Skip to content

Commit 29d4dea

Browse files
fix 118
While the previous solution works, I think these options provide a cleaner approach following best practices. I'm very open to learn why I might be wrong.
1 parent 05f50fe commit 29d4dea

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1614,11 +1614,11 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
16141614

16151615
### A company has an application where reading objects from Amazon S3 is based on the type of user. The user types are registered user and guest user. The company has 25,000 users and is growing. Information is pulled from an S3 bucket depending on the user type. Which approaches are recommended to provide access to both user types? (Choose TWO)
16161616

1617-
- [x] Provide a different access key and secret access key in the application code for registered users and guest users to provide read access to the objects.
1618-
- [x] Use S3 bucket policies to restrict read access to specific IAM users.
1619-
- [ ] Use Amazon Cognito to provide access using authenticated and unauthenticated roles.
1617+
- [ ] Provide a different access key and secret access key in the application code for registered users and guest users to provide read access to the objects.
1618+
- [ ] Use S3 bucket policies to restrict read access to specific IAM users.
1619+
- [x] Use Amazon Cognito to provide access using authenticated and unauthenticated roles.
16201620
- [ ] Create a new IAM user for each user and grant read access.
1621-
- [ ] Use the AWS IAM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) AssumeRole action depending on the type of user and provide read access to Amazon S3 using the assumed role.
1621+
- [x] Use the AWS IAM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) AssumeRole action depending on the type of user and provide read access to Amazon S3 using the assumed role.
16221622

16231623
**[⬆ Back to Top](#table-of-contents)**
16241624

0 commit comments

Comments
 (0)