4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 1 / 2
23 results tagged iam x
  • Working with presigned URLs - Amazon Simple Storage Service

    If you created a presigned URL by using a temporary token, then the URL expires when the token expires, even if you created the URL with a later expiration time. For more information about how the credentials you use affect the expiration time, see Who can create a presigned URL.

    So you have to use regular IAM user instead of IAM role for service generating presigned urls..? :-/

    12 août 2023 à 10:53:10 UTC+2 - permalink - archive.org - https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-presigned-url.html#who-presigned-url
    aws iam presigned s3
  • Cross-account IAM permissions - Amazon EKS
    13 avril 2023 à 17:53:34 UTC+2 - permalink - archive.org - https://docs.aws.amazon.com/eks/latest/userguide/cross-account-access.html
    account cross eks iam oidc
  • iam-policy-json-to-terraform - Easily convert AWS IAM policies to Terraform HCL

    via nedim

    24 novembre 2022 à 09:33:44 UTC+1 * - permalink - archive.org - https://flosell.github.io/iam-policy-json-to-terraform/
    aws hcl iam json terraform
  • Actions, resources, and condition keys for AWS services - Service Authorization Reference

    google iam resources list

    5 septembre 2022 à 17:59:18 UTC+2 - permalink - archive.org - https://docs.aws.amazon.com/service-authorization/latest/reference/reference_policies_actions-resources-contextkeys.html
    api iam
  • IAM Roles for Service Accounts - Amazon EKS

    This feature also eliminates the need for third-party solutions such as kiam or kube2iam.

    great

    15 décembre 2019 à 16:36:18 UTC+1 - permalink - archive.org - https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
    eks iam role
  • thumbnail
    Identify Unintended Resource Access with AWS Identity and Access Management (IAM) Access Analyzer | AWS News Blog
    3 décembre 2019 à 09:41:36 UTC+1 - permalink - archive.org - https://aws.amazon.com/fr/blogs/aws/identify-unintended-resource-access-with-aws-identity-and-access-management-iam-access-analyzer/
    audit aws iam
  • Keycloak
    27 mars 2019 à 21:02:30 UTC+1 - permalink - archive.org - https://www.keycloak.org/
    iam k8s
  • kiam/README.md at master · uswitch/kiam · GitHub

    Une alternative à kube2iam qui est apparemment plus secure

    27 mars 2019 à 20:46:01 UTC+1 * - permalink - archive.org - https://github.com/uswitch/kiam/blob/master/README.md
    iam k8s
  • thumbnail
    Installing kube2iam in AWS Kubernetes EKS Cluster | Carlos Sanchez's Weblog
    26 mars 2019 à 09:33:47 UTC+1 - permalink - archive.org - https://blog.csanchez.org/2018/11/14/installing-kube2iam-in-aws-kubernetes-eks-cluster/
    iam k8s
  • thumbnail
    jtblin/kube2iam: kube2iam provides different AWS IAM roles for pods running on Kubernetes
    6 mars 2019 à 09:54:26 UTC+1 - permalink - archive.org - https://github.com/jtblin/kube2iam
    eks iam k8s policy role
  • Note: List users and their inline attached policies

    for user in $(aws iam list-users|jq '.Users|.[]|.UserName' -r); do echo $user;aws iam list-user-policies --user-name $user; done

    22 septembre 2017 à 10:19:31 UTC+2 - permalink - archive.org - https://links.infomee.fr/?xhJZ2g
    aws iam
  • upload-server-certificate — AWS CLI 1.11.124 Command Reference

    --path

    25 juillet 2017 à 11:07:06 UTC+2 - permalink - archive.org - http://docs.aws.amazon.com/cli/latest/reference/iam/upload-server-certificate.html
    aws iam ssl
  • Example 2: Bucket Owner Granting Cross-Account Bucket Permissions - Amazon Simple Storage Service
    Donc pour autoriser un compte externe, on va créer une bucket policy sur notre bucket pour autoriser "arn:aws:iam::account_id:root" ou plus précis sur l'user arn:aws:iam::account_id:user/foobar ou le role

    C'est le compte en face qui va décider qui a le droit de venir sur notre bucket avec des user policy standard (quand on est dans le contexte du compte en face, c'est comme si le bucket nous appartenait)

    Exemple bucket policy à mettre sur le BUCKET de l'account A pour autoriser l'account xxx en RW


