You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/design/IamUserInlinePolicy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ When used, it adds a layer of permission to the users under the account.
4
4
We decided that IAM user inline policies are checked for authorization only in S3 operations (`src/endpoint/s3/s3_rest.js`).
5
5
6
6
## User Without IAM User Policy
7
-
We decided that when a user is created under the account (and has access keys), it can operate all S3 operations (unless there is a bucket policy which do not authorize it).
7
+
User must have IAM policy to be authorized for S3 operations.
8
8
9
9
## User With IAM User Policy
10
10
The user’s inline policy is embedded in the user.
@@ -29,8 +29,8 @@ If a user has a user policy, the ability to perform an S3 operation is based on
29
29
For every S3 request, authorization (`authorize_request` in `src/endpoint/s3/s3_rest.js`) is performed.
30
30
The authorization now will have:
31
31
1. Authorization handle for signed request and anonymous requests.
32
-
2. Authorization handle according to bucket policy.
33
-
3. Authorization handle according to the user IAM policy (the new added layer - only for IAM users).
32
+
2. Authorization handle according to the user IAM policy (the new added layer - only for IAM users).
33
+
3. Authorization handle according to bucket policy.
34
34
35
35
If one of the layers does not permit it would result in `AccessDenied` error.
0 commit comments