The root user is the account owner and is created when the AWS account is created. Other types of users, including IAM users, and AWS IAM Identity Center users are created by the root user or an administrator for the account. All AWS users have security credentials.
-
ROOT
The credentials of the account owner allow full access to all resources in the account. You can't use IAM policies to explicitly deny the root user access to resources. You can only use an AWS Organizations service control policy (SCP) to limit the permissions of the root user of a member account. Because of this, we recommend that you create an administrative user in IAM Identity Center to use for everyday AWS tasks. Then, safeguard the root user credentials and use them to perform only those few account and service management tasks that require you to sign in as the root user. For the list of those tasks, see Tasks that require root user credentials.
-
IAM
An IAM user is an entity you create in AWS that represents the person or service that uses the IAM user to interact with AWS resources. These users are identities within your AWS account that have specific custom permissions. For example, you can create IAM users and give them permissions to create a directory in IAM Identity Center. IAM users have long-term credentials that they can use to access AWS using the AWS Management Console, or programmatically using the AWS CLI or AWS APIs
-
Make root user account: AWS link
-
Setting Multi Factor Authentication(MFA)
- Make IAM account
Authorize AdministratorAccess to IAM account
Download csv file and check your iam account and password
- Make IAM account access key
- Setting aws cli in Local environment
-
Install
pip install awscli -
check Installation
aws -
Register your IAM user
aws configure # Register with profile name aws configure --profile [ProfileName] # enter your Access key, secret key AWS Access Key ID [None]: AWS Secret Access Key [None]: Default region name [None]: ap-northeast-1 Default output format [None]: text # check Access key ID, AWS Secret Access Key registered aws configure list -
Select profile
setx AWS_PROFILE [ProfileName] # setting default profile set AWS_DEFAULT_PROFILE=[ProfileName]You can check your profile information in .aws/config and .aws/credentials
Insert your profile name in OCR_MODEL/TTS/tts.py line 97session = Session(profile_name=[your ProfileName])







