Skip to content

Commit 7521d7a

Browse files
committed
Add README.md and tutorial walkthrough for script-only tutorials
1 parent a505406 commit 7521d7a

10 files changed

Lines changed: 269 additions & 0 deletions

File tree

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
# Iam Access Analyzer
2+
3+
An AWS CLI tutorial that demonstrates Accessanalyzer operations.
4+
5+
## Running
6+
7+
```bash
8+
bash iam-access-analyzer.sh
9+
```
10+
11+
To auto-run with cleanup:
12+
13+
```bash
14+
echo 'y' | bash iam-access-analyzer.sh
15+
```
16+
17+
## What it does
18+
19+
1. Creating analyzer: $ANALYZER
20+
2. Listing findings
21+
3. Getting analyzer details
22+
4. Listing analyzers
23+
24+
## Resources created
25+
26+
- Analyzer
27+
28+
The script prompts you to clean up resources when it finishes.
29+
30+
## Cost
31+
32+
Free tier eligible for most operations. Clean up resources after use to avoid charges.
33+
34+
## Related docs
35+
36+
- [AWS CLI accessanalyzer reference](https://docs.aws.amazon.com/cli/latest/reference/accessanalyzer/index.html)
37+
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Iam Access Analyzer
2+
3+
## Prerequisites
4+
5+
1. AWS CLI installed and configured (`aws configure`)
6+
2. Appropriate IAM permissions for the AWS services used
7+
8+
## Step 1: Creating analyzer: $ANALYZER
9+
10+
The script handles this step automatically. See `iam-access-analyzer.sh` for the exact CLI commands.
11+
12+
## Step 2: Listing findings
13+
14+
The script handles this step automatically. See `iam-access-analyzer.sh` for the exact CLI commands.
15+
16+
## Step 3: Getting analyzer details
17+
18+
The script handles this step automatically. See `iam-access-analyzer.sh` for the exact CLI commands.
19+
20+
## Step 4: Listing analyzers
21+
22+
The script handles this step automatically. See `iam-access-analyzer.sh` for the exact CLI commands.
23+
24+
## Cleanup
25+
26+
The script prompts you to clean up all created resources. If you need to clean up manually, check the script log for the resource names that were created.
27+

tuts/188-iam-mfa-devices/README.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Iam Mfa
2+
3+
A read-only script that queries Iam resources and displays information.
4+
5+
## Running
6+
7+
```bash
8+
bash iam-mfa.sh
9+
```
10+
11+
## What it does
12+
13+
1. Listing MFA devices
14+
2. Listing virtual MFA devices
15+
3. Getting account summary (MFA status)
16+
4. Getting credential report
17+
18+
## Resources created
19+
20+
None — this script is read-only.
21+
22+
## Cost
23+
24+
No cost. This script only reads existing resources.
25+
26+
## Related docs
27+
28+
- [AWS CLI iam reference](https://docs.aws.amazon.com/cli/latest/reference/iam/index.html)
29+
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# Iam Mfa
2+
3+
## Prerequisites
4+
5+
1. AWS CLI installed and configured (`aws configure`)
6+
2. Appropriate IAM permissions for the AWS services used
7+
8+
## Step 1: Listing MFA devices
9+
10+
The script handles this step automatically. See `iam-mfa.sh` for the exact CLI commands.
11+
12+
## Step 2: Listing virtual MFA devices
13+
14+
The script handles this step automatically. See `iam-mfa.sh` for the exact CLI commands.
15+
16+
## Step 3: Getting account summary (MFA status)
17+
18+
The script handles this step automatically. See `iam-mfa.sh` for the exact CLI commands.
19+
20+
## Step 4: Getting credential report
21+
22+
The script handles this step automatically. See `iam-mfa.sh` for the exact CLI commands.
23+
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
# Iam Password Policy
2+
3+
A read-only script that queries Iam resources and displays information.
4+
5+
## Running
6+
7+
```bash
8+
bash iam-password-policy.sh
9+
```
10+
11+
## What it does
12+
13+
1. Getting current password policy
14+
2. Getting account authorization details summary
15+
3. Listing access keys
16+
17+
## Resources created
18+
19+
None — this script is read-only.
20+
21+
## Cost
22+
23+
No cost. This script only reads existing resources.
24+
25+
## Related docs
26+
27+
- [AWS CLI iam reference](https://docs.aws.amazon.com/cli/latest/reference/iam/index.html)
28+
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
# Iam Password Policy
2+
3+
## Prerequisites
4+
5+
1. AWS CLI installed and configured (`aws configure`)
6+
2. Appropriate IAM permissions for the AWS services used
7+
8+
## Step 1: Getting current password policy
9+
10+
The script handles this step automatically. See `iam-password-policy.sh` for the exact CLI commands.
11+
12+
## Step 2: Getting account authorization details summary
13+
14+
The script handles this step automatically. See `iam-password-policy.sh` for the exact CLI commands.
15+
16+
## Step 3: Listing access keys
17+
18+
The script handles this step automatically. See `iam-password-policy.sh` for the exact CLI commands.
19+

