Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Navigate to https://aws.amazon.com and create a new account, or login to your existing account.
  2. Once logged into the AWS Management Console, under Storage services, double-click S3 to open the dashboard.
  3. To create a new Bucket for GlobalSync, click the Create Bucket button.
  4. In the Bucket name field, enter a unique DNS-compliant name for the Bucket.
    1. Refer to Amazon for information on required Bucket naming conventions.
  5. Select the region that you want the Bucket to reside in the Region field.
  6. Click Create, or click Next and configure additional options for your bucket.  Refer to Amazon's S3 documentation for more information on options available for S3.

...

Secure an AWS User Account

GlobalSync requires an AWS access key ID and secret access key used together to secure access to your Bucket. To gain the necessary access you will need to create a user that will be used as a service account.

Info

Once the AWS user is created, you will be brought to a screen allowing you to access the user’s security credentials. You will not be able to access these credentials again. There is no way to recover the credentials if they are lost and the user account will need to be recreated if that happens. DO NOT LOOSE THE ACCESS KEY ID AND SECRET ACCESS KEY

  1. To create a user, click Access the AWS security interfaces by clicking your account name in the top-right corner of the AWS screen and choose Security Credentials.
  2. In the the Identity and Access Management console User’s screen which appears console Policies screen, click the Create New Users button and enter a username in the Enter User Names text box.
  3. Ensure that Generate an access key for each user is checked and click Create.
  4. To apply permissions, select the new user on the User list.
  5. Permissions in AWS are applied with “Policies.” Two policies are required for GlobalSync to function.
  6. Click the Attach User Policy button.
  7. On the set permissions screen, choose Custom Policy and click Select.
  8. In the Policy Name section, type ListBuckets.
  9. In the Policy Document section, enter the following PolicyCreate Policy.
  10. Click the JSON tab, and replace the policy text with the following:

    Code Block
    languagejs
    title
    List Buckets
    Security Policy
    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Sid": "Stmt1403202294000",
          "Effect": "Allow",
          "Action": [
            "s3:ListAllMyBuckets"
          ],
          "Resource": [
            "arn:aws:s3:::*"
          ]
        }
    ] }Attach a second Policy named BucketAccess and enter the following Policy Document.  Be sure to use your own Bucket name. The Bucket name is listed twice in the Policy.
    Code Block
    languagejs
    titleBucket Access
    { "Version": "2012-10-17", "Statement": [
    ,
    	{
           "Sid": "Stmt1403202783000",
           "Effect": "Allow",
           "Action": [
             "s3:*"
           ],
           "Resource": [
             "arn:aws:s3:::YourBucketName",
    "arn:aws:s3:::YourBucketName/*"
           ]
         }
      
    ]
    
    }
    }


  11. Ensure the policy text starts on line 1, and click Review Policy.
  12. Give the policy a name and click Create Policy.
  13. In the Identity and Access Management console User screen, click the Add User button and enter a user name.
  14. Choose Programmatic Access for the Access Type and click Next.
  15. Click Attach existing policies directly, then select the policy created in step 5.
  16. Click Next to provide any additional parameters, and continue moving through the creation screens until the Create User button displays.
  17. Click Create User.
  18. On success, be sure to copy the Access Key and Secret Access Key.  You WILL NOT be able to access these values again, and you need them to configure GlobalSync.