Access Key Id and Secret Access Key. How to retrieve your Access Keys and use them to access Amazon S3.
S3 Browser
Free Windows Client for Amazon S3 and Amazon CloudFront

AWS Access Keys

Access Keys are used to sign the requests you send to Amazon S3. Like the Username/Password pair you use to access your AWS Management Console, Access Key Id and Secret Access Key are used for programmatic (API) access to AWS services.

You can manage your Access Keys in AWS Management Console.

In this article we will describe two types of Access Keys

Root Access Keys

Root Access Keys provide unlimited access to your AWS resources. It's not recommended to use them in normal situations. AWS recommends to delete existing Root Access Keys and create IAM user and Access Keys limited to specific service or resource (see below).

To Delete Root Access Keys

1. Type in your web browser

2. Click My Account, Security Credentials

to aws console

Sign in to AWS Management Console

3. Enter your account email address and password:

enter account email

Enter Account Email

enter account password

Enter Account Password

You will be redirected to the Your Security Credentials page of the IAM service.

4. Expand the Access Keys (access key id and secret access key) section.

5. Click the Delete link next to your access keys.

delete root access keys

Your Security Credentials page

Delete Confirmation dialog will open:

confirm deletion

Confirm Access Keys Deletion

6. Click the Deactivate button to disable your Access Keys.

confirm deletion

Confirm Access Keys Deletion

7. Type your Access Key ID into the corresponding text-box and click Delete.

8. Your Root Access Keys are deleted. Now you can create IAM user and Access Keys limited to specific service or resource (see below).

root keys deleted

Root Access Keys Deleted

Be sure to replace your root access keys with your IAM access keys in any programs/scripts you are currently using.

IAM Access Keys

To create IAM user and Access Keys:

1. Open IAM Dashboard as described above and navigate to Users

2. Click Add User

iam console users section

Iam Console Users Section

Add User Wizard will open:

set user name and access type

Set User Name And Access Type

3. Specify User Name (any user name of your choice).

4. Check Programmatic Access

5. Click Next: Permissions

Permissions page will open:

set permissions attach policy

Set Permissions Attach Policy

6. Click Attach Existing policies directly

7. Type s3 in the Filter field.

8. Check AmazonS3FullAccess policy

9. Click Next: Review

Review tab will open:

create user review

Create User Review

10. Review new user details and click Create User

The final page will open:

new user created

New User Created

11. Click Show under the Secret access key column

copy access key id and secret access key

Copy Access Key Id And Secret Access Key

12. Copy Access key ID and Secret access key into the safe place.

You can now use your access keys to add new Amazon S3 account to S3 Browser.

S3 Browser 11.7.5 Freeware
Powered by Amazon Web Services and Rated by CNET Editors!
Social Connection
S3 Client Logo
Like Us!
People like S3 Browser!
People like us
Our customers say

"S3 Browser is an invaluable tool to me as a web developer to easily manage my automated site backups" -Bob Kraft, Web Developer

"Just want to show my appreciation for a wonderful product. I use S3 Browser a lot, it is a great tool." -Gideon Kuijten, Pro User

"Thank You Thank You Thank You for this tool. A must have for anyone using S3!" -Brian Cummiskey, USA

Related Products
Windows Client for Amazon Glacier - new low-cost storage for data archiving and backup.
protects your Windows Server from RDP Brute-force Attacks.
"Amazon Web Services", "AWS", "Amazon S3", "Amazon Simple Storage Service", "Amazon CloudFront", "CloudFront", the "Powered by Amazon Web Services" logo are trademarks of, Inc. or its affiliates in the US and/or other countries.
Copyright © 2008-2024 Netsdk Software FZE. All rights reserved.  Terms of Use.  Privacy Policy.  S3 Drive.  RDP brute-force protection.