- Effective DevOps with AWS
- Yogesh Raheja Giuseppe Borgese Nathaniel Felsen
- 424字
- 2021-07-23 16:27:26
Enabling MFA on the root account
In order to avoid any kind of issues, the first thing we need to do once we sign up is enable MFA. In case you haven't seen or heard of this before, MFA is a security system that requires more than one method of authentication from independent categories of credentials. These are used to verify the user's identity in order to log in. In practice, once enabled, you will need the password previously set when you signed up in order to login. However, you will also need another code provided from a different source. That second source can be provided through a physical device such as the SafeNet IDProve, which is available at http://amzn.to/2u4K1rR, through an SMS on your phone, or through an application installed on your smartphone. We will use the third option—an application installed on your smartphone, which is completely free:
- Go to your App Store, Google Play Store, or App Marketplace and install an application called Google Authenticator (or any other equivalent, such as Authy).
- In the AWS Management Console, open the My Security Credentials page in the top-right corner:

- If prompted to create and use AWS Identity and Access Management (IAM), users with limited permissions, click on the Continue to Security Credentials button. We will explore the IAM system in Chapter 3, Treating Your Infrastructure as Code. Expand the Multi-factor authentication (MFA) section on the page.
- Pick virtual MFA and follow the instructions to sync Google authentication with your root account (note that the scan QR code option is the easiest one to pair the device).
From this point on, you will need your password and the token displayed on the MFA application in order to log in as root in the AWS console.
- There are a number of good applications to manage passwords, such as 1Password at https://agilebits.com/onepassword or Dashlane at https://www.dashlane.com.
- For MFA, you can also try using Authy at https://www.authy.com. This works like Google Authenticator but also has a centralized server allowing it to work across multiple devices (including desktop applications), so if you lose your phone, you won't lose access to AWS.
As we have seen earlier, the root account usage should be limited to a bare minimum. So, in order to create virtual servers, configure services, and so on, we will rely on the IAM service which will let us have granular control over permissions for each user.
- Hands-On Intelligent Agents with OpenAI Gym
- Mastering Spark for Data Science
- 21天學(xué)通PHP
- 會聲會影X5視頻剪輯高手速成
- 網(wǎng)頁編程技術(shù)
- 人工智能工程化:應(yīng)用落地與中臺構(gòu)建
- Windows環(huán)境下32位匯編語言程序設(shè)計
- 信息物理系統(tǒng)(CPS)測試與評價技術(shù)
- Excel 2007技巧大全
- Docker on Amazon Web Services
- 多媒體制作與應(yīng)用
- 菜鳥起飛五筆打字高手
- Keras Reinforcement Learning Projects
- 數(shù)據(jù)結(jié)構(gòu)與實訓(xùn)
- 從實踐中學(xué)嵌入式Linux操作系統(tǒng)