Managed Users in Identity & Access Management(IAM) of AWS cloud

Create & managed permission for USER in Identity & Access Management of AWS cloud

IAM allows you to manage users and their level of access to the AWS console. It’s manages as:
Authentication: who can use your AWS resources
Authorization: What resources can use and in what ways

Four Terms:
USERS It is end user. Create & Manage User, permission to allow or deny access to AWS resources. It can be people, employees of an organization etc.

GROUPS: Define group of permission assigned to user like Development team has same permission assign to a user then you create a group of common permission of development team which will easy to assign to the USER added in development team. All team having same permission.

ROLES Roles are similar to User. Roles are assigned to AWS Resources to access different AWS resources. Example EC2 application want to access S3 Services with help of Roles.

POLICES It is basically permissions. Policies are made up of documents called policy documents. These documents are created in JSON and they give permissions to USERS/GROUPS/ROLES.

Basic Login with IAM

A. Login with the main account to Manage the User and Permission then select services from upper right side.


B. Go to the Security Identity & Compliance module and select IAM from it.


C. Now highlighted URL is used to login for other user which you are going to create in next step.(IAM USER-SIGNIN LINK)
This page also show you resource how much user, roles, Policies groups present in it.


In left panel, you can manage groups like create, modify the groups. You create new group then attach policy with it like administrator full access permission to group.
Note: You have option in Group Action as Add users to group, delete group, Edit group Name & Remove Users from Group

Steps to Create a new group
A. Create a new group

B. Add new group name and attach policy


C. Finish the Creating of Group.



A. Create user
Note: Access type as Programmatic access or AWS Management Console access
Programmatic: access used in development, application interacting with API.
AWS Management console: used to deploy resources, Remove or give access


B. When using AWS Management Console login it will ask you for assigning password.


C. Assign Permission to new create user.


D. Review user before create.


After creating User you can login with New URL Provided by AWS

A. Copy the URL on IAMS first page and open into new browser.


B. It will go for new signin page as below.


C. Now You can login with you new created user in AWS with IAMS with this URL.
In that way you can have only one user as super user and you can create other user with different permission as you want to manage your security.

Role is used by application and user are assigned to peoples. If i want that my AWS service want to use the S3 service then i need to create a role with S3 permission and assigned to that EC2 which running AWS Service.

A. Create a Role.
e.g Create a role with S3 service then attached it with EC2 that AWS service is hosted. Go t0 IAM –> Dashboard –> Role –> Amazon EC2 –> What type of role (amazon s3 full access) –> Name (s3fullaccess_role)

B. Assigned Role to the EC2 instance.
EC2 console –> Start the instance —> attach the policy from ACTION tab –> INSTANCE SETTINGS –> ATTACH/REPLACE IAM ROLE –> Select the IAM role –> Apply.

Note: With this example, EC2 instance is able to interact with S3

Policy is basically permission you can give to users, groups or roles. You can also create your own policies by JSON format.

A. Create a Policy.
Create Policy –> Policy generator –> AWS Service : EC2 , Actions: All actions , Resource : * (all resources) —> Create policy

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.