zoukankan      html  css  js  c++  java
  • [AWS] Lab: Configure a Cognito user can access DynamoDB for read

    Create an IAM User

    Give Admin access

    Create DynamoDB Table

      
    1) Create facts table:
    **** (use ^ - Shift + 6 if you are a windows user, not ) ****
    
    aws dynamodb create-table --table-name facts --attribute-definitions 
    AttributeName=fact_id,AttributeType=N --key-schema 
    AttributeName=fact_id,KeyType=HASH 
    --provisioned-throughput ReadCapacityUnits=5,WriteCapacityUnits=5
    
    
    2) Populate facts table:
    **** (make sure items.json is in your working directory) ****
    
    aws dynamodb batch-write-item --request-items file://items.json

    items.json

    https://github.com/ACloudGuru-Resources/course-aws-certified-developer-associate/blob/main/Cognito_Demo/items.json

    Create an EC2 Instance

    Install HTTPD:

    #!/bin/bash
    yum update -y
    yum install -y httpd
    systemctl start httpd
    systemctl enable httpd

    Create a Cognito Identity Pool and IAM Role

    Cognito Commands: 
    
    
    1) Using the CLI, create new identity pool, named DynamoPool, allow unauthenticated entities.
    **** (use ^ - Shift + 6 if you are a windows user, not ) ****
    
        aws cognito-identity create-identity-pool 
        --identity-pool-name DynamoPool 
        --allow-unauthenticated-identities 
        --output json
           
    
    2) Create an IAM role named Cognito_DynamoPoolUnauth. 
    
    aws iam create-role --role-name Cognito_DynamoPoolUnauth --assume-role-policy-document file://myCognitoPolicy.json --output json
     
    3) Grant the Cognito_DynamoPoolUnauth role read access to DynamoDB by attaching a managed policy (AmazonDynamoDBReadOnlyAccess).
    
    aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess --role-name Cognito_DynamoPoolUnauth 
    
    4) Get the IAM role Amazon Resource Name (ARN).
    aws iam get-role --role-name Cognito_DynamoPoolUnauth --output json 
    
    
    5) Add our role to the Cognito Identity Pool. Replace the pool ID with your own pool ID and use the role ARN from the previous step.
    
    aws cognito-identity set-identity-pool-roles 
    --identity-pool-id "us-east-1:xxxxxxxxxxxxxxxxxxxxxxxxxxxxx" 
    --roles unauthenticated=arn:aws:iam::xxxxx:role/Cognito_DynamoPoolUnauthRole --output json
    
    6) Double check it worked using: 
    
    aws cognito-identity get-identity-pool-roles  --identity-pool-id "us-east-1:xxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
    
    7) We can now specify the Cognito credentials in our application - i.e. in the JavaScript section of our webpage!
    Replace the identity pool ID with your own and the role ARN with your own role ARN. 
    We are going to add this snippet to our index.html:
    
    
    AWS.config.credentials = new AWS.CognitoIdentityCredentials({
    IdentityPoolId: "us-east-1:xxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
    RoleArn: "arn:aws:iam::xxxxx:role/Cognito_DynamoPoolUnauthRole"
    });
  • 相关阅读:
    Sencha Touch 使用笔记
    区数据
    省市 数据
    js校验身份证
    js 邮政编码验证
    原生js添加class
    让IE6 IE7 IE8 IE9 IE10 IE11支持Bootstrap的解决方法
    js学习笔记 Function类型属性的理解
    js学习笔记 理解原型对象
    js学习笔记 chapter5 引用类型
  • 原文地址:https://www.cnblogs.com/Answer1215/p/14695278.html
Copyright © 2011-2022 走看看