Hi,

I have setup with one default tenant and next user/bucket structure:

user1
                bucket1
                bucket11
user2
                bucket2
user3
                bucket3

IAM and STS APIs are enabled, user1 has roles=* capabilities.

When user1 permit user2 to assume role with next permission policy:

{"Version":"2012-10-17",
"Statement":[
{"Effect":"Allow",
"Action":["s3:*"],
"Resource":"arn:aws:s3:::*"}]
}

user2 can use temporary credentials (after AssumeRole action) which give him 
access to ALL buckets of ALL users in this tenant (bucket3 for example).

But I expect that access should be limited by user1 own buckets.

I understand that roles=* caps it’s some kind of global admin permissions, but 
this caps are so powerful and give access to all buckets through roles.

How can I use Role to limit access to only all own buckets? Now I can specify 
one or few exact buckets or ALL (*) in tenant.

In AWS, we can give access to all buckets (*) but it will be all buckets in our 
account, not all buckets in S3.


_______________________________________________
ceph-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to