Skip to content

Commit 049b253

Browse files
authored
Update guide.en-gb.md
minor fixes on latest version
1 parent 5f264a6 commit 049b253

File tree

1 file changed

+2
-5
lines changed
  • pages/storage_and_backup/object_storage/s3_identity_and_access_management

1 file changed

+2
-5
lines changed

pages/storage_and_backup/object_storage/s3_identity_and_access_management/guide.en-gb.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -84,13 +84,10 @@ Select the access profile for this user and click `Confirm`{.action}.
8484
#### Overview
8585
By default, all resources (buckets, objects) and sub-resources (lifecycle configuration, webite configuration, ...etc) are private in Object Storage. Only the resource owner, i.e the user account that creates it, has full control.
8686

87-
Access to private resources can be granted via access policies.
88-
89-
Access policies can be categorized broadly into 2 types :
87+
Access to private resources can be granted via access policies. Access policies can be categorized broadly into 2 types :
9088
- user based: access policies attached to a specific user are called user policies. A user policy is evaluated using Object Storage IAM permissions and applies only to the specific user it is attached to.
9189
- resource based : bucket policies and ACLs are policies that are attached directly to specific resources
9290

93-
Access policies attached to a specific user are called user policies. A user policy is evaluated using Object Storage IAM permissions and applies only to the specific user it is attached to.
9491

9592
> [!primary]
9693
>
@@ -113,7 +110,7 @@ Click on the `...`{.action} at the end of your user's line, then `Import JSON fi
113110

114111
#### Understanding the user policy evaluation process
115112
At the moment, user permissions are evaluated as follows:
116-
1. if exists, evaluate user policy<br>
113+
1. if exists, evaluate user policy else fallback to ACLs<br>
117114
1.1 check for an explicit deny: if there is an explicit deny, then deny permission, else, check for an explicit allow<br>
118115
1.2 check for an explicit allow: if there is an explicit allow, then allow permission<br>
119116
1.3 if there is no explicit deny nor explicit allow, then fallback to ACLs<br>

0 commit comments

Comments
 (0)