[NEW] Team setup for AWS Cloud9 | cloud 9 team – Vietnamnhanvan

cloud 9 team: นี่คือโพสต์ที่เกี่ยวข้องกับหัวข้อนี้

NỘI DUNG BÀI VIẾT

Team setup for AWS Cloud9

This topic explains how to use AWS Identity and Access
Management (IAM)
to enable multiple users within a single AWS account to use
AWS Cloud9. To set up to use AWS Cloud9 for any other usage pattern, see Setting up AWS Cloud9 for the correct instructions.

These instructions assume that you have (or will have) administrative access to a
single
AWS account. For more information, see The AWS account root
user
and Creating
your first IAM admin user and group
in the IAM User Guide.
If you already have an AWS account but you do not have administrative access to it,
see your
AWS account administrator.

To enable multiple users in a single AWS account to start using AWS Cloud9, start
with one of
the following steps, depending on which AWS resources you already have.

Step 1: Create an AWS account

Note

Your organization might already have an AWS account set up for you. If your
organization has an AWS account administrator, check with that person before starting
the following procedure. If you already have an AWS account, skip ahead to Step 2: Create an IAM Group and User, and Add
the User to the Group
.

To watch a 4-minute video related to the following procedure, see Creating an Amazon Web Services
Account
on the YouTube website.

To create an AWS account

  1. Go to https://aws.amazon.com/.

  2. Choose Sign In to the Console.

  3. Choose Create a new AWS account.

  4. Complete the process by following the on-screen directions. This includes giving
    AWS your email address and credit card information. You must also use your phone to
    enter a code that AWS gives you.

After you finish creating the account, AWS will send you a confirmation email. Do
not
go to the next step until you get this confirmation.

Step 2: Create an IAM group and user, and
add the user to the group

In this step, you create a group and a user in AWS Identity and Access Management
(IAM), add the user to the
group, and then use the user to access AWS Cloud9. This is an AWS security best practice.
For
more information, see IAM Best Practices in the IAM User Guide.

If you already have all of the IAM groups and users that you need, skip ahead to Step 3: Add AWS Cloud9 access permissions to the
group
.

Note

Your organization might already have an IAM group and user set up for you. If your
organization has an AWS account administrator, check with that person before starting
the following procedures.

You can complete these tasks using the AWS Management Console or the AWS Command Line Interface
(AWS CLI)
.

To watch a 9-minute video related to the following console procedures, see How do I set up an IAM user and sign
in to the AWS Management Console using IAM credentials
on the YouTube website.

Step 2.1: Create an IAM
group with the console

  1. Sign in to the AWS Management Console, if you are not already signed in, at https://console.aws.amazon.com/codecommit.

    Note

    Although you can sign in to the AWS Management Console with the email address and
    password that was provided when the AWS account was created (we call this an
    AWS account root user), this isn’t an AWS security
    best practice. In the future, we recommend you sign in using credentials for an
    IAM administrator user in the AWS account. An IAM administrator user has
    similar AWS access permissions to an AWS account root user and avoids some
    of the associated security risks. If you cannot sign in as an IAM
    administrator user, check with your AWS account administrator. For more
    information, see Creating your first IAM admin user and group in the
    IAM User Guide.

  2. Open the IAM console. To do this, in the AWS navigation bar, choose
    Services. Then choose IAM.

  3. In the IAM console’s navigation pane, choose
    Groups.

  4. Choose Create New Group.

  5. On the Set Group Name page, for Group
    Name
    , enter a name for the new group.

  6. Choose Next Step.

  7. On the Attach Policy page, choose Next
    Step
    without attaching any policies. (You will attach a policy in
    Step 3: Add AWS Cloud9 access permissions to
    the group
    .)

  8. Choose Create Group.

    Note

    We recommend that you repeat this procedure to create at least two groups:
    one group for AWS Cloud9 users, and another group for AWS Cloud9 administrators. This
    AWS security best practice can help you better control, track, and
    troubleshoot issues with AWS resource access.

Skip ahead to Step 2.2:
Create an IAM user and add the user to the group with the console
.

Step 2.1: Create an IAM group
with the AWS CLI

Note

If you’re using AWS managed temporary credentials, you can’t use a terminal session in the AWS Cloud9 IDE
to run some or all of the commands in this section. To address AWS security best practices,

AWS managed temporary credentials don’t allow some commands to be run. Instead, you
can run those commands
from a separate installation of the AWS Command Line Interface (AWS CLI).

  1. Install and configure the AWS CLI on your computer, if you haven’t done so
    already. To do this, see the following in the
    AWS Command Line Interface User Guide:

    • Installing
      the AWS Command Line Interface

    • Quick configuration

    Note

    Although you can configure the AWS CLI using the credentials associated with
    the email address and password that was provided when the AWS account was
    created (we call this an AWS account root user), this
    isn’t an AWS security best practice. Instead, we recommend you configure the
    AWS CLI using credentials for an IAM administrator user in the AWS account.
    An IAM administrator user has similar AWS access permissions to an AWS
    account root user and avoids some of the associated security risks. If you
    cannot configure the AWS CLI as an IAM administrator user, check with your
    AWS account administrator. For more information, see Creating your first IAM admin user and group in the
    IAM User Guide.

  2. Run the IAM create-group command, specifying the new group’s name
    (for example, MyCloud9Group).

    aws iam create-group --group-name MyCloud9Group

    Note

    We recommend that you repeat this procedure to create at least two groups:
    one group for AWS Cloud9 users, and another group for AWS Cloud9 administrators. This
    AWS security best practice can help you better control, track, and
    troubleshoot issues with AWS resource access.