    {
        "Version": "2012-10-17",
        "Statement": [





            {
                "Sid": "Allow account_xx on aws account xxx RW",
                "Effect": "Allow",
                "Principal": {
                    "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                },
                "Action": ["s3:GetBucketLocation", "s3:ListBucket"],
                "Resource": "arn:aws:s3:::BUCKET"
            },
            {
                "Sid": "Allow account_xx on aws account xxx RW",
                "Effect": "Allow",
                "Principal": {
                    "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                },
                "Action": [
                    "s3:*"
                ],
                "Resource": "arn:aws:s3:::BUCKET/*"
            }




        ]
    }

    Pour Read only, remplacer action du deuxieme bloc par "Action": ["s3:Get*","s3:List*"],
    12 juin 2017 à 08:48:42 UTC+2 * - permalink - archive.org - http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthroughs-managing-access-example2.html
    aws cross iam policy s3
  • Note: s3 policy one bucket
    ReadWrite :

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                 "Action": ["s3:GetBucketLocation", "s3:ListBucket"],
                "Resource": [
                    "arn:aws:s3:::LeBucket"
                ]
            },
            {
                "Effect": "Allow",
                "Action": [
                    "s3:*"
                ],
                "Resource": [
                    "arn:aws:s3:::LeBucket/*"
                ]
            }
        ]
    }

    Pour Read only, remplacer action du deuxieme bloc par "Action": ["s3:Get*","s3:List*"],
    17 mai 2017 à 17:02:27 UTC+2 * - permalink - archive.org - https://links.infomee.fr/?Vp7r6Q
    aws iam s3
  • thumbnail
    rvedotrc/aws-iam-reference: A list of all known IAM actions; and a way of updating that list
    13 avril 2017 à 14:36:05 UTC+2 - permalink - archive.org - https://github.com/rvedotrc/aws-iam-reference
    actions iam
  • thumbnail
    IAM Policies and Bucket Policies and ACLs! Oh, My! (Controlling Access to S3 Resources) | AWS Security Blog

    Easy one?
    Not even close

    24 mars 2017 à 12:24:51 UTC+1 - permalink - archive.org - https://aws.amazon.com/blogs/security/iam-policies-and-bucket-policies-and-acls-oh-my-controlling-access-to-s3-resources/
    iam policy s3
  • Note: How to know which policy contains a specific action?
    Warning : this loop does a lot of call to aws api, use it with caution

    To know that I needed to list all policies and associated statements (for the default policy version)

    ```
    #!/bin/bash
    IFS=$'\n'
    for line in $(aws iam list-policies|jq '.Policies|.[]|[ .PolicyName, .Arn, .DefaultVersionId ]| @csv' -r|sed 's/","/ /g'|sed 's/"//g'); do
        name=$(echo $line|cut -d' ' -f1);
        arn=$(echo $line|cut -d' ' -f2);
        version=$(echo $line|cut -d' ' -f3);
        echo "$name"
        aws iam get-policy-version --policy-arn $arn --version-id $version
    done
    ```

    Put this in a script, redirect output to a file and go get grep!
    22 février 2017 à 16:16:06 UTC+1 * - permalink - archive.org - https://links.infomee.fr/?bERNcg
    aws bash for foreach iam policy separator
  • Note sur les Policy IAM

    Une policy IAM est constituée de statement, ce sont des règles (des blocs de codes)

    {
    "Statement":[{
    "Effect":"effect",
    "Action":"action",
    "Resource":"arn",
    "Condition":{
    "condition":{
    "key":"value"
    }
    }
    }
    ]
    }

    Chaque règle dans sa forme la plus simple est composée de 3 choses :

    Effect : allow ou deny

    Action : quelle action concerne la règle

    Resource : la resource concernée

    Chaque service Amazon (EC2, ECR, etc...) expose une liste d'action, on peut trouver cette liste dans la doc (http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements.html#Action)

    Et chaque resource peut être identifiée par un arn (une manière simple de retrouver un ARN est d'afficher la resources dans l'interface web AWS, il y a souvent l'arn)

    12 décembre 2016 à 12:59:10 UTC+1 - permalink - archive.org - https://links.infomee.fr/?3KOHAQ
    aws iam policy
  • Managed Policies and Inline Policies - AWS Identity and Access Management

    AWS Managed VS Customer Manageg VS Inline

    22 septembre 2016 à 11:08:16 UTC+2 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html
    iam policy
  • Identities (Users, Groups, and Roles) - AWS Identity and Access Management

    Diff between user and role

    21 septembre 2016 à 11:21:30 UTC+2 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/id.html
    aws iam
Links per page: 20 50 100
◄Older
page 1 / 2
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation