Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions,
see Getting Started with Amazon Web Services in China
(PDF).
IAM identity-based policies for
S3 Tables
By default, users and roles don't have permission to create or modify tables and table
buckets. They also can't perform tasks by using the s3 console, Amazon Command Line Interface
(Amazon CLI), or Amazon S3 REST APIs. To create and access table buckets and tables, an Amazon Identity and Access Management (IAM)
administrator must grant the necessary permissions to the IAM role or users. To learn how
to create an IAM identity-based policy by using these example JSON policy documents, see
Creating IAM
policies in the IAM User Guide.
The following topic includes examples of IAM identity-based policies. To use the following example policies, replace the user input
placeholders
with your own information.
Example 1: Allow access to create and use table buckets
.
- JSON
-
-
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowBucketActions",
"Effect": "Allow",
"Action": [
"s3tables:CreateTableBucket",
"s3tables:PutTableBucketPolicy",
"s3tables:GetTableBucketPolicy",
"s3tables:ListTableBuckets",
"s3tables:GetTableBucket"
],
"Resource": "arn:aws-cn:s3tables:us-east-1
:111122223333
:bucket/*"
}
]
}
Example 2: Allow access to create and use tables in a table bucket
- JSON
-
-
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowBucketActions",
"Effect": "Allow",
"Action": [
"s3tables:CreateTable",
"s3tables:PutTableData",
"s3tables:GetTableData",
"s3tables:GetTableMetadataLocation",
"s3tables:UpdateTableMetadataLocation",
"s3tables:GetNamespace",
"s3tables:CreateNamespace"
],
"Resource": [
"arn:aws:s3tables:us-east-1
:111122223333
:bucket/amzn-s3-demo-bucket
",
"arn:aws:s3tables:us-east-1
:111122223333
:bucket/amzn-s3-demo-bucket
/table/*"
]
}
]
}