Using IPv6 addresses in IAM and AWS Private CA - AWS Private Certificate Authority

Using IPv6 addresses in IAM and AWS Private CA

Before trying to access AWS Private Certificate Authority over IPv6, ensure any IAM policies containing IP address restrictions are updated to include IPv6 address ranges. IP based policies that are not updated to handle IPv6 addresses may result in clients incorrectly losing or gaining access when they start using IPv6. To learn more about AWS Private CA and dual-stack support, see Dual-stack endpoint support.

Important

These statements do not allow any actions. Use these statements in combination with other statements that allow specific actions.

The following statement explicitly denies access to all AWS Private CA permissions for requests originating from the 192.0.2.* range of IPv4 addresses. Any IP addresses outside of this range are not explicitly denied AWS Private CA permissions. Since all IPv6 addresses are outside of the denied range, this statement does not explicitly deny AWS Private CA permissions for any IPv6 addresses.

{ "Sid": "DenyPrivateCAPermissions", "Effect": "Deny", "Action": [ "acm-pca:*" ], "Resource": "*", "Condition": { "NotIpAddress": { "aws:SourceIp": [ "192.0.2.0/24" ] } } }

You can modify the Condition element to deny both IPv4 (192.0.2.0/24) and IPv6 (2001:db8::/32) address ranges as shown in the following example:

{ "Sid": "DenyPrivateCAPermissions", "Effect": "Deny", "Action": [ "acm-pca:*" ], "Resource": "*", "Condition": { "NotIpAddress": { "aws:SourceIp": [ "192.0.2.0/24", "2001:db8::/32" ] } } }