Skip to content

Latest commit

 

History

History
59 lines (38 loc) · 2.51 KB

File metadata and controls

59 lines (38 loc) · 2.51 KB
title excerpt updated
How to analyse IAM policy results
Find out how to use generated logs to identify missing rights in IAM policies
2023-11-17

Objective

The purpose of this guide is to present the different methods available for identifying missing actions in IAM policies.

Requirements

Instructions

In HTTP responses

During API calls, you can get the name of the missing action in the HTTP request response: via the unauthorizedActionsByIAM field. In the following example, the missing action is "vps:apiovh:reboot"

{
  "class": "Client::Forbidden",
  "message": "User not granted for this request",
  "details": {
    "unauthorizedActionsByAuthentication": "",
    "unauthorizedActionsByIAM": "vps:apiovh:reboot"
  }
}

From the OVHcloud Control Panel, based entirely on our API, it is also possible to access this information through the web browser development tools. This is done by analysing the errors of type 403.

To do this, go to the Network{.action} tab, and select the query that returns a status 403, then go to the Response{.action} tab.

Browser development tool{.thumbnail}

In Logs Data Platform (LDP)

If transmission of OVHcloud account logs to LDP is enabled, you can find the information in the access policy logs.

In the Graylog interface, search for the login of the user concerned and logs containing unauthorized_actions_array with the identities_array:*My_user* AND unauthorized_actions_array:* request.

Graylog research{.thumbnail}

The logs filtered in this way show the actions refused by the OVHcloud IAM for the user.

Log example{.thumbnail}

Here for example, the user Ines tried to perform the action vps:apiovh:reboot without success.

You can also filter the search on authorized_actions_array to list the actions authorised by the OVHcloud IAM.

Go further

Join our community of users on https://community.ovh.com/en/.