====================
Bucket policies are managed through standard S3 operations rather than
-radosgw-admin.
+``radosgw-admin``.
-For example, one may use s3cmd to set or delete a policy thus::
+For example, one may use ``s3cmd`` to set or delete a policy thus::
$ cat > examplepol
{
tenant its own namespace of buckets. There may be an option to enable
an AWS-like 'flat' bucket namespace in future versions. At present, to
access a bucket belonging to another tenant, address it as
-"tenant:bucket" in the S3 request.
+``tenant:bucket`` in the S3 request.
In AWS, a bucket policy can grant access to another account, and that
account owner can then grant access to individual users with user
Bucket policies do not yet support string interpolation.
For all requests, condition keys we support are:
+
- aws:CurrentTime
- aws:EpochTime
- aws:PrincipalType
- aws:UserAgent
- aws:username
-We support certain s3 condition keys for bucket and object requests.
+We support certain S3 condition keys for bucket and object requests.
*Support for the following bucket-related operations was added in the Mimic
release of Ceph.*