4 回答
- 最新
- 投票最多
- 评论最多
0
Hey,
I think your problem is the policy type. You need to return the json string, rather than the object.
已回答 5 年前
0
Thanks!
Changing the last part to this fixed the issue by making the policy a string.
response = {
Role: 'my_role_arn',
Policy: JSON.stringify(policy),
HomeDirectory: '/my-bucket/in/myuser',
};
已回答 5 年前
0
PriorityITS:
Are you still seeing issues using Scope Down Policy with with your Custom Identity Provider integration? I'm not sure if you are aware, but with our recent logical directories for S3 feature you can control access by mapping S3 paths to end user visible paths. That way only those portions of your S3 bucket would be visible to them. Here are a few resources to get started:
- The announcement for this feature (for use cases where it's applicable): https://aws.amazon.com/about-aws/whats-new/2019/09/aws-transfer-for-sftp-now-supports-logical-directories-for-amazon-s3/
- Blog post on how to "chroot" your users to a designated folder:https://aws.amazon.com/blogs/storage/simplify-your-aws-sftp-structure-with-chroot-and-logical-directories/
- Building a data distribution service using logical directories:https://aws.amazon.com/blogs/storage/using-aws-sftp-logical-directories-to-build-a-simple-data-distribution-service/
Please let me know if you have any questions or want to provide me details on your use case over private message.
Thanks,
Smitha
已回答 4 年前