This topic describes how to grant an IAM user the read/write permission on an OBS bucket.
To grant resource-level permissions to an IAM user, use a bucket policy.
After configuration, the IAM user can use APIs or SDKs to upload, download, and delete objects in the bucket. However, if they log in to OBS Console or OBS Browser+ to perform those operations, an error will be reported indicating that they do not have required permissions. .
If you still want the IAM user to perform read and write operations on OBS Console or OBS Browser+, you need to configure custom IAM policies. For details, see Follow-up Procedure.
After configuration, the system still displays a message indicating that the IAM user does not have required permissions, because OBS Console also calls other APIs for advanced configurations. However, the IAM user can still perform read/write operations.
Parameter |
Description |
---|---|
Policy Mode |
Select Read and write. |
Principal |
|
Resources |
|
To perform read and write operations on OBS Console or OBS Browser+, you must add the obs:bucket:ListAllMyBuckets (for listing buckets) and obs:bucket:ListBucket (for listing objects in a bucket) permissions to the custom IAM policy.
obs:bucket:ListAllMyBuckets applies to all resources, while obs:bucket:ListBucket applies only to the authorized bucket. Therefore, you need to add these two permissions to the policy.
Parameter |
Description |
---|---|
Policy Name |
Enter a policy name. |
Policy View |
Select one based on your own habits. Visual editor is used here. |
Policy Content |
[Permission 1]
[Permission 2]
|
Scope |
Use the default value Global services. |
Apply the created custom policy to the user group by following the instructions in the IAM document.
Due to data caching, it takes about 10 to 15 minutes for a custom policy to take effect.