Create an IAM user with CodeCommit permissions

Welcome to Chapter 18B of our "Mastering AWS DevOps" series! In this blog, I will walk you through the steps to create an IAM User for interacting with AWS CodeCommit. We will ensure the User has the proper permissions to access and manage your code repositories securely. It's a pretty important concept, especially if you are working with AWS and CodeCommit for source code management. Essentially, it is about creating specific user accounts with the right permissions to access and work with CodeCommit repositories.

Let’s get started:

Step 1: Sign In to the AWS Console

Open your preferred web browser and go to the official AWS website by entering the following URL in the address bar https://aws.amazon.com/:

Blog Post Image

On the AWS home page, locate and click on the “Sign In” button. This will take you to the AWS Management Console sign-in page.

Blog Post Image

After completing these steps, you will be successfully signed in to the AWS Console, where you can begin managing your AWS resources, including setting up IAM users and configuring their permissions for AWS services like AWS CodeCommit.

Step 2: Access IAM Service

In this step, we will see the “Access to IAM service”.

Blog Post Image

Once you are logged in, you will land on the AWS Dashboard. In the top search bar, type “IAM” and select “IAM” under “Services.”

IAM Dashboard:

Clicking on “IAM” from the Services menu takes you to the IAM dashboard. This dashboard is where you perform user management tasks, create and configure IAM users, set up groups, define roles, assign permissions, and establish security policies. It’s a critical component of maintaining your AWS resources' security and access control.

Step 2 is about accessing the IAM (Identity and Access Management) service within the AWS Management Console. IAM is essential for controlling and managing user access to AWS services and resources securely.

This step is a foundational part of configuring IAM users and granting them permissions for services like AWS CodeCommit.

Step 3: Locate the IAM User

Certainly! Let’s explain Step 3, “Locate the IAM User,” as below:

After accessing IAM services, now you will find the IAM user.

Click on ‘Users’:

Within the IAM Dashboard, there is a navigation pane on the left side. Clicking on ‘Users’ in this navigation pane takes you to the section where you can manage IAM users.

Blog Post Image

List of Existing “IAM Users”:

Upon clicking ‘Users,’ you are presented with a list of IAM User names. This list displays all the IAM Users that have been created in your AWS account, along with details such as user ARNs (Amazon Resource Names) and creation dates.

Step 3 is about navigating to the IAM User Management section within the IAM Dashboard. It allows you to view and manage individual IAM Users, including creating new ones, configuring their security credentials, and defining their permissions for accessing AWS services and resources.

Step 4: Create or Select an IAM User

Let’s explain Step 4, “Create or Select an IAM User,” as below:

  1. If you are creating a new IAM user:
  2. Selecting this option allows you to create a new IAM User. When you create a new user:

    Blog Post Image

    Specify a username for the user (e.g. “JohnDoe”)

    Blog Post images

    Choose whether the user should have programmatic access (using AWS APIs and CLI) and/or AWS Management Console access (web-based access). In User type, you will find 2 options and you have to select the 2nd option (I want to create an IAM user).

    Blog Post Image

    Generate security credentials for the user, including an access key and secret access key for programmatic access, and an initial password for console access.

    Blog Post Image

    If you want to create a custom password then select that option and after that uncheck the “Users must create a new password at next sign-in-Recommended”. Click on “Next” button.

    The username is a unique identifier for an IAM User within your AWS account. It is used to distinguish one user from another. Each IAM User must have a distinct username.

  3. If you are configuring an existing IAM user:
  4. This option is used when you want to work with an IAM User that you’ve already created in your AWS account. You can select from a list of existing users

    It’s like selecting a character in a video game that you’ve previously created and customized.

  5. Username:
  6. The username is a unique identifier for an IAM User within your AWS account. It is used to distinguish one user from another. Each IAM User must have a distinct username.

