- Neueste
- Die meisten Stimmen
- Die meisten Kommentare
Hello,
I think the IAM policy is a better option for your use case.
The below link answers your question with an explanation - https://stackoverflow.com/questions/41110167/how-to-create-access-keys-that-only-have-access-to-specific-s3-buckets
Thanks
To create an AWS Access Key ID and Secret Access Key with limited permissions for a specific S3 bucket, follow these summarized steps:
-
Create a New IAM User:
- Sign in to the AWS Management Console and navigate to the IAM console.
- Choose Users > Add user.
- Enter a user name and select Programmatic access.
- Click Next: Permissions.
-
Attach Policy Directly or Add to Group:
-
For direct policy attachment, choose Attach existing policies directly > Create policy. Use the JSON editor to specify permissions for viewing and uploading to your bucket. Replace
YOUR_BUCKET_NAME
with your actual bucket name in the policy:{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:ListBucket", "s3:GetObject", "s3:PutObject", "s3:PutObjectAcl" ], "Resource": [ "arn:aws:s3:::YOUR_BUCKET_NAME", "arn:aws:s3:::YOUR_BUCKET_NAME/*" ] } ] }
-
Alternatively, add the user to a group that already has the desired permissions.
-
-
Review and Create User:
- After attaching the policy, proceed through Next: Tags, Next: Review, and finally click Create user.
-
Access Key and Secret:
- Once the user is created, you'll be shown the Access Key ID and Secret Access Key. Make sure to save these securely.
Relevanter Inhalt
- AWS OFFICIALAktualisiert vor 5 Monaten
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor 2 Jahren