Using IPv6 addresses in IAM and Amazon Private CA - Amazon Private Certificate Authority
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Using IPv6 addresses in IAM and Amazon Private CA

Before trying to access Amazon Private Certificate Authority over IPv6, ensure any IAM policies containing IP address restrictions are updated to include IPv6 address ranges. IP based policies that are not updated to handle IPv6 addresses may result in clients incorrectly losing or gaining access when they start using IPv6. To learn more about Amazon Private CA and dual-stack support, see Dual-stack endpoint support.

Important

These statements do not allow any actions. Use these statements in combination with other statements that allow specific actions.

The following statement explicitly denies access to all Amazon Private CA permissions for requests originating from the 192.0.2.* range of IPv4 addresses. Any IP addresses outside of this range are not explicitly denied Amazon Private CA permissions. Since all IPv6 addresses are outside of the denied range, this statement does not explicitly deny Amazon Private CA permissions for any IPv6 addresses.

{ "Sid": "DenyPrivateCAPermissions", "Effect": "Deny", "Action": [ "acm-pca:*" ], "Resource": "*", "Condition": { "NotIpAddress": { "aws:SourceIp": [ "192.0.2.0/24" ] } } }

You can modify the Condition element to deny both IPv4 (192.0.2.0/24) and IPv6 (2001:db8::/32) address ranges as shown in the following example:

{ "Sid": "DenyPrivateCAPermissions", "Effect": "Deny", "Action": [ "acm-pca:*" ], "Resource": "*", "Condition": { "NotIpAddress": { "aws:SourceIp": [ "192.0.2.0/24", "2001:db8::/32" ] } } }