Amazon Managed Blockchain (AMB) Access Polygon is in preview release and is subject to change.
Setting up Amazon Managed Blockchain (AMB) Access Polygon
Before you use Amazon Managed Blockchain (AMB) Access Polygon for the first time, follow the steps in this section to create an AWS account. The following chapter discusses how to start using AMB Access Polygon.
Prerequisites for using AMB Access Polygon
Before you use AWS for the first time, you must have an AWS account.
Sign up for AWS
When you sign up for AWS, your AWS account is automatically signed up for all AWS services, including Amazon Managed Blockchain (AMB) Access Polygon. You're charged only for the services that you use.
If you have an AWS account already, go to the next step. If you don't have an AWS account, use the following procedure to create one.
To create an AWS account
Open https://portal.aws.amazon.com/billing/signup
. Follow the online instructions.
Part of the sign-up procedure involves receiving a phone call or text message and entering a verification code on the phone keypad.
When you sign up for an AWS account, an AWS account root user is created. The root user has access to all AWS services and resources in the account. As a security best practice, assign administrative access to a user, and use only the root user to perform tasks that require root user access.
Create an IAM user with appropriate permissions
To create and work with AMB Access Polygon, you must have an AWS Identity and Access Management (IAM) principal (user or group) with permissions that allow necessary Managed Blockchain actions.
When making calls to the Polygon JSON-RPCs on Amazon Managed Blockchain, you can do so over an HTTPS connection authenticated using the Signature Version 4 signing process. This means that only authorized IAM principals in the AWS account can make Polygon JSON-RPC calls. To do this, AWS credentials (an access key ID and a secret access key) must be provided with the call.
You can also use Accessor tokens to make JSON-RPC
calls to the Polygon network endpoints as a convenient alternative to the Signature Version 4 (SigV4) signing
process. You must provide a BILLING_TOKEN from one of the Accessor tokens you create and add as a parameter with your calls. However, you still need IAM access to get permissions to create Accessor
tokens using the AWS Management Console, AWS CLI, and SDK.
For information about how to create an IAM user, see Creating an IAM user in your AWS account. For more information about how to attach a permissions policy to a user, see Changing permissions for an IAM user. For an example of a permissions policy that you can use to give a user permission to work with AMB Access Polygon, see Identity-based policy examples for Amazon Managed Blockchain (AMB) Access Polygon.
Install and configure the AWS Command Line Interface
If you have not already done so, install the latest AWS Command Line Interface (AWS CLI) to work with AWS resources from a terminal. For more information, see Installing or updating the latest version of the AWS CLI.
Note
For CLI access, you need an access key ID and a secret access key. Use temporary credentials instead of long-term access keys when possible. Temporary credentials include an access key ID, a secret access key, and a security token that indicates when the credentials expire. For more information, see Using temporary credentials with AWS resources in the IAM User Guide.