Configuring AWS credentials
The initial phase of the worker life cycle is bootstrapping. In this phase the worker agent software creates a worker in your fleet, and obtains AWS credentials from your fleet's role for further operation.
- AWS credentials for Amazon EC2
-
To create an IAM role for Amazon EC2 with Deadline Cloud worker host permissions
Open the IAM console at https://console.aws.amazon.com/iam/
. -
In the navigation pane, choose Roles in the navigation pane, then choose Create role.
-
Select AWS service.
-
Select EC2 as the Service or use case, then select Next.
-
To grant the necessary permissions, attach the
AWSDeadlineCloud-WorkerHost
AWS managed policy.
- On-premise AWS credentials
-
Your on-premise workers use credentials to access Deadline Cloud. For the most secure access, we recommend using IAM Roles Anywhere to authenticate your workers. For more information, see IAM Roles Anywhere.
For testing, you can use IAM user access keys for AWS credentials. We recommend that you set an expiration for the IAM user by including a restrictive inline policy.
Important
Heed the following warnings:
-
Do NOT use your account's root credentials to access AWS resources. These credentials provide unrestricted account access and are difficult to revoke.
-
Do NOT put literal access keys or credential information in your application files. If you do, you create a risk of accidentally exposing your credentials if, for example, you upload the project to a public repository.
-
Do NOT include files that contain credentials in your project area.
-
Secure your access keys. Do not provide your access keys to unauthorized parties, even to help find your account identifiers. By doing this, you might give someone permanent access to your account.
-
Be aware that any credentials stored in the shared AWS credentials file are stored in plain text.
For more details, see Best practices for managing AWS access keys in the AWS General Reference.
Create an IAM user
Open the IAM console at https://console.aws.amazon.com/iam/
. -
In the navigation pane, select Users and the select Create user.
-
Name the user. Clear the checkbox for Provide user access to the AWS Management Console, then choose Next.
-
Choose Attach policies directly.
-
From the list of permission policies, choose the AWSDeadlineCloud-WorkerHost policy and then choose Next.
-
Review the user details and then choose Create user.
Restrict user access to a limited time window
Any IAM user access keys that you create are long-term credentials. To ensure that these credentials expire in case they are mishandled, you can make these credentials time-bound by creating an inline policy that specifies a date after which the keys will no longer be valid.
-
Open the IAM user that you just created. In the Permissions tab, choose Add permissions and then choose Create inline policy.
-
In the JSON editor, specify the following permissions. To use this policy, replace the
aws:CurrentTime
timestamp value in the example policy with your own time and date.{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": "*", "Resource": "*", "Condition": { "DateGreaterThan": { "aws:CurrentTime": "
2024-01-01T00:00:00Z
" } } } ] }
Create an access key
-
On the user details page, select the Security credentials tab. In the Access keys section, choose Create access key.
-
Indicate that you want to use the key for Other, then choose Next, then choose Create access key.
-
On the Retrieve access keys page, choose Show to reveal the value of your user's secret access key. You can copy the credentials or download a .csv file.
Store the user access keys
-
Store the user access keys in the agent user's AWS credentials file on the worker host system:
-
On Linux, the file is located at
~/.aws/credentials
-
On Windows, the file is located at
%USERPROVILE\.aws\credentials
Replace the following keys:
[default] aws_access_key_id=
ACCESS_KEY_ID
aws_access_key_id=SECRET_ACCESS_KEY
-
Important
When you no longer need this IAM user, we recommend that you remove it and align with the AWS security best practice. We recommend that you require your human users to use temporary credentials through AWS IAM Identity Center when accessing AWS.
-