Skip ahead to Step 2.2: Create an
IAM user and add the user to the group with the AWS CLI
.

Step 2.2: Create an IAM user
and add the user to the group with the console

  1. With the IAM console open from the previous procedure, in the navigation
    pane, choose Users.

  2. Choose Add user.

  3. For User name, enter a name for the new user.

    Note

    You can create multiple users at the same time by choosing Add
    another user
    . The other settings in this procedure apply to each
    of these new users.

  4. Select the Programmatic access and AWS Management Console
    access
    check boxes. This allows the new user to use various AWS
    developer tools and service consoles.

  5. Leave the default choice of Autogenerated password. This
    creates a random password for the new user to sign in to the console. Or choose
    Custom password and enter a specific password for the new
    user.

  6. Leave the default choice of Require password reset. This
    prompts the new user to change their password after they sign in to the console
    for the first time.

  7. Choose Next: Permissions.

  8. Leave the default choice of Add user to group (or
    Add users to group for multiple users).

  9. In the list of groups, select the check box (not the name) next to the group
    you want to add the user to.

  10. Choose Next: Review.

  11. Choose Create user (or Create users
    for multiple users).

  12. On the last page of the wizard, do one of the following:

    • Next to each new user, choose Send email, and follow
      the on-screen directions to email the new user their console sign-in URL and
      user name. Then communicate to each new user their console sign-in password,
      AWS access key ID, and AWS secret access key separately.

    • Choose Download .csv. Then communicate to each new
      user their console sign-in URL, console sign-in password, AWS access key
      ID, and AWS secret access key that is in the downloaded file.

    • Next to each new user, choose Show for both
      Secret access key and Password.
      Then communicate to each new user their console sign-in URL, console sign-in
      password, AWS access key ID, and AWS secret access key.

    Note

    If you do not choose Download .csv, this is the only
    time you can view the new user’s AWS secret access key and console sign-in
    password. To generate a new AWS secret access key or console sign-in password
    for the new user, see the following in the
    IAM User Guide.

    • Creating, modifying, and viewing access keys (console)

    • Creating, changing, or deleting an IAM user password
      (console)

  13. Repeat this procedure for each additional IAM user that you want to create,
    and then skip ahead to Step 3: Add AWS Cloud9
    access permissions to the group
    .

Step 2.2: Create an IAM User and
add the user to the group with the AWS CLI

Note

If you’re using AWS managed temporary credentials, you can’t use a terminal session in the AWS Cloud9 IDE
to run some or all of the commands in this section. To address AWS security best practices,

AWS managed temporary credentials don’t allow some commands to be run. Instead, you
can run those commands
from a separate installation of the AWS Command Line Interface (AWS CLI).

  1. Run the IAM create-user command to create the user, specifying the
    new user’s name (for example, MyCloud9User).

    aws iam create-user --user-name MyCloud9User
  2. Run the IAM create-login-profile command to create a new console
    sign-in password for the user, specifying the user’s name and initial sign-in
    password (for example, MyC10ud9Us3r!). After the user signs in, AWS
    asks the user to change their sign-in password.

    aws iam create-login-profile --user-name MyCloud9User --password MyC10ud9Us3r! --password-reset-required

    If you need to generate a replacement console signin password for the user
    later, see Creating, changing, or deleting an IAM user password (API, CLI,
    PowerShell)
    in the IAM User Guide.

  3. Run the IAM create-access-key command to create a new AWS access
    key and corresponding AWS secret access key for the user.

    aws iam create-access-key --user-name MyCloud9User

    Make a note of the AccessKeyId and SecretAccessKey
    values that are displayed. After you run the IAM create-access-key
    command, this is the only time you can view the user’s AWS secret access key. If
    you need to generate a new AWS secret access key for the user later, see Creating, modifying, and viewing access keys (API, CLI, PowerShell) in
    the IAM User Guide.

  4. Run the IAM add-user-to-group command to add the user to the
    group, specifying the group’s and user’s names.

    aws iam add-user-to-group --group-name MyCloud9Group --user-name MyCloud9User
  5. Communicate to the user their console sign-in URL, initial console sign-in
    password, AWS access key ID, and AWS secret access key.

  6. Repeat this procedure for each additional IAM user that you want to
    create.

See also  Dragon Ball Tập 6 - Khách Viếng Giữa Đêm Khuya - Phim Bảy Viên Ngọc Rồng | c9 ball

Step 3: Add AWS Cloud9 access permissions to the
group

By default, most IAM groups and users don’t have access to any AWS services,
including AWS Cloud9. (An exception is IAM administrator groups and IAM administrator
users,
which have access to all AWS services in their AWS account by default.) In this step,
you use IAM to add AWS Cloud9 access permissions directly to an IAM group to which
one or
more users belong, so that you can ensure those users can access AWS Cloud9.

Note

Your organization might already have a group set up for you with the appropriate
access permissions. If your organization has an AWS account administrator, check with
that person before starting the following procedure.

You can complete this task using the AWS Management Console or the AWS
CLI
.

Add AWS Cloud9 access permissions to the
group with the console

  1. Sign in to the AWS Management Console, if you are not already signed in, at https://console.aws.amazon.com/codecommit.

    Note

    Although you can sign in to the AWS Management Console with the email address and
    password that was provided when the AWS account was created (we call this an
    AWS account root user), this isn’t an AWS security
    best practice. In the future, we recommend you sign in using credentials for an
    IAM administrator user in the AWS account. An IAM administrator user has
    similar AWS access permissions to an AWS account root user and avoids some
    of the associated security risks. If you cannot sign in as an IAM
    administrator user, check with your AWS account administrator. For more
    information, see Creating your first IAM admin user and group in the
    IAM User Guide.

