassemb.ly/storage/user/5688/files/ae45bf3e-52c3-11e7-9070-f4ca72d5c8ab)
1. At the bottom of the `Bucket Policy Editor` page,
click `Policy Generator`. This opens the AWS Policy Generator page.
1. On the AWS Policy Generator page
@@ -106,16 +134,26 @@ In the [S3](https://console.aws.amazon.com/s3) tab:
1. Select `Allow` for `Effect`.
1. Paste the User ARN into the `Principal` box.
1. Select `PutObject` and `PutObjectAcl` for `Actions`.
![image](https://git.generalassemb.ly/storage/user/5688/files/af19a6a0-52c3-11e7-944b-bda14c01b7ec)

1. Enter `arn:aws:s3:::<bucket_name>/*` into the
`Amazon Resource Name (ARN)` box.
- Make sure you add `/*` at the end of your user ARN for this step.
![image](https://git.generalassemb.ly/storage/user/5688/files/b02fbb2e-52c3-11e7-9e77-a95f6fceb508)

1. Click the `Add Statement`.
![image](https://git.generalassemb.ly/storage/user/5688/files/b269d492-52c3-11e7-9a11-74afb54a90fc)
1. Step 3: Generate Policy
1. Click `Generate Policy`
1. Copy the JSON from the `Policy JSON Document` modal.
1. Return to the S3 tab.
1. Paste the bucket policy into the `Bucket Policy Editor` field.
![image](https://git.generalassemb.ly/storage/user/5688/files/b35a2d3e-52c3-11e7-86ca-9b5d8221bc14)
1. Click `Save`.
1. Click `Save` in the `Permissions` dropdown.
2. Click on `Access Control List`
3. Click on your account
4. A modal will pop up.
1. Click `Save` in the modal.

You have now created and granted access to an S3 bucket.

ProTip! Use n and p to navigate between commits in a pull request.