- Access keys consist of an access key ID (like AKIAIOSFODNN7EXAMPLE) and a
secret access key (like wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY). You use access keys to sign
programmatic requests that you make to AWS whether you're using the AWS SDK,
REST, or Query APIs. The AWS SDKs use your access keys (which you store as
part of the application) to sign requests for you so that you don't have to
handle the signing process. If you're unable to use the AWS SDK, you can
sign requests manually.
Access keys are also used with command line interfaces (CLIs). When you use a CLI, the commands that you issue are signed by your access keys, which you can either pass with the command or store as configuration settings on your computer.
You can also create and use temporary access keys, known as temporary security credentials. In addition to the access key ID and secret access key, temporary security credentials include a security token that you must submit to AWS when you use temporary security credentials. The advantage of temporary security credentials is that they have a limited life (after they expire, they're no longer valid), so you can use them in less secure environments or distribute them to grant users temporary access to resources in your AWS account. For example, you can use temporary security credentials to grant entities from other AWS accounts access to resources in your AWS account (cross-account access) or grant users who don't have AWS security credentials access to resources in your AWS account (federation).
Logged operations are replicated. These include, but are not limited to: DDL DML Create/alter table space Create/alter storage group Create/alter buffer pool XML data. Logged LOBs Not logged operations are not replicated. These include, but are not limited to: Database configuration parameters (this allows primary and standby databases to be configured differently). "Not logged initially" tables Not logged LOBs UDF (User Defined Function) libraries. UDF DDL is replicated. But the libraries used by UDF (such as C or Java libraries) are not replicated, because they are not stored in the database. Users must manually copy the libraries to the standby. Note: You can use database configuration parameter BLOCKNONLOGGED to block not logged operations on the primary.
Comments