Open pierreozoux opened 1 week ago
first proposition: autorize all api except api relative to EIM management. result will be 2 policies :
{
"Statement": [
{
"Action": [
"api:*"
],
"Resource": [
"*"
],
"Effect": "Allow"
}
]
}
and
{
"Statement": [
{
"Action": [
"api:*AccessKey*",
"api:*Account*",
"api:*ApiAccessRule*",
"api:CreateCa",
"api:DeleteCa",
"api:UpdateCa",
"api:*User*",
"api:ReadAdminPassword",
"api:*ApiAccessPolicy",
"api:ReadEntitiesLinkedToPolicy",
"api:*Policies",
"api:*Policy"
],
"Resource": [
"*"
],
"Effect": "Deny"
},
{
"NotAction": [
"api:CreateLoadBalancerPolicy",
"api:DeleteLoadBalancerPolicy"
],
"Resource": [
"*"
],
"Effect": "Deny"
}
]
}
this configuration is not yet tested (i have a doubt about Effect value for NotAction)
Hello, We will test it on our end and keep you updated today.
Explain problem to solve
We want to have a tight configuration of EIM policy associated to this controller.
Describe the solution you would like
We'd like a nice policy json example, like here:
Additional context
,
Environment