• Resolved managedhostingpartners

    (@managedhostingpartners)


    I’ve set up the following policy in AWS IAM for access to the bucket that files are uploaded to with AWS:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "Stmt1503142286000",
                "Effect": "Allow",
                "Action": [
                    "s3:*"
                ],
                "Resource": [
                    "arn:aws:s3:::site-mysite.com"
                ]
            }
        ]
    }

    but the plugin still shows “no access”. When I give the same user full S3 access rights, it works. What rights exactly to I need to give in my policy – I need to not allow multiple sites to write to other buckets.

    The page I need help with: [log in to see the link]

Viewing 1 replies (of 1 total)
  • Thread Starter managedhostingpartners

    (@managedhostingpartners)

    I have found an example on the web for S3 handling, which solves my problem:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "Stmt1503142286000",
                "Effect": "Allow",
                "Action": [
                    "s3:*"
                ],
                "Resource": [
                    "arn:aws:s3:::site-mysite.com",
                    "arn:aws:s3:::site-mysite.com/*"
                ]
            },
            {
                "Effect": "Allow",
                "Action": "s3:ListAllMyBuckets",
                "Resource": "arn:aws:s3:::*"
            }
        ]
    }
Viewing 1 replies (of 1 total)

The topic ‘IAM policy’ is closed to new replies.