Page History
...
1. Create
...
an
...
S3
...
bucket
...
with
...
an
...
Access
...
Control
...
List
...
with
...
no
...
public
...
access,
...
but
...
with
...
root
...
account
...
access
...
and
...
access
...
from
...
the
...
current
...
user.
...
2. Modify
...
the
...
Bucket
...
Policy
...
to
...
be
...
of
...
this
...
form.
...
Details
...
of
...
how
...
to
...
determine
...
the
...
values
...
of
...
the
...
highlighted
...
text
...
may
...
be
...
found here: How to Restrict Amazon S3 Bucket Access to a Specific IAM Role.
A summary follows, for AWS experts, of how to derive the values :
775488040364 AWS Account number
lansa-secure S3 Secure Bucket name
AROAI4S5N5QLPZ5QHQIJ2 RoleId of paas-ec2 (aws iam get-role -–role-name ROLE-NAME)
AIDAJFF4TKJHEGHMMDUUQ IAM UserId of the administrator (aws iam get-user -–user-name USER-NAME)
| Panel | ||
|---|---|---|
| ||
{here: [<span style="color: #0000ee"><span style="text-decoration: underline; ">How to Restrict Amazon S3 Bucket Access to a Specific IAM Role</span></span>|https://aws.amazon.com/blogs/security/how-to-restrict-amazon-s3-bucket-access-to-a-specific-iam-role/] A summary follows, for AWS experts, of how to derive the values : 775488040364 AWS Account number lansa-secure S3 Secure Bucket name AROAI4S5N5QLPZ5QHQIJ2 RoleId of paas-ec2 (aws iam get-role -–role-name ROLE-NAME) AIDAJFF4TKJHEGHMMDUUQ IAM UserId of the administrator (aws iam get-user -–user-name USER-NAME) \{ "Version": "2012-10-17",
\ [
\ {
\ {
\ },
\ },
\ {
\ {
\ },
\ [
\ ],
\ },
\ {
\ [
\ ],
\ {
\ {
\ [
\ ]
\}
\}
\}
\]
\}
[<span style="color: #0000ee"><span style="text-decoration: underline; ">Show Contents List</span></span>|../../Default.htm#lansa/VLDToolDevOps_0270.htm]
|