1 réponse
- Le plus récent
- Le plus de votes
- La plupart des commentaires
0
You will have to remove the s3:ListAllMyBuckets permission to prevent the buckets being shown as per https://aws.amazon.com/premiumsupport/knowledge-center/s3-console-access-certain-bucket/
Is the error being returned when attempting to modify the IAM policy or when viewing the S3 console?
répondu il y a 2 ans
Contenus pertinents
- demandé il y a 2 ans
- demandé il y a 10 mois
- demandé il y a 2 mois
- demandé il y a un an
- AWS OFFICIELA mis à jour il y a 3 ans
- Comment résoudre les problèmes d’autorisation liés aux politiques générées par IAM Access Analyzer ?AWS OFFICIELA mis à jour il y a 3 mois
- AWS OFFICIELA mis à jour il y a 8 mois
Yes, i returned to following error when viewing s3 console through login iam user
You don't have permissions to list buckets After you or your AWS administrator have updated your permissions to allow the s3:ListAllMyBuckets action, refresh this page.
I ran into that before as the S3 console needs the ListAllBuckets permission to work. You can then use the ListBucket permission like you have done above to prevent the requester from being able to actually see the files in other buckets but sadly from when I ran into this issue in the past I could find no way to show them only the buckets they had access to via the S3 console.
And how to prevent my client if i am sharing iam user credentials with my clients who have some knowledge of aws and he try to access bucket through direct account login aws url https://us-east-1.console.aws.amazon.com/ instead of given url of bucket https://s3.console.aws.amazon.com/s3/buckets/mybucket-name