Configure STS Role
Perform the following steps to configure STS role.
- To set the AWS Security Token Service (STS) role, include the following property in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, and then click on Access Management -> ADVANCED tab.
- Add the following property with the appropriate value for
<your_profile_name>
,<account_id>
, and<your_STS_role>
:Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Add UserInfo in S3 Requests¶
This feature enables the logging of the privacera-username attempting to access S3 data via the Privacera Dataserver in the AWS CloudWatch logs.
You can find the privacera-username represented as a request parameter {privacera-user: callingUser} in the AWS CloudWatch Logs for the specific resource that the calling user is attempting to access.
To enable this feature, follow these steps:
- Navigate to Settings > Applications > S3, and click the pencil icon to edit properties.
- Toggle the button for the service you wish to enable.
- In the ADVANCED tab, add the following custom property:
Properties - Click Save.
Create Custom S3 Service Repository¶
For information on using a custom s3 service repository, visit - Use Custom Service Repository for S3.
Configuration to avoid removing S3 directory markers from access check¶
By default, the Privacera Dataserver removes the S3 directory markers _$folder$
, __PLACEHOLDER__
from the resource path before applying the access check on OLAC use cases.
To enable access check including the directory marker set the following property in the vars.dataserver.aws.yml
file as:
YAML | |
---|---|
If the above property is set to false
an access extra audit will be generated on the resource path with a directory marker prefix.
A policy needs to be created in S3 service repository to grant appropriate access on the directory path as below:
- Prev topic: Advanced Configuration