How to access Amazon S3 via Single Sign-On
AWS Single Sign-On (AWS SSO) is a cloud service that allows you to grant your users access
to AWS resources, such as Amazon S3, across multiple AWS accounts.
With S3 Browser you can easily work
with Amazon S3 via AWS SSO, it provides user-friendly way to configure Amazon S3 access via the Single Sign-On service.
To configure Amazon S3 via AWS Single Sign-On:
1. Start S3 Browser and click Accounts -> Add New Account.
Click Accounts -> Add New Account
The Add New Account dialog will open:
New Amazon S3 via AWS SSO account dialog.
2. Choose the Amazon S3 via SSO account type
3. Enter single sign-on account details:
Start URL - the URL that points to the organization's AWS SSO user portal.
SSO Region - the AWS Region that contains the AWS SSO portal host.
Account ID - the AWS account ID that contains the IAM role you want to use.
Role name - the name of the IAM role that defines the user's permissions.
8. Click Add new account
You can now choose the newly added account from the accounts menu:
Click Accounts -> Account Name to switch between accounts.
Advanced Account Settings
You may also configure additional settings when adding new or editing existing account.
In order to open advanced account settings, please click the advanced settings link
located at the bottom left corner of the dialog.
The Advanced Account Settings dialog will open:
Advanced account settings
You may configure the following settings here:
Enable Dual-Stack Endpoints (IPv4/IPv6) - When checked, S3 Browser will use dual-stack endpoints
to access storage, allowing connections over both IPv4 and IPv6.
This improves compatibility with networks that support IPv6.
List All My Buckets When Account Assigned - When checked, S3 Browser will perform the
s3:ListAllMyBuckets call when the account is assigned. If the account does not have permission
to list all buckets, you can uncheck this option to avoid failed tasks and warnings in the log.
Check CloudFront Distributions When Account Assigned - When checked, S3 Browser will perform the
cloudfront:ListDistributions call when the account is assigned, allowing it to set a special
icon for buckets used as origins for CloudFront distributions. If the account does not have permission to
list CloudFront distributions, you can uncheck this option to avoid failed tasks and warnings in the log.
External Buckets - You can edit the external buckets associated with the account. Each bucket should be listed on a new line.
Optional paths are also supported, with a slash used as the delimiter (e.g., my-bucket/and/optional/path).
|