Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Impossible Cloud Storage is not exactly like a computer's file system, we do have something similar to folders to help keep things tidy. You can group related files (objects) by giving them a shared beginning to their names, almost like they're in a folder.
Just like you can have folders inside folders on a computer, you can do the same here, but you can't have buckets inside buckets. You can create these virtual folders and put objects directly into them, and while you can create and delete these folders, renaming and sharing them are not an option.
Here are a few examples you can use Impossible Cloud Storage:
Backup and Recovery: Securely back up your files and recover them whenever needed.
Media Hosting and Management: Store and distribute media files, like images and videos, directly from your bucket.
Data Archiving: For data that isn't accessed frequently but still needs to be retained, Impossible Cloud Storage provides a cost-effective solution. Historical data, long-term records, or old project files can be securely stored in the cloud and retrieved whenever needed.
While the use cases we've outlined are common, Impossible Cloud Storage is versatile S3 compatible storage and can be tailored to many different needs. Your requirements dictate its use - so it's not just for backups, media hosting, and the other examples we mentioned. Explore and see what it can do for you.
Need more help? Here are some useful links:
For detailed instructions on integrating Impossible Cloud Storage with your preferred backup solutions, visit our comprehensive guide at this link.
Please visit Impossible Cloud page where you can submit a support request.
We're excited to have you on board and can't wait to see what you'll do with Impossible Cloud Storage! Don't forget - we're here to help if you need it.
Welcome to the Impossible Cloud Storage family! This guide is designed to help you get up and running as smoothly as possible, whether you're a business or an individual user.
At the heart of our service are two simple concepts - Buckets and Objects.
A Bucket is a container for your data. Think of it like a big digital box where you store all your files, which we refer to as Objects.
An Object represents an individual file that you store in a Bucket. This can be any file you need to store – a photo, a document, a video, and more.
Impossible Cloud offers next-generation, resilient object storage optimized for fast data backup and retrieval.
Enterprises and SMBs backing up data to centralized, public cloud providers, or using on-premise solutions, who are looking to save up to 80% on data storage costs. Additionally, companies that prioritize:
Big Data Analytics: Many businesses are now using large-scale data analysis to drive decisions. Impossible Cloud Storage can be used to store large datasets, providing an accessible and scalable solution for your big data analytics needs.
Once an object is placed in a bucket, it's ready for you to interact with. You can open it, download it to your device, or update its properties. And when you're finished with an object or even an entire bucket, you can delete them to keep your resources tidy and organized.
We've built in a couple of unique features to ensure the security and integrity of your data.
Object Lock is a feature that protects your objects from being altered or deleted for a set period. It's like a digital safe for your most important files. It's also known as WORM: Write-Once-Read-Many.
It is designed to provide an additional layer of data protection. It prevents the permanent deletion of objects during a period defined by you, serving as an enforceable retention policy. This comes in handy for regulatory compliance or when you need an extra safety net for your data.
Versioning is another safety measure that lets you retrieve any deleted or overwritten items. It's like having a time machine for your data!
The true strength of versioning-enabled buckets lies in their ability to help you recover objects from accidental deletion or overwriting. Let's say you delete an object; Impossible Cloud Storage will insert a 'delete marker' instead of permanently removing the object. This 'delete marker' then becomes the current version of the object. Similarly, if you overwrite an object, it results in a new object version in the bucket, but don't worry, you can always restore the previous version.
For a deeper dive into Versioning and Object Lock, we invite you to explore our detailed guides:
Learn more about managing different versions of your objects with Versioning.
Discover how to add an extra layer of data protection with Object Lock.
Once your account is set up, you can log in using your new credentials.
When you request a trial, you'll receive access to the full functionality of a standard Impossible Cloud Storage root account. This includes all features available in a productive environment, enabling you to fully evaluate our services in real-world conditions.
Key aspects of the trial:
Full Functionality: The trial includes all capabilities of a regular production account.
Partner-Driven Activation: Trial accounts are provided through our official distribution partners. After you complete the trial request form, our sales team will connect you with the appropriate distributor to activate your trial.
Trial Capacity: The amount of trial storage is typically between 1 TB and 5 TB. The final allocation is determined by the distribution partner and may be adjusted to fit your specific requirements.
