amazon-iam

AWS S3 Transfer Manager ${cognito-identity.amazonaws.com:sub} Policy Variable Access Denied

柔情痞子 提交于 2019-12-01 06:57:07
问题 I am trying to download a file from AWS S3 to my iOS mobile app from a folder that is specific to the user, using Transfer Manager, like so: @IBAction func download() { let transferManager = AWSS3TransferManager.default()! let downloadingFileURL = URL(fileURLWithPath: NSTemporaryDirectory()).appendingPathComponent("disney1.jpg") let downloadRequest = AWSS3TransferManagerDownloadRequest()! downloadRequest.bucket = "sidestreamx" // user's UUID/disney1 downloadRequest.key = "631d121f-b294-4318

Fine-grained access control for AWS DynamoDB using AWS Cognito

a 夏天 提交于 2019-12-01 06:53:40
问题 I am developing a simple application (ios) where each user can send simple messages (each of them composed of a few data slots, all strings for the moment) to other users (their Facebook friends). People log in using their Facebook account through Cognito and I manage users accounts using a single table in DynamoDB where the primary key is the the Facebook id (the secondary key is a unique message id). When user A sends a message to user B, two almost identical rows are added to the table,

AWS IAM Access Management

醉酒当歌 提交于 2019-12-01 06:00:59
I know that you can set up an IAM policy to restrict access to services. However, is it possible to set up a policy to allow access to a part of a service. E.g. I am two EC2 instances. I need to create two users such that they have an access to the AWS console, but only to one EC2 instance each. EFeit Yes you can do this with Resource-Level Permissions for EC2 The structure of the resource is stated in the documentation as follows: arn:aws:[service]:[region]:[account]:resourceType/resourcePath Here is how you would structure the IAM policies for each user: User 1 { "Version": "2012-10-17",

Writing an IAM policy and CORS configuration for Amazon S3

旧街凉风 提交于 2019-12-01 04:31:41
问题 I am very new to all this but have been able to get an avatar/image uploader to work in my Rails application. A user can upload a new avatar to my S3 bucket and the avatar shows within the web application. To this end, I've had to grant "AmazonS3FullAccess" policy to the user. That seems like a bit too much, since the user from the application only needs write (upload his avatar) and read (show the avatar on the web page) permission. Would you agree that it is therefore better to write a

AWS IAM Access Management

岁酱吖の 提交于 2019-12-01 03:07:24
问题 I know that you can set up an IAM policy to restrict access to services. However, is it possible to set up a policy to allow access to a part of a service. E.g. I am two EC2 instances. I need to create two users such that they have an access to the AWS console, but only to one EC2 instance each. 回答1: Yes you can do this with Resource-Level Permissions for EC2 The structure of the resource is stated in the documentation as follows: arn:aws:[service]:[region]:[account]:resourceType/resourcePath

AWS Service Unable To Assume Role

别来无恙 提交于 2019-12-01 00:38:50
I've two AWS Cloudformation stacks, one for IAM roles and the second to create an AWS service and import the respective roles into it using Cloudformation. When 10+ services are deployed the following error appears randomly on 1 or 2 of the services - AWS::ECS::Service service Unable to assume role and validate the listeners configured on your load balancer. Please verify that the ECS service role being passed has the proper permissions. If all the services are torn down and the services redployed to the ECS cluster, the error appears but for different services. The AWS fix for this can be

Does Windows Azure have the equivalent of AWS Identity Access Management?

限于喜欢 提交于 2019-11-30 22:05:42
So I have a mobile app that uses AWS's IAM infrastructure that effectively allows me to provide temporary access tokens to anonymous mobile devices, so that they can run queries against AWS services directly from the mobile device. Does anyone know if Windows Azure has a drop in replacement for this sort of thing too? I've read about Windows Azure Access Control but all examples seem to focus on allowing authentication via the likes of Facebook, Twitter or Windows Live etc. In my case, I don't want the mobile user to have to "log-in" anywhere, I just want them to be able to access Azure

How to download an EC2 X.509 certificate with an IAM User account?

大兔子大兔子 提交于 2019-11-30 20:21:09
Through the AWS Identity and Access Management, I have a user account to the AWS account of my CTO (who is credited with some money). I wanted to use this IAM user account to set up my own instances to ssh to it and run some BeautifulSoup python scripts. However, following this tutorial , when arriving to the part where I need to go on the Security Credentials page, I can't access this page and I'm told I do not have the authorization to view it. I checked my permissions with the IAM Manager, and I have administration rights, the highest possible clearance (so it seems to me). What can I do to

When do I need to have CAPABILITY_NAMED_IAM

試著忘記壹切 提交于 2019-11-30 20:04:52
I was editing my CloudFormation templates and suddenly AWS tells me I need CAPABILITY_NAMED_IAM . I am curious as to which change triggers this? What is a named IAM resource? Before I already "name" my resources like RoleName: !Sub '${PipelineName}-codebuild' I am not asked to add this capability, I think until I add Parameters: AppName: Type: String Description: Prefix for resources Resources: LambdaRole: Type: AWS::IAM::Role Properties: RoleName: !Ref AppName To my SAM application template. But arent they the "same" except one uses !Ref ? Or maybe some other change triggered this? For

AWS Service Unable To Assume Role

落爺英雄遲暮 提交于 2019-11-30 18:10:39
问题 I've two AWS Cloudformation stacks, one for IAM roles and the second to create an AWS service and import the respective roles into it using Cloudformation. When 10+ services are deployed the following error appears randomly on 1 or 2 of the services - AWS::ECS::Service service Unable to assume role and validate the listeners configured on your load balancer. Please verify that the ECS service role being passed has the proper permissions. If all the services are torn down and the services