The Complete Guide to Setting Up Your First AWS Account [2025]
When you create your first AWS account, it can be quite daunting figuring out how to do it right so your project gets off to the best start it can. There’s a lot of moving parts involved and this tutorial brings them all together into a single comprehensive guide.
Prerequisites#
- A computer with an internet connection
- A valid credit or debit card. You won’t be spending anything today, but you can’t create an AWS account with a valid payment method.
Walkthrough#
Part 1 - Creating the AWS account. We won’t be doing much without this
- Follow this link to the AWS signup page.
- Fill in the
Root user email addressandAWS account name. - Click
Verify email address. This will cause an email to be sent to theRoot user email addresscontaining a six digit verification code. Type or paste that code into theVerification codebox that should now be on your screen. - Now choose a secure password for your root user.
- On the next page:
- Choose
Personal - for your own projects - Fill in your name, phone number and address
- Check the box saying you accept the terms of the AWS Customer Agreement
- Click
Continue.
- Choose
- On the next page enter your payment card details. You’ll only be charged a $1
verification amount, which will then be refunded. After that, you’ll only be
charged for whatever computer or storage resources you use. Click
Verify and Continueto make the payment. - Once your payment card has been verified, you now need to verify your phone
number. Do that on this page and click
Send SMS: - You’ll receive a SMS message with a 4-digit code. Enter that on the next page.
- On the next page, choose
Basic support - Freeand clickComplete sign up. - Congratulation, you now have an AWS account.
- Click on
Go to the AWS Management Consoleand we’ll proceed to the next step, which is securing the account’s root user.
Part 2 - Securing the root user. This user comes with all AWS accounts by default and has ultimate power. We will securely configure this user so no one else can get at it.
- Every AWS account has a root user that is created when the account is. This is the superuser with unlimited permissions, including being the only user that is able to close the account.
- Before we continue, we will enable Multi-Factor Authentication on the root
user. Start by clicking the account name in the upper right corner, followed by
Security Credentials. - Next you want to click
Assign MFA.- On the next page:
- Give your MFA device a name, I chose
root - Choose
Authenticator appfor your device type. This is the most common option. - Click
Next
- If you already have an authenticator app on your phone, you can skip step 1
on the next page, otherwise follow the link to
See a list of compatible applicationsand set one up. - For step 2, click
Show QR codeand scan it with your authenticator app. For step 3, wait for the code to refresh itself twice, entering each code into the fields markedMFA Code 1andMFA Code 2. ClickAdd MFA. - You’ll be brought back to
Security credentialswhere you’ll see a green banner confirming setup of the MFA device. You’ll need to use this device every time you log in as the root user, and if you lose it you’ll need to get on a phone call with AWS to reset it. - Scrolling down this page, you’ll see several different types of credentials:
Access keys,CloudFront key pairsandX.509 Signing certificates. There shouldn’t be any credentials on the root user, now or ever. If you’ve just created your account, then this should already be the case.
Never let the root user have any credentials!
If you’re using an existing account where any credentials have been added to the root user, I strongly suggest you delete them from the root user and recreate them on IAM users, and in the next part we’ll create an IAM user for day to day use.
Part 3 - Setting up AWS Organization. This service allowed you to link multiple AWS accounts into a single group for easy management. While we’ll only be creating one AWS account today, it’s still essential to set this up.
- Using the search bar at the top of the page, search for and select AWS Organizations.
- Choose
Create an organization. - Once again, the green banner signifies success.
Part 4 - Setting up IAM Identity Center. This is where you will manage all users in your AWS Organisation. This needs to be enabled and configured after AWS Organisations so that it can integrate with it.
- Since we’re not going to be using the root user for any work, we need to create another user for this purpose.
- In the search bar at the top of the AWS console, type
iamand click on theIAM Identity Centerlink that appears.
IAM vs IAM Identity Center
When you search for
iamin the search box, you’ll see two services that begin with that name.IAMis the old way of doing this, whileIAM Identity Centeris newer and recommended when creating new accounts. This tutorial will useIAM Identity Center.
- First, we need to enable
IAM Identity Centerin our account by clicking onEnable. - You’ll now end up on the homepage for
IAM Identity Centrewith a green banner confirming it’s set up. - We now need to give a name to our identity center instance.
- Name it whatever you want and click
Save changes. - You’ll now see confirmation that it’s renamed.
Part 5 - Creating an IAM user. You don’t want to use the root user for day-to-day work, so you’ll create an IAM user which you’ll use to log in.
- Now that we’ve set up the
IAM Identity Center, we can create our personal administrator user. - Click on
Usersfrom the left ofIAM Identity Centerhomepage. - Click
Add userfrom the upper right. - On the next page, do the following:
- Give your user a username
- Choose to send an email with password setup instructions
- Give the user an email address. I’m using Gmail’s
+feature to save creating a second Google account for this tutorial. - Set the first, last and display names.
- Skip the rest of the tabs and click
Next.
- Choose to send an email with pNext, choose
Create group. This will open a new tab. Ensure you keep the current tab since we’ll be returning to it once we’ve created the group. - It’s good practice to not attach policies directly to users, rather it’s best
to give groups permissions, and add users to that group. We’re going to create
an
administratorsgroup. - Fill in the name and description before clicking
Create group. - We’ll see the now familiar green banner saying we’ve successfully created our group.
- Close the group creation tab and return to the user creation tab. Click the
refresh button in the upper right to cause our
administratorsgroup to appear. Select it and clickNext. - Confirm the details are correct before clicking
Add user. - Once again, we’ll see a green banner telling us the user was created successfully.
- Finally we need to give our new user some permissions. It’s always a good idea to attach permissions to groups, and add users to those groups, instead of giving permissions directly to users, so that’s what we’ll do here.
- From the IAM Identity Center sidebar, choose
Permission Setsfollowed byCreate permission set. - Next, choose
Administrator Accessfrom the predefined permission sets followed byNext. - Leave the name as it is and give it a description if you want, before
clicking
Next. - Review the settings before clicking
Create. - Now we’ve created the permission set, we need to associate it with an
account. From the sidebar again choose
AWS accounts, check the box next to the account name, and clickAssign users or groups. - Choose the administrators group we created earlier and click
Next. - Select the permission set we created earlier and click
Next. - Review your changes and click
Submit. - The IAM user is now created with administrator permissions, and before we start using it we need to set up and secure the user.
Part 6 - Setting up and securing the IAM user. Before the IAM user can be used, it must be configured in IAM Identity Center and secured with MFA.
- When we created the user in the end of last section, an email was sent to the
email address we provided inviting our user to IAM Identity Center. Go to your
email, find this message and click the link that says
Accept invitation. - Choose a password, enter the confirmation and click
Set new password. - Sign in with your username and the password you just created.
- You’ll now be prompted to set up MFA for your IAM user.
Different MFA devices
This MFA device is separate from the one you set up for the root user. You can use the same device to manage both accounts, but you need to add your IAM user account separately from the root user.
- Choose
Authenticator appand clickNext. - Click
Show QR code, scan it with your app and enter theAuthenticator codeto confirm. - Click
Doneon the confirmation screen - Click done and you’ll appear on the AWS access portal. Click on
AdministratorAccessunderneath the account name to log into the account.
Finished#
And we’re done. The lessons you will have taken away from this tutorial are:
- How AWS Organizations and IAM Identity Center work together to manage the users in your organisation and what accounts they have access to.
- That you should never log in with the root user if there are permissions you can give an IAM user.
- That permissions are best attached to groups instead of users. That way you can just look inside a group to see how many people have those particular permissions.