Easy Transition to Production: If you're ready to continue after the trial, your account can seamlessly be converted into a fully productive account by the distribution partner, without losing any stored data or configurations.
Once you're logged in, you can start using Impossible Cloud Storage. Review the Next steps section and our Storage Guide to understand how you can use Impossible Cloud Storage.
Improving the security of their backups
Increasing performance
Public cloud providers enabled many companies to lower the TCO of data backups - e.g., by rendering their data centers obsolete and reducing management complexity. Despite this advantage, public cloud providers have experienced numerous outages that affected thousands of companies and millions of customers. This effectively shows that traditional multi-zone redundancy architecture is unreliable.
Impossible Cloud stores data over a distributed architecture designed to eliminate single points of failure. This in turn creates superior reliability, resulting in optimized availability (lower downtime) and resiliency (faster recovery time).
Impossible Cloud's distributed architecture ensures superior file security and durability:
After receiving files from the customer, we encrypt each file with a respective unique key. We then store the files at enterprise-grade data centers - each with industry-relevant certificates incl. ISO 27001 and PCI DSS. Individual nodes within the data centers redundantly encrypt files at rest to further increase security.
We employ algorithms that continuously maintain the integrity and consistency of files in case any particular server or disk is unavailable. For instance, these algorithms enable reconstruction of files in case a copy on a specific device goes down for any reason.
Our storage is designed for at least 11 nines of durability (99.999999999%) - meaning our architecture minimizes the probability of file loss to near zero.
Besides security advantages, we combine established industry best practices with multi-layer encryption:
Identity and access management (IAM)
Default SSL HTTPS end-to-end encryption
Server-side encryption
Impossible Cloud Storage is based on innovative architecture and a plethora of underlying tools that help ensure the highest performance in terms of throughput speed as well as low latency:
Files are downloaded from multiple concurrent locations. This multi-threaded, peer-to-peer parallel structure maximizes bandwidth to enhance performance and throughput speed.
Data and metadata are both distributed, enabling users with the fewest required “hops”. This provides low-latency with better, if not the same, performance with the leading industry providers of hot storage.
Backup to the public cloud adds an additional reliability dimension when storing the data. However, this often comes at the cost of security and throughput speed, as well as high costs and exorbitant retrieval (egress) fees. Impossible Cloud provides a storage architecture that measurably improves these critical challenges of the major centralized, public cloud providers.
We offer a robust architecture, a new benchmark for security, and highly performant upload and retrieval. Customers using Impossible Cloud Storage will measurably and safely improve backup recovery time objective (RTO) and recovery point objective (RPO) metrics. Additionally, customers can leverage our transparent prices and save up to 80% compared to major public cloud providers.
Support of client-side encryption
Impossible Cloud Storage Console introduces a new feature to change password.
Customers can now securely change their own password from the 'Profile Settings' menu. The new feature is available for all Impossible Cloud Storage Console users and offers a user-friendly way to change their password from the UI.
Impossible Cloud Storage Console (ICSC) is the management tool providing any user the central access point to our Impossible Cloud Storage. In addition to using CLI, you can use the web console for uploading and retrieving data as well as configuring user details.
Find here the link to access the Impossible Cloud Storage Console.
Impossible Cloud introduces an enhanced identity and access management (IAM) capabilities in Impossible Cloud Storage Console (ICSC). It features a new login page to access ICSC as a root user or IAM user and a new menu bar inside ICSC. This update also introduces the Account ID that can be used to login as an IAM user in ICSC. The brings us closer to better user and access management in ICSC.
The new login page update comes with a menu bar update in ICSC. It separates the login process for root and IAM user in ICSC, as well as the S3 Storage and IAM features in the UI. As a root user, user can login using the email and password and as an IAM user, user can login using the account ID, username, and password.
The new menu bar grouped the ICSC menus based on feature: S3 Storage and IAM (Identity and Access Management). This guides users to navigate and differentiate the different features in ICSC easily.
Unlocking IAM Management with AWS CLI
Efficiently manage Identity Access Management (IAM) using the AWS Command Line Interface (CLI). The CLI offers a comprehensive set of commands and options to configure and control IAM resources.