tuts/199-iam-groups/README.md

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
# Iam Groups
2+
3+
An AWS CLI tutorial that demonstrates Iam operations.
4+
5+
## Running
6+
7+
```bash
8+
bash iam-groups.sh
9+
```
10+
11+
To auto-run with cleanup:
12+
13+
```bash
14+
echo 'y' | bash iam-groups.sh
15+
```
16+
17+
## What it does
18+
19+
1. Creating group: $G"; aws iam create-group --group-name "$G
20+
2. Attaching policy"; aws iam attach-group-policy --group-name "$G
21+
3. Describing group"; aws iam get-group --group-name "$G
22+
4. Listing attached policies"; aws iam list-attached-group-policies --group-name "$G
23+
24+
## Resources created
25+
26+
- Group
27+
28+
The script prompts you to clean up resources when it finishes.
29+
30+
## Cost
31+
32+
Free tier eligible for most operations. Clean up resources after use to avoid charges.
33+
34+
## Related docs
35+
36+
- [AWS CLI iam reference](https://docs.aws.amazon.com/cli/latest/reference/iam/index.html)
37+

tuts/199-iam-groups/iam-groups.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Iam Groups
2+
3+
## Prerequisites
4+
5+
1. AWS CLI installed and configured (`aws configure`)
6+
2. Appropriate IAM permissions for the AWS services used
7+
8+
## Step 1: Creating group: $G"; aws iam create-group --group-name "$G
9+
10+
The script handles this step automatically. See `iam-groups.sh` for the exact CLI commands.
11+
12+
## Step 2: Attaching policy"; aws iam attach-group-policy --group-name "$G
13+
14+
The script handles this step automatically. See `iam-groups.sh` for the exact CLI commands.
15+
16+
## Step 3: Describing group"; aws iam get-group --group-name "$G
17+
18+
The script handles this step automatically. See `iam-groups.sh` for the exact CLI commands.
19+
20+
## Step 4: Listing attached policies"; aws iam list-attached-group-policies --group-name "$G
21+
22+
The script handles this step automatically. See `iam-groups.sh` for the exact CLI commands.
23+
24+
## Cleanup
25+
26+
The script prompts you to clean up all created resources. If you need to clean up manually, check the script log for the resource names that were created.
27+
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Iam Service Linked Roles
2+
3+
A read-only script that queries Iam resources and displays information.
4+
5+
## Running
6+
7+
```bash
8+
bash iam-service-linked-roles.sh
9+
```
10+
11+
## What it does
12+
13+
1. Listing service-linked roles
14+
2. Counting roles by type"; echo " Service-linked: $(aws iam list-roles --query 'Roles[?starts_with(Path, `/aws-service-role/`)] | length(@)' --output text)
15+
16+
## Resources created
17+
18+
None — this script is read-only.
19+
20+
## Cost
21+
22+
No cost. This script only reads existing resources.
23+
24+
## Related docs
25+
26+
- [AWS CLI iam reference](https://docs.aws.amazon.com/cli/latest/reference/iam/index.html)
27+
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# Iam Service Linked Roles
2+
3+
## Prerequisites
4+
5+
1. AWS CLI installed and configured (`aws configure`)
6+
2. Appropriate IAM permissions for the AWS services used
7+
8+
## Step 1: Listing service-linked roles
9+
10+
The script handles this step automatically. See `iam-service-linked-roles.sh` for the exact CLI commands.
11+
12+
## Step 2: Counting roles by type"; echo " Service-linked: $(aws iam list-roles --query 'Roles[?starts_with(Path, `/aws-service-role/`)] | length(@)' --output text)
13+
14+
The script handles this step automatically. See `iam-service-linked-roles.sh` for the exact CLI commands.
15+

0 commit comments

Comments
 (0)