You can attach the following policy to the basket:
{ "Version": "2008-10-17", "Id": "Policy1358656005371", "Statement": [ { "Sid": "Stmt1354655992561", "Effect": "Allow", "Principal": { "AWS": [ "arn:aws:sts::778671367984:federated-user/ dean@player.com " ] }, "Action": [ "s3:List*", "s3:Get*" ], "Resource": [ "arn:aws:s3:::my.bucket", "arn:aws:s3:::my.bucket/*" ] } ] }
grant federated user dean@player.com read-only permissions on 'my.bucket'.
This policy is not very convenient to maintain because it, in particular, calls this user. To provide access only to specific federated users in a more scalable way, it would be better to do this when you call GetFederationToken. If you publish your STS code, I can help you assign a policy there, but it is very similar to the one above.
source share