mirror of
https://github.com/ceph/ceph
synced 2025-01-30 23:13:44 +00:00
doc/radosgw: Uppercase s3
Signed-off-by: Anthony D'Atri <anthonyeleven@users.noreply.github.com>
This commit is contained in:
parent
ac0e45656e
commit
73f0d5707d
@ -110,8 +110,8 @@ Examples
|
||||
|
||||
radosgw-admin caps add --uid="TESTER" --caps="roles=*"
|
||||
|
||||
2. The following is an example of AssumeRole API call, which shows steps to create a role, assign a policy to it
|
||||
(that allows access to S3 resources), assuming a role to get temporary credentials and accessing s3 resources using
|
||||
2. The following is an example of the AssumeRole API call, which shows steps to create a role, assign a policy to it
|
||||
(that allows access to S3 resources), assuming a role to get temporary credentials and accessing S3 resources using
|
||||
those credentials. In this example, TESTER1 assumes a role created by TESTER, to access S3 resources owned by TESTER,
|
||||
according to the permission policy attached to the role.
|
||||
|
||||
|
@ -35,7 +35,7 @@ Parameters:
|
||||
**TokenCode** (String/ Optional): The value provided by the MFA device, if MFA is required.
|
||||
|
||||
An administrative user needs to attach a policy to allow invocation of GetSessionToken API using its permanent
|
||||
credentials and to allow subsequent s3 operations invocation using only the temporary credentials returned
|
||||
credentials and to allow subsequent S3 operations invocation using only the temporary credentials returned
|
||||
by GetSessionToken.
|
||||
|
||||
The user attaching the policy needs to have admin caps. For example::
|
||||
|
Loading…
Reference in New Issue
Block a user