1 Risposta
- Più recenti
- Maggior numero di voti
- Maggior numero di commenti
0
Hello, Access Denied generally occurs because of permission related issues. In you scenario I would suggest to check the following:
- If the S3 bucket is encrypted with AWS KMS. Check if the KMS key policy allowed the other account to access.
- Does the IAM role created in account B has permissions for the S3 bucket. You have to add the S3 bucket in the IAM role policy.
- Check if the organisation does not have any restrictive policies.
Please refer the below document [+] https://repost.aws/knowledge-center/s3-cross-account-access-denied
Contenuto pertinente
- AWS UFFICIALEAggiornata 2 anni fa
- AWS UFFICIALEAggiornata 2 anni fa
- AWS UFFICIALEAggiornata un anno fa
Already done. I know the permissions set against the bucket are working as I can use the AWS CLI to get the object assuming a different role with account B. I have used a similar pattern of policies in a few places now and have not encountered any issue, but no matter what I have tried nothing is working within the context of an Amplify build.