S3: The bucket can not be accessed by its root account?
The permission granting things of S3 is rather complicated. As far as I have understood the root account (that with email login) should have access to anything, except for objects in bucket which do not belong to it (which is not the case).
My setting:
> a root account, called: myroot a IAM user, called myiam, whose parent
> account is myroot
myiam create a bucket, called mybucket. without granting permission, myroot can not have access to it.
I looked up the aws documentation(http://docs.aws.amazon.com/AmazonS3/latest/dev/access-control-overview.html), think that shouldn't be the case
By default, all Amazon S3 resources are private. Only a resource owner can access the resource. The resource owner refers to the AWS account that creates the resource. For example:
The AWS account that you use to create buckets and objects owns those resources. If you create an AWS Identity and Access Management (IAM) user in your AWS account, your AWS account is the parent owner. If the IAM user uploads an object, the parent account, to which the user belongs, owns the object.
It should work just fine.
I did the following to test your situation:
Actions -> Open
to generate a Signed URL) 上一篇: IAM角色基于来自另一个帐户的现有证书集
下一篇: S3:存储桶不能通过其root帐户访问?