Skip to content

Commit 7776f96

Browse files
pietroalbiniXAMPPRocky
authored andcommitted
infra: add docs on managing aws access
1 parent c3a3996 commit 7776f96

File tree

3 files changed

+44
-1
lines changed

3 files changed

+44
-1
lines changed

src/SUMMARY.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@
4040
- [Static websites](./infra/guidelines/static-websites.md)
4141
- [Documentation](./infra/docs/README.md)
4242
- [AWS access for team members](./infra/docs/aws-access.md)
43+
- [AWS access management](./infra/docs/aws-access-management.md)
4344
- [Bastion server](./infra/docs/bastion.md)
4445
- [Crater agents](./infra/docs/crater-agents.md)
4546
- [Discord moderation bot](./infra/docs/discord-mods-bot.md)
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
# AWS access management
2+
3+
This document explains how to setup and manage AWS access for Rust team
4+
members. If you're a team member and you need to access AWS with your existing
5+
credentials, or you have received your credentials for the first time, check
6+
out the ["AWS access for team members"](./aws-access.md) page.
7+
8+
## Granting access
9+
10+
To grant access to a person, go to [`team-members-access/_users.tf`][tf] in the
11+
Terraform configuration and add the new user to it, specifying which teams they
12+
should be a member of. The user will be created as soon as you apply the
13+
configuration.
14+
15+
By default, there will be no credentials attached to the user. To allow the
16+
user to log in, go to the [IAM console][iam-users], open the security
17+
credentials page of the user you just created, and enable a console password.
18+
Let AWS generate a random one, and require the password to be changed on first
19+
login.
20+
21+
Finally communicate to the user that they can join with the generated password,
22+
and to follow the ["AWS access for team members"](./aws-access.md) page to
23+
learn how to enable 2FA and gain access to their account.
24+
25+
## Revoking access
26+
27+
To revoke access from a person, log into the [IAM console][iam-users],
28+
open the security credentials page of the user you want to delete, and:
29+
30+
* Disable console access by clicking "Manage" on the console password
31+
* Disable 2-factor authentication by clicking "Manage" on the assigned MFA
32+
device
33+
* Remove all the access keys, including inactive ones, by clicking the "x".
34+
35+
Once all the access was removed from the console, go to
36+
[`team-members-access/_users.tf`][tf] in the Terraform configuration, remove
37+
the user and apply the configuration.
38+
39+
[iam-users]: https://console.aws.amazon.com/iam/home#/users
40+
[tf]: https://github.com/rust-lang/simpleinfra/blob/master/terraform/team-members-access/_users.tf

src/infra/docs/aws-access.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ project. This includes both members of the Infrastructure Team and members of
55
teams with services hosted on AWS.
66

77
This document explains how to access our AWS account, and how to interact with
8-
it.
8+
it. If you're a infrastructure team member and you need to setup or revoke
9+
access for another person, read the ["AWS access
10+
management"](./aws-access-management.md) page.
911

1012
## Setting up your user after receiving the credentials
1113

0 commit comments

Comments
 (0)