Create an AWS IAM User for Demos

Programmatic access to the AWS Cloud API

In order to run the examples presented in IT Wonder Lab, you will need programmatic access to the AWS Cloud API.

The following instructions guide you on creating a user for programmatic access with full administration permissions.

How To Create an AWS IAM User for Demos

  1. Sign in AWS Management Console

    Sign in to the AWS Management Console using the email address of your new AWS account.

  2. Access AWS IAM Service for user management

    Select "IAM Manage User Access and Encryption Keys" in the AWS Console.

  3. Create a user in the AWS IAM Management Console

    Follow the the Add User wizard.

  4. Next Steps

    Use the newly created users for Terraform

Check the Tutorial on How to create AWS IAM users using Terraform.

Be aware that these instructions should only be used for demos and accounts should be disabled after completion.

These instructions don't follow the common security practice of Granting Least Privilege.

In other tutorials, we will show how to properly manage security in the cloud.

Sign in AWS Management Console

Sign in to the AWS Management Console using the email address of your new AWS account created on the Create an AWS Account for Demos post.

Fill in the e-mail address and press Next.

Sign in AWS interface

Fill in the password and press Sign in.

AWS Root user sign in interface

Access AWS IAM Service for User Management

On the AWS Management Console home, write IAM into the search box and select "IAM Manage User Access and Encryption Keys"

AWS Services select IAM

Create a user in the AWS IAM Management Console

Click Users on the left menu and click the Add User button.

AWS Add user interface

Add a user

AWS shows a user creation wizard.

AWS IAM Add User: Add tags.

In current releases of the AWS console, the Add User wizard has been updated to include a new step to Add Tags to the created user. That step is not shown in this tutorial screenshots.

First, write a user name.

We like to follow a pattern for all the elements in the infrastructure, since users are part of the infrastructure, start them with a prefix that uniquely identifies this Cloud.

In this case, the prefix will be ditwl which stands for Demo IT Wonder Lab in lowercase. Append the name of the user or a functional description, in our case, the full user name will be ditwl-terraform-user.

AWS allows two types of user access:

  • Programmatic access: is used by tools like Terraform that access AWS API for all operations.
  • AWS Management Console access: is used by people who need to access Management Console using a web browser.

Since we are creating a user for Terraform to access the AWS API, select Programmatic access for the AWS access type.

Click Next: Permissions

AWS Add user wizard

Assign a Group

The recommended way to manage user permissions is by assigning users to groups and giving permissions to the groups.  Since this is our first user (beyond the root account), press Create group to create our first group.

AWS Add Users, set permissions, add to group

A new form is shown for the Create group. Name the group (we will use ditwl-admins as the name) and select AdministratorAccess as the Policy. The AdministratorAccess provides full access to AWS services.

Press Create Group to go back to the previous screen.

AWS create group add policy

Assign the created group to the user

Assign the previously created group to the user and click Next: Review.

AWS assign user to existing group

Review user

The review screen shows all the data for the user. Review the correct spelling of the names and group assignments and press Create user.

AWS Add user review screen

Download User credentials

The user has been created and AWS shows the Access key ID and the Secret access key. This is the only time that AWS will show the Secret access key.

Press Download .csv to download a CSV file named credentials.csv that contains the credentials or press Show to see the Secret access key on the screen.

AWS Add user download credentials

The downloaded file credentials.csv contains the following fields [1]:

User name,Password,Access key ID,Secret access key,Console login link

Keep the credentials safe by storing them under encryption and make sure that you don't upload the Secret access key to a public repository. The Access Key ID and Secret access key can be used to buy services from AWS that will be charged to your account.

1] The Access Key ID, Secret access key, and Console login link shown in the example are fake.

Next steps

Use your newly created user for Terraform and OpenTofu creation of AWS Infrastructure, like:

Explore other AWS Tutorials.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Cloud Tutorials

Control traffic to AWS resources using security groups
How to configure and use the Terraform aws_security_group and aws_security_group_rule resource blocks to create and manage AWS Security Groups and secure the infrastructure.
AWS Routing Tables with Terraform
How to configure and use the Terraform aws_route_table, aws_route, and aws_main_route_table_association resource blocks to create and manage AWS Routing Tables.
AWS NAT Gateway
How to configure and use the Terraform aws_nat_gateway and aws_eip resource blocks to create and manage AWS NAT Gateway and its corresponding Public IPs inside each availability zone to enable Internet access from instances in private subnets.
An AWS NAT Gateway is a managed service that allows instances in a private subnet to connect to the Internet while keeping them secure. It provides network address translation (NAT) for outbound traffic, allowing resources in a private subnet to access the internet while maintaining a private IP address.
AWS Internet Gateway
How to configure and use the Terraform aws_internet_gateway resource block to create and manage AWS Internet Gateway inside a VPC to enable instances access to and from the Internet.
Javier Ruiz Cloud and SaaS Expert

Javier Ruiz

IT Wonder Lab tutorials are based on the diverse experience of Javier Ruiz, who founded and bootstrapped a SaaS company in the energy sector. His company, later acquired by a NASDAQ traded company, managed over €2 billion per year of electricity for prominent energy producers across Europe and America. Javier has over 25 years of experience in building and managing IT companies, developing cloud infrastructure, leading cross-functional teams, and transitioning his own company from on-premises, consulting, and custom software development to a successful SaaS model that scaled globally.

Are you looking for cloud automation best practices tailored to your company?

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram