Obtaining Amazon SES SMTP credentials
You need Amazon SES SMTP credentials to access the SES SMTP interface.
The credentials that you use to send email through the SES SMTP interface are unique to each AWS Region. If you use the SES SMTP interface to send email in more than one Region, you must generate a set of SMTP credentials for each Region that you plan to use.
Your SMTP password is different from your AWS secret access key. For more information about credentials, see Types of Amazon SES credentials.
Note
SMTP endpoints are not currently available in Africa (Cape Town), Asia Pacific (Jakarta), Europe (Milan), Israel (Tel Aviv), and Middle East (Bahrain).
Obtaining SES SMTP credentials using the SES console
Requirement
An IAM user can create SES SMTP credentials, but the user's policy must
give them permission to use IAM itself, because SES SMTP credentials are
created by using IAM. Your IAM policy must allow you to perform the following
IAM actions: iam:ListUsers
, iam:CreateUser
,
iam:CreateAccessKey
, and iam:PutUserPolicy
. If you try
to create SES SMTP credentials using the console and your IAM user doesn't
have these permissions, you see an error that states that your account is "not
authorized to perform iam:ListUsers."
To create your SMTP credentials
-
Sign in to the AWS Management Console and open the Amazon SES console at https://console.aws.amazon.com/ses/
. -
Choose SMTP settings in the left navigation pane - this will open the Simple Mail Transfer Protocol (SMTP) settings page.
-
Choose Create SMTP Credentials in the upper-right corner - the IAM console will open.
-
(Optional) If you need to view, edit, or delete SMTP users you’ve already created, choose Manage my existing SMTP credentials in the lower-right corner - the IAM console will open. Details for managing SMTP credentials is given following these procedures.
-
For Create User for SMTP, type a name for your SMTP user in the User Name field. Alternatively, you can use the default value that is provided in this field. When you finish, choose Create user in the bottom-right corner.
-
Select Show under SMTP password - your SMTP credentials are shown on the screen.
-
Download these credentials by choosing Download .csv file or copy them and store them in a safe place, because you can't view or save your credentials after you close this dialog box.
-
Choose Return to SES console.
You can view a list of the SMTP credentials you've created using this procedure in the IAM console under Access management and choosing Users followed by using the search bar to find all users that you've assigned SMTP credentials.
You can also use the IAM console to delete existing SMTP users. To learn more about deleting users, see Managing IAM Users in the IAM Getting Started Guide.
If you want to change your SMTP password, delete your existing SMTP user in the IAM console. Then, to generate a new set of SMTP credentials, complete the previous procedures.
Obtaining SES SMTP credentials by converting existing AWS credentials
If you have a user that you set up using the IAM interface, you can derive the user's SES SMTP credentials from their AWS credentials.
Important
Don't use temporary AWS credentials to derive SMTP credentials. The SES SMTP interface doesn't support SMTP credentials that have been generated from temporary security credentials.
To enable the IAM user to send email using the SES SMTP interface
-
Derive the user's SMTP credentials from their AWS credentials by using the algorithm provided in this section following these procedures.
Because you're starting from AWS credentials, the SMTP user name is the same as the AWS access key ID, so you only need to generate the SMTP password.
Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/
. -
Under Access management, choose Polices followed by Create policy.
-
In the Policy editor, select JSON and remove any example code in the editor.
-
Paste to the following permissions policy into the editor:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "ses:SendRawEmail", "Resource": "*" } ] }
-
Select Next and enter
AmazonSesSendingAccess
in the Policy name field followed by Create policy. -
Under Access management, choose User groups followed by Create group.
-
Enter
AWSSESSendingGroupDoNotRename
in the User group name field. -
Add SMTP users to the group by selecting them from the Add users to the group table.
-
Attach the
AmazonSesSendingAccess
policy created previously by selecting it from the Attach permissions policies table followed by Create user group.
For more information about using SES with IAM, see Identity and access management in Amazon SES.