  2. Open the IAM console. To do this, in the AWS navigation bar, choose
    Services. Then choose IAM.

  3. Choose Groups.

  4. Choose the group’s name.

  5. Decide whether you want to add AWS Cloud9 user or AWS Cloud9 administrator access
    permissions to the group. These permissions will apply to each user in the
    group.

    AWS Cloud9 user access permissions allow each user in the group to do the following
    things within their AWS account:

    • Create their own AWS Cloud9 development environments.

    • Get information about their own environments.

    • Change the settings for their own environments.

    AWS Cloud9 administrator access permissions allow each user in the group to do
    additional things within their AWS account, such as:

    • Create environments for themselves or others.

    • Get information about environments for themselves or others.

    • Delete environments for themselves or others.

    • Change the settings of environments for themselves or others.

    Note

    We recommend that you add only a limited number of users to the AWS Cloud9
    administrators group. This AWS security best practice can help you better
    control, track, and troubleshoot issues with AWS resource access.

  6. On the Permissions tab, for Managed
    Policies
    , choose Attach Policy.

  7. In the list of policy names, choose the box next to
    AWSCloud9User for AWS Cloud9 user access permissions or
    AWSCloud9Administrator for AWS Cloud9 administrator access
    permissions. (If you don’t see either of these policy names in the list, enter the
    policy name in the Filter box to display it.)

  8. Choose Attach Policy.

    Note

    If you have more than one group you want to add AWS Cloud9 access permissions to,
    repeat this procedure for each of those groups.

To see the list of access permissions that these AWS managed policies give to a
group, see AWS managed
(predefined) policies
.

To learn about AWS access permissions that you can add to a group in addition to
access permissions that are required by AWS Cloud9, see Managed policies and inline policies and Understanding permissions granted by a policy in the
IAM User Guide.

Skip ahead to Step 4: Sign in to the AWS Cloud9
console
.

Add AWS Cloud9 access permissions to the group
with the AWS CLI

Note

If you’re using AWS managed temporary credentials, you can’t use a terminal session in the AWS Cloud9 IDE
to run some or all of the commands in this section. To address AWS security best practices,

AWS managed temporary credentials don’t allow some commands to be run. Instead, you
can run those commands
from a separate installation of the AWS Command Line Interface (AWS CLI).

  1. Install and configure the AWS CLI on your computer, if you haven’t done so
    already. To do this, see the following in the
    AWS Command Line Interface User Guide:

    • Installing
      the AWS Command Line Interface

    • Quick Configuration

    Note

    Although you can configure the AWS CLI using the credentials associated with
    the email address and password that was provided when the AWS account was
    created (we call this an AWS account root user), this
    isn’t an AWS security best practice. Instead, we recommend you configure the
    AWS CLI using credentials for an IAM administrator user in the AWS account.
    An IAM administrator user has similar AWS access permissions to an AWS
    account root user and avoids some of the associated security risks. If you
    cannot configure the AWS CLI as an IAM administrator user, check with your
    AWS account administrator. For more information, see Creating Your First IAM Admin User and Group in the
    IAM User Guide.

  2. Decide whether to add AWS Cloud9 user or AWS Cloud9 administrator access permissions
    to
    the group. These permissions will apply to each user in the group.

    AWS Cloud9 user access permissions allow each user in the group to do the following
    things within their AWS account:

    • Create their own AWS Cloud9 development environments.

    • Get information about their own environments.

    • Change the settings for their own environments.

    AWS Cloud9 administrator access permissions allow each user in the group to do
    additional things within their AWS account, such as the following:

    • Create environments for themselves or others.

    • Get information about environments for themselves or others.

    • Delete environments for themselves or others.

    • Change the settings of environments for themselves or others.

    Note

    We recommend that you add only a limited number of users to the AWS Cloud9
    administrators group. This AWS security best practice can help you better
    control, track, and troubleshoot issues with AWS resource access.

  3. Run the IAM attach-group-policy command, specifying the group’s
    name and the Amazon Resource Name (ARN) for the AWS Cloud9 access permissions policy
    to
    add.

    For AWS Cloud9 user access permissions, specify the following ARN.

    aws iam attach-group-policy --group-name MyCloud9Group --policy-arn arn:aws:iam::aws:policy/AWSCloud9User

    For AWS Cloud9 administrator access permissions, specify the following ARN.

    aws iam attach-group-policy --group-name MyCloud9Group --policy-arn arn:aws:iam::aws:policy/AWSCloud9Administrator

    Note

    If you have more than one group you want to add AWS Cloud9 access permissions to,
    repeat this procedure for each of those groups.

To see the list of access permissions that these AWS managed policies give to a
group, see AWS Managed
(Predefined) Policies
.

To learn about AWS access permissions that you can add to a group in addition to
access permissions that are required by AWS Cloud9, see Managed Policies and Inline Policies and Understanding Permissions Granted by a Policy in the
IAM User Guide.

Step 4: Sign in to the AWS Cloud9 console

After you complete the previous steps in this topic, you and your users are ready
to
sign in to the AWS Cloud9 console and start using it.

  1. If you are already signed in to the AWS Management Console as an AWS account root
    user, sign
    out of the console.

