Skip to content

Commit dcde51d

Browse files
author
Microchip Technology
committed
MCU8MASS-262: Updated policy to authorize all IoT Core Resources, and added a disclaimer to the README about the update;MCU8MASS-262: Made the note bold;
1 parent 51d4838 commit dcde51d

File tree

2 files changed

+7
-12
lines changed

2 files changed

+7
-12
lines changed

connect-the-board-to-your-aws-account/MCHPProvToolAccess.json

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,31 +6,24 @@
66
"Effect": "Allow",
77
"Action": [
88
"lambda:CreateFunction",
9-
"iot:RegisterThing",
10-
"iot:GetRegistrationCode",
9+
"iot:*",
1110
"iam:CreateRole",
1211
"lambda:GetFunctionConfiguration",
1312
"iam:AttachRolePolicy",
1413
"iam:PutRolePolicy",
15-
"iot:DescribeEndpoint",
1614
"iam:PassRole",
1715
"iam:DetachRolePolicy",
18-
"iot:DeleteTopicRule",
1916
"iam:DeleteRolePolicy",
2017
"lambda:DeleteFunction",
2118
"iam:GetRole",
22-
"iot:RegisterCACertificate",
2319
"lambda:ListFunctions",
2420
"lambda:GetFunction",
2521
"iam:DeleteRole",
26-
"iot:RegisterCertificate",
2722
"cloudformation:DescribeStacks",
28-
"iot:CreateTopicRule",
2923
"lambda:UpdateFunctionCode",
3024
"lambda:AddPermission",
3125
"cloudformation:CreateStack",
3226
"cloudformation:DeleteStack",
33-
"iot:DescribeCACertificate",
3427
"lambda:RemovePermission",
3528
"iam:GetRolePolicy"
3629
],

connect-the-board-to-your-aws-account/README.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ To connect the board to an AWS account, it must be *provisioned* using the [*IoT
6464
6565
Open the [IAM module](https://console.aws.amazon.com/iam/home#/home) in AWS and select **Policies** in the menu on the left-hand side. Click **Create policy** and select the **JSON** tab. Copy and paste the contents of [MCHPProvToolAccess.json](./MCHPProvToolAccess.json) into the editor and click **Review Policy**. Name it `MCHPProvToolAccess` before clicking **Create policy**.
6666

67+
> **Note**: The MCHPProvToolAccess.json file has been updated in newer revisions of this guide to reflect changes in the IoT Provisioning Tool. If you have already added the permissions at an earlier point, it is recommended to re-add them.
68+
6769
![How to create an IAM policy](./figures/iam-policy.png)
6870

6971
### Creating a New IAM User
@@ -126,10 +128,10 @@ Rebooting debugger
126128

127129
The tool creates and uploads a *Certificate Authority (CA)* to AWS IoT Core, to the region specified in [Registering the AWS Credentials](#registering-the-aws-credentials) section. When the board has managed to connect to AWS, it uploads its certificate, which is signed by the newly created CA. This is the [X.509](https://en.wikipedia.org/wiki/X.509) cryptography standard and is not required reading for this introductory guide. For now, understand that the CA *trusts* the device's certificate. Every device that has a CA trusted certificate can be authorized. For reference, all the certificates and their private keys can be found in the `.microchip-iot` folder in the user home directory.
128130

129-
|OS|Path|
130-
|---|---|
131-
|Windows|%userprofile%\\.microchip-iot|
132-
|Mac and Linux|~/.microchip-iot|
131+
| OS | Path |
132+
| ------------- | ----------------------------- |
133+
| Windows | %userprofile%\\.microchip-iot |
134+
| Mac and Linux | ~/.microchip-iot |
133135

134136
> *In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key.*
135137
>

0 commit comments

Comments
 (0)