Zata
LoginSignup
  • Getting Started with Zata.ai
    • Create & activate Account
  • Dashboard
  • Manage
    • Bucket
      • Create Bucket
        • To store objects in a Bucket
      • Deleting the Bucket
      • Bucket Policy
      • Applying Limitations with Bucket Policies
      • Share an object with a presigned URL
    • Access Keys
      • Creating a New Access Key
    • Service URLs for Zata.ai S3
    • Migration
      • Migrate from AWS S3 storage to Zata.ai S3 storage
      • Migrate from Wasabi S3 storage to Zata.ai S3 storage
  • Users
    • Create a Subuser
    • Create a new access key and secret key for the specific subuser.
    • Roles
  • Account
    • Billing
    • Ingress and Egress Policy
  • KnowledgeBase
    • Integration
      • Connect Acronis Backup Gateway With ZATA.AI
      • Connect Bucket with CloudBerry
      • Connect MSP360 Backup With ZATA.AI
      • Connect Veeam Backup Gateway With ZATA.AI
      • Connect Ahsay cloud backup suite(ACBS) with Zata.ai
      • Connect Commvault Backup with ZATA.AI
      • Connect Vembu Backup with ZATA.AI
    • Mount S3 bucket to Linux operating system
    • Connect Bucket with S3 Client
    • Connect Bucket with Cyberduck
    • How to Transfer Data to Zata.ai Bucket Using Rclone
      • For Linux Server
      • For Windows Server
    • Connect S3 storage to CPanel
    • Backup your WordPress Site to Zata.ai S3 storage with using Updraft plugin.
    • Connect S3 Drive to Zata.ai
    • Mount Bucket to Local system using the TntDrive
    • How to Integrate QNAP NAS storage and Backup to Zata.ai
  • FAQ
    • What are the regions of Zata.ai?
    • What is the billing process for Zata.ai ?
    • What happens if I miss a Payment ?
    • How can I get support for billing-related issue?
    • What are the terms and conditions for using Zata.ai services?
    • Where can I find additional information on pricing and billing?
  • Support
Powered by GitBook
On this page
  1. Manage
  2. Bucket

Bucket Policy

PreviousDeleting the BucketNextApplying Limitations with Bucket Policies

Last updated 5 months ago

Permission is available to attach a policy to a bucket to define the actions that can take place on the bucket and the condition under which those actions can occur.

For a bucket policy, you can edit an existing policy or delete it. Defining, editing, and deleting a bucket policy are described in this article.

Navigate to the manage and click on the Buckets

Select the Bucket, click for the bucket, and select the Settings

Click the Permissions section, and a policy template is provided that you can edit accordingly. Then click Save to save the policy.

For example, I have created a policy to access objects inside the bucket by following these steps.

{
    "Version": "2012-10-17",
    "Statement": [{
      "Effect": "Allow",
      "Principal": {"AWS": ["arn:aws:iam:::user/4fe084dd-8531-4087-bc89-91cca2c9ea8d:Access"]},
      "Action": "s3:GetObject",
      "Resource": [
        "arn:aws:s3:::panktestbucket/*"
      ]
    }]
  }

In this policy, I have defined the

Effect- Allow

Principal: I have changed the sub-user name, I have used (Access user)

{"AWS": ["arn:aws:iam:::user/4fe084dd-8531-4087-bc89-91cca2c9ea8d:<subuser>"]},

Action : "s3:GetObject"

Resource: "arn:aws:s3:::panktestbucket/*"

Now set all the values to click the save.

To check the created policy, click on the Properties section.

Delete the Bucket policy

Navigate to the Buckets > Action > Settings > Properties and click on the delete

Make sure first of all create a .

USER