Supported S3 ACL Permissions

The following tables describe the supported permissions for primary and canned ACLs:

Table 2-2 Primary ACL: Grantee Supported Permissions

Permission When Granted on Bucket When Granted on Object

READ

Enables grantee to list the objects in the bucket.

Enables grantee to read the object data and its metadata.

WRITE

Enables grantee to create, overwrite, and delete any object in the bucket.

Not applicable.

READ_ACP

Enables grantee to read the bucket ACL.

Enables grantee to read the object ACL.

WRITE_ACP

Enables grantee to write the ACL for the applicable bucket.

Enables grantee to write the ACL for the applicable object.

FULL_CONTROL

Allows grantee the READ, WRITE, READ_ACP, and WRITE_ACP permissions on the bucket.

Enables grantee the READ, READ_ACP, and WRITE_ACP permissions on the object.

Table 2-3 Canned ACL: Supported Group Permissions

Canned ACL Applies To Permissions Added To ACL

private

Bucket and object

Owner gets FULL_CONTROL. No one else has access rights (default).

public-read

Bucket and object

Owner gets FULL_CONTROL. The All Users Group gets READ access.

public-read-write

Bucket and object

Owner gets FULL_CONTROL. The All Users Group gets READ and WRITE access. For security reasons, granting this canned ACL on a bucket is generally not recommended.

authenticated-read

Bucket and object

Owner gets FULL_CONTROL. The Authenticated Users Group gets READ access.

bucket-owner-read

Object

Object owner gets FULL_CONTROL. Bucket owner gets READ access. If you specify this canned ACL when creating a bucket, the appliance S3 API ignores it.

bucket-owner-full-control

Object

Both the object owner and the bucket owner get FULL_CONTROL over the object. If you specify this canned ACL when creating a bucket, the appliance S3 API ignores it.