1. Navigate to https://console.firebase.google.com and create a project:
3. Navigate to the "Authentication" page:
4. Select "Sign-in method", enable "Email/Password" and "Google" sign-in methods. At the bottom of the page, enter your newly created domain name:
For the below instructions, you'll need the output values in the "Configuration and SSL" section. Keep track of them.
1. Navigate to the "Project settings" page:
3. Under the "Service Accounts" tab, find the section called "Firebase Admin SDK".
4. Click "Generate new private key" and keep the file around. The contents will be `[FIREBASE_SECRET](http://google.com)`.
Using the AWS Console, create an S3 bucket with the default settings.
In order to have our EC2 instance access the AWS bucket, we need to create an AWS IAM role and associate it with our EC2 instance.
1. Navigate to the AWS IAM page and add a "New User" and select "Programmatic Access".
2. On "Set permissions" -> "Attach existing policies directly", select "Create Policy", and use the following JSON string as your policy body (replace `my-company-highlight-sessions` with your bucket).
3. Back on the "Add User" page, select the newly created policy and create the user. Make sure to save the user credentials for later steps.