  2. Open the AWS Cloud9 console, at https://console.aws.amazon.com/cloud9/.

  3. Enter the AWS account number for the IAM user you created or identified
    earlier, and then choose Next.

    Note

    If you don’t see an option for entering the AWS account number, choose
    Sign in to a different account. Enter the AWS account
    number on the next page, and then choose Next.

  4. Enter the user name and password of the IAM user you created or identified
    earlier, and then choose Sign In.

  5. If prompted, follow the on-screen directions to change your user’s initial sign-in
    password. Save your new sign-in password in a secure location.

The AWS Cloud9 console is displayed, and you can begin using AWS Cloud9.

Next steps

Task
See this topic

Restrict AWS Cloud9 usage for others in your AWS account, to control
costs.

Additional setup options

Create an AWS Cloud9 development environment, and then use the AWS Cloud9 IDE to work
with code in your
new environment.

Creating an environment

Learn how to use the AWS Cloud9 IDE.

Getting started: basic tutorials and
Working with the IDE

Invite others to use your new environment along with you, in real time and with
text chat support.

Working with shared environments

[NEW] Team setup for AWS Cloud9 | cloud 9 team – Vietnamnhanvan

Team setup for AWS Cloud9

This topic explains how to use AWS Identity and Access
Management (IAM)
to enable multiple users within a single AWS account to use
AWS Cloud9. To set up to use AWS Cloud9 for any other usage pattern, see Setting up AWS Cloud9 for the correct instructions.

These instructions assume that you have (or will have) administrative access to a
single
AWS account. For more information, see The AWS account root
user
and Creating
your first IAM admin user and group
in the IAM User Guide.
If you already have an AWS account but you do not have administrative access to it,
see your
AWS account administrator.

To enable multiple users in a single AWS account to start using AWS Cloud9, start
with one of
the following steps, depending on which AWS resources you already have.

Step 1: Create an AWS account

Note

Your organization might already have an AWS account set up for you. If your
organization has an AWS account administrator, check with that person before starting
the following procedure. If you already have an AWS account, skip ahead to Step 2: Create an IAM Group and User, and Add
the User to the Group
.

To watch a 4-minute video related to the following procedure, see Creating an Amazon Web Services
Account
on the YouTube website.

To create an AWS account

  1. Go to https://aws.amazon.com/.

  2. Choose Sign In to the Console.

  3. Choose Create a new AWS account.

  4. Complete the process by following the on-screen directions. This includes giving
    AWS your email address and credit card information. You must also use your phone to
    enter a code that AWS gives you.

After you finish creating the account, AWS will send you a confirmation email. Do
not
go to the next step until you get this confirmation.

Step 2: Create an IAM group and user, and
add the user to the group

In this step, you create a group and a user in AWS Identity and Access Management
(IAM), add the user to the
group, and then use the user to access AWS Cloud9. This is an AWS security best practice.
For
more information, see IAM Best Practices in the IAM User Guide.

See also  [NEW] The Best Dota 2 Skins You Should Buy in 2021 | immortals dota 2 - Vietnamnhanvan

If you already have all of the IAM groups and users that you need, skip ahead to Step 3: Add AWS Cloud9 access permissions to the
group
.

Note

Your organization might already have an IAM group and user set up for you. If your
organization has an AWS account administrator, check with that person before starting
the following procedures.

You can complete these tasks using the AWS Management Console or the AWS Command Line Interface
(AWS CLI)
.

To watch a 9-minute video related to the following console procedures, see How do I set up an IAM user and sign
in to the AWS Management Console using IAM credentials
on the YouTube website.

Step 2.1: Create an IAM
group with the console

  1. Sign in to the AWS Management Console, if you are not already signed in, at https://console.aws.amazon.com/codecommit.

    Note

    Although you can sign in to the AWS Management Console with the email address and
    password that was provided when the AWS account was created (we call this an
    AWS account root user), this isn’t an AWS security
    best practice. In the future, we recommend you sign in using credentials for an
    IAM administrator user in the AWS account. An IAM administrator user has
    similar AWS access permissions to an AWS account root user and avoids some
    of the associated security risks. If you cannot sign in as an IAM
    administrator user, check with your AWS account administrator. For more
    information, see Creating your first IAM admin user and group in the
    IAM User Guide.

  2. Open the IAM console. To do this, in the AWS navigation bar, choose
    Services. Then choose IAM.

  3. In the IAM console’s navigation pane, choose
    Groups.

  4. Choose Create New Group.

  5. On the Set Group Name page, for Group
    Name
    , enter a name for the new group.

  6. Choose Next Step.

  7. On the Attach Policy page, choose Next
    Step
    without attaching any policies. (You will attach a policy in
    Step 3: Add AWS Cloud9 access permissions to
    the group
    .)

  8. Choose Create Group.

    Note

    We recommend that you repeat this procedure to create at least two groups:
    one group for AWS Cloud9 users, and another group for AWS Cloud9 administrators. This
    AWS security best practice can help you better control, track, and
    troubleshoot issues with AWS resource access.

Skip ahead to Step 2.2:
Create an IAM user and add the user to the group with the console
.

Step 2.1: Create an IAM group
with the AWS CLI

Note

If you’re using AWS managed temporary credentials, you can’t use a terminal session in the AWS Cloud9 IDE
to run some or all of the commands in this section. To address AWS security best practices,

AWS managed temporary credentials don’t allow some commands to be run. Instead, you
can run those commands
from a separate installation of the AWS Command Line Interface (AWS CLI).

