Reputation: 63
I am working on a system that allows users to access, process and retrieve S3 data by making HTTP requests to AWS API Gateway which invokes an AWS Lambda function. A S3 path can be a parameter to these requests. I'm trying to find an IAM native solution that will evaluate the fine-grained S3 permission (assigned to my users) with the lambda service role to determine object/bucket level access at runtime.
Similar to what is depicted here (AWS QuickSight)
Upvotes: 0
Views: 371
Reputation: 270134
No, this is not possible.
API Gateway will trigger an AWS Lambda function. The Lambda function is assigned an IAM Role, which is independent of "who" made the call.
You will need to incorporate permission restrictions into the Lambda function as code. (Eg lookup user, determine what they can do, then decide what calls to make on their behalf.)
Upvotes: 2