Using IPv6 addresses in IAM and Amazon Private CA
Before trying to access Amazon Private Certificate Authority over IPv6, ensure any IAM policies containing IP address restrictions are updated to include IPv6 address ranges. IP based policies that are not updated to handle IPv6 addresses may result in clients incorrectly losing or gaining access when they start using IPv6. To learn more about Amazon Private CA and dual-stack support, see Dual-stack endpoint support.
Important
These statements do not allow any actions. Use these statements in combination with other statements that allow specific actions.
The following statement explicitly denies access to all Amazon Private CA permissions for
requests originating from the 192.0.2.* range of IPv4 addresses. Any IP
addresses outside of this range are not explicitly denied Amazon Private CA permissions. Since
all IPv6 addresses are outside of the denied range, this statement does not
explicitly deny Amazon Private CA permissions for any IPv6 addresses.
{ "Sid": "DenyPrivateCAPermissions", "Effect": "Deny", "Action": [ "acm-pca:*" ], "Resource": "*", "Condition": { "NotIpAddress": { "aws:SourceIp": [ "192.0.2.0/24" ] } } }
You can modify the Condition element to deny both IPv4
(192.0.2.0/24) and IPv6 (2001:db8::/32) address ranges
as shown in the following example:
{ "Sid": "DenyPrivateCAPermissions", "Effect": "Deny", "Action": [ "acm-pca:*" ], "Resource": "*", "Condition": { "NotIpAddress": { "aws:SourceIp": [ "192.0.2.0/24", "2001:db8::/32" ] } } }