Overview
Manage AWS S3 data stores with Appian! Users can access their S3 objects directly from an Appian interface. Appian documents can be uploaded to a S3 bucket with Server-Side Encryption and be configured as Public or Private. The AWS S3 Connected System Plug-in uses the AWS Java SDK to connect to S3.
Key Features & Functionality
Requirements
Access Key Id: the access key id for connecting to S3 can be retrieved from AWS Management Console Navigate to the Users > Summary page and click the “Security credentials” tabSecret Access Key: the secret access key can only be viewed once upon the creation of an access key, see AWS Access Keys documentation for more information: https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys
Notes
Users that want to upload objects as 'Public' must have the correct IAM privileges or an "Access Denied" error will return.
ListAllBuckets related error:I am using the AWS Assume Role Plug-in with the Amazon S3 plug-in. After providing an Access Key ID, Region, Secret Access Key, Role ARN, and Role, I am getting Access Denied Error (403) when using the following role policy:
{ "Version": "2012-10-17", "Statement": [ { "Action": [ "s3:Put*", "s3:Get*", "s3:Delete*", "s3:List*" ], "Effect": "Allow", "Resource": [ "arn:aws:s3:::specificBucket", "arn:aws:s3:::specificBucket/*" ] } ] }
{ "Version": "2012-10-17", "Statement": [ { "Action": [ "s3:Put*", "s3:Get*", "s3:Delete*", "s3:List*" ], "Effect": "Allow", "Resource": [ "arn:aws:s3:::specificBucket", "arn:aws:s3:::specificBucket/*" ] }, { "Action": [ "s3:ListAllMyBuckets" ], "Effect": "Allow", "Resource": [ "*" ] } ] }
However, I cannot give full access to AWS S3 and I need to use the first policy.