  1. Install and configure the AWS CLI on your computer, if you haven’t done so
    already. To do this, see the following in the
    AWS Command Line Interface User Guide:

    • Installing
      the AWS Command Line Interface

    • Quick configuration

    Note

    Although you can configure the AWS CLI using the credentials associated with
    the email address and password that was provided when the AWS account was
    created (we call this an AWS account root user), this
    isn’t an AWS security best practice. Instead, we recommend you configure the
    AWS CLI using credentials for an IAM administrator user in the AWS account.
    An IAM administrator user has similar AWS access permissions to an AWS
    account root user and avoids some of the associated security risks. If you
    cannot configure the AWS CLI as an IAM administrator user, check with your
    AWS account administrator. For more information, see Creating your first IAM admin user and group in the
    IAM User Guide.

  2. Run the IAM create-group command, specifying the new group’s name
    (for example, MyCloud9Group).

    aws iam create-group --group-name MyCloud9Group

    Note

    We recommend that you repeat this procedure to create at least two groups:
    one group for AWS Cloud9 users, and another group for AWS Cloud9 administrators. This
    AWS security best practice can help you better control, track, and
    troubleshoot issues with AWS resource access.

Skip ahead to Step 2.2: Create an
IAM user and add the user to the group with the AWS CLI
.

Step 2.2: Create an IAM user
and add the user to the group with the console

  1. With the IAM console open from the previous procedure, in the navigation
    pane, choose Users.

  2. Choose Add user.

  3. For User name, enter a name for the new user.

    Note

    You can create multiple users at the same time by choosing Add
    another user
    . The other settings in this procedure apply to each
    of these new users.

  4. Select the Programmatic access and AWS Management Console
    access
    check boxes. This allows the new user to use various AWS
    developer tools and service consoles.

  5. Leave the default choice of Autogenerated password. This
    creates a random password for the new user to sign in to the console. Or choose
    Custom password and enter a specific password for the new
    user.

  6. Leave the default choice of Require password reset. This
    prompts the new user to change their password after they sign in to the console
    for the first time.

  7. Choose Next: Permissions.

  8. Leave the default choice of Add user to group (or
    Add users to group for multiple users).

  9. In the list of groups, select the check box (not the name) next to the group
    you want to add the user to.

  10. Choose Next: Review.

  11. Choose Create user (or Create users
    for multiple users).

  12. On the last page of the wizard, do one of the following:

    • Next to each new user, choose Send email, and follow
      the on-screen directions to email the new user their console sign-in URL and
      user name. Then communicate to each new user their console sign-in password,
      AWS access key ID, and AWS secret access key separately.

    • Choose Download .csv. Then communicate to each new
      user their console sign-in URL, console sign-in password, AWS access key
      ID, and AWS secret access key that is in the downloaded file.

    • Next to each new user, choose Show for both
      Secret access key and Password.
      Then communicate to each new user their console sign-in URL, console sign-in
      password, AWS access key ID, and AWS secret access key.

    Note

    If you do not choose Download .csv, this is the only
    time you can view the new user’s AWS secret access key and console sign-in
    password. To generate a new AWS secret access key or console sign-in password
    for the new user, see the following in the
    IAM User Guide.

    • Creating, modifying, and viewing access keys (console)

    • Creating, changing, or deleting an IAM user password
      (console)

  13. Repeat this procedure for each additional IAM user that you want to create,
    and then skip ahead to Step 3: Add AWS Cloud9
    access permissions to the group
    .

Step 2.2: Create an IAM User and
add the user to the group with the AWS CLI

Note

If you’re using AWS managed temporary credentials, you can’t use a terminal session in the AWS Cloud9 IDE
to run some or all of the commands in this section. To address AWS security best practices,

AWS managed temporary credentials don’t allow some commands to be run. Instead, you
can run those commands
from a separate installation of the AWS Command Line Interface (AWS CLI).

  1. Run the IAM create-user command to create the user, specifying the
    new user’s name (for example, MyCloud9User).

    aws iam create-user --user-name MyCloud9User
  2. Run the IAM create-login-profile command to create a new console
    sign-in password for the user, specifying the user’s name and initial sign-in
    password (for example, MyC10ud9Us3r!). After the user signs in, AWS
    asks the user to change their sign-in password.

    aws iam create-login-profile --user-name MyCloud9User --password MyC10ud9Us3r! --password-reset-required

    If you need to generate a replacement console signin password for the user
    later, see Creating, changing, or deleting an IAM user password (API, CLI,
    PowerShell)
    in the IAM User Guide.

  3. Run the IAM create-access-key command to create a new AWS access
    key and corresponding AWS secret access key for the user.

    aws iam create-access-key --user-name MyCloud9User

    Make a note of the AccessKeyId and SecretAccessKey
    values that are displayed. After you run the IAM create-access-key
    command, this is the only time you can view the user’s AWS secret access key. If
    you need to generate a new AWS secret access key for the user later, see Creating, modifying, and viewing access keys (API, CLI, PowerShell) in
    the IAM User Guide.

  4. Run the IAM add-user-to-group command to add the user to the
    group, specifying the group’s and user’s names.

    aws iam add-user-to-group --group-name MyCloud9Group --user-name MyCloud9User
  5. Communicate to the user their console sign-in URL, initial console sign-in
    password, AWS access key ID, and AWS secret access key.

  6. Repeat this procedure for each additional IAM user that you want to
    create.

Step 3: Add AWS Cloud9 access permissions to the
group

By default, most IAM groups and users don’t have access to any AWS services,
including AWS Cloud9. (An exception is IAM administrator groups and IAM administrator
users,
which have access to all AWS services in their AWS account by default.) In this step,
you use IAM to add AWS Cloud9 access permissions directly to an IAM group to which
one or
more users belong, so that you can ensure those users can access AWS Cloud9.

