Version - 7
Author: Bill Dry
a) Identity the target AWS account where you would like to deploy Tag Tamer
b) 3. If you are not using an Amazon EC2 AMI that includes the AWS SSM client, identify the EC2 Key Pair you will use to access the Tag Tamer Web App EC2 instance ("Web App")
c) Identify the IAM role within your target AWS account is prerequisite a) that AWS CloudFormation will use to deploy DynamoDB, EC2 & IAM resources into the target account to operate the Web App.
d) Identify the X.509 certificate to use for ALB if loadbalancer needs to be deployed in public subnet. If you plan to install a self-signed certificate, instructions are provided below.
Step 1 - Download the AWS CloudFormation template at the following link. It specifies the Tag Tamer solution infrastructure.
https://github.com/billdry/tag-tamer/blob/master/deployment/tagtamer_private.yaml
Step 2 Authorize Amazon Cognito to send SES Email on your behalf. This allows Cognito to send new account verification emails sourced from your SES-verified email address to new Tag Tamer users. The procedure is at this link:
Note: Within the SES section of the AWS console, double click on your validated email address to see the ARN of your SES-verified email address. Enter the ARN into the example permission policy shown at the link, above. Create an SES Identity Policy using this updated permission policy.
Step 3 - Deploy the CloudFormation Template downloaded in step 1 into your AWS account. You will need an EC2 Key Pair, am AMI ID such as amzn2-ami-hvm-x86_64-gp2, a VPC ID, Private Subnet, a source IP range for incoming management connections and an AWS SES-verified email address.
Step 4 - Verify the correct operation of the Tag Tamer Web App by browsing to https://<EC2Instance.PrivateDnsName>/sign-in The CloudFormation outputs list the exact sign-in URL you must use.
Step 1 - Download the AWS CloudFormation template at the following link. It specifies the Tag Tamer solution infrastructure.
https://github.com/billdry/tag-tamer/blob/master/deployment/tagtamer_public.yaml
Step 2 Authorize Amazon Cognito to send SES Email on your behalf. This allows Cognito to send new account verification emails sourced from your SES-verified email address to new Tag Tamer users. The procedure is at this link:
Note: Within the SES section of the AWS console, double click on your validated email address to see the ARN of your SES-verified email address. Enter the ARN into the example permission policy shown at the link, above. Create an SES Identity Policy using this updated permission policy.
Step 3 - Deploy the CloudFormation Template downloaded in step 1 into your AWS account. You will need an EC2 Key Pair, am AMI ID such as amzn2-ami-hvm-x86_64-gp2, an X.509 certificate, a source IP range for incoming management connections and an AWS SES validated email address.
Step 4 - Verify the correct operation of the Tag Tamer Web App by browsing to https://<EC2Instance.PublicDnsName>/sign-in The CloudFormation outputs list the exact sign-in URL you must use.
openssl genrsa 2048 > my-aws-private.key
openssl req -new -x509 -nodes -sha1 -days 398 -extensions v3_ca -key my-aws-private.key > my-aws-public.crt
openssl pkcs12 -inkey my-aws-private.key -in my-aws-public.crt -export -out my-aws-public.p12
aws acm import-certificate --certificate fileb://my-aws-public.crt --private-key fileb://my-aws-private.key