Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file added docs/iam/create-access-key/1-get-started.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/iam/create-access-key/2-access-keys.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/iam/create-access-key/3-blank-form.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/iam/create-access-key/4-filled-out-form.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/iam/create-access-key/5-creds.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
34 changes: 34 additions & 0 deletions docs/iam/create-access-key/index.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
# Creating an Access Key

Clients need access keys to store files on Tigris. You can mint new access keys
from the [Tigris Dashboard](https://console.tigris.dev).

First, go to the [Tigris Dashboard](https://console.tigris.dev).

![](./1-get-started.webp)

Click on Access Keys in the left-hand menu.

![](./2-access-keys.webp)

Click on the Create New Access Key button.

![](./3-blank-form.webp)

Give the key a name and assign the desired permissions. If you're unsure, you
can always come back and edit the permissions later. Some common permissions to
give:

- Admin access for your developer machine (not recommended for production)
- Read-only access to all buckets
- Editor access to a specific bucket or set of buckets (such as a bucket for a
specific project or service)

![](./4-filled-out-form.webp)

Click Create.

![](./5-creds.webp)

Copy the credentials to your notes or password manager. You will not be able to
see them again. Then you can use them with [any tools you want](/docs/sdks/s3/).
8 changes: 4 additions & 4 deletions docs/iam/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,12 +13,12 @@ Because Tigris is S3-compatible, you can continue to use existing AWS S3 IAM
policies, CLIs, SDKs, and libraries with Tigris. Custom IAM policies must be
defined and set using the AWS CLI, configured with Tigris credentials.

# How to create and attach an IAM policy
## How to create and attach an IAM policy

Policies are attached to access keys. If you delete and recreate an access key,
you'll need to attach IAM policies to the new access key.

## Create an Access Key
### Create an Access Key

- Go to the [Tigris Dashboard](https://console.tigris.dev).
- Click on the `Access Keys` tab.
Expand All @@ -31,7 +31,7 @@ you'll need to attach IAM policies to the new access key.
- Ensure your IAM endpoint URL points to Tigris:
`AWS_ENDPOINT_URL_IAM=https://fly.iam.storage.tigris.dev`

## Create an IAM Policy
### Create an IAM Policy

Let's create an IAM policy and attach it to an access key. Here's an example IAM
policy. You'll need to save it as a `.json` file.
Expand Down Expand Up @@ -71,7 +71,7 @@ aws iam create-policy --policy-name <example-org-level-unique-policy-name> --pol

Note the ARN of the policy.

## Attach IAM Policy
### Attach IAM Policy

Once you've created an IAM Policy, you can attach it to users using the
`IAM:AttachUserPolicy` operation:
Expand Down
1 change: 1 addition & 0 deletions sidebars.js
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,7 @@ const sidebars = {
label: "IAM",
items: [
"iam/index",
"iam/create-access-key/index",
"iam/limited-access-key",
"iam/ip-restrictions",
"iam/date-time-restrictions",
Expand Down