  7. Type of Access:

There are two types of access:

Step 4 involves creating or selecting IAM Users, which serve as identity entities with specific access capabilities within AWS. It also involves defining the access methods (programmatic or console) and setting up security credentials for these users, depending on their roles and requirements within your AWS environment.

Step 5: Attach Permissions

Let’s explore Step 5, “Attach Permissions,” in detail as below:

In Step 4, you either created a new IAM User or selected an existing one. However, at that point, the IAM User didn’t have any specific permissions. It was merely an identity within your AWS account.

In the “Set permissions” section, you have two options:

Step 5, “Attach Permissions,” is the process of associating specific IAM permissions with the IAM User.

Blog Post Image

Groups and Policies:

Permissions can be managed by adding the IAM User to IAM Groups or attaching IAM policies directly to the user. IAM Groups act as containers for users with shared permissions. IAM policies are sets of permissions that can be fine-tuned to allow or deny access to AWS resources.

In this case, no group is required.

Step 6: Search for CodeCommit Policies

In this step, Let’s search for CodeCommit policies

In the “Search policies” search bar, type “AWSCodeCommit” to find policies related to CodeCommit.

Blog Post Image

You should see policies like “AWSCodeCommit_FullAccess” (which grants full access) or “AWSCodeCommit_ReadOnly” (which grants read-only access).

Select the appropriate policy based on your requirements. For this example, let’s choose “AWSCodeCommit_FullAccess.” as shown below:

Blog Post Image

Why are we selecting? “AWSCodeCommit_FullAccess “ because The “AWSCodeCommit_FullAccess” policy grants broad permissions to perform various actions in CodeCommit, which might be more access than some users or roles need.

After selecting the “AWSCodeCommitFullAccess” policy, click on the “Next” button.

Step 7: Review and Add Permissions

After choosing “AWSCodeCommit_FullAccess”, In this step we will do “Review and Add Permissions” as below:

After adding or adjusting permissions, review your changes carefully to ensure they align with your organization’s security policies. Double-check that you have not granted excessive permissions.

When you are satisfied, proceed to the next steps, typically by clicking “Create user” or “Previous” for changes.

Step 8: Review User Details

In Step 8, “Review User Details,” you will want to carefully review and verify the details you’ve configured for an IAM (Identity and Access Management) user before creating the user. This step is important to ensure that the user’s settings are accurate and align with your organization’s requirements.

Review the user details to ensure they are correct as shown below:

Blog Post Image

Step 9: Complete the User Creation or Permission Assignment

Click “Download .csv” to download a CSV file containing the access key ID and secret access key. Store this file in a secure location. You won’t be able to retrieve the secret access key again.

If you are creating a new IAM user, you will now see a confirmation message indicating that the user has been created successfully. Make sure to note down the user’s username and the console sign-in link for future reference.

You have successfully created the IAM user for CodeCommit, As shown in the above image.

Blog Post Image

Step 13: Next Steps

After creating or configuring the IAM user for CodeCommit, you can proceed with the following steps:

  1. Configure AWS CLI or SDKs on your local development environment using the access key ID and secret access key to interact with CodeCommit programmatically.
  2. Grant the IAM user access to specific CodeCommit repositories by configuring repository-level permissions and adding the user to the repository’s IAM policies.
  3. Begin using CodeCommit for version control by pushing, pulling, and managing your code repositories.

Remember that IAM user permissions should be fine-tuned based on the principle of least privilege, ensuring that users only have access to the AWS resources they need. Regularly review and update permissions as necessary to maintain security and compliance.

Step 14: Granting Repository Access

In Step 14, “Granting Repository Access,” you are taking actions to grant specific users or groups access to your AWS CodeCommit repository. This step is essential to control who can view, clone, push changes, and perform other actions on your Git repositories hosted on AWS CodeCommit. Here’s how you can grant repository access:

  1. Select Your Repository: From the list of repositories on the CodeCommit dashboard, choose the repository to which you want to grant access. Click on the repository name to open its details.
  2. If you don’t have a repository in CodeCommit then create a new repository.

