0% found this document useful (0 votes)
54 views3 pages

Aws s3 Bucket To Bucket

The document contains two IAM policy statements. The first statement grants permissions to allow actions like PutObject, GetObject on two S3 buckets. The second statement grants similar permissions to another set of S3 buckets. The document also shares an IAM user ARN with the client.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views3 pages

Aws s3 Bucket To Bucket

The document contains two IAM policy statements. The first statement grants permissions to allow actions like PutObject, GetObject on two S3 buckets. The second statement grants similar permissions to another set of S3 buckets. The document also shares an IAM user ARN with the client.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

{

"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObjectAcl",
"s3:GetObject",
"s3:ListBucketMultipartUploads",
"s3:GetObjectVersionTagging",
"s3:ListBucket",
"s3:PutObjectAcl",
"s3:GetObjectVersion"
],
"Resource": [
"arn:aws:s3:::excelra-constellation-depmap/*",
"arn:aws:s3:::excelra-constellation-depmap"
]
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObjectAcl",
"s3:GetObject",
"s3:ListBucketMultipartUploads",
"s3:GetObjectTagging",
"s3:ListBucket",
"s3:PutObjectAcl",
"s3:GetObjectVersion"
],
"Resource": [
"arn:aws:s3:::cpi-bioinfotest/xinwei",
"arn:aws:s3:::cpi-bioinfotest/xinwei/*"
]
}
]
}

And the arn to be share to the client is

arn:aws:iam::286371959324:user/[email protected]

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObjectAcl",
"s3:GetObject",
"s3:ListBucketMultipartUploads",
"s3:GetObjectTagging",
"s3:ListBucket",
"s3:PutObjectAcl",
"s3:GetObjectVersion"
],
"Resource": [
"arn:aws:s3:::cpi-bioinfotest/xinwei",
"arn:aws:s3:::cpi-bioinfotest/xinwei/*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObjectAcl",
"s3:GetObject",
"s3:ListBucketMultipartUploads",
"s3:GetObjectTagging",
"s3:ListBucket",
"s3:PutObjectAcl",
"s3:GetObjectVersion"
],
"Resource": [
"arn:aws:s3:::excelra-constellation-depmap/*",
"arn:aws:s3:::excelra-constellation-depmap"
]
}
]
}

{
"Version": "2012-10-17",
"Id": "Policy1611277539797",
"Statement": [
{
"Sid": "Stmt1611277535086",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::222222222222:user/Jane"
},
"Action": "s3:PutObject",
"Resource": [
"arn:aws:s3:::cpi-bioinfotest/xinwei",
"arn:aws:s3:::cpi-bioinfotest/xinwei/*"
]
"Condition": {
"StringEquals": {
"s3:x-amz-acl": "bucket-owner-full-control"
}
}
},
{
"Sid": "Stmt1611277877767",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::222222222222:user/Jane"
},
"Action": "s3:ListBucket",
"Resource": [
"arn:aws:s3:::excelra-constellation-depmap/*",
"arn:aws:s3:::excelra-constellation-depmap"
]
}
]
}

You might also like