29.07.2020 Views

sqs-dg-2009-02-01

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Amazon Simple Queue Service Developer Guide

HMAC-SHA Signatures

Process for Authentication: Tasks You Perform

You construct a request to AWS.

You calculate a keyed-hash message authentication code (HMAC-SHA) signature using

your Secret Access Key (for information about HMAC, go to

http://www.faqs.org/rfcs/rfc2104.html)

You include the signature and your Access Key ID in the request, and then send the request

to AWS.

AWS performs the next three tasks.

Process for Authentication: Tasks AWS Performs

AWS uses the Access Key ID to look up your Secret Access Key.

AWS generates a signature from the request data and the Secret Access Key using the

same algorithm you used to calculate the signature you sent in the request.

If the signature generated by AWS matches the one you sent in the request, the request is

considered authentic. If the comparison fails, the request is discarded, and AWS returns an

error response.

API Version 2009-02-01

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!