Benefit from flexibility and scalability, managing IAM resources across multiple accounts from a single interface. Ensure secure access through authentication, access keys, and IAM roles. Achieve greater efficiency in user management, permissions assignment, and policy updates. Leverage extensive documentation and community support for guidance.
In the Usage section, you can find information about the utilization of your storage capacity. In this page you can view your current usage, storage capacity, and an overview of how much storage you have left.
The Usage section is only visible if you are accessing the Impossible Cloud Storage Console using a root user account.
If you are using Impossible Cloud Storage with a pay-per-use plan, the remaining storage amount will not be displayed, as charges are based entirely on your current usage. For more information, see the following pages for details.
Your Account Settings: An Overview
Here, the Profile Settings page is a control hub for your Impossible Cloud Storage account.
To start managing your profile settings, simply go to the Profile Settings menu or go to the "ellipsis" (three dots) at the top-right corner of your screen next to your user details, and select Profile Settings.
Impossible Cloud Storage works seamlessly with the AWS S3 API. This means that you can use it with the AWS CLI or any other software that is compatible with AWS S3.
If you want to use the AWS CLI with Impossible Cloud Storage, simply follow the guidelines on the next pages.
At Impossible Cloud Storage, we follow a decimal storage calculation where 1 terabyte (TB) is considered 1,000 gigabytes (GB), and 1 gigabyte is considered 1,000 megabytes (MB). This means that when you see our storage pricing of €7.99 per terabyte for the 'Pay-per-use' plan, it is equivalent to €0.00799 per gigabyte.
We adopt this calculation method to provide a consistent and transparent pricing structure for our users. Using a base of 1,000 rather than 1,024 simplifies the storage calculation process and allows for easier budgeting and cost management.
When estimating your storage requirements and understanding the associated costs, keep in mind that each gigabyte is comprised of 1,000 megabytes and each terabyte is comprised of 1,000 gigabytes. This ensures clarity and accuracy when calculating your storage expenses with Impossible Cloud Storage.
If you have any further questions or need assistance with understanding your billing and storage calculations, please don't hesitate to reach out to our support team. We are here to help you make the most of your storage resources efficiently and cost-effectively.
Here you can find the Impossible Cloud Storage Console URLs.
See the following pages for details on how to signup and sign in as well as session lifetime limits for automatically being signed out:
The Impossible Cloud Storage Console supports Multi-Factor Authentication (MFA) using various third-party authenticator applications. Learn more about how MFA works in this section.
Session lifetime limits determine how long the system should retain a login session. For security reasons, users are logged out automatically after certain intervals:
Inactivity timeout: Period after a user's session expires - given they do not interact with the console. This occurs after 3 minutes of inactivity.
Require login after: Period after a user's session expires - independent of their interaction with the console. This is set to 30 days after login.
Impossible Cloud has implemented a fair use policy mechanism to ensure effective service utilization for all its customers, regardless of the existing service load conditions. This mechanism prevents any individual Impossible Cloud user account from monopolizing system resources at the expense of other accounts.
When other cloud providers terminate your contract, we will contact you first. For instance, if a user account excessively uses egress, we will approach that account and find a joint solution.
To use your Impossible Cloud Storage with the AWS CLI, you need to use the "configure" command. Simply type:
aws configureYou will be prompted to enter your access key and secret access key for Impossible Cloud Storage. When it asks for the region, you can either type "eu-central-2" or leave it blank.
If you need to configure a profile for a specific type of access, you can do so by typing:
aws configure --profile impossiblecloudThen enter your Access Key ID and Secret Access Key, and you are ready to go.
To begin, you will need to install the AWS CLI and configure it using your AWS Access Key and Secret Key. You can follow the instructions located here for guidance.
Once you have configured the AWS CLI, you must create an additional profile specifically for your Impossible Cloud Storage account. You can find detailed instructions on how to do this here.
Transfer all files from your source AWS bucket to a local directory by running the following command:
aws s3 --profile=your_source_cloud_profile cp s3://<source_bucket>/ <local_directory> --recursiveFinally, to transfer all of your files from a local directory to your new target bucket, run the following command:
aws s3 --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net cp <local_directory>/ s3://<destination_bucket>/ --recursiveObject lock can prevent objects from being removed or overwritten for a specified period. Note that you must first enable versioning before enabling this feature on a bucket. Unlike versioning, object lock must be enabled at the time of bucket creation and the settings cannot be changed after creation.
