Reputation: 1317
We have a website hosted on AWS S3 that we intend to be accessed only by a limited group of people. Right now, we are white listing the allowed IPs, as described in Restrict access to website hosted on S3.
However, some of the people that must have access to this website don't have static ips, which forces us to constantly update the whitelisted ips on the AWS policy.
I'm pretty sure something like client side certificates should work, but I have no idea how to implement that in terms of AIM policy. Any other (simpler) alternative that does not rely on the IPs being static? I'm guessing adding ssh keys to AWS wouldn't do any good in this case, right?
Upvotes: 1
Views: 842
Reputation: 19728
One alternative approach is to setup user based access control. You can do this by using the following AWS services.
The steps are as follows
After the setup, users should be able to login and access S3 through API Gateway.
Upvotes: 2