- AWS Administration Cookbook
- Lucas Chan Rowan Udell
- 101字
- 2021-07-09 18:18:31
Configuration
Authentication between the CLI tool and the AWS API is done via two pieces of information:
- Access key ID
- Secret access key
As the name suggests, you should keep your secret access key a secret! Be careful where you store or send it.
Once you have created a user, you can configure the tool to use it for authentication purposes.
While you can configure the CLI tool with access keys directly, this should be avoided. Instead, you should use profiles to store your credentials. Using profiles gives you a more consistent and manageable centralized location to secure your secret keys.
推薦閱讀
- Hands-On Intelligent Agents with OpenAI Gym
- Hands-On Internet of Things with MQTT
- Learning Microsoft Azure Storage
- Learning Apache Spark 2
- Getting Started with Containerization
- 數控銑削(加工中心)編程與加工
- Mastering Salesforce CRM Administration
- AutoCAD 2012中文版繪圖設計高手速成
- 分析力!專業Excel的制作與分析實用法則
- 單片機技能與實訓
- 機器人人工智能
- 精通LabVIEW程序設計
- 工業機器人實操進階手冊
- 計算機辦公應用培訓教程
- Learning Couchbase