Yearly Archives: 2015

/2015
­

EC2 Instance Roles

In the previous post about Access & Secret Keys I emphasized that those keys - static keys - should never be used in production and in fact they should never leave your laptop. But what if you need to call the AWS services from scripts or programs running on an EC2 instance? In a typical [...]

By |November 27th, 2015|Best Practice|0 Comments

Access & Secret Keys

When working with AWS API the clients (programs, scripts, etc) must have a way to prove who they are and what level of access to Amazon services they should have. In a typical scenario an AWS user runs aws cli (or a script using aws cli) to interact with Amazon. For example to create a [...]

By |July 22nd, 2015|Best Practice|2 Comments