<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>How do i know root cause of the issue when trying to connect appian and AWS S3</title><link>https://community.appian.com/discussions/f/integrations/35126/how-do-i-know-root-cause-of-the-issue-when-trying-to-connect-appian-and-aws-s3</link><description>Hello, 
 We have a AWS environment setup completed and trying to use AWS S3 using connected system by providing access key and secret key. I see an error saying &amp;quot; Access Denied (Service: Amazon S3; Status Code: 403; Error Code: AccessDenied; Request ID</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: How do i know root cause of the issue when trying to connect appian and AWS S3</title><link>https://community.appian.com/thread/136377?ContentTypeID=1</link><pubDate>Tue, 04 Jun 2024 15:59:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c22033bf-29b2-4738-ae63-8efcee327acd</guid><dc:creator>Stefan Helzle</dc:creator><description>&lt;p&gt;I am not sure it is clever to configure MFA. I assume you want to use a service account to perform the actual calls, MFA will probably not work.&lt;/p&gt;
&lt;p&gt;Said that, I am not a AWS or S3 expert and my naive next step would be to just test this.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: How do i know root cause of the issue when trying to connect appian and AWS S3</title><link>https://community.appian.com/thread/136376?ContentTypeID=1</link><pubDate>Tue, 04 Jun 2024 15:45:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:8be4bfcd-5417-42c5-b4bf-40c1d78f562b</guid><dc:creator>Chaithra A R</dc:creator><description>&lt;p&gt;Thank you for&amp;nbsp;your&amp;nbsp;inputs &lt;a href="/members/stefanhelzle0001"&gt;Stefan Helzle&lt;/a&gt;&amp;nbsp;. In continuation to the above we have MFA enabled in AWS environment. Considering this and above mentioned scenarios do we have to establish any setup from Appian side.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: How do i know root cause of the issue when trying to connect appian and AWS S3</title><link>https://community.appian.com/thread/136164?ContentTypeID=1</link><pubDate>Fri, 31 May 2024 08:58:24 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:4fdf7d9d-325b-45b2-93f9-364cd4124a7f</guid><dc:creator>Stefan Helzle</dc:creator><description>&lt;p&gt;My AI&amp;nbsp;told me this, when shown your error message. Please use it with care as LLMs sometimes write nonsense.&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="markdown"&gt;The error message you&amp;#39;re seeing indicates that your request to access an Amazon S3 (Simple Storage Service) resource was denied due to insufficient permissions. Here’s a breakdown of the error message:

- **Service**: Amazon S3
- **Status Code**: 403 (Forbidden)
- **Error Code**: AccessDenied
- **Request ID**: GEC4SADZ0V9EAXY5
- **S3 Extended Request ID**: K1xnNBqqSOyIRzaG4oVhOF5gl445LMP0PhElTnz4pVJ8vb0ERbzMeoYFuJgwzGAzQMzss4FCqM8=
- **Proxy**: null

### Possible Causes and Solutions

1. **Insufficient Permissions**:
   - **Cause**: The AWS Identity and Access Management (IAM) user or role making the request does not have the necessary permissions to access the S3 resource.
   - **Solution**: Ensure that the IAM user or role has the appropriate permissions. You can attach a policy that grants the necessary permissions. For example:
     ```json
     {
       &amp;quot;Version&amp;quot;: &amp;quot;2012-10-17&amp;quot;,
       &amp;quot;Statement&amp;quot;: [
         {
           &amp;quot;Effect&amp;quot;: &amp;quot;Allow&amp;quot;,
           &amp;quot;Action&amp;quot;: &amp;quot;s3:GetObject&amp;quot;,
           &amp;quot;Resource&amp;quot;: &amp;quot;arn:aws:s3:::your-bucket-name/your-object-key&amp;quot;
         }
       ]
     }
     ```

2. **Bucket Policy Restrictions**:
   - **Cause**: The S3 bucket policy might be restricting access.
   - **Solution**: Check the bucket policy to ensure it allows access to the IAM user or role. For example:
     ```json
     {
       &amp;quot;Version&amp;quot;: &amp;quot;2012-10-17&amp;quot;,
       &amp;quot;Statement&amp;quot;: [
         {
           &amp;quot;Effect&amp;quot;: &amp;quot;Allow&amp;quot;,
           &amp;quot;Principal&amp;quot;: {
             &amp;quot;AWS&amp;quot;: &amp;quot;arn:aws:iam::account-id:user/username&amp;quot;
           },
           &amp;quot;Action&amp;quot;: &amp;quot;s3:GetObject&amp;quot;,
           &amp;quot;Resource&amp;quot;: &amp;quot;arn:aws:s3:::your-bucket-name/your-object-key&amp;quot;
         }
       ]
     }
     ```

3. **Object-Level Permissions**:
   - **Cause**: The object itself might have an ACL (Access Control List) that denies access.
   - **Solution**: Check the ACL of the object to ensure it grants the necessary permissions.

4. **MFA (Multi-Factor Authentication)**:
   - **Cause**: If the bucket policy requires MFA, the request must include valid MFA authentication.
   - **Solution**: Ensure that the request includes MFA authentication if required.

5. **VPC Endpoint Policies**:
   - **Cause**: If you are accessing the S3 bucket through a VPC endpoint, the endpoint policy might be restricting access.
   - **Solution**: Check the VPC endpoint policy to ensure it allows the necessary actions.

### Steps to Troubleshoot

1. **Verify IAM Policies**:
   - Check the IAM policies attached to the user or role making the request.
   - Ensure the policies grant the necessary S3 permissions.

2. **Check Bucket Policy**:
   - Review the bucket policy to ensure it allows access to the user or role.

3. **Review Object ACLs**:
   - Check the ACLs of the specific object you are trying to access.

4. **Examine VPC Endpoint Policies**:
   - If applicable, review the VPC endpoint policies.

5. **Use AWS CLI for Testing**:
   - Use the AWS CLI to test access and get more detailed error messages.
     ```sh
     aws s3 cp s3://your-bucket-name/your-object-key .
     ```

By systematically checking these areas, you should be able to identify and resolve the access issue.&lt;/pre&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: How do i know root cause of the issue when trying to connect appian and AWS S3</title><link>https://community.appian.com/thread/136159?ContentTypeID=1</link><pubDate>Fri, 31 May 2024 08:14:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:62c47bb5-300a-4ebb-9dfb-c113396a8a1f</guid><dc:creator>Shubham Aware</dc:creator><description>&lt;p&gt;Hello &lt;a href="/members/chaithraa0001"&gt;Chaithra A R&lt;/a&gt;&amp;nbsp;&lt;br /&gt;You&amp;#39;re getting &amp;quot;Access Denied&amp;quot; error from S3. I would recommend to,&lt;br /&gt;Verify credentials and bucket name. Review IAM policy for S3 actions (use IAM Policy Simulator).&lt;br /&gt;&lt;br /&gt;This articles might help you.&lt;br /&gt;&lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/troubleshoot-403-errors.html"&gt;https://docs.aws.amazon.com/AmazonS3/latest/userguide/troubleshoot-403-errors.html ,&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html"&gt;https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>