☁️Use AWS S3
Last updated
Last updated
Log in to the AWS Console
In the AWS Console search "S3" and select the S3 service
On the right side click Create Bucket
Enter a Bucket Name and select an AWS region
Leave Object Ownership as (ACLs disabled)
Depending on your use case you may want the NFT metadata to be private but, for most use cases you will want the data to be publicly available.
If you want the metadata and assets to be publicly available uncheck "Block all public access" and check the acknowledgement confirming you are aware that objects will be public as such:
For most use cases you can leave bucket versioning disabled
Add a Tag to easily identify a bucket when organizing them or tracking costs:
For most use cases, you can disable Bucket encryption as such:
Open the newly created bucket by clicking on the bucket name
Open the "Permissions" tab
Find the "Bucket policy" section and select Edit
The next step will configure all objects in the created bucket to be publicly accessible with read permissions.
Be sure you want this for your particular use case
Enter the following bucket policy (Replace "BUCKET-NAME" with your bucket name)
The bucket contents are now publicly available.
Next, we will create a new IAM User with the appropriate permissions to access the bucket programmatically
In the AWS Console, Search "IAM" and select the "IAM" service
On the left side, Select Users
Enter a username and click Next
Select Add user to group and create a group
Provide a group name for the project and press Create user group.
Now check the newly created user group and press next.
Review the user details and confirm the user was added to the group and click create user.
On the left side navigate to User groups
Select the newly created user group and navigate to the "Permissions" tab
From the dropdown on the right labeled Add permissions, Select Create inline policy
Select the tab labeled JSON and add the following policy to the group:
REPLACE "YOUR-BUCKET-NAME" with the name of your s3 bucket
Select Review Policy
Enter a name for this policy and review that the policy has list, read and write access to S3.
Click Create policy
Now Navigate back to 'Users' and select the user you created.
Click on the tab labeled "Security Credentials"
Scroll down to Access keys and select "Create access key"
Select "Application running outside AWS and press next
Provide a description tag to easily identify this key later and click create Access Key
Make a copy of your access key and secret to integrate into X-Tokenize
Be sure to store your access key and secret in a safe place or you can risk the integrity of your AWS account and your metadata.
FINISHED!
Review the settings and click "Create bucket":
On the bottom right select "Save Changes"
Now in the top right, select "Add users"