When a bucket is configured for object versioning, a developer should be able to optionally configure the bucket to require a multi-factor authentication token for delete requests. The token is passed as a key to the x-amz-mfa header. The tokens are generated with virtual MFA devices like Google Authenticator (TOTP), or a hardware MFA device like those provided by Gemalto. https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingMFADelete.html https://aws.amazon.com/iam/details/mfa/ This feature is used by companies like Netflix to prevent accidental, or malicious, removal of data. http://www.slideshare.net/jason_chan/aws-security-a-p (slide 129)
Updating the QA Contact to a Hemant. Hemant will be rerouting them to the appropriate QE Associate. Regards, Giri
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:0312
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days