Note

Your organization might already have a group set up for you with the appropriate
access permissions. If your organization has an AWS account administrator, check with
that person before starting the following procedure.

You can complete this task using the AWS Management Console or the AWS
CLI
.

Add AWS Cloud9 access permissions to the
group with the console

  1. Sign in to the AWS Management Console, if you are not already signed in, at https://console.aws.amazon.com/codecommit.

    Note

    Although you can sign in to the AWS Management Console with the email address and
    password that was provided when the AWS account was created (we call this an
    AWS account root user), this isn’t an AWS security
    best practice. In the future, we recommend you sign in using credentials for an
    IAM administrator user in the AWS account. An IAM administrator user has
    similar AWS access permissions to an AWS account root user and avoids some
    of the associated security risks. If you cannot sign in as an IAM
    administrator user, check with your AWS account administrator. For more
    information, see Creating your first IAM admin user and group in the
    IAM User Guide.

  2. Open the IAM console. To do this, in the AWS navigation bar, choose
    Services. Then choose IAM.

  3. Choose Groups.

  4. Choose the group’s name.

  5. Decide whether you want to add AWS Cloud9 user or AWS Cloud9 administrator access
    permissions to the group. These permissions will apply to each user in the
    group.

    AWS Cloud9 user access permissions allow each user in the group to do the following
    things within their AWS account:

    • Create their own AWS Cloud9 development environments.

    • Get information about their own environments.

    • Change the settings for their own environments.

    AWS Cloud9 administrator access permissions allow each user in the group to do
    additional things within their AWS account, such as:

    • Create environments for themselves or others.

    • Get information about environments for themselves or others.

    • Delete environments for themselves or others.

    • Change the settings of environments for themselves or others.

    Note

    We recommend that you add only a limited number of users to the AWS Cloud9
    administrators group. This AWS security best practice can help you better
    control, track, and troubleshoot issues with AWS resource access.

  6. On the Permissions tab, for Managed
    Policies
    , choose Attach Policy.

  7. In the list of policy names, choose the box next to
    AWSCloud9User for AWS Cloud9 user access permissions or
    AWSCloud9Administrator for AWS Cloud9 administrator access
    permissions. (If you don’t see either of these policy names in the list, enter the
    policy name in the Filter box to display it.)

  8. Choose Attach Policy.

    Note

    If you have more than one group you want to add AWS Cloud9 access permissions to,
    repeat this procedure for each of those groups.

See also  Andon - The One | andon

To see the list of access permissions that these AWS managed policies give to a
group, see AWS managed
(predefined) policies
.

To learn about AWS access permissions that you can add to a group in addition to
access permissions that are required by AWS Cloud9, see Managed policies and inline policies and Understanding permissions granted by a policy in the
IAM User Guide.

Skip ahead to Step 4: Sign in to the AWS Cloud9
console
.

Add AWS Cloud9 access permissions to the group
with the AWS CLI

Note

If you’re using AWS managed temporary credentials, you can’t use a terminal session in the AWS Cloud9 IDE
to run some or all of the commands in this section. To address AWS security best practices,

AWS managed temporary credentials don’t allow some commands to be run. Instead, you
can run those commands
from a separate installation of the AWS Command Line Interface (AWS CLI).

  1. Install and configure the AWS CLI on your computer, if you haven’t done so
    already. To do this, see the following in the
    AWS Command Line Interface User Guide:

    • Installing
      the AWS Command Line Interface

    • Quick Configuration

    Note

    Although you can configure the AWS CLI using the credentials associated with
    the email address and password that was provided when the AWS account was
    created (we call this an AWS account root user), this
    isn’t an AWS security best practice. Instead, we recommend you configure the
    AWS CLI using credentials for an IAM administrator user in the AWS account.
    An IAM administrator user has similar AWS access permissions to an AWS
    account root user and avoids some of the associated security risks. If you
    cannot configure the AWS CLI as an IAM administrator user, check with your
    AWS account administrator. For more information, see Creating Your First IAM Admin User and Group in the
    IAM User Guide.

  2. Decide whether to add AWS Cloud9 user or AWS Cloud9 administrator access permissions
    to
    the group. These permissions will apply to each user in the group.

    AWS Cloud9 user access permissions allow each user in the group to do the following
    things within their AWS account:

    • Create their own AWS Cloud9 development environments.

    • Get information about their own environments.

    • Change the settings for their own environments.

    AWS Cloud9 administrator access permissions allow each user in the group to do
    additional things within their AWS account, such as the following:

    • Create environments for themselves or others.

    • Get information about environments for themselves or others.

    • Delete environments for themselves or others.

    • Change the settings of environments for themselves or others.

    Note

    We recommend that you add only a limited number of users to the AWS Cloud9
    administrators group. This AWS security best practice can help you better
    control, track, and troubleshoot issues with AWS resource access.

  3. Run the IAM attach-group-policy command, specifying the group’s
    name and the Amazon Resource Name (ARN) for the AWS Cloud9 access permissions policy
    to
    add.

    For AWS Cloud9 user access permissions, specify the following ARN.

    aws iam attach-group-policy --group-name MyCloud9Group --policy-arn arn:aws:iam::aws:policy/AWSCloud9User

    For AWS Cloud9 administrator access permissions, specify the following ARN.

    aws iam attach-group-policy --group-name MyCloud9Group --policy-arn arn:aws:iam::aws:policy/AWSCloud9Administrator

    Note

    If you have more than one group you want to add AWS Cloud9 access permissions to,
    repeat this procedure for each of those groups.

