Using Amazon IAM account

CloudBerry Managed Backup service allows using Amazon Identity and Access Management service to create an account with limited permissions. Such an IAM user account can be used when Amazon S3 account contains sensitive information that can be accessed only by the account owner.

With Amazon Identity and Access Management you can use all of the CloudBerry Managed Backup features without any risk of unauthorized access to your sensitive data. This manual will help you create and configure Amazon IAM account with limited permissions and explain how to use it with CloudBerry Managed Backup.

How to create an Amazon IAM account

To create Amazon IAM account you will need CloudBerry Explorer PRO. If you don't have CloudBerry Explorer PRO installed on your computer you can download it here. Fully functional 15-days trial version of the program is available

If you don't have your Amazon Web Services account in CloudBerry Explorer PRO you'll have to create it. This video tutorial will help you.

Once you have an AWS account in CloudBerry Explorer you can start creating an Identity and Access Management account with limited permissions. Follow the instructions below to do this:

Step 1. Go to “Access Manager” and click on “New Policy Wizard”.

Step 2. Here you have to choose your AWS account and click “Next” button.

Step 3. Now you have to create a new IAM user and specify the name.

Step 4. On the next screen you can specify permissions for selected users. If you have CloudBerry Explorer PRO version 3.8.1.11 or higher, choose “Create IAM user for CloudBerry MBS” option, that automates most of the tasks.

Note: If you use CloudBerry Explorer PRO earlier version you can upgrade your application. Just download the latest version from here. If you don't have an ability to upgrade you can create access permissions manually as shown in the “Using IAM Account with Restricted Privileges” video.

Step 5. At the next step you have to select buckets to be used in this policy. Check proper boxes and click “Next” button.

Step 6. Next screen allows to preview or modify created policy script. If you want to specify some additional rules you can do it with Policy Designer.

Step 7. At this step you need to allow your user access Amazon SES for email notifications. Click "Policy Script" tab for that and manually paste the following statement:

{
"Effect": "Allow",
"Action": "ses:*",
"Resource": "*",
"Condition": {}
}

When you're finished with this step, click “Next”.

Step 8. Next is the preview screen where you can overview the list of your operations before the actual start. Click “Next” to proceed.

Step 9. It may take a several minutes to create policy. When the procedure is completed you'll see the summary screen like below. You can save your summary in a text file by clicking on the “Save Summary” button. Click “Finish”.

Note. If you want to use AWS Console, CloudBerry Explorer freeware or another Amazon S3 client, you can use the following policy script. This policy is created for a bucket called cloudberry.tonny2. Make sure to replace it with your own bucket.

{	
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Deny",
"Action": "s3:DeleteBucket",
"Resource": "arn:aws:s3:::cloudberry.tonny2",
"Condition": {}
},
{
"Effect": "Allow",
"Action": "s3:*",
"Resource": "arn:aws:s3:::cloudberry.tonny2/*",
"Condition": {}
},
{
"Effect": "Allow",
"Action": "s3:ListAllMyBuckets",
"Resource": "*",
"Condition": {}
},
{
"Effect": "Allow",
"Action": "sts:GetFederationToken",
"Resource": "*",
"Condition": {}
},
{
"Effect": "Allow",
"Action": "ses:*",
"Resource": "*",
"Condition": {}
}
]
}

Creating Access Keys

Step 1. Go to “Access Manager” in CloudBerry Explorer PRO.

Step 2. In the opened window choose your Amazon Web Service account.

Step 3. Right click on your previously created IAM user and click “Manage Access Keys”.

Step 4. In the opened “Security Credentials” screen click “Create” button to generate Access Key and Secret Key for your IAM user.

Step 5. Now you should see your new IAM user security credentials. You can copy your Secret Key to clipboard or save it to a file.

Add an Amazon S3 account

  1. Go to Storage Accounts page. To add a new storage, click Add Account.

  1. Select Amazon S3 storage.

  1. Enter the Access Key and the Secret Key and Click Save button.

Now you are ready to use Managed Backup service with IAM account with restricted privileges while protecting your master AWS account.

You can also familiarize yourself with Amazon's comprehensive articles on the matter here and here.