This script generates signed URLs for CloudFront distributions to control access to private S3-hosted static websites. You can use it to create temporary access URLs with expiration dates.
- Go to S3 in AWS Console
⚠️ Select your region in the top right corner first (changing it later will clear your bucket name)- Click "Create bucket"
- Enter a unique bucket name
- Keep all default settings
- Click "Create bucket"
- Upload your website files AND the
login.html
from this repository
[Screenshot placeholder: Create bucket dialog with default settings]
- Keep all default settings.
- Don not enable "Static website hosting"
- The
login.html
file is a part of this solution, not your website
-
Create a directory outside of any git repository
mkdir cloudfront-keys cd cloudfront-keys
-
Prevent git from tracking the files in this directory
echo "*" > .gitignore
After creating your secure directory, run to create private and public keys:
openssl genrsa -out private_key.pem 2048 && openssl rsa -pubout -in private_key.pem -out public_key.pem
- Create keys in a directory that sits outside any Git repository
- Never place keys in a directory that Git could track
- Use the private key only with the URL signer script
- Consider AWS KMS or a secure vault for key storage
- Rotate your keys regularly
- Run
chmod 600 private_key.pem
to restrict file access
- Go to CloudFront in AWS Console
- Click "Security" → "Origin access" in the left menu
- Click "Create control setting"
- Enter a description (e.g., "-OAC")
- Set Origin type to "S3"
- Keep default settings
- Click "Create"
[Screenshot placeholder: Origin access control creation]
- Go to "Key Management" → "Public keys" in CloudFront
- Click "Create public key"
- Enter a name for your key (e.g., "my-static-website-key")
- Copy content of the
public_key.pem
to the "Key" field. If you on MacOS, you can use the following command to copyt the key:pbcopy < public_key.pem
- Click "Create"
- Save the generated "Key ID" - you need it for the URL signer script
- Go to "Key groups"
- Click "Create key group"
- Enter a group name (e.g., "my-static-website-key-group")
- Select your uploaded public key
- Click "Create key group"
[Screenshot placeholder: Key group creation dialog]
- Go to the Distributions page in CloudFront
- Click "Create distribution"
- Under "Origin":
- Pick your S3 bucket as Origin domain
- Leave Origin path empty
- Click on the "Origin access control settings (recommended)" radio button
- Select your OAC in Origin access control dropdown
- Under "Viewer":
- Set the Restrict viewer access to "Yes"
- In the "Add key groups" dropdown, select the key group you created in step 2
- Under "Web Application Firewall (WAF)" choose whether or not you want to enable WAF
- Click "Create distribution"
[Screenshot placeholder: CloudFront distribution creation with OAC]
Note, that the AWS CloudFront console can help you with the following steps by generating the policy and providing a link to the the right place in the S3 console.
- Go to your S3 bucket
- Click "Permissions" tab
- Click "Edit" under "Bucket policy"
- Add this policy (replace the placeholders):
{
"Version": "2012-10-17",
"Id": "PolicyForCloudFrontPrivateContent",
"Statement": [
{
"Sid": "AllowCloudFrontServicePrincipal",
"Effect": "Allow",
"Principal": {
"Service": "cloudfront.amazonaws.com"
},
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::<your-bucket-name>/*",
"Condition": {
"StringEquals": {
"AWS:SourceArn": "arn:aws:cloudfront::<your-account-id>:distribution/<your-distribution-id>"
}
}
}
]
}
python3 -m venv myenv
source myenv/bin/activate
pip3 install -r requirements.txt
python3 cloudfront_url_signer.py <private-key-path> <key-id> <expiration-days> <distribution-domain> <redirect-path>
private-key-path
: Where to find your private key file (.pem)key-id
: Your key pair ID from CloudFrontexpiration-days
: How many days the URL should workdistribution-domain
: Your CloudFront domain (e.g.,d1234.cloudfront.net
)redirect-path
: Where to go after login (e.g.,/index.html
)
python cloudfront_url_signer.py ./private_key.pem K2JCJMDEHXQW5F 7 d1234.cloudfront.net /dashboard.html
This command creates a signed URL using:
- The private key from
./private_key.pem
- Key pair ID
K2JCJMDEHXQW5F
- 7-day validity
- Distribution
d1234.cloudfront.net
- Redirect to
/dashboard.html
after login
The script creates a URL like this:
https://d1234.cloudfront.net/login.html?Policy=eyJTdGF0...&Signature=ABCdef...&Key-Pair-Id=K2JCJMDEHXQW5F&Expires=1234567890&RedirectTo=/dashboard.html