Authorization and authentication caching - Amazon Simple Storage Service
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Authorization and authentication caching

S3 on Outposts securely caches authentication and authorization data locally on Outposts racks. The cache removes round trips to the parent Amazon Web Services Region for every request. This eliminates the variability that is introduced by network round trips. With the authentication and authorization cache in S3 on Outposts, you get consistent latencies that are independent from the latency of the connection between the Outposts and the Amazon Web Services Region.

When you make an S3 on Outposts API request, the authentication and authorization data is securely cached. The cached data is then used to authenticate subsequent S3 object API requests. S3 on Outposts only caches authentication and authorization data when the request is signed using Signature Version 4A (SigV4A). The cache is stored locally on the Outposts within the S3 on Outposts service. It asynchronously refreshes when you make an S3 API request. The cache is encrypted, and no plaintext cryptographic keys are stored on Outposts.

The cache is valid for up to 10 minutes when the Outpost is connected to the Amazon Web Services Region. It is refreshed asynchronously when you make an S3 on Outposts API request, to ensure that the latest policies are used. If the Outpost is disconnected from the Amazon Web Services Region, the cache will be valid for up to 12 hours.

Configuring the authorization and authentication cache

S3 on Outposts automatically caches authentication and authorization data for requests signed with the SigV4A algorithm. For more information, see Signing Amazon API requests in the Amazon Identity and Access Management User Guide. The SigV4A algorithm is available in the latest versions of the Amazon SDKs. You can obtain it through a dependency on the Amazon Common Runtime (CRT) libraries.

You need to use the latest version of the Amazon SDK and install the latest version of the CRT. For example, you can run pip install awscrt to obtain the latest version of the CRT with Boto3.

S3 on Outposts does not cache authentication and authorization data for requests signed with the SigV4 algorithm.

Validating SigV4A signing

You can use Amazon CloudTrail to validate that requests were signed with SigV4A. For more information on setting up CloudTrail for S3 on Outposts, see Monitoring S3 on Outposts with Amazon CloudTrail logs.

After you have configured CloudTrail, you can verify how a request was signed in the SignatureVersion field of the CloudTrail logs. Requests that were signed with SigV4A will have a SignatureVersion set to Amazon4-ECDSA-P256-SHA256. Requests that were signed with SigV4 will have SignatureVersion set to Amazon4-HMAC-SHA256.