Note
Although you can generate SES SMTP credentials for any IAM user, we recommend that you create a separate IAM user when you generate your SMTP credentials. For information about why it's good practice to create users for specific purposes, go to IAM Best Practices.
The following pseudocode shows the algorithm that converts an AWS secret access key to an SES SMTP password.
// Modify this variable to include your AWS secret access key key = "
wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
"; // Modify this variable to refer to the AWS Region that you want to use to send email. region = "us-west-2
"; // The values of the following variables should always stay the same. date = "11111111"; service = "ses"; terminal = "aws4_request"; message = "SendRawEmail"; version = 0x04; kDate = HmacSha256(date, "AWS4" + key); kRegion = HmacSha256(region, kDate); kService = HmacSha256(service, kRegion); kTerminal = HmacSha256(terminal, kService); kMessage = HmacSha256(message, kTerminal); signatureAndVersion = Concatenate(version, kMessage); smtpPassword = Base64(signatureAndVersion);
Some programming languages include libraries that you can use to convert an IAM secret access key into an SMTP password. This section includes a code example that you can use to convert an AWS secret access key to an SES SMTP password using Python.
Note
The following example uses f-strings that were introduced in Python 3.6; if using an older version, they won't work.
Currently, the Python SDK (Boto3) officially supports 2.7 and 3.6 (or later). However, 2.7 support is deprecated and will be dropped on 7/15/2021, so you'll need to upgrade to at least 3.6.
Migrating a SMTP user from an existing inline policy to a group policy (security recommendation)
Important
If you created SES SMTP credentials before September 6, 2024, an inline policy and a tag have been attached to your SMTP user. SES is moving away from inline policies and encourages you to do the same as a security recommendation.
Before migrating a SMTP user off of an existing inline policy to a group policy, you must first create an IAM user group with the SES permissions policy to take the place of the inline policy. If you've already created this IAM user group, or it was automatically created for SMTP credentials you created from September 6, 2024 onward, you can skip directly to step 10 in the following procedures.
To migrate from an existing inline policy to a managed group
Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/
. -
Under Access management, choose Polices followed by Create policy.
-
In the Policy editor, select JSON and remove any example code in the editor.
-
Paste to the following permissions policy into the editor:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "ses:SendRawEmail", "Resource": "*" } ] }
-
Select Next and enter
AmazonSesSendingAccess
in the Policy name field followed by Create policy. -
Under Access management, choose User groups followed by Create group.
-
Enter
AWSSESSendingGroupDoNotRename
in the User group name field. -
Add SMTP users to the group by selecting them from the Add users to the group table.
-
Attach the
AmazonSesSendingAccess
policy created previously by selecting it from the Attach permissions policies table followed by Create user group.Now that you've created the IAM user group with the SES permissions policy, you can migrate a SMTP user from their current inline policy to this group policy as explained in the remaining steps.
-
Under Access management, choose Users followed by selecting the SMTP user you want to migrate.
-
Select the Groups tab and choose Add user to groups.
-
Select the
AWSSESSendingGroupDoNotRename
group followed by Add user to group(s). -
Select the Permissions tab and confirm that there are two rows listed with
AmazonSesSendingAccess
the in the Policy name column, one with Inline and one with GroupAWSSESSendingGroupDoNotRename
listed in the Attached via column. -
Select only the row that contains
AmazonSesSendingAccess
in the Policy name column and Inline in the Attached via column followed by Remove and confirm with Remove policy.Verify the row with Group
AWSSESSendingGroupDoNotRename
in the Attached via column remains. -
Select the Tags tab followed by Manage tags.
-
Select Remove next to the row that contains InvokedBy in the Key column and SESConsole in the Value column followed by Save changes.
Important
The AmazonSesSendingAccess
policy (either as an inline or group
policy or both) must remain attached to the SMTP user to make sure their sending is
not impacted. Only remove the inline policy after the group policy is attached to
your user.