Log in to your AWS Management Console
Navigate to IAM (Identity and Access Management)
- In the AWS Console search bar, type “IAM” and select the IAM service.
Create a new IAM User for S3 Access
- Click “Users” in the left sidebar, then click “Add users.”
- Enter a user name (e.g., “mcp-s3-user”).
- Select “Access key - Programmatic access” as the access type, then click “Next: Permissions.”
Assign S3 Access Permissions
- Attach a policy that allows access to your S3 buckets:
- Click “Attach policies directly.”
- To allow full access, search for and select the
AmazonS3FullAccess
policy.
- For more restricted access, click “Create policy” and define custom permissions (e.g., List/Get only for specific buckets).
Finish User Creation and Download Credentials
- Complete the steps. On the final screen, click “Download .csv” to save the
AWS_ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
.
Fill in the FastMCP Connection Interface
- Click the Install Now button for the S3 MCP server integration.
- In the FastMCP connection settings, fill in:
- AWS_REGION: The region where your S3 buckets are located (e.g.,
us-east-1
).
- S3_BUCKETS: Comma-separated list of bucket names (e.g.,
bucket1,bucket2
).
- S3_MAX_BUCKETS: (Optional) Maximum number of buckets to list (default is 5).
- AWS_ACCESS_KEY_ID: The Access Key ID from the IAM user you created.
- AWS_SECRET_ACCESS_KEY: The Secret Access Key from the IAM user.
Save the Configuration
- Submit or save the connection details. The S3 MCP server will now use the specified AWS credentials to access only the listed buckets.
Note: Use IAM credentials with minimum necessary permissions for best security practices. If you’re testing locally with MinIO, MinIO default credentials are minioadmin
(username and password), and you can set them in these fields as well.