diff --git a/mountainduck/installation/index.md b/mountainduck/installation/index.md index b626ae2e..8348f115 100644 --- a/mountainduck/installation/index.md +++ b/mountainduck/installation/index.md @@ -147,7 +147,7 @@ You can distribute Mountain Duck with the help of Active Directory or a system m ### Defaults - Add preconfigured connection profiles and bookmarks this way by copying the connection profile file (`.cyberduckprofile`) into the *Profiles* folder or the bookmark file (`.duck`) into the *Bookmarks* folder within the [application support folder](../support.md#application-support-folder). -- Share default settings by using the [default.properties file](../preferences#hidden-configuration-options). +- Share default settings by using the [default.properties file](../preferences.md#hidden-configuration-options). ## Uninstall diff --git a/protocols/s3/_images/S3_Anonymous_Login.png b/protocols/s3/_images/S3_Anonymous_Login.png new file mode 100644 index 00000000..073bc01a Binary files /dev/null and b/protocols/s3/_images/S3_Anonymous_Login.png differ diff --git a/protocols/s3/index.md b/protocols/s3/index.md index a041a711..a175b1ad 100644 --- a/protocols/s3/index.md +++ b/protocols/s3/index.md @@ -216,7 +216,7 @@ You can also do this for a specific profile by adding `--profile myProfile` to t #### Connecting Using AssumeRole from AWS Security Token Service (STS) -Instead of providing Access Key ID and Secret Access Key, authenticate using temporary credentials from AWS Security Token Service (STS) with optional Multi-Factor Authentication (MFA). Refer to U[sing IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html). +Instead of providing Access Key ID and Secret Access Key, authenticate using temporary credentials from AWS Security Token Service (STS) with optional Multi-Factor Authentication (MFA). Refer to [Using IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html). ![MFA Token Prompt](_images/MFA_Token_Prompt.png) @@ -238,6 +238,17 @@ Refer to [Assuming a Role](https://docs.aws.amazon.com/cli/latest/userguide/cli- When editing a bookmark, the *Access Key ID* is set from the `default` profile in the credentials file located at `~/.aws/credentials` on macOS or `%USERPROFILE%\.aws\credentials` on Windows if such a profile exists. +### Connecting without using AWS credentials + +Use the *S3 (HTTPS)* connection profile to access public data sets on [AWS Open Data](https://registry.opendata.aws/) without using access keys by using the *Anonymous Login* option in the bookmark configuration. + +```{image} _images/S3_Anonymous_Login.png +:alt: S3 Anonymous Login +:width: 400px +``` + +- {download}`Download` the *S3 (HTTPS) profile* for preconfigured settings + ## Cyberduck CLI List all buckets with [Cyberduck CLI](https://duck.sh/) using