To see the list of access permissions that these AWS managed policies give to a
group, see AWS Managed
(Predefined) Policies
.

To learn about AWS access permissions that you can add to a group in addition to
access permissions that are required by AWS Cloud9, see Managed Policies and Inline Policies and Understanding Permissions Granted by a Policy in the
IAM User Guide.

Step 4: Sign in to the AWS Cloud9 console

After you complete the previous steps in this topic, you and your users are ready
to
sign in to the AWS Cloud9 console and start using it.

  1. If you are already signed in to the AWS Management Console as an AWS account root
    user, sign
    out of the console.

  2. Open the AWS Cloud9 console, at https://console.aws.amazon.com/cloud9/.

  3. Enter the AWS account number for the IAM user you created or identified
    earlier, and then choose Next.

    Note

    If you don’t see an option for entering the AWS account number, choose
    Sign in to a different account. Enter the AWS account
    number on the next page, and then choose Next.

  4. Enter the user name and password of the IAM user you created or identified
    earlier, and then choose Sign In.

  5. If prompted, follow the on-screen directions to change your user’s initial sign-in
    password. Save your new sign-in password in a secure location.

The AWS Cloud9 console is displayed, and you can begin using AWS Cloud9.

Next steps

Task
See this topic

Restrict AWS Cloud9 usage for others in your AWS account, to control
costs.

Additional setup options

Create an AWS Cloud9 development environment, and then use the AWS Cloud9 IDE to work
with code in your
new environment.

Creating an environment

Learn how to use the AWS Cloud9 IDE.

Getting started: basic tutorials and
Working with the IDE

Invite others to use your new environment along with you, in real time and with
text chat support.

Working with shared environments


C9 Blue vs. C9 White in VALORANT But There’s A Twist


The longawaited C9 Blue vs. C9 White VALORANT match is finally here but there’s a twist…
Don’t forget to subscribe, like, and comment below for more C9 VALORANT content!
The winners of our 100k subscriber giveaway have been picked and all 3 have confirmed via email! Congratulations to Ryan L., Alex C., and Ishan P.!
Featuring: TenZ, Relyks, mitch, shinobi, vice, mel, alexis, katsumi, jazzyk1ns, Annie
Cloud9 Links:
Store:            http://c9.gg/store
Website:       https://c9.gg/
Twitter:         https://c9.gg/twitter
Instagram:   https://c9.gg/instagram
TikTok:          https://c9.gg/tiktok 
Facebook:    https://c9.gg/facebook
Reddit:          https://c9.gg/reddit
Discord:        https://c9.gg/discord
Twitch:          https://c9.gg/twitchtv
Weibo:           https://c9.gg/weibo
Check out our main channel at https://c9.gg/youtube, League of Legends channel at https://c9.gg/lol, CS:GO channel at https://c9.gg/csgo, Fortnite channel at https://c9.gg/fortnite, and C9 TV channel at https://c9.gg/c9tv
Thank you to all of our partners!
PUMA:          https://c9.gg/pumayt
Microsoft:    https://c9.gg/msftyt
AT\u0026T:            https://c9.gg/attyt
Red Bull:       https://c9.gg/redbullyt
HyperX:        https://c9.gg/hyperxyt
Secretlab:    https://c9.gg/secretlabyt
Twitch:         https://c9.gg/twitchyt
SyncID: MB01KV8CODSIEOV
C9 Blue vs. C9 White in VALORANT But There’s A Twist
Cloud9 C9 VALORANT

นอกจากการดูบทความนี้แล้ว คุณยังสามารถดูข้อมูลที่เป็นประโยชน์อื่นๆ อีกมากมายที่เราให้ไว้ที่นี่: ดูเพิ่มเติม

C9 Blue vs. C9 White in VALORANT But There's A Twist

Valorant: 5 Silvers who think they deserve Plat VS 5 Actual Platinum Players!


NEW Valorant: 5 Silvers who think they deserve Plat VS 5 Actual Platinum Players!
➡️ Wanna join our games? Join the discord! https://discord.gg/Zg7WCQr
➥ Check Out Our BEST Clips on Facebook: https://www.facebook.com/ValorantGamingCurios/
🔶 Submit Your Valorant Moments At: https://goo.gl/cSxfvY 🔶
We hope you enjoy our videos of valorant news, valorant gameplay, valorant beta gameplay, in this valorant guide, with valorant tips and tricks, valorant leak, and project a gameplay + valorant leaks for valorant beginners and more in this valorant beginner guide from pros! Valorant: 5 Silvers who think they deserve Plat VS 5 Actual Platinum Players! Valorant: 5 Silvers who think they deserve Plat VS 5 Actual Platinum Players! Valorant: 5 Silvers who think they deserve Plat VS 5 Actual Platinum Players!
Valorant
ValorantMoments
ValorantGameplay

Valorant: 5 Silvers who think they deserve Plat VS 5 Actual Platinum Players!

