IAM stands for "Identity and Access Management" and enables AWS customers to manage users and user permissions under their AWS account.
To use the Choreos in this bundle, you'll need an Amazon AWS Secret Key and an Amazon AWS Access Key, which are used to authenticate your account. If you already have an Amazon AWS account, you can find both keys by logging into the AWS Console and going to the Security Credentials area. If you don't have an Amazon account, you can sign up for one here.
MarkerUsed in some of the Amazon IAM Choreos that return lists of items. Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated (the item IsTruncated is set to true). Set it to the value of the Marker element in the response you just received to get the next page of results.
Instance ProfileAn instance profile is a container for a role. To associate a role to an Amazon EC2 instance, you must use the instance profile name. If you use the AWS Management Console to create and manage roles, instance profiles are automatically managed for you. If you use the IAM API or CLI to create and manage roles, you must create instance profiles for each role. A role can be associated with many instance profiles, but an instance profile can be associated with only one role.
PolicyA policy is a document that provides a formal statement of one or more permissions. With IAM, you can assign a policy to an entity, permissions stated in the policy. You can assign multiple policies to an entity. If you want to assign the same policy to multiple users, we recommend you put the users in a group and assign the policy to the group.
RolesIAM roles allow you to delegate access to users or services that normally don't have access to your organization's AWS resources. IAM users or AWS services can assume a role to obtain temporary security credentials that can be used to make AWS API calls. Consequently, you don't have to share long-term credentials or define permissions for each entity that requires access to a resource.