Access Control: Reviewing and Setting
    • 25 Jun 2024
    • 1 Minute to read
    • PDF

    Access Control: Reviewing and Setting

    • PDF

    Article summary

    An access control list (ACL) enables you to manage the users and groups that have access to buckets and objects. ACLs are a deprecated version of access control and are only recommended to be modified for legacy applications. Access to buckets is best controlled with bucket policies, as described in Policies. But, if you want to use an ACL, follow the instructions below.

    Reviewing Access Control

    1. On the Buckets list, clickfor the desired bucket.
    2. Click Settings.
    3. Click the Access Control tab. The Quick Settings panel is displayed. For example:

    Setting Access Control

    1. On the Buckets list, clickfor the desired bucket.
    2. Click Settings.
    3. Click the Access Control tab. The Quick Settings panel is displayed, as shown above.
    4. Click Set for any access control area you want to change.
    5. Be sure to review the warning message. Then, click Set.



    ESC

    Eddy AI, facilitating knowledge discovery through conversational intelligence