    Blog Post Image

    Blog Post Image

  3. Access Control: Inside the repository details, look for an “Access control” or “Permissions” section, where you can configure who has access to the repository.
  4. Add Users or Groups: Typically, you have the option to add users or groups to the repository’s access control list. This could include IAM users, IAM groups, or even specific AWS accounts.
  5. Define Permissions: For each user or group you add, specify the permissions you want to grant them. AWS CodeCommit provides fine-grained access control, allowing you to grant read-only or read-write permissions, control access to specific branches, and more.
    • Read-only access: Users with read-only access can clone the repository and view its contents but cannot make changes.
    • Read-write access: Users with read-write access can clone the repository, view its contents, and make changes, including pushing changes back to the repository.
  6. Access Levels: Depending on your requirements, you may set different access levels for different users or groups. For example, developers might get read-write access, while auditors may get read-only access.
  7. Review and Confirm: Before finalizing the permissions, review your choices to ensure you’re granting the appropriate access to the right users or groups.
  8. Save Changes: Once you’ve confirmed the permissions, save your changes. The access control settings are now in effect for the selected repository.
  9. Test Access: It’s a good practice to test the access you’ve granted to ensure that users or groups can perform the intended actions in the repository.
  10. Monitor and Revise: Regularly monitor and revise access control settings as needed. As project requirements change or team members come and go, you’ll want to adjust repository access accordingly.

Remember that you can also use AWS Identity and Access Management (IAM) to control CodeCommit access at a broader level. IAM allows you to define policies that govern access to all repositories within your AWS account. This can be useful for setting up default permissions for all repositories and then refining access control at the repository level as necessary.

Carefully managing repository access in AWS CodeCommit is crucial for ensuring the security and integrity of your source code while enabling collaboration among your development team.

Step 15: Repository Access Permissions

In this step, we will see the Repository Access Permissions in detail as below.

In Step 15, “Repository Access Permissions,” you are configuring and fine-tuning the access permissions for users, groups, or AWS accounts that you’ve granted access to within your AWS CodeCommit repository. This step allows you to define who can do what within the repository with granular control over their actions.

Here is how you can set and manage repository access permissions:

  1. In the “Add permissions” dialogue, you will specify who can access and interact with the selected CodeCommit repository
  2. Type: Choose “IAM users, roles, or groups” to define the identity or group to which you want to grant access.
  3. Name: Enter the IAM username, group name, or role name that you want to grant access to the repository. This identifies the AWS identity that will receive the permissions.
  4. Access level: Select the appropriate access level for the IAM entity you are granting access to.
  5. Access Levels: Depending on your requirements, you may set different access levels for different users or groups. For instance, developers might be given read-write access, while auditors or external collaborators may receive read-only access.
  6. Read: Opt for “Read” if you want to provide read-only access to the repository. Users with read access can clone the repository, view its contents, and fetch code, but they can’t make changes.
  7. ReadWrite: If you wish to grant full access to the repository, choose “ReadWrite.” Users with read-write access can not only view the code but also make edits, create branches, and push commits.
  8. Permission Overview: The permissions you add here establish an access control list (ACL) for the repository, specifying who can or cannot access it.
    1. IAM users, groups, or roles added at this stage inherit the permissions defined by the chosen access level.
    2. You can add multiple IAM entities to grant access to various users, groups, or roles, each with its own access permissions.
    3. Beyond this, you can further fine-tune access control by configuring policies in your IAM settings to define more detailed permissions.
  9. Save Permissions: After defining the IAM entities, access levels, and permissions, click “Add” to save these access permissions for the selected CodeCommit repository.
  10. Verification: Upon adding permissions, review the permissions summary to confirm their accurate configuration. You should see a list of IAM entities along with their associated access levels.
  11. Testing Access: To confirm that access permissions are functioning correctly, consider testing repository access using the IAM entities you’ve granted access to. This will ensure that users can interact with the repository according to their permissions.
  12. Regular Review: Periodically revisiting and updating repository access permissions is crucial to adapt to the evolving needs of your project and team. This practice ensures that security and compliance standards are maintained over time.

