Granting an Account Read Permissions on Certain Objects

Scenario

This case describes how to grant other accounts (excluding IAM users under the account) the read permission for an object or a type of objects in an OBS bucket. For details about how to grant permissions to an IAM user, see Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket.

Configuration Precautions

The preset read-only mode of OBS has the following permissions:

  • GetObject: downloading objects

  • GetObjectVersion: downloading versioned objects

After the configuration is complete, you can read (download) specific objects using APIs. However, if you download an object from OBS Console or OBS Browser+, an error is reported indicating that you do not have required permissions.

This is because when you log in to OBS Console or OBS Browser+, APIs (such as ListAllMyBuckets and ListBucket) are called to load the bucket list and object list and some other APIs will also be called on other pages, but your permissions do not cover those APIs. In such case, your access is denied or your operation is not allowed.

Procedure

  1. In the navigation pane of OBS Console, choose Object Storage.

  2. In the bucket list, click the bucket name you want to go to the Overview page.

  3. In the navigation pane, choose Permissions.

  4. On the Bucket Policies page, click Create Bucket Policy under Custom Bucket Policies.

  5. Configure parameters for a bucket policy.

    **Figure 1** Configuring parameters for a bucket policy

    Figure 1 Configuring parameters for a bucket policy

    Table 1 Parameters for creating a bucket policy

    Parameter

    Description

    Policy Mode

    Select Read-only.

    Principal

    • Select Include > Other account.

    • Account ID: Enter the ID of the account which you want to grant permissions to. You can obtain it from the My Credentials page of the account.

    • User ID: Enter the account ID, which can be obtained from the My Credentials page of the account.

      Note

      In this example, permissions are granted to an account, excluding any IAM user under the account. Therefore, the user ID is the same as the account ID.

    Resources

    • Include

    • Resource Name: Enter the object or the set of objects that will be accessed.

      For one object, enter object name.

      For a set of objects, enter object name prefix + *, * + object name suffix, or *.

  6. Click OK. The bucket policy is created.