DriveMond

View Categories

AWS Access Key & Secret Key Setup

For Driver Face Verification (Amazon Rekognition)

This guide explains how to generate AWS Access Key ID and Secret Access Key required for driver face verification using Amazon Rekognition.

Step 1.1: Create a New IAM User #

Create a New IAM User
  • Log in to the AWS Management Console
  • Go to IAM → Users
  • Click Create user

Step 1.2: Create a New IAM User #

Create a New IAM User Step - 2
  • Enter a user name
    • Example: test-rekognition-api
  • Do NOT enable “Provide user access to the AWS Management Console” as this user will be used only for API access, not for AWS dashboard login.
  • Click Next

Step 2: Assign Amazon Recognition Permission #

Assign Amazon Recognition Permission
  • Select Attach policies directly
  • Search for rekognition
  • Select AmazonRekognitionFullAccess (this permission allows Detect faces, Compare faces, Perform identity verification)
  • Click Next

Step 3: Review and Create User #

Review and Create User
  • Verify:
    • User name
    • Attached policy: AmazonRekognitionFullAccess
  • Click Create user. IAM user is now created successfully.
Successful Creation of IAM User

Step 4: Open User and Create Access Key #

Open User and Create Access Key
  • Click the created user (test-rekognition-api)
  • Open the Security credentials tab
  • Scroll to Access keys
  • Click Create access key

Step 5: Select Access Key Use Case #

Select Access Key Use Case
  • Select Application running outside AWS (assuming the application is not hosted inside AWS)
  • Click Next

Note

Choose the use case that suits your application best.

Step 6: (Optional) Add Description Tag #

Add Description Tag
  • Add a description (optional but recommended)
    • Example: Driver face verification for production app
  • Click Create access key

Step 7: Copy Access Key & Secret Key #

Copy Access Key & Secret Key

You will see:

  • Access Key ID
  • Secret Access Key

⚠️ VERY IMPORTANT

  • This is the only time the secret key is visible
  • Download the CSV file or copy both keys immediately
  • AWS will NOT show the secret key again

Step 8: Use Credentials in Your Application #

Use Credentials in Your Application

If Keys Are Lost or Exposed #

  • Deactivate the compromised key
  • Create a new access key
  • Update credentials in the application