By configuring these repository access permissions, you can effectively manage and control who has access to your AWS CodeCommit repository, providing the appropriate level of access to team members and collaborators while maintaining the security and integrity of your codebase.

Step 16: Configuring Git Credentials

In this step, we will configure git credentials.

After setting up IAM user permissions, the next step is configuring Git credentials. This ensures that Git can authenticate and interact securely with AWS CodeCommit repositories.

To interact with the CodeCommit repository from your local development environment, you will need to configure Git credentials.

There are two common methods for configuring Git credentials: “HTTPS Git credentials and SSH keys.”

You have two options for setting this up:

  1. Option 1: HTTPS Git Credentials:
  2. This option is more straightforward for beginners.

    1. Open a terminal or command prompt on your local machine.
    2. Run the following command, replacing ‘’ with the username of the IAM user:
    git config –global credential.helper ‘!aws codecommit credential-helper $@’
    git config –global credential.UseHttpPath true
        

    Certainly, let’s explain the two ‘git config’ commands in detail:

    1. git config –global credential.helper ‘!aws codecommit credential-helper $@’:
      • ‘git config’: This is the Git command used for configuring Git settings.
      • ‘–global’: The ‘–global’ flag specifies that the configuration should be applied globally to your user account. This means it will affect all Git repositories on your system.
      • credential.helper: This is a Git configuration property used to specify a credential helper. A credential helper is a tool that Git uses to store and retrieve credentials, such as usernames and passwords, for various services.
      • ‘!aws codecommit credential-helper $@’: This is the actual credential helper configuration. Let’s break it down:
        • ‘!aws codecommit credential-helper’ is a utility provided by AWS for interacting with CodeCommit repositories. It’s used to manage authentication credentials for CodeCommit.
        • $@ is a special shell variable that represents all the arguments passed to the command. In this context, it’s used to pass any additional parameters or arguments to the aws codecommit credential-helper utility.
      • Effect: When you run this command, you’re configuring Git to use the ‘aws codecommit credential-helper’ as a credential manager. This helper will securely store and retrieve your CodeCommit credentials, so you don’t have to enter your credentials manually every time you interact with a CodeCommit repository.
    2. ‘git config –global credential.UseHttpPath true’:
      • ‘git config’: This is the ‘Git’ command used for configuring Git settings.
      • ‘–global’: Just like in the previous command, the ‘–global’ flag specifies that the configuration should be applied globally to your user account.
      • ‘credential.UseHttpPath’: This is another Git configuration property. It’s used to enable or disable the use of the HTTP(S) URL path when identifying credentials for Git operations.
      • ‘true’: Setting this property to ‘true’ means that Git will consider the full HTTP(S) URL path when matching credentials. This is particularly useful when you have multiple repositories hosted on the same domain but with different credentials.
      • Effect: When you run this command with true, you are telling Git to consider the full URL path when identifying credentials. This ensures that the correct credentials are used for each repository, even if they share the same domain.

    In summary, these Git configuration commands are used to set up and configure Git to work seamlessly with AWS CodeCommit. They ensure that Git uses the ‘aws codecommit credential-helper’ to securely manage your CodeCommit credentials and that Git considers the full URL path when identifying credentials to avoid conflicts in case you have multiple repositories on the same domain. These configurations enhance the convenience and security of working with CodeCommit repositories.

  3. Option 2: SSH Keys:

Option 2: SSH Keys:

This option involves generating SSH keys and associating them with your IAM user. It provides secure access to CodeCommit.

