{"id":19154,"date":"2015-04-23T13:13:38","date_gmt":"2015-04-23T07:43:38","guid":{"rendered":"http:\/\/www.tothenew.com\/blog\/?p=19154"},"modified":"2015-04-24T10:28:40","modified_gmt":"2015-04-24T04:58:40","slug":"iam-users-access-key-last-used-information","status":"publish","type":"post","link":"https:\/\/www.tothenew.com\/blog\/iam-users-access-key-last-used-information\/","title":{"rendered":"IAM user\u2019s access key last used information"},"content":{"rendered":"<p><span style=\"color: #000000\">Yesterday AWS rolled out the new feature to <strong>enhance security<\/strong> <strong>for IAM user Access and Secret Key<\/strong>.Going forward now,\u00a0IAM reports the time stamp when access keys were last used along with the region and the AWS service that was accessed.All these details can be seen\u00a0from the IAM console, programmatically via the API\/CLI\/SDK, or in the contents of an IAM credential report.<\/span><\/p>\n<p><strong><span style=\"color: #000000\">View IAM details from AWS console<\/span><\/strong><\/p>\n<p><span style=\"color: #000000\">Go the IAM console, then select the user from the navigation panel. When you select the user ,access key last used details can see seen on the bottom most panel(As shown in the screenshot).<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"\/blog\/wp-ttn-blog\/uploads\/2015\/04\/prahasnt.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-19163\" src=\"\/blog\/wp-ttn-blog\/uploads\/2015\/04\/prahasnt.png\" alt=\"prahasnt\" width=\"985\" height=\"355\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #000000\">Moreover now you can download entire AWS\u00a0account credential reports from the IAM console by clicking\u00a0<strong>Credential Report tab \u00a0<\/strong>in the navigation panel and clicking the <strong>Download Report<\/strong>.<\/span><\/p>\n<p><a href=\"\/blog\/wp-ttn-blog\/uploads\/2015\/04\/cred_report.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-19165\" src=\"\/blog\/wp-ttn-blog\/uploads\/2015\/04\/cred_report.png\" alt=\"cred_report\" width=\"1283\" height=\"440\" \/><\/a><\/p>\n<address>Thanks<\/address>\n<address>Prashant Sharma<\/address>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday AWS rolled out the new feature to enhance security for IAM user Access and Secret Key.Going forward now,\u00a0IAM reports the time stamp when access keys were last used along with the region and the AWS service that was accessed.All these details can be seen\u00a0from the IAM console, programmatically via the API\/CLI\/SDK, or in the [&hellip;]<\/p>\n","protected":false},"author":120,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":3},"categories":[1174],"tags":[248,1167],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/19154"}],"collection":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/comments?post=19154"}],"version-history":[{"count":0,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/19154\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/media?parent=19154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/categories?post=19154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/tags?post=19154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}