AWS Setup Guide
Complete step-by-step instructions to configure AWS credentials and SSO authentication for DinoDB. Follow these guides to get connected to your AWS DynamoDB tables.
đ Table of Contents
đ Setup AWS Security Credentials
AWS security credentials allow DinoDB to authenticate with your AWS account using Access Keys. This method is suitable for personal accounts and development environments.
Sign in to AWS Console
Navigate to the AWS Management Console and sign in with your AWS account credentials.
Navigate to IAM Service
In the AWS Console, search for "IAM" in the services search bar and select IAM (Identity and Access Management).
Create or Select a User
You have two options:
- Use existing user: Click on "Users" in the left sidebar and select an existing user
- Create new user: Click "Users" â "Create user" and follow the wizard
Attach DynamoDB Permissions
Ensure your user has the necessary DynamoDB permissions. You can:
- Use AWS managed policy: Attach "AmazonDynamoDBFullAccess" for full access
- Use AWS managed policy: Attach "AmazonDynamoDBReadOnlyAccess" for read-only access
- Create custom policy: Define specific permissions for your needs
- dynamodb:DescribeTable
- dynamodb:ListTables
- dynamodb:Query
- dynamodb:Scan
- dynamodb:GetItem (optional - for item operations)
- dynamodb:PutItem (optional - for adding items)
Create Access Key
Navigate to the user's "Security credentials" tab and create an access key:
- Click "Create access key"
- Select "Application running outside AWS" as the use case
- Add a description tag (optional): "DinoDB macOS App"
- Click "Create access key"
Add Account to DinoDB
In DinoDB:
- Click the "+" button or use File â New Account
- Enter your AWS Access Key ID
- Enter your AWS Secret Access Key
- Select your preferred AWS Region
- Give your account a descriptive name
- Click "Add Account"
đĸ Setup AWS SSO (Identity Center)
AWS SSO (now called AWS Identity Center) provides secure, centralized access management for multiple AWS accounts. This is the recommended approach for organizations and users with multiple AWS accounts.
Enable AWS Identity Center
Sign in to your AWS Management Console and navigate to AWS Identity Center:
- Search for "IAM Identity Center" in the services search
- Select your preferred region (us-east-1 recommended)
- Click "Enable" if Identity Center isn't already enabled
- Choose your identity source (AWS Identity Center directory or external provider)
Configure Users and Groups
Set up users and groups in Identity Center:
- Navigate to "Users" in the left sidebar
- Add users manually or sync from your external identity provider
- Create groups to organize users (optional but recommended)
- Assign users to appropriate groups
Set Up Permission Sets
Create permission sets that define what users can access:
- Go to "Permission sets" in the left sidebar
- Click "Create permission set"
- Choose predefined or custom permission set
- For DynamoDB access, include policies like:
âĸ AmazonDynamoDBFullAccess (full access)
âĸ AmazonDynamoDBReadOnlyAccess (read-only)
âĸ Custom policy with specific DynamoDB permissions
Assign Users to AWS Accounts
Connect users to AWS accounts with their permission sets:
- Navigate to "AWS accounts" in the left sidebar
- Select the AWS account you want to provide access to
- Click "Assign users or groups"
- Select users/groups and assign the appropriate permission set
- Repeat for additional AWS accounts as needed
Note Your SSO Configuration
You'll need these details for DinoDB configuration:
- Start URL: Found in Identity Center settings (e.g., https://d-1234567890.awsapps.com/start)
- SSO Region: The region where Identity Center is configured
- Account ID(s): The AWS account numbers you have access to
- Role Names: The permission set names that will become role names
Example Configuration:
âĸ Start URL: https://d-1234567890.awsapps.com/start
âĸ SSO Region: us-east-1
âĸ Account ID: 123456789012
âĸ Role: DynamoDBFullAccess
Add SSO Account to DinoDB
In DinoDB Professional:
- Click the "+" button or use File â New Account
- Select "AWS Identity Center (SSO)" as the authentication type
- Enter your Start URL
- Select your SSO Region
- Give your configuration a descriptive name
- Click "Add Account"
- Follow the browser authentication flow
- Select the account and role you want to use
đ§ Troubleshooting
Common Issues & Solutions
Access Denied Errors
- Verify your IAM user has the correct DynamoDB permissions
- Check that your access keys are valid and not expired
- Ensure you're connecting to the correct AWS region
SSO Authentication Fails
- Verify your Start URL is correct and accessible
- Check that you have been assigned to the AWS account
- Ensure your SSO session hasn't expired
- Try clearing browser cookies for the SSO domain
No Tables Visible
- Confirm you're connected to the correct AWS region
- Verify your permissions include "dynamodb:ListTables"
- Check that DynamoDB tables exist in the selected region
Connection Timeout
- Check your internet connection
- Verify AWS service status for your region
- Try a different AWS region