Skip to content

Commit

Permalink
Add note for Anonymous login
Browse files Browse the repository at this point in the history
  • Loading branch information
Cassie205 committed Feb 1, 2024
1 parent d88a7f7 commit b7c4cdd
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 2 deletions.
2 changes: 1 addition & 1 deletion mountainduck/installation/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ You can distribute Mountain Duck with the help of Active Directory or a system m

### Defaults
- Add preconfigured connection profiles and bookmarks this way by copying the connection profile file (`.cyberduckprofile`) into the *Profiles* folder or the bookmark file (`.duck`) into the *Bookmarks* folder within the [application support folder](../support.md#application-support-folder).
- Share default settings by using the [default.properties file](../preferences#hidden-configuration-options).
- Share default settings by using the [default.properties file](../preferences.md#hidden-configuration-options).

## Uninstall

Expand Down
Binary file added protocols/s3/_images/S3_Anonymous_Login.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
13 changes: 12 additions & 1 deletion protocols/s3/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -216,7 +216,7 @@ You can also do this for a specific profile by adding `--profile myProfile` to t

#### Connecting Using AssumeRole from AWS Security Token Service (STS)

Instead of providing Access Key ID and Secret Access Key, authenticate using temporary credentials from AWS Security Token Service (STS) with optional Multi-Factor Authentication (MFA). Refer to U[sing IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html).
Instead of providing Access Key ID and Secret Access Key, authenticate using temporary credentials from AWS Security Token Service (STS) with optional Multi-Factor Authentication (MFA). Refer to [Using IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html).

![MFA Token Prompt](_images/MFA_Token_Prompt.png)

Expand All @@ -238,6 +238,17 @@ Refer to [Assuming a Role](https://docs.aws.amazon.com/cli/latest/userguide/cli-

When editing a bookmark, the *Access Key ID* is set from the `default` profile in the credentials file located at `~/.aws/credentials` on macOS or `%USERPROFILE%\.aws\credentials` on Windows if such a profile exists.

### Connecting without using AWS credentials

Use the *S3 (HTTPS)* connection profile to access public data sets on [AWS Open Data](https://registry.opendata.aws/) without using access keys by using the *Anonymous Login* option in the bookmark configuration.

```{image} _images/S3_Anonymous_Login.png
:alt: S3 Anonymous Login
:width: 400px
```

- {download}`Download<https://profiles.cyberduck.io/S3%20(HTTPS).cyberduckprofile>` the *S3 (HTTPS) profile* for preconfigured settings

## Cyberduck CLI

List all buckets with [Cyberduck CLI](https://duck.sh/) using
Expand Down

0 comments on commit b7c4cdd

Please sign in to comment.