How can SSO users in a billing group access s3 buckets

0

Hello,

required: Enable s3 bucket access for a specific permission set

1.I have an SSO role in IAM for Billing. This is an AWS managed SSO Role and gives access to Billing Actions in its policy. AWSReservedSSO_BillingReadOnly_tagnumber. 2.Have an IAM Identity Center Group, AWS-acctnum-BillingReaders-Prod, that has 4 SSO users. 3. The above group has been assigned to permission sets below, user is able to see the permission sets on his login page, under the account. 4. Also Have a permission set(BillingReadOnly) that has the AWS managed Billing policy- AWSBillingReadOnlyAccess and also an inline policy that allows access to s3 bucket, (ListBucket, GetObject) The SSO user who is part of group 2, sees this permission set on his login screen. But he does not see any buckets listed on s3.

Note, anything that is AWS managed, cannot be altered, hence the addition of custom inline policy on the permission set.

Any idea what's wrong here? Thanks in advance.

2 個答案
0
已接受的答案

Issue got resolved... The inline policy on the permission set, was restricting bucket by specific bucket on resource tag, and somehow this was not working. A specific bucket restriction should be added in condition by the new AWS condition tags.

Swee
已回答 1 年前
0

What is your S3 bucket policy look like?

profile pictureAWS
Niko
已回答 1 年前
  • S3 bucket has basic access for AWSBillingConductor write, so that Billing can dump its monthly reports. Was advised to allow this access through IAM. On another note, had tried modifying s3 policy for that specific sso role arn, but that had not shown the bucket either. Can we add a permission set to s3 bucket policy, instead(permission sets are new to me).

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南