Bucket Policy
Last updated
Last updated
The vStorage Bucket Policy feature is a powerful tool for managing access to your buckets through JSON rules. It gives you granular control over the actions that an IAM User (coming soon), another vStorage account, or external sources can perform on your bucket and the objects within it. Here are the basic instructions for configuring Bucket Policy:
Log in to .
Select the icon in the project containing the bucket you want to grant permissions to.
If you want to delegate bucket permissions to a Root User Account or another IAM User Account or Service Account , you need to know the vStorage User ID of the user you want to delegate permissions to:
For Root User Account : you can get vStorage User ID information right on the project information page as shown below.
b. For IAM User Account and Service Account : you can get vStorage User ID information in Identity and Access Management
Continue to select the Bucket you want to perform authorization.
Select the Action icon and select Configure policy.
4. Here, you can choose the configuration for each Statement on the left or directly edit the JSON file in the right column. Specifically, the structure of a Bucket Policy includes:
Version : Specifies the version of the Bucket Policy (recommended "2012-10-17"
).
Statement : Each policy will have one or more Statements (specific purposes of the policy).
Effect : Allow
or Deny
access.
Principal : The object to which access is granted (IAM User (coming soon), specific vStorage account).
Action : Actions allowed on the bucket, for example: s3:GetObject
(view object), s3:PutObject
(upload object), s3:DeleteObject
(delete object),…
Resource : Specific buckets and objects affected by the policy (using ARN to identify resources).
Condition : (Optional) Specific condition that restricts access.
4. Select Save to save the Bucket Policy configuration.
Grant everyone ( *
) read permission ( s3:GetObject
) to all objects in the bucket.
Only users with vStorage user IDs in the file are allowed to upload ( s3:PutObject
) and delete ( s3:DeleteObject
) objects.
Do not allow anyone (include Root User) to work with buckets and objects.
Only users with IP address 10.0.0.1 can get object information
Allow all users to GetObject + allow only 1 vStorage user in the file to PutObject and DeleteObject + Disallow all users to perform PutBucketEncryption