3 réponses
- Le plus récent
- Le plus de votes
- La plupart des commentaires
1
Hi,
Yes, you will need to use CloudFront to secure the access to your S3 bucket. You will need to follow the steps here:
Link: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html
-randy
répondu il y a 5 ans
0
For a Cognito-based approach, I used the method described in https://aws.amazon.com/blogs/networking-and-content-delivery/authorizationedge-how-to-use-lambdaedge-and-json-web-tokens-to-enhance-web-application-security/.
Edited by: JohnMcGehee on Aug 22, 2020 3:01 PM
répondu il y a 4 ans
Hi John, I tried solution that you have mentioned but it is failing to invoke customer lambdas. I changed python runtime from 3.6 to 3.11, were you able to execute launch stake successfully. ?
Contenus pertinents
- demandé il y a 3 mois
- Réponse acceptéedemandé il y a un an
- demandé il y a un mois
- demandé il y a un an
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a 3 ans
- AWS OFFICIELA mis à jour il y a 4 mois
- AWS OFFICIELA mis à jour il y a 2 ans
You could also use API Gateway to serve S3 content: https://docs.aws.amazon.com/apigateway/latest/developerguide/integrating-api-with-aws-services-s3.html
For authentication at API Gateway you could use multiple options like Lambda authorizers or Amazon Cognito user pools which allow also for the integration of third party identify providers: https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-control-access-to-api.html