BEST PLAYS from PRO TOURNAMENTS in 2020 Valorant (INSANE)


submit your clips: https://rebrand.ly/Valorant_Flavorz
giveaway: https://gleam.io/3RpbQ/100valorantgiftcardorpaypal
BEST PLAYS from PRO TOURNAMENTS in Valorant (INSANE) Best 1v5 Clutches, Solo Aces, 200 IQ Plays, 1v9 Moments and Pro Player Clutch Ace in a VALORANT Montage
Credit:
https://www.twitch.tv/nerdstgamers
https://www.twitch.tv/t1esports
https://www.twitch.tv/blasttv
https://www.twitch.tv/WePlayEsport_EN
https://www.twitch.tv/valorant_jpn
https://www.twitch.tv/Flashpoint
https://www.twitch.tv/valorant_esports_na
https://www.twitch.tv/valorant_esports_eu

Thank you for choosing my channel, hope you enjoy Valorant highlights!
We call HIGHLIGHTS a video where you find the best plays of the game with the best clips, best frags, valorant pro highlights, twitch highlights, with the best players in the world like
bonkar, Tenner, Zyppan, rhyme, Yacine, Bird, mezii, bramz, ScreaM, mixwell, pyth, ALEX, JEROME, Kryptix, ardiis, L1NK, ec1s, soulcas, Sliggy, Ex6TenZ, beyAz, Matélian, AKUMAAAAA, Happy,
xajdish, kicker, Devilwalk, sayf, 1mpala, Coffee, kolyaN, SmartSeven, zeddy, PNUKH, ANGE1, 7ssk7, Art1st, Shao, dinkzj, and much more.
лучшие клипы, лучшие моменты valorant, яркие моменты, все здесь в одном видео.
parhaat leikkeet, valorant pro kohokohdat, nykytilan kohokohdat, kaikki täällä yhdessä videossa, melhores mementos.
moments forts de valorant pro, moments forts de twitch, le tout ici dans une seule vidéo.
The best tier 1 and tier 2 teams in the world such as T1, NiP, Immortals, TSM, Team SoloMID, Ninjas in Pyjamas, Gen.G, 100T, 100Thieves
If you want more than just looking at VALORANT scores, you can watch how the pro matches unfolded, if you had no time to follow up with valorant live scores.

We provide source \u0026 credit for all footage you can find the links to all original sources \u0026 music in the rest of the description.
VIDEO CONTEXT DISCLAIMER:
We obtain and compile clips to fit under the guise of a compelling narrative via the use of interesting and exciting video concepts and themes for each individual video. We also add significant editing to make the work transformative from the original creations and fair use.

Valorant ValorantMoments ValorantMontage

BEST PLAYS from PRO TOURNAMENTS in 2020 Valorant (INSANE)

CS:GO – Best of Team Cloud9


Cloud9 has been strong lately, here you go!
Want to see more in the future? Go subscribe! http://tinyurl.com/lm9spqf
Facebook: https://www.facebook.com/virrecsgo
I hope you liked what you’ve seen and stay tuned for more!
https://www.reddit.com/r/GlobalOffensive/comments/3fvgue/csgo_best_of_team_cloud9/
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Frags by : Shroud, n0thing, Seangares, Freakazoid, Skadoodle
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
TOP GAMING PRODUCTS FOR SWEDES!
For you who lives in Sweden, the best prices and top gaming products.
● http://www.gamingbutiken.com/
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
♬ Song name: Martyna Wren Oh Butterfly (T \u0026 Sugah Remix)
♬ Outro song: Party Favor Bap U
● T and Sugah
http://facebook.com/T.and.Sugah
http://soundcloud.com/tandsugah
● Martyna Wren
http://www.martynawren.com
http://facebook.com/MartynaWrenMusic
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Do you want to buy an edit with your frags? Send me a PM on youtube/facebook or add my steam:
● https://steamcommunity.com/id/viRRE3
● https://www.facebook.com/virrecsgo
Trade link: https://steamcommunity.com/tradeoffer/new/?partner=54587153\u0026token=KU_66WTb
Incase you want to donate any skins! 🙂
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
WANT TO WIN BIG SKINS? then check out https://CSGOFast.com !
100% legit betting site with a great and smooth system.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Buy cheap games at G2A!
https://www.g2a.com/r/virrecsgo
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Software used:
Sony Vegas Pro 12
Photoshop CS6
CounterStrike:Global Offensive
Shadowplay
HLAE
Smoofofer
Adobe After Effects
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

CS:GO - Best of Team Cloud9

The Complete Evolution Of Cloud9 (2014 – 2017)


From the very first C9 roster with Hiko in 2014 to the now 2017 roster without Shroud and n0thing… The complete evolution of Cloud9’s CSGO roster, with some highlights from each roster change, Enjoy!
┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉
🌾My Twitter: https://twitter.com/Mellowcsg
🥙 Join the Discord: https://discord.gg/TmSRYuV
🍧SUBSCRIBE: https://www.youtube.com/channel/UCu12c4rmcm_A3gI2ZTBYNRg?sub_confirmation=1
┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉
💽Intro Song: The Black Eyed Peas Pump It
Link: https://www.youtube.com/watch?v=ZaI2IlHwmgQ
📀Music: Undertale Asgore Theme
Link: https://www.youtube.com/watch?v=zKLxc2NsNcg
💽Outro Song: Kodak Black \”Can I\” Instrumental Remake By Digital
Link: https://www.youtube.com/watch?v=_P5jMO7q5gM
┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉┉
💙Thanks for Watching!💕
(~˘▾˘)~( ͡ᵔ ͜ʖ ͡ᵔ )\\ (•◡•) /

The Complete Evolution Of Cloud9 (2014 - 2017)

นอกจากการดูบทความนี้แล้ว คุณยังสามารถดูข้อมูลที่เป็นประโยชน์อื่นๆ อีกมากมายที่เราให้ไว้ที่นี่: ดูวิธีอื่นๆWiki

ขอบคุณที่รับชมกระทู้ครับ cloud 9 team

Leave a Comment