08.04.2020 Aufrufe

sqs-dg-2009-02-01

Erfolgreiche ePaper selbst erstellen

Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.

Amazon Simple Queue Service Developer Guide

Table of Contents

Welcome ............................................................................................................................................................. 1

Introduction to Amazon SQS .............................................................................................................................. 2

Making API Requests ....................................................................................................................................... 12

Endpoints .............................................................................................................................................. 13

Making Query Requests ....................................................................................................................... 14

Request Authentication ......................................................................................................................... 17

What Is Authentication? .............................................................................................................. 17

Your AWS Account ...................................................................................................................... 18

Your AWS Identifiers .................................................................................................................... 18

Viewing Your AWS Identifiers ...................................................................................................... 19

HMAC-SHA Signatures ............................................................................................................... 19

Required Authentication Information .................................................................................. 20

Basic Authentication Process ............................................................................................ 20

About the String to Sign ..................................................................................................... 22

About the Time Stamp ....................................................................................................... 22

Java Sample Code for Base64 Encoding .......................................................................... 22

Java Sample Code for Calculating HMAC-SHA1 Signatures ............................................. 22

Query Request Authentication .................................................................................................... 23

Responses ............................................................................................................................................ 27

Shared Queues ..................................................................................................................................... 29

Programming Languages ..................................................................................................................... 31

Using The Access Policy Language ................................................................................................................. 32

Overview ............................................................................................................................................... 33

When to Use Access Control ...................................................................................................... 33

Key Concepts .............................................................................................................................. 33

Architectural Overview ................................................................................................................ 36

Using the Access Policy Language ............................................................................................. 38

Evaluation Logic .......................................................................................................................... 39

Basic Use Cases for Access Control ........................................................................................... 42

How to Write a Policy ............................................................................................................................ 46

Basic Policy Structure ................................................................................................................. 46

Element Descriptions .................................................................................................................. 47

Supported Data Types ................................................................................................................. 55

Amazon SQS Policy Examples ............................................................................................................. 57

Special Information for SQS Policies .................................................................................................... 61

Controlling User Access to Your AWS Account ................................................................................................ 62

Amazon SQS Resources ................................................................................................................................. 72

Document History ............................................................................................................................................. 75

Glossary ........................................................................................................................................................... 73

Index ................................................................................................................................................................. 78

Hurra! Ihre Datei wurde hochgeladen und ist bereit für die Veröffentlichung.

Erfolgreich gespeichert!

Leider ist etwas schief gelaufen!