AegisBlade requires a set of IAM credentials in order to link with your AWS account and provision resources.

Let's get started creating those credentials.

Go ahead and login to the AWS Console.

Once logged in, first we will navigate to the IAM dashboard.
Screenshot navigating to the IAM dashboard.

On the IAM dashboard, first expand the tab labeled "Create individual IAM users", and then press the "Manage Users" button.

Screenshot selecting the Manage Users button.

Add a User

On the manage users page, press the "Add user" button.

Screenshot pressing the add user button.

Fill out User Details

Now that you're on the "Add user" fill out the details as shown in the screenshot below.

We recommend setting the username to "aegisblade". The "Programmatic access" checkbox MUST be checked!

Press the "Next: Permissions" button when finished.

Screenshot filling out user details.

Attach the EC2 Policy

AegisBlade needs the "AmazonEC2FullAccess" permission in order to create and cleanup virtual machines on your account when you run a job.

We use a number of tags to identify which resources have been created by AegisBlade and do not attempt to inspect or alter any other resources that may exist in your account.

Select the "Attach existing policies directly" tab and search for the "AmazonEC2FullAccess" policy.

Check the box next to the policy to add it to the user.

Screenshot attaching the ec2 policy.

Attach the S3 Policy

AegisBlade needs the "AmazonS3FullAccess" permission in order to store your application's deployment files, job return values, logs, data, and other artifacts.

We use a number of tags to identify which resources have been created by AegisBlade and do not attempt to inspect or alter any other resources that may exist in your account.

Still on the the "Attach existing policies directly" tab, search for the "AmazonS3FullAccess" policy.

Check the box next to the policy to add it to the user, and press the "Next: Tags" button on the bottom right when finished.

Screenshot attaching the s3 policy.

Skip the Tags Page

AegisBlade does not require any tags added to the IAM user, but you may choose to add some for your own needs if applicable.

Press the "Next: Review" button.

Screenshot pressing the next:review button

Review the User

Review the user's details and compare with the screenshot below.

In particular, ensure the proper permissions were successfully attached.

Press the "Create user" button when finished.

Screenshot reviewing the user.

Download the Credentials

On the final page, press the "Download .csv" button in order to download a file with both the access key id and secret access key inside.

Congratulations! You have successfully created an IAM user.

Add the credentials to your AegisBlade account to finish linking AWS.

Screenshot downloading the csv file.