1 réponse
- Le plus récent
- Le plus de votes
- La plupart des commentaires
0
Hello, Access Denied generally occurs because of permission related issues. In you scenario I would suggest to check the following:
- If the S3 bucket is encrypted with AWS KMS. Check if the KMS key policy allowed the other account to access.
- Does the IAM role created in account B has permissions for the S3 bucket. You have to add the S3 bucket in the IAM role policy.
- Check if the organisation does not have any restrictive policies.
Please refer the below document [+] https://repost.aws/knowledge-center/s3-cross-account-access-denied
Contenus pertinents
- demandé il y a un an
- demandé il y a 3 mois
- demandé il y a un an
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a 2 ans
- AWS OFFICIELA mis à jour il y a 2 ans
Already done. I know the permissions set against the bucket are working as I can use the AWS CLI to get the object assuming a different role with account B. I have used a similar pattern of policies in a few places now and have not encountered any issue, but no matter what I have tried nothing is working within the context of an Amplify build.