AWS Task 1

Task 1: Explore the Users and Groups
In this task, you will explore the Users and Groups that have already been created for you in IAM.

In the AWS Management Console, on the Services menu, select IAM.

In the navigation pane on the left, choose Users.

The following IAM Users have been created for you:

Choose user-1.

This will bring to a summary page for user-1. The Permissions tab will be displayed.

Notice that user-1 does not have any permissions.

Choose the Groups tab.

user-1 also is not a member of any groups.

Choose the Security credentials tab.

user-1 is assigned a Console password

In the navigation pane on the left, choose User groups.

The following groups have already been created for you:

EC2-Support

S3-Support

Choose the EC2-Support group.

This will bring you to the summary page for the EC2-Support group.

Choose the Permissions tab.

This group has a Managed Policy associated with it, called AmazonEC2ReadOnlyAccess. Managed Policies are pre-built policies (built either by AWS or by your administrators) that can be attached to IAM Users and Groups. When the policy is updated, the changes to the policy are immediately apply against all Users and Groups that are attached to the policy.

Choose the plus (+) icon next to the AmazonEC2ReadOnlyAccess policy to view the policy details.

Note: A policy defines what actions are allowed or denied for specific AWS resources.

This policy is granting permission to List and Describe information about EC2, Elastic Load Balancing, CloudWatch and Auto Scaling. This ability to view resources, but not modify them, is ideal for assigning to a Support role.

The basic structure of the statements in an IAM Policy is:

Effect says whether to Allow or Deny the permissions.

Action specifies the API calls that can be made against an AWS Service (eg cloudwatch:ListMetrics).

Resource defines the scope of entities covered by the policy rule (eg a specific Amazon S3 bucket or Amazon EC2 instance, or * which means any resource).

Choose the minus icon (-) to hide the policy details.

In the navigation pane on the left, choose User groups.

Choose the S3-Support group and then choose the Permissions tab.

The S3-Support group has the AmazonS3ReadOnlyAccess policy attached.

Choose the plus (+) icon to view the policy details.

This policy grants permissions to Get and List resources in Amazon S3.

Choose the minus icon (-) to hide the policy details.

In the navigation pane on the left, choose User groups.

Choose the EC2-Admin group and then choose the Permissions tab.

This Group is slightly different from the other two. Instead of a Managed Policy, it has an Inline Policy, which is a policy assigned to just one User or Group. Inline Policies are typically used to apply permissions for one-off situations.

Choose the plus (+) icon to view the policy details.

This policy grants permission to view (Describe) information about Amazon EC2 and also the ability to Start and Stop instances.

Choose the minus icon (-) to hide the policy details.

Business Scenario
For the remainder of this lab, you will work with these Users and Groups to enable permissions supporting the following business scenario:

Your company is growing its use of Amazon Web Services, and is using many Amazon EC2 instances and a great deal of Amazon S3 storage. You wish to give access to new staff depending upon their job function:

User In Group Permissions
user-1 S3-Support Read-Only access to Amazon S3
user-2 EC2-Support Read-Only access to Amazon EC2
user-3 EC2-Admin View, Start and Stop Amazon EC2 instances

Task 2: Add Users to Groups
You have recently hired user-1 into a role where they will provide support for Amazon S3. You will add them to the S3-Support group so that they inherit the necessary permissions via the attached AmazonS3ReadOnlyAccess policy.

You can ignore any “not authorized” errors that appear during this task. They are caused by your lab account having limited permissions and will not impact your ability to complete the lab.

Add user-1 to the S3-Support Group
In the left navigation pane, choose User groups.

Choose the S3-Support group.

Choose the Users tab.

In the Users tab, choose Add users.

In the Add Users to S3-Support window, configure the following:

Select user-1.
At the bottom of the screen, choose Add Users.
In the Users tab you will see that user-1 has been added to the group.

Add user-2 to the EC2-Support Group
You have hired user-2 into a role where they will provide support for Amazon EC2.

Using similar steps to the ones above, add user-2 to the EC2-Support group.

user-2 should now be part of the EC2-Support group.

Add user-3 to the EC2-Admin Group
You have hired user-3 as your Amazon EC2 administrator, who manage your EC2 instances.

Using similar steps to the ones above, add user-3 to the EC2-Admin group.

user-3 should now be part of the EC2-Admin group.

In the navigation pane on the left, choose User groups.

Each Group should now have a 1 in the Users column for the number of Users in each Group.

If you do not have a 1 beside each group, revisit the above instructions above to ensure that each user is assigned to a User group, as shown in the table in the Business Scenario section.

