sqs-dg-2009-02-01
Erfolgreiche ePaper selbst erstellen
Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.
Amazon Simple Queue Service Developer Guide
Table of Contents
Welcome ............................................................................................................................................................. 1
Introduction to Amazon SQS .............................................................................................................................. 2
Making API Requests ....................................................................................................................................... 12
Endpoints .............................................................................................................................................. 13
Making Query Requests ....................................................................................................................... 14
Request Authentication ......................................................................................................................... 17
What Is Authentication? .............................................................................................................. 17
Your AWS Account ...................................................................................................................... 18
Your AWS Identifiers .................................................................................................................... 18
Viewing Your AWS Identifiers ...................................................................................................... 19
HMAC-SHA Signatures ............................................................................................................... 19
Required Authentication Information .................................................................................. 20
Basic Authentication Process ............................................................................................ 20
About the String to Sign ..................................................................................................... 22
About the Time Stamp ....................................................................................................... 22
Java Sample Code for Base64 Encoding .......................................................................... 22
Java Sample Code for Calculating HMAC-SHA1 Signatures ............................................. 22
Query Request Authentication .................................................................................................... 23
Responses ............................................................................................................................................ 27
Shared Queues ..................................................................................................................................... 29
Programming Languages ..................................................................................................................... 31
Using The Access Policy Language ................................................................................................................. 32
Overview ............................................................................................................................................... 33
When to Use Access Control ...................................................................................................... 33
Key Concepts .............................................................................................................................. 33
Architectural Overview ................................................................................................................ 36
Using the Access Policy Language ............................................................................................. 38
Evaluation Logic .......................................................................................................................... 39
Basic Use Cases for Access Control ........................................................................................... 42
How to Write a Policy ............................................................................................................................ 46
Basic Policy Structure ................................................................................................................. 46
Element Descriptions .................................................................................................................. 47
Supported Data Types ................................................................................................................. 55
Amazon SQS Policy Examples ............................................................................................................. 57
Special Information for SQS Policies .................................................................................................... 61
Controlling User Access to Your AWS Account ................................................................................................ 62
Amazon SQS Resources ................................................................................................................................. 72
Document History ............................................................................................................................................. 75
Glossary ........................................................................................................................................................... 73
Index ................................................................................................................................................................. 78