3 Risposte
- Più recenti
- Maggior numero di voti
- Maggior numero di commenti
1
Hi,
Yes, you will need to use CloudFront to secure the access to your S3 bucket. You will need to follow the steps here:
Link: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html
-randy
con risposta 5 anni fa
0
For a Cognito-based approach, I used the method described in https://aws.amazon.com/blogs/networking-and-content-delivery/authorizationedge-how-to-use-lambdaedge-and-json-web-tokens-to-enhance-web-application-security/.
Edited by: JohnMcGehee on Aug 22, 2020 3:01 PM
con risposta 4 anni fa
Hi John, I tried solution that you have mentioned but it is failing to invoke customer lambdas. I changed python runtime from 3.6 to 3.11, were you able to execute launch stake successfully. ?
Contenuto pertinente
- AWS UFFICIALEAggiornata un anno fa
- AWS UFFICIALEAggiornata 9 mesi fa
- AWS UFFICIALEAggiornata 3 anni fa
You could also use API Gateway to serve S3 content: https://docs.aws.amazon.com/apigateway/latest/developerguide/integrating-api-with-aws-services-s3.html
For authentication at API Gateway you could use multiple options like Lambda authorizers or Amazon Cognito user pools which allow also for the integration of third party identify providers: https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-control-access-to-api.html