AWS Access Control
Datomic peers and transactors requiring access to services provided by AWS (DDB, S3, Cloudwatch) must be authorized to do so. Datomic supports using roles to grant access to specific AWS resources. Use of roles is based on AWS Identity and Access Management.
Use of IAM user access keys is deprecated except when used for initial configuration and deployment steps (e.g. ensure-transactor or create-cf-stack). You should not use user access keys to provide resource access to peer and transactor processes directly.
Using IAM roles
Using IAM roles is the preferred method of granting resource access to Datomic peers and transactors running in EC2. Using roles obviates the need for Datomic processes to store sensitive user credentials in memory, and the need of users to store these credentials in plain text in source code or config files.
EC2 instances can run as an IAM role specified at launch time. Each role can be given a set of policies granting access to specific AWS resources.
Deprecated: Using IAM user access keys
AWS credentials can still be provided as environment variables (AWS_ACCESS_KEY_ID, AWS_SECRET_KEY) or as Java properties (aws.accessKeyId, aws.secretKey). Transactor and peer processes, including backup and restore, will implicitly use credentials provided this way.
Datomic also continues to support passing AWS credentials in URIs as query parameters (e.g. in ddb database and S3 backup URIs), in transactor properties files, and in the S3 URIs passed as arguments to the bin/backup and bin/restore commands, though these methods are deprecated.
Migrating from user access keys to IAM roles
Please see Migrating to IAM Roles.