Access Control: Reviewing and Setting
- 25 Jun 2024
- 1 Minute to read
- Print
- PDF
Access Control: Reviewing and Setting
- Updated on 25 Jun 2024
- 1 Minute to read
- Print
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
An access control list (ACL) enables you to manage the users and groups that have access to buckets and objects. ACLs are a deprecated version of access control and are only recommended to be modified for legacy applications. Access to buckets is best controlled with bucket policies, as described in Policies. But, if you want to use an ACL, follow the instructions below.
Reviewing Access Control
- On the Buckets list, clickfor the desired bucket.
- Click Settings.
- Click the Access Control tab. The Quick Settings panel is displayed. For example:
Setting Access Control
- On the Buckets list, clickfor the desired bucket.
- Click Settings.
- Click the Access Control tab. The Quick Settings panel is displayed, as shown above.
- Click Set for any access control area you want to change.
- Be sure to review the warning message. Then, click Set.