  1. In the terminal or command prompt, generate an SSH key pair:
  2. Certainly! The ssh-keygen command is used to generate SSH (Secure Shell) key pairs for secure authentication and communication between your computer and remote servers. Let’s break down the ‘ssh-keygen -t rsa -b 2048’ command in detail:

    • ssh-keygen: This is the main command for generating SSH key pairs. It is a part of the OpenSSH suite of tools, which provides secure remote access to servers and secure file copying between a local and a remote computer.
    • -t rsa: This is an option specifying the type of key to generate. In this case, it indicates that you want to generate an RSA (Rivest–Shamir–Adleman) key pair. RSA is a widely used asymmetric encryption algorithm for secure communication.
    • -b 2048: This is another option specifying the number of bits in the key. In this case, it specifies that you want to generate an RSA key with 2048 bits. The key’s bit length directly affects its security. Longer keys are more secure but may also require more computational resources to use.

    How ‘ssh-keygen’ Works:

    When you run ‘ssh-keygen -t rsa -b 2048’, the following happens:

    • ssh-keygen’ generates a new RSA key pair, which consists of two parts: a private key and a public key.
    • The private key is stored securely on your local computer. It should never be shared or exposed to others. It’s used for authentication when connecting to remote servers.
    • The public key is also generated and saved in a file. By default, it’s saved in ‘~/.ssh/id_rsa.pub’. This is the key you can share with remote servers, allowing them to verify your identity when you connect.
    • The key pair is protected with a passphrase. You’ll be prompted to enter a passphrase for additional security. The passphrase is like a password for your private key. It’s recommended to set a passphrase, but you can leave it empty if you prefer.

    In summary, ‘ssh-keygen -t rsa -b 2048’ is a command used to generate an RSA key pair for secure authentication and communication with remote servers. The private key is kept secure on your local machine, while the public key is shared with servers you want to access. This method enhances security and convenience when working with remote systems.

    Follow the prompts to create the key pair.

  3. b. Add the generated SSH public key to the IAM user’s SSH keys:
  4. In the AWS Management Console, navigating to IAM means accessing the IAM service within the AWS Management Console.

    • Select the IAM user you configured for CodeCommit.
    • In the “Security credentials” tab, under “SSH keys for AWS CodeCommit,” click “Upload SSH public key” and upload the public key file ( ‘~/.ssh/id_rsa.pub’ by default).

Step 17: Clone the Repository

In this step, We will see steps to Clone a Repository.

  1. To start working with your CodeCommit repository, you will need to clone it to your local machine.
    • In the CodeCommit repository’s AWS Console, click the “Clone URL” button. This will provide you with the HTTPS or SSH clone URL.
    • In your terminal or command prompt, navigate to the directory where you want to store the repository.
    • Run the following command, replacing ‘ ’ with the URL you copied:

Certainly, let’s explain the ‘git clone <Clone-URL>’ command in detail:

How ‘git clone’ Works:

When you run ‘git clone <Clone-URL>’, Git performs the following steps:

In summary, ‘git clone <Clone-URL>’ is the command you use to create a local copy of a Git repository from a remote location. It’s the first step in collaborating on a Git project, allowing you to work on the code and contribute changes.

Step 18: Push and Pull Code

You’re now ready to work with your CodeCommit repository locally. Make changes to your code, commit those changes, and then push them back to the CodeCommit repository using Git commands like ‘git add’, ‘git commit’, and ‘git push’. You can also pull the latest changes from the repository to keep your local copy up to date using ‘git pull’.

Congratulations! You have successfully configured an IAM user for AWS CodeCommit, granted repository access, and set up Git credentials to interact with your CodeCommit repository from your local development environment. You are now ready to collaborate and manage your code with CodeCommit.

Conclusion

In this guide, we walked through the steps of creating an IAM user and assigning CodeCommit-specific permissions. CodeCommit permission is an essential step to managing your source code repositories on AWS securely. It’s a crucial step in ensuring that your projects run smoothly, your code remains safe, and your collaboration efforts thrive.

By following the steps outlined in this guide, you can grant the right level of access to your developers while maintaining the highest standards of security. Remember to regularly review and update permissions to align with your project’s evolving needs.

Explore more online AWS courses at:
https://university.pravinmishra.in

Share this post:

Back