Integration Track 1
IAM user name
and Password
from .cvs
file we gave you.
- Minimum password length is 14 characters
- Require at least one uppercase letter from Latin alphabet (A-Z)
- Require at least one lowercase letter from Latin alphabet (a-Z)
- Require at least one number
- Require at least one non-alphanumeric character (!@#$%^&*()_+-=[]{}|')
- Password expires in 90 day(s)
- Allow users to change their own password
- Remember last 24 password(s) and prevent reuse
Sign in
Team | Group | Permissions | Remark |
---|---|---|---|
Big Hero 6 King Codras |
Frontend | S3FullAccess AmazonAPIGatewayInvokeFullAccess AmazonAPIGatewayPushToCloudWatchLogs AWSWAFReadOnlyAccess CloudFrontFullAccess AmazonAPIGatewayAdministrator AmazonRDSDataFullAccess AmazonRDSReadOnlyAccess AWSLambdaReadOnlyAccess AWSWAFConsoleReadOnlyAccess |
None |
Segfault Line Team Kakashi |
Lambda | AmazonRDSFullAccess AWSLambdaFullAccess AmazonRDSDataFullAccess AWSWAFConsoleReadOnlyAccess RoleCreateWithBounds CreatePolicy |
For information regarding the creation of roles to use with services, please refer to Role Creation |
5 Guys | Cloud | AdministratorAccess | None |
Role | Permissions |
---|---|
T1LambdaFullAcess | AWSLambdaFullAccess AmazonAPIGatewayInvokeFullAccess AmazonRDSDataFullAccess CognitoPolicies sesPerms |
Remark: To simplify the process of development, we combine all Lambda related permission policies into one giant Role. It works well so far, but may lead to security concerns.
For the Lambda teams only: Any policy can be written and attached to roles you create. However, you may only create roles that also have the T1LambdaPermissions policy set as their PermissionBoundary. This ensures that any role you create cannot have more permissions than your account has REGARDLESS OF THE POLICY ATTACHED. To do this, ensure that you create the roles needed before the creation of lambdas, and ensure that at the bottom of the creation menu you set the RoleBoundary to T1LambdaPermissions. If you do not do this, you WILL NOT BE ABLE TO CREATE THE ROLE.
Hosting the static website
Storing CloudFront Logs
Storing resumes and other files
Storing pictures and images
The Host bucket hosts the website. Currently it's open to public to access the website. But since the CloudFront is set up, it could be restrict to only accessed via CloudFront to reach further security.
Setting up CloudFront is really easy and straightforward. Be careful DO NOT use the originally S3 Bucket URL in the default pull down list for Origin Domain Name
. Please use the website endpoint URL in the "Static Website Hosting" section of the properties in S3 Bucket Console.
We do not use Route 53 to register the domain, so don't worry about it.
Updated 5/4 10am
Click here for Full Version
The Back-end teams and Front-end teams are granted with all permission to set up Lambda Functions and API Gateway. And the documentation of integration tests is in Low Level Design Document.
Amazon Cognito is a service that lets you add sign in, sign up and other permission restrictions to a website or mobile app. it was integrated with the website easily and handled complicated steps in the sign-in and sign-up process such as email verification and user authentication. Cognito is easily scalable to more than millions of user and its free tier handles 50,000 monthly active users, which should be enough for ReachOut, but if this number isn't enough, the cost for each monthly active user after 50,000 is only $0.00550.