Figure 4

« 
Previous
|
|
Next image
 »

Figure 4: Creating the access key and secret key for your IAM user.