Create AWS Access Keys

Overview

This guide provides step-by-step instructions for creating AWS access keys required for setting up an AWS connector on the ZinkML platform.

Video guide

For a visual guide on creating AWS access keys, please watch our step-by-step tutorial:

Table of Contents

  1. Creating IAM User
  2. Setting Up Permissions
  3. Creating Access Keys
  4. Next Steps

Creating IAM User

Step 1: Access IAM

  1. Log into AWS Console
  2. Navigate to IAM service

Step 2: Create User

  1. Click "Users" in navigation panel
  2. Select "Create user"
  3. Enter user details:
    User name: zinkml-v1-demo (or your preferred name)
    
  4. Click "Next"

Step 3: Initial Setup

  1. Select "Add user to group" under "Permissions options"
  2. Proceed to next step

Setting Up Permissions

Step 1: Create Policy

  1. Select created user from Users list
  2. Click "Add permissions"
  3. Use the following JSON policy template:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": ["s3:ListBucket", "s3:GetObject"],
      "Resource": ["arn:aws:s3:::your-bucket-name", "arn:aws:s3:::your-bucket-name/*"]
    }
  ]
}

Step 2: Customize Policy

  1. Replace your-bucket-name with your actual S3 bucket name
  2. Adjust folder paths if necessary
  3. Click "Next"
  4. Name the policy
  5. Click "Create policy"

Creating Access Keys

Step 1: Initialize Key Creation

  1. Navigate to created user in Users list
  2. Go to "Summary" section
  3. Click "Create access key"

Step 2: Configure Key Settings

  1. Under "Use case":
    Select: Application running on an AWS compute service
    
  2. Confirm selection
  3. Click "Next"

Step 3: Generate Keys

  1. Click "Create access key"
  2. Download the .csv file containing:
    • Access key ID
    • Secret access key

Next Steps

Using the Keys

  1. Open the downloaded .csv file
  2. Use the credentials to create ZinkML connector:
    • Access key
    • Secret access key

Security Best Practices

  • Store credentials securely
  • Never share access keys
  • Monitor key usage

Additional Resources

Important: Keep your access keys secure and never share them publicly.