sqs-dg-2009-02-01
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Amazon Simple Queue Service Developer Guide
HMAC-SHA Signatures
Process for Authentication: Tasks You Perform
You construct a request to AWS.
You calculate a keyed-hash message authentication code (HMAC-SHA) signature using
your Secret Access Key (for information about HMAC, go to
http://www.faqs.org/rfcs/rfc2104.html)
You include the signature and your Access Key ID in the request, and then send the request
to AWS.
AWS performs the next three tasks.
Process for Authentication: Tasks AWS Performs
AWS uses the Access Key ID to look up your Secret Access Key.
AWS generates a signature from the request data and the Secret Access Key using the
same algorithm you used to calculate the signature you sent in the request.
If the signature generated by AWS matches the one you sent in the request, the request is
considered authentic. If the comparison fails, the request is discarded, and AWS returns an
error response.
API Version 2009-02-01
21