4340 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
page 1 / 1
23 results tagged iam x
  • Working with presigned URLs - Amazon Simple Storage Service

    If you created a presigned URL by using a temporary token, then the URL expires when the token expires, even if you created the URL with a later expiration time. For more information about how the credentials you use affect the expiration time, see Who can create a presigned URL.

    So you have to use regular IAM user instead of IAM role for service generating presigned urls..? :-/

    2023年8月12日 GMT+2 上午10:53:10 - permalink - archive.org - https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-presigned-url.html#who-presigned-url
    aws iam presigned s3
  • Cross-account IAM permissions - Amazon EKS
    2023年4月13日 GMT+2 下午5:53:34 - permalink - archive.org - https://docs.aws.amazon.com/eks/latest/userguide/cross-account-access.html
    account cross eks iam oidc
  • iam-policy-json-to-terraform - Easily convert AWS IAM policies to Terraform HCL

    via nedim

    2022年11月24日 GMT+1 上午9:33:44 * - permalink - archive.org - https://flosell.github.io/iam-policy-json-to-terraform/
    aws hcl iam json terraform
  • Actions, resources, and condition keys for AWS services - Service Authorization Reference

    google iam resources list

    2022年9月5日 GMT+2 下午5:59:18 - permalink - archive.org - https://docs.aws.amazon.com/service-authorization/latest/reference/reference_policies_actions-resources-contextkeys.html
    api iam
  • IAM Roles for Service Accounts - Amazon EKS

    This feature also eliminates the need for third-party solutions such as kiam or kube2iam.

    great

    2019年12月15日 GMT+1 下午4:36:18 - permalink - archive.org - https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
    eks iam role
  • thumbnail
    Identify Unintended Resource Access with AWS Identity and Access Management (IAM) Access Analyzer | AWS News Blog
    2019年12月3日 GMT+1 上午9:41:36 - permalink - archive.org - https://aws.amazon.com/fr/blogs/aws/identify-unintended-resource-access-with-aws-identity-and-access-management-iam-access-analyzer/
    audit aws iam
  • Keycloak
    2019年3月27日 GMT+1 下午9:02:30 - permalink - archive.org - https://www.keycloak.org/
    iam k8s
  • kiam/README.md at master · uswitch/kiam · GitHub

    Une alternative à kube2iam qui est apparemment plus secure

    2019年3月27日 GMT+1 下午8:46:01 * - permalink - archive.org - https://github.com/uswitch/kiam/blob/master/README.md
    iam k8s
  • thumbnail
    Installing kube2iam in AWS Kubernetes EKS Cluster | Carlos Sanchez's Weblog
    2019年3月26日 GMT+1 上午9:33:47 - permalink - archive.org - https://blog.csanchez.org/2018/11/14/installing-kube2iam-in-aws-kubernetes-eks-cluster/
    iam k8s
  • thumbnail
    jtblin/kube2iam: kube2iam provides different AWS IAM roles for pods running on Kubernetes
    2019年3月6日 GMT+1 上午9:54:26 - permalink - archive.org - https://github.com/jtblin/kube2iam
    eks iam k8s policy role
  • Note: List users and their inline attached policies

    for user in $(aws iam list-users|jq '.Users|.[]|.UserName' -r); do echo $user;aws iam list-user-policies --user-name $user; done

    2017年9月22日 GMT+2 上午10:19:31 - permalink - archive.org - https://links.infomee.fr/?xhJZ2g
    aws iam
  • upload-server-certificate — AWS CLI 1.11.124 Command Reference

    --path

    2017年7月25日 GMT+2 上午11:07:06 - permalink - archive.org - http://docs.aws.amazon.com/cli/latest/reference/iam/upload-server-certificate.html
    aws iam ssl
  • Example 2: Bucket Owner Granting Cross-Account Bucket Permissions - Amazon Simple Storage Service
    Donc pour autoriser un compte externe, on va créer une bucket policy sur notre bucket pour autoriser "arn:aws:iam::account_id:root" ou plus précis sur l'user arn:aws:iam::account_id:user/foobar ou le role

    C'est le compte en face qui va décider qui a le droit de venir sur notre bucket avec des user policy standard (quand on est dans le contexte du compte en face, c'est comme si le bucket nous appartenait)

    Exemple bucket policy à mettre sur le BUCKET de l'account A pour autoriser l'account xxx en RW


    {
        "Version": "2012-10-17",
        "Statement": [





            {
                "Sid": "Allow account_xx on aws account xxx RW",
                "Effect": "Allow",
                "Principal": {
                    "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                },
                "Action": ["s3:GetBucketLocation", "s3:ListBucket"],
                "Resource": "arn:aws:s3:::BUCKET"
            },
            {
                "Sid": "Allow account_xx on aws account xxx RW",
                "Effect": "Allow",
                "Principal": {
                    "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                },
                "Action": [
                    "s3:*"
                ],
                "Resource": "arn:aws:s3:::BUCKET/*"
            }




