Access and secret keys are one of the way you connect to Amazon S3 as a IAM user. You can contact your manager/responsible person who has a master account and granted you the access and secret keys to find out your IAM policy and whether it is an option for you to extend your permissions.
if I want/prefer to have a separate set of keys that can use that have read only permission how do I go about that? I created user/iam but can't assign that userid to anything in ACL
If you are master account, you can use IAM Manager to create as many IAM users as you want with different permissions. There you can also generate access and secret keys for those IAM users and, finally, use IAM users access/secret keys for different purposes that you have.
I was sure you have been working with CloudBerry Explorer all the time :)
Let's start from scratch then - what would you like to configure and to do next with the users?
I have several buckets. I have different websites that i am going to store data in based on website as to which bucket it goes.
I am currently using keypair for master user, ME,
I would like to have different keypair for the different buckets
plus prefer that the websites using s3 SDK only have read/write permissions
again thanks.
i have dealt with windows server permissions but this is crazy new
You can register your master Amazon S3 account in CloudBerry Explorer and configure any IAM user that you want.
If you need those IAM users be able to use IAM manager as well, you should grant them required permissions (i.e. "iam:*").
If you would like those IAM users be able to access certain buckets only, so you can grant them full access for those buckets and no need for "iam" permissions then.
I believe I have done this already. I can browse my buckets and add/delete files. just if i go to IAM manager in Cloudberry i get the error and cannot add users
Are you working under the master Amazon S3 account. The master account has full permissions for all actions. You can check what policies/permissions you have in the AWS Management Console where you generated the access/secret keys.
What permissions does that account have (check the AWS Management Console where you created it)? It seems you need to grant it "iam:*" permissions there.