Skip to content

Access Keys & Authentication

Deployport provides multiple authentication methods for accessing resources programmatically, ranging from long-term access keys to short-lived temporary credentials.

Access keys provide long-term credentials for programmatic access to Deployport APIs. They consist of an Access Key ID and Secret Access Key pair.

Generate access keys for specific users:

Terminal window
deployport iam users access-keys generate -u <username>

Example:

Terminal window
deployport iam users access-keys generate -u u1

This will output an Access Key ID and Secret Access Key that can be used for programmatic access.

Temporary keys are short-lived credentials that automatically expire, providing enhanced security for time-limited access. These are typically obtained through role assumption.

Terminal window
deployport iam roles assume <role-name>

Example:

Terminal window
deployport iam roles assume r1

You can specify a custom duration for the temporary credentials:

Terminal window
deployport iam roles assume <role-name> --duration <duration>

Example:

Terminal window
# Assume role for 15 minutes
deployport iam roles assume r1 --duration 15m
  • Access Keys: Use for long-running applications or users that need consistent access
  • Temporary Keys: Prefer for short-term access, CI/CD pipelines, and human users
  • Rotate Regularly: Set up a schedule to rotate access keys
  • Principle of Least Privilege: Grant only the minimum permissions needed
  • Monitor Usage: Keep logs of credential usage and access patterns
  • Never Store in Code: Use environment variables or secure credential stores