Skip to main content

Attaching IAM Policies

IAM policies are attached to access keys. If you delete and recreate an access key, you'll need to attach IAM policies to the new access key.

note

Before you start, make sure you have your AWS CLI configured with the Tigris credentials. You can do this by following the instructions in the Getting Started with Tigris guide.

1. Create an access key in the Tigris Dashboard

First, create an access key. You can do this using the Tigris Dashboard or the AWS CLI. For more information, refer to the Create an Access Key guide.

Make sure to not grant access to any bucket when creating the access key. This will create an access key with no permissions.

2. Create the IAM policy

Then, create an IAM policy. Assuming you have already created a policy file (policy.json), you can attach it to the access key using the following command:

aws --profile=tigris iam --endpoint-url=https://iam.storage.dev create-policy --policy-name <example-org-level-unique-policy-name> --policy-document file:///path/to/policy.json

This command creates a new IAM policy using the specified JSON file. Make sure to replace <example-org-level-unique-policy-name> with a unique name for your policy.

3. Attach the IAM policy to the access key

Next, attach the IAM policy to the access key using the following command:

aws --profile=tigris iam --endpoint-url=https://iam.storage.dev attach-user-policy --policy-arn <generated_policy_arn_from_previous_step> --user-name <tid_>

This command attaches the IAM policy to the access key, allowing it to perform the actions specified in the policy. Make sure to replace <generated_policy_arn_from_previous_step> with the ARN of the policy you created in the previous step and <tid_> with the access key ID you created in the first step.