jeudi 3 septembre 2015

AWS:Allowing Access to an IAM application user to a sepcific S3 bucket

I know this question has been posted and answered many times but none of the solution has worked for my situation. Following is the policy attached to one of the IAM user that will be used by application to access a s3 bucket called xyz-billing:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["s3:ListBucket"],
"Resource": ["arn:aws:s3:::xyz-billing"]
},
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObject"
],
"Resource": ["arn:aws:s3:::xyz-billing/*"]
}
]
}

In fact I have tried multiple ways of defining policy but below is the common issue in all: When I try to simullate policy everything is denied. When I use asterix for the "Resource" :"*" the simulator shows allowed. Where am I going wrong?




Aucun commentaire:

Enregistrer un commentaire