I have created the following bucket policy in S3 for a couple of users.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "S3ViewBuckets",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::167757684197:user/rama"
},
"Action": "s3:",
"Resource": "arn:aws:s3:::anuguru/public/"
},
{
"Sid": "S3AllAccess",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::167757684197:user/krishna"
},
"Action": "s3:*",
"Resource": "arn:aws:s3:::anuguru/private"
}
]
}
when i try to login with those users, the access is still denied. Is there something that is missing? I am experiencing the same with user policies as well. The policy looks good but access is still denied. Is there any other setting that trumps the bucket and user policies?
I have created the following bucket policy in S3 for a couple of users. { "Version": "2012-10-17", "Statement": [ { "Sid": "S3ViewBuckets", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::167757684197:user/rama" }, "Action": "s3:", "Resource": "arn:aws:s3:::anuguru/public/" }, { "Sid": "S3AllAccess", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::167757684197:user/krishna" }, "Action": "s3:*", "Resource": "arn:aws:s3:::anuguru/private" } ] } when i try to login with those users, the access is still denied. Is there something that is missing? I am experiencing the same with user policies as well. The policy looks good but access is still denied. Is there any other setting that trumps the bucket and user policies?