1. 程式人生 > >Use IAM Policy Variables with Federated Users

Use IAM Policy Variables with Federated Users

{
   "Version":"2012-10-17",
   "Statement":[
      {
         "Sid":"AllowListingOfUserFolder",
         "Action":[
            "s3:ListBucket"
         ],

         "Effect":"Allow",

         "Resource":[
            "arn:aws:s3:::TESTBUCKET"
         ],
         "Condition":{
            "StringLike":{
               "s3:prefix":[
                  "TESTBUCKET/${aws:userid}/*"
               ]
            }
         }
      },
      {
         "Sid":"AllowAllS3ActionsInUserFolder",
         "Action":[
            "s3:PutObject",
            "s3:GetObject",
            "s3:GetObjectVersion",
            "s3:DeleteObject"
         ],
         "Effect":"Allow",
         "Resource":[
            "arn:aws:s3:::TESTBUCKET/${aws:userid}/*"
         ]
      }
   ]
}

相關推薦

Use IAM Policy Variables with Federated Users

{ "Version":"2012-10-17", "Statement":[ { "Sid":"AllowListingOfUserFolder", "Action":[ "s3:ListBucket"

強化學習(RLAI)讀書筆記第十一章 Off-policy Methods with Approximation

本書第五章就已經講解過分別使用on-policy和off-policy方法來解決GPI框架裡固有的explore和exploit的矛盾。前兩章已經講了on-policy情形下對於函式近似的拓展,本章繼續講解off-policy下對函式近似的拓展,但是這個拓展比on-policy時更難更不同。在第六第

強化學習(RLAI)讀書筆記第十章On-Policy Control with Approximation

目前繼續考慮on-policy的帶逼近的control演算法。這章主要介紹半梯度Sarsa演算法,也就是半梯度TD(0)演算法對於動作值估計以及on-policy control演算法的自然延伸。雖然這個延伸對於episodic的情況是很自然的,但是對於continuing的情況,我們需要再次考慮對

強化學習(RLAI)讀書筆記第九章On-policy Prediction with Approximation

這一章學習使用on-policy的資料對狀態值函式進行逼近,也就是在策略下估計值函式。這一章的重點在於估計的值函式不是使用表格來表示而是使用引數w的函式形式。一般來說權重引數的數量是遠遠比狀態的數量要小的,而且改變一個權重的大小會影響到很多個狀態值的估計。於是一個值函式的更新會帶來很多其它值函式的改

Connect to Amazon Athena with federated identities using temporary credentials

Many organizations have standardized on centralized user management, most commonly Microsoft Active Directory or LDAP.  Access to AWS resources is

Use WebP images along with other fallback sources to and placeholder to get max image optimization…

Use WebP images along with other fallback sources and placeholder to get max image optimization on the websiteI was figuring out the best way to AUTO optim

Train your own ML model using Scikit and use in iOS app with CoreML (and probably with Augmented…

Next we plot the data using below code —%matplotlib inlineimport matplotlib.pyplot as pltiris_data.hist(bins=50, figsize=(20,15))plt.show()Plot of sepal_le

Ask HN: What tool do you use to sync MongoDB with Elasticsearch?

Currently I am performing full text search on MongoDB but I would love to use Elasticsearch for the same. My primary data source is MongoDB. Right now I am

Use IAM Roles to Restrict API Calls from Specific IP Addresses

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::account-id:user/&

Troubleshoot IAM Policy Issues

Review any service-specific controls that might affect the permissions. For example, VPC endpoint policies and Organization Service Control pol

Use IAM Tags to Restrict EC2 Instances or EBS Volumes

{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowToDescribeAll", "Effect": "Allow",

How to use Retrofit on android with Kotlin (KAD 21)

This is just one more example about how in Kotlin we can continue to use the same libraries we’ve always used in Java for Android. Retrofit is a libr

Use SSL/TLS Certificate with HTTPS load balancer

You can configure load balancers to use the SSL/TLS protocol for encrypted connections between the load balancer and clients that initiate HTTP

Attach and use an elastic GPU with my Windows EC2 instance

To launch an instance and associate it with an elastic GPU during launch, follow the instructions for Working with Elastic GPUs or consider the

Use IAM Policies to Grant Access to User

{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowUserToSeeBucketListInTheConsole", "Action": [

Accessing Outside Variables with the Final Keyword內部類訪問外部變數

Sometimes you want to access information available outside of the inner class. Consider the following example. You’ve got a screen with

How to Use an SSL Certificate on ACM or IAM with CloudFront

{ "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": [ "acm:ListCertificates",

Use Wildcards With Explicit Deny With Principle Elements in an S3 Bucket Policy

{ "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": "*",

pod 導入第三方 linker command failed with exit code 1 (use -v to see invocation)

pod 技術 html code all -o png targe wid 一般是因為導入了的文件重復 TARGES的other linkers 下的-all_load和-ObjC以及其他的庫的”-XXX”, -all_load就包括了其他的 刪除掉-all_load

3% of users browse with IE9 and 14% of users have a disability. Why do we only cater for the former?

我的網站 作品 form 我不 post ability img gpo 想要 我想要用一個否定聲明來開始我的文章:對於怎樣創造一個易於用戶體驗的站點,我也不是了解非常多。 讓作為一個資深開發人員的我操心的是,我在並沒有獲得太多關於這個主題(指怎樣創造一個