官术网_书友最值得收藏!

The AWS credential search order

AWS Tools stores the credential in the C:\Users\username>\AppData\Local\AWSToolkit\RegisteredAccounts.json file. This files stores your access and secret access keys in an encrypted format. Even if you copy this file to a different computer, you cannot use it. This is the first file that AWS Tools for PowerShell searches on the Windows platform for the AWS credentials. You can also write the credentials to a different file as follows:

PS C:\> Set-AWSCredentials -AccessKey {xx} -SecretKey {xx} -StoreAs {ProfileName} -ProfilesLocation c:\AWSTools\MyCredential

By default, on a Windows platform, AWS Tools for Windows PowerShell modules read profiles from the file C:\Users<userid>\.aws\credentials. Don't get confused here. I specifically mentioned AWS Tools for Windows PowerShell and not AWS Tools for PowerShell Core. AWS Tools for PowerShell Core still store credentials in the location, C:\Users\username>\AppData\Local\AWSToolkit\RegisteredAccounts.json. On Linux, the file is at ~/.aws/credentials. Here are the high-level steps for the credential search:

  • Literal credentials in the cmdlet
  • Profile names or profile locations
  • Credentials specified by the credential parameter
  • PowerShell session profiles
  • Default profiles set in PowerShell for the AWS access
  • The EC2 instance credential if EC2 instance is configured for an IAM role
主站蜘蛛池模板: 揭阳市| 卢龙县| 开封县| 平果县| 长寿区| 芦山县| 且末县| 谢通门县| 肇源县| 承德县| 柏乡县| 米脂县| 雷波县| 雷波县| 宁波市| 景宁| 屏东县| 重庆市| 连州市| 阜城县| 河南省| 泸溪县| SHOW| 东莞市| 苗栗县| 新宁县| 镇安县| 呼图壁县| 响水县| 祁东县| 九龙坡区| 汉阴县| 高陵县| 雅江县| 融水| 隆化县| 万州区| 武汉市| 武城县| 阳西县| 周宁县|