- AWS Administration Cookbook
- Lucas Chan Rowan Udell
- 101字
- 2021-07-09 18:18:31
Configuration
Authentication between the CLI tool and the AWS API is done via two pieces of information:
- Access key ID
- Secret access key
As the name suggests, you should keep your secret access key a secret! Be careful where you store or send it.
Once you have created a user, you can configure the tool to use it for authentication purposes.
While you can configure the CLI tool with access keys directly, this should be avoided. Instead, you should use profiles to store your credentials. Using profiles gives you a more consistent and manageable centralized location to secure your secret keys.
推薦閱讀
- Ansible Configuration Management
- 集成架構(gòu)中型系統(tǒng)
- Instant Raspberry Pi Gaming
- 機(jī)器學(xué)習(xí)實(shí)戰(zhàn):基于Sophon平臺的機(jī)器學(xué)習(xí)理論與實(shí)踐
- Mastercam 2017數(shù)控加工自動編程經(jīng)典實(shí)例(第4版)
- OpenStack for Architects
- 人工智能工程化:應(yīng)用落地與中臺構(gòu)建
- Implementing Splunk 7(Third Edition)
- 分?jǐn)?shù)階系統(tǒng)分析與控制研究
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用
- Dreamweaver CS6精彩網(wǎng)頁制作與網(wǎng)站建設(shè)
- Linux Shell編程從初學(xué)到精通
- MongoDB 4 Quick Start Guide
- PostgreSQL 10 High Performance
- Java求職寶典