        ]
    }

    Pour Read only, remplacer action du deuxieme bloc par "Action": ["s3:Get*","s3:List*"],
    2017年6月12日 GMT+2 上午8:48:42 * - permalink - archive.org - http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthroughs-managing-access-example2.html
    aws cross iam policy s3
  • Note: s3 policy one bucket
    ReadWrite :

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                 "Action": ["s3:GetBucketLocation", "s3:ListBucket"],
                "Resource": [
                    "arn:aws:s3:::LeBucket"
                ]
            },
            {
                "Effect": "Allow",
                "Action": [
                    "s3:*"
                ],
                "Resource": [
                    "arn:aws:s3:::LeBucket/*"
                ]
            }
        ]
    }

    Pour Read only, remplacer action du deuxieme bloc par "Action": ["s3:Get*","s3:List*"],
    2017年5月17日 GMT+2 下午5:02:27 * - permalink - archive.org - https://links.infomee.fr/?Vp7r6Q
    aws iam s3
  • thumbnail
    rvedotrc/aws-iam-reference: A list of all known IAM actions; and a way of updating that list
    2017年4月13日 GMT+2 下午2:36:05 - permalink - archive.org - https://github.com/rvedotrc/aws-iam-reference
    actions iam
  • thumbnail
    IAM Policies and Bucket Policies and ACLs! Oh, My! (Controlling Access to S3 Resources) | AWS Security Blog

    Easy one?
    Not even close

    2017年3月24日 GMT+1 下午12:24:51 - permalink - archive.org - https://aws.amazon.com/blogs/security/iam-policies-and-bucket-policies-and-acls-oh-my-controlling-access-to-s3-resources/
    iam policy s3
  • Note: How to know which policy contains a specific action?
    Warning : this loop does a lot of call to aws api, use it with caution

    To know that I needed to list all policies and associated statements (for the default policy version)

    ```
    #!/bin/bash
    IFS=$'\n'
    for line in $(aws iam list-policies|jq '.Policies|.[]|[ .PolicyName, .Arn, .DefaultVersionId ]| @csv' -r|sed 's/","/ /g'|sed 's/"//g'); do
        name=$(echo $line|cut -d' ' -f1);
        arn=$(echo $line|cut -d' ' -f2);
        version=$(echo $line|cut -d' ' -f3);
        echo "$name"
        aws iam get-policy-version --policy-arn $arn --version-id $version
    done
    ```

    Put this in a script, redirect output to a file and go get grep!
    2017年2月22日 GMT+1 下午4:16:06 * - permalink - archive.org - https://links.infomee.fr/?bERNcg
    aws bash for foreach iam policy separator
  • Note sur les Policy IAM

    Une policy IAM est constituée de statement, ce sont des règles (des blocs de codes)

    {
    "Statement":[{
    "Effect":"effect",
    "Action":"action",
    "Resource":"arn",
    "Condition":{
    "condition":{
    "key":"value"
    }
    }
    }
    ]
    }

    Chaque règle dans sa forme la plus simple est composée de 3 choses :

    Effect : allow ou deny

    Action : quelle action concerne la règle

    Resource : la resource concernée

    Chaque service Amazon (EC2, ECR, etc...) expose une liste d'action, on peut trouver cette liste dans la doc (http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements.html#Action)

    Et chaque resource peut être identifiée par un arn (une manière simple de retrouver un ARN est d'afficher la resources dans l'interface web AWS, il y a souvent l'arn)

    2016年12月12日 GMT+1 下午12:59:10 - permalink - archive.org - https://links.infomee.fr/?3KOHAQ
    aws iam policy
  • Managed Policies and Inline Policies - AWS Identity and Access Management

    AWS Managed VS Customer Manageg VS Inline

    2016年9月22日 GMT+2 上午11:08:16 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html
    iam policy
  • Identities (Users, Groups, and Roles) - AWS Identity and Access Management

    Diff between user and role

    2016年9月21日 GMT+2 上午11:21:30 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/id.html
    aws iam
  • Getting Credential Reports for Your AWS Account - AWS Identity and Access Management

    To generate a report

    • :

    In addition to using credential reports, you can also determine when a password or access key was last used by using these IAM APIs:
    ListUsers (AWS CLI command: aws iam list-users)
    GetUser (AWS CLI command: aws iam get-user)
    GetAccessKeyLastUsed (AWS CLI command: aws iam get-access-key-last-used)

    2016年9月21日 GMT+2 上午11:16:54 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html
    audit aws iam
  • Using an IAM Role to Grant Permissions to Applications Running on Amazon EC2 Instances - AWS Identity and Access Management

    This one explains why to use roles

    2016年9月21日 GMT+2 上午11:14:50 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2.html
    aws iam
  • IAM Best Practices - AWS Identity and Access Management

    Premières choses à faire, best practice concernant iam. En résumé : ne pas générer d'access key pour l'utilisateur "root", créer des users avec des droits bien determinés.

    2016年8月31日 GMT+2 上午11:32:26 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
    aws iam
Links per page: 20 50 100
page 1 / 1
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation