- 
                Notifications
    
You must be signed in to change notification settings  - Fork 12
 
Amazon AWS Setup for Microchip IOT Example
        ChrisBerg-Microchip edited this page Feb 2, 2017 
        ·
        2 revisions
      
    In order to work with the AWS IoT Zero Touch GUI and Development tools, we need to first setup our own AWS account.
- 
Go to IAM (Identify and Access Management) and follow the recommended steps
- Activate MFA (Multi-factor Authentication) for your root account
 - Create a new IAM user for running the IoT example
- Create password that must be changed on next login
 
 - Create a new iot_example group
- Attach the AWSIoTFullAccess policy
 - Attach the AWSLambdaFullAccess policy
 
 - Add the new IoT user to the iot_example group
 
 - 
Create a policy for the IoT registration lambda function
- Goto IAM -> Policies -> Create Policy -> Create Your Own Policy
- Policy Name: AWSLambdaIotRegistration
 - Description: Policy for the lambda function role responsible to registering IoT devices.
 
 
 - Goto IAM -> Policies -> Create Policy -> Create Your Own Policy
 
    Policy:
    {  
        "Version":"2012-10-17",  
        "Statement":[  
           {   
               "Effect":"Allow",  
               "Action":[    
                   "logs:CreateLogGroup",  
                   "logs:CreateLogStream",  
                   "logs:PutLogEvents"  
               ],  
               "Resource":"arn:aws:logs:*:*:*"  
           },  
           {    
               "Effect":"Allow",  
               "Action":[    
                   "iot:UpdateCertificate",  
                   "iot:CreatePolicy",  
                   "iot:AttachPrincipalPolicy"  
               ],  
               "Resource":"*"  
           }  
       ]  
    }
- 
Create a role for the IoT registration lambda function
- Goto IAM -> Roles -> Create New Role
 - Role Name: lambda_iot_registration
 - Select AWS Lambda Service Role
 - Attach policy created in previous step (AWSLambdaIotRegistration)
 
 - 
Log out of the AWS root account