Task 3: Sign-In and Test Users
In this task, you will test the permissions of each IAM User.

In the navigation pane on the left, choose Dashboard.

An IAM users sign-in link is displayed on the right. It will look similar to: https://123456789012.signin.aws.amazon.com/console

This link can be used to sign-in to the AWS Account you are currently using.

Copy the Sign-in URL for IAM users in this account to a text editor.

Open a private (Incognito) window.

Mozilla Firefox

Choose the menu bars at the top-right of the screen
Select New private window
Google Chrome

Choose the ellipsis at the top-right of the screen
Select New Incognito Window
Microsoft Edge

Choose the ellipsis at the top-right of the screen
Choose New InPrivate window
Microsoft Internet Explorer

Choose the Tools menu option

Choose InPrivate Browsing

Paste the IAM users sign-in link into the address bar of your private browser session and press Enter.

Next, you will sign-in as user-1, who has been hired as your Amazon S3 storage support staff.

Sign-in with:

IAM user name: user-1

Password: Lab-Password1

In the Services menu, choose S3.

Choose the name of the bucket that exists in the account and browse the contents.

Since your user is part of the S3-Support Group in IAM, they have permission to view a list of Amazon S3 buckets and the contents.

Note: The bucket does not contain any objects.

Now, test whether they have access to Amazon EC2.

In the Services menu, choose EC2.

In the left navigation pane, choose Instances.

You cannot see any instances. Instead, you see a message that states You are not authorized to perform this operation. This is because this user has not been granted any permissions to access Amazon EC2.

You will now sign-in as user-2, who has been hired as your Amazon EC2 support person.

Sign user-1 out of the AWS Management Console by completing the following actions:

At the top of the screen, choose user-1
Choose Sign Out
screenshot

Paste the IAM users sign-in link into your private browser tab’s address bar and press Enter.

Note: This link should be in your text editor.

Sign-in with:

IAM user name: user-2

Password: Lab-Password2

In the Services menu, choose EC2.

In the navigation pane on the left, choose Instances.

You are now able to see an Amazon EC2 instance because you have Read Only permissions. However, you will not be able to make any changes to Amazon EC2 resources.

If you cannot see an Amazon EC2 instance, then your Region may be incorrect. In the top-right of the screen, pull-down the Region menu and select the region that you noted at the start of the lab (for example, N. Virginia).

Select the instance named LabHost.

In the Instance state menu above, select Stop instance.

In the Stop Instance window, select Stop.

You will receive an error stating You are not authorized to perform this operation. This demonstrates that the policy only allows you to view information, without making changes.

Choose the X to close the Failed to stop the instance message.

Next, check if user-2 can access Amazon S3.

In the Services, choose S3.

You will see the message You don’t have permissions to list buckets because user-2 does not have permission to access Amazon S3.

You will now sign-in as user-3, who has been hired as your Amazon EC2 administrator.

Sign user-2 out of the AWS Management Console by completing the following actions:

At the top of the screen, choose user-2
Choose Sign Out
screenshot

Paste the IAM users sign-in link into your private window and press Enter.

Paste the sign-in link into the address bar of your private web browser tab again. If it is not in your clipboard, retrieve it from the text editor where you stored it earlier.

Sign-in with:

IAM user name: user-3

Password: Lab-Password3

In the Services menu, choose EC2.

In the navigation pane on the left, choose Instances.

As an EC2 Administrator, you should now have permissions to Stop the Amazon EC2 instance.

Select the instance named LabHost .

If you cannot see an Amazon EC2 instance, then your Region may be incorrect. In the top-right of the screen, pull-down the Region menu and select the region that you noted at the start of the lab (for example, N. Virginia).

In the Instance state menu, choose Stop instance.

In the Stop instance window, choose Stop.

The instance will enter the stopping state and will shutdown.

Close your private browser window.

Lab complete
Congratulations! You have completed the lab.

Choose End Lab at the top of this page, and then select Yes to confirm that you want to end the lab.

A panel indicates that You may close this message box now…

Select the X in the top-right corner to close the panel.

Conclusion
Congratulations! You now have successfully:

Explored pre-created IAM users and groups
Inspected IAM policies as applied to the pre-created groups
Followed a real-world scenario, adding users to groups with specific capabilities enabled
Located and used the IAM sign-in URL
Experimented with the effects of policies on service access

© 2021 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed, in whole or in part, without prior written permission from Amazon Web Services, Inc. Commercial copying, lending, or selling is prohibited.