Cloud Storage and IAM; An Introduction
There are several ways to control access to Cloud Storage resources, including buckets and objects in those buckets.
1. Cloud IAM is the preferred way to control access to buckets and objects.
2. For complex access control logic or when you need to control access to individual objects, you may need to use access control lists (ACLs).
3. Signed URLs is another option for granting access. These URLs are generated by you and shared with someone to whom you want to grant access but only for a short period of time.
4. If you want to control what can be uploaded to a bucket, you can use a signed policy document.
In this section, we will focus on the use of Cloud IAM with Cloud Storage.
Cloud Storage permissions are organized around resources, such as buckets, objects, and Hash-based Message Authentication Code (HMAC) keys. The bucket permissions allow users to create, delete, and list buckets. There are also permissions for getting and updating metadata as well as setting and getting IAM policies.
Object permissions also have create, delete, and list permissions as well as metadata and IAM policy permissions.
Comments
Post a Comment