amazon web services - accessing AWS S3 from a desktop app securely -


i have data multiple users inside single s3 account. desktop app has authentication system let app know user , folder access on s3. desktop app has access code whole s3 folder.

somebody told me not secure since hacker break request app s3 , use credentials download data.

is true? , if how can avoid it? (he said need client server in aws cloud isn't clear me... )

btw. using boto python library access s3.

thanks

i found this:

  1. don't store aws secret key in app. determined hacker able find eventially. 1 idea have web service hosted somewhere sole purpose sign client's s3 requests using secret key, requests relayed s3 service. therefore users authenticate agaist web service using credentials control. re-iterate: clients talk directly s3, requests "rubber-stamped"/approved you.

  2. i don't see s3 flat structure - if use filesystem notation "folder/subfolder/file.ext" keys.

  3. vanity urls supported s3 see http://docs.amazonwebservices.com/amazons3/2006-03-01/virtualhosting.html - url "http://s3.amazonaws.com/mybucket/myfile.ext" becomes "http://mybucket.s3.amazonaws.com/myfile.ext" , can setup cname in dns maps "www.myname.com" "mybucket.s3.amazonaws.com" results in "http://www.myname.com/myfile.ext"


Comments

Popular posts from this blog

monitor web browser programmatically in Android? -

Shrink a YouTube video to responsive width -

wpf - PdfWriter.GetInstance throws System.NullReferenceException -