Skip to content

AWS S3 Guide (Beta)


Support for AWS S3 is available in private beta for select customers. To gain access to the beta version, email us at

Satori streamlines and simplifies the process of controlling access to data in AWS S3. Satori reduces the risk of data leakage caused by misconfiguring users or permissions. When using Satori to deliver access to data in AWS S3, organizations provision a single set of AWS credentials that are only used by the Satori DAC to access AWS S3. Satori generates temporary credentials for data consumers instead of their existing AWS credentials. The benefits of this approach are as follows:

  1. There is no need to create an AWS IAM user for each data consumer, which reduces the risk of granting access to AWS resources that users do not require.
  2. Auditing user access to data in AWS S3 is performed via Satori, without requiring you to activate native AWS logging which does not differentiate between user and machine access.

Note: Satori protects S3 data using Satori Datasets, Dataset Permissions, and Auditing. Security policies and Masking Profiles are not supported on AWS S3 data stores. To enforce security policies on data in S3, data must be queried via one of the supporting data stores such as AWS Athena, AWS Redshift Spectrum, Snowflake or others.

S3 Tutorial and Overview


Perform the following steps to grant Satori access to AWS S3.

Step 1: Create an IAM Policy for Satori

The IAM policy implemented by the Satori AWS user should be configured with access to any S3 bucket where data that requires control is stored. For maximum security, the policy should limit access to S3 only via the Satori DAC IP addresses. Below is an example of an IAM policy you can use as a starting point to create your own IAM policy:

  • Consider replacing the wildcard actions list with specific actions, as required
  • Consider replacing the wildcard resources list with specific buckets, as required
  • Replace the IP addresses with the IP addresses of the DAC
    "Version": "2012-10-17",
    "Statement": [
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
            "Resource": [
            "Condition": {
                "ForAnyValue:IpAddress": {
                    "aws:SourceIp": [

Perform the following§ steps to create the IAM policy for Satori:

  1. Go to AWS IAM
  2. Click on Policies and select Create Policy
  3. Click the JSON tab and paste the JSON policy file you prepared.
  4. Complete the policy creation process and name your policy, for example: satori_s3_policy.

Step 2: Create an IAM User for Satori

  1. Go to AWS IAM.
  2. Click on Users and select Add Users.
  3. Enter satori_s3_user in the Username input field and check the Access key - Programmatic access checkbox.
  4. Select Attach Existing Policy and search for the policy created in the previous step.
  5. Now, attach the policy to the user.
  6. In the last step of the process, copy the AWS Access Key ID and Secret Access Key.

Adding an AWS S3 Data Store to Satori

  1. Login to the Satori management console
  2. Go to the Data Stores view and click the Add Data Store button.
  3. Select the AWS S3 option.
  4. Provide an informative name for the data store, for example: S3 US-East-1.
  5. Select the AWS region where your data is hosted, for example: us-east-1.
  6. Select the Data Access Controller to use for accessing the data store.
  7. Enter the AWS account ID for the S3 data store.
  8. Enter the AWS Access Key ID and Secret Access Key you copied in the previous step.
  9. Click the Create button.
  10. Satori will then validate that the credentials and AWS Account ID match and you will then be redirected to the Data Stores list.

Connect to AWS S3 via Satori

Each user can generate personal credentials from the Satori Data Portal. In this option, <SATORI_USERNAME> and <SATORI_PASSWORD> shown in the example below refer to the generated username and password.

Connecting with the AWS Command Line

To connect to S3 via Satori using the AWS command line, first create a profile using your personal credentials. For example:


Then add the endpoint-url parameter to your aws s3 command with the Satori hostname for the data store. For example: aws s3 ls --endpoint-url

Connecting with Python

To connect to S3 via Satori using Python, set the endpoint_url argument to the client function and configure the client to use path-style addressing. For example:

import boto3
from botocore.client import Config

client = boto3.client(
  config=Config(s3={'addressing_style': 'path'})

Connecting with Java

To connect to S3 via Satori using the AWS Java SDK, set the serviceEndpoint parameter and configure the client to use path-style addressing. For example:

import com.amazonaws.auth.AWSStaticCredentialsProvider;
import com.amazonaws.auth.BasicAWSCredentials;
import com.amazonaws.client.builder.AwsClientBuilder.EndpointConfiguration;

class S3Example {

    public static void main(String[] args) {
      AmazonS3ClientBuilder s3Builder = AmazonS3ClientBuilder

          new EndpointConfiguration("", "us-east-1")

          new AWSStaticCredentialsProvider(
              new BasicAWSCredentials("<SATORI_USERNAME>", "<SATORI_PASSWORD>")

      AmazonS3 s3 =;


Connecting with Cyberduck

To connect to S3 via Satori using Cyberduck, enable the S3 (Deprecated path style requests) connection profile in the Profiles preferences tab: Screenshot

To create a new connection, click the Open Connection button, select the S3 (Deprecated path style requests) profile and then enter the Satori hostname in the Server field (without https://):


Network Policy Settings

Satori provides you with the ability to define your network security policy for your data store.


Simply, specify which IP addresses and subnet masks should be allowed access to the Data Store and which IP addresses and subnet masks should be blocked. Note that by default, Satori allows all IP address ranges if you leave the form empty.

Example 1

To allow all IP addresses - Leave the form empty. Screenshot

Example 2

To block specific IP addresses - Add them to the blocked IP address list. Screenshot

Example 3

To only allow access to specific IP addresses - Add them to the allow list. Note: Access from all other IP addresses ware blocked. Screenshot

Example 4

To allow access from a specific IP address range while blocking parts of the range - Add the IP range to the list of allowed IP addresses and add the IP address that you wish to block to the Block list. Screenshot