Configuring the IAM user policy - PingAuthorize - 9.3

PingAuthorize 9.3

bundle
pingauthorize-93
ft:publication_title
PingAuthorize 9.3
Product_Version_ce
PingAuthorize 9.3 (Latest)
category
ContentType
Product
Productdocumentation
paz-93
pingauthorize
ContentType_ce
Product documentation

To manage your deployment package store, configure a new identity and access management (IAM) policy in the IAM dashboard of AWS Management Console.

  1. Sign on to the IAM dashboard in AWS Management Console.
  2. Go to Access Management > Policies and click Create policy.
    Screen capture of the Policies page with the Create policy button in the IAM dashboard of AWS Management Console
  3. In the Create policy wizard, select the JSON tab and enter these permissions:
    {
        "Version": "<policy_creation_date>",
        "Statement": [
            {
                "Effect": "Allow",
                "Action": [
                    "s3:PutObject",
                    "s3:GetObject",
                    "s3:ListBucket"
                ],
                "Resource": "*"
            }
        ]
    }
    Note:

    You can manage S3 bucket access in multiple ways, including IAM policies, S3 policies, or S3 access control lists (ACLs). We provide a working IAM policy example, but you should be aware of current AWS best practices, industry best practices, and your organization's conventions when configuring S3 bucket access.

    1. Optional: Replace the asterisk wildcard character to restrict the access scope of the previous policy.
  4. Complete the Create policy wizard according to your organization's specifications.
  5. On the Review policy confirmation page, review your configurations and click Create policy to create the IAM user policy.