You can either choose to define a retention period for each object individually or for all underlying objects. Legal holds can only be defined by version or object and not by bucket.
Reserve the option for individual retention periods for underlying objects by leaving the 'Retention' checkmark blank.
Set up aggregate retention periods for all underlying objects by defining the retention mode and validity when creating the bucket.
After signing in to the Impossible Cloud Console, you can see both the menu on the left-hand side as well as the panel on the right-hand side. See the following pages for details on how to both navigate the menu as well as use the panel.
You may remove one or more folders after they were created. Simply navigate to the particular bucket, select the folder, and click on 'Remove object' or click on the delete button next to the specific folder.
This action also applies when deleting buckets. Note that the delete action is irreversible.
Versioning in Impossible Cloud is a way of keeping multiple versions of an object in the same bucket. Thus, when Impossible Cloud receives multiple write requests for the same object simultaneously, it stores all of those objects as versions. This feature has to be enabled on a bucket level - when creating the folder or by editing its settings:
To activate versioning when creating a bucket, simply create a new bucket and enable its versioning.
For enabling or disabling versioning later in the process, navigate to the bucket overview and change the respective bucket's settings.
As a commitment to providing an industry-ready solution for Impossible Cloud customers, Impossible Cloud is now certified as a Cloud Storage destination for HYCU.
After a thorough testing and verification, customers can now securely backup their data to Impossible Cloud Storage with peace of mind. The verification includes testing for backing up and recovering data with immutability enabled.
Learn more about how to register your Impossible Cloud buckets as an S3 compatible storage target in HYCU from our .
Creating a bucket allows you to store any object - irrespective of type or size. To create a bucket, simply navigate to the 'buckets' menu item and click on 'Add Bucket'.
You are then asked to edit its properties - i.e., define its name and choose whether to use versioning (see ) and object lock (see ). While the versioning property can be changed at a later point in time, both the name and object lock properties are unchangeable.
You can select a specific geographical region for data storage in your bucket and once selected, the bucket's region cannot be changed. This option ensures that your data complies with local residency laws and improves performance by reducing latency.
Please see the full list of all the available regions, their geographical locations and S3 API endpoint URLs .
Once you have created a bucket in the Impossible Cloud Storage console, you can access the bucket and store an object. There are two ways to upload an object:
You can use the built-in drag & drop function.
Open the relevant bucket in the console, drag the object from your device and drop it into the relevant area in the panel. This also works for multiple objects at a time.
Access keys combined with an S3-compatible endpoint are used with third-party applications. They are used to make programmatic calls to AWS S3 API actions.
There are two types of access keys:
Access key ID
Secret access key
Access and secret keys are generated under the "IAM → keys" tab in the console menu bar. To create a new access key, simply navigate to the menu and click "Add key"
Impossible Cloud introduces a new feature to control access to the Impossible Cloud Storage Console (ICSC). This update keeps the current user creation flow and adds a functionality to enable/disable console access for sub-users in ICSC.
The “Console Access“ feature controls the provisioning of Login Profiles for IAM Users in ICSC. A Login Profile is required to sign in to ICSC. The root users can disable and enable console access during or after user creation in ICSC.
Read our knowledge base article about to learn more.
Currently, the ability to configure Cross-Origin Resource Sharing (CORS) is only available through the AWS Command Line Interface (CLI) utility. Unfortunately, there is no user interface option available for setting up CORS in our platform at this time.
If you need help getting started with the AWS CLI utility or need to familiarize yourself with how to set up CORS configurations using this tool, we recommend checking out the official AWS guide. You'll find examples of the cors-configuration file .
For detailed instructions on using Impossible Cloud Management Console (ICMC, formerly known as Partner Portal), visit our guide at .
Impossible Cloud stores files and folders, i.e., objects, in buckets. You can upload any objects after creating such a bucket. See the following how-to pages for details:
buckets
objects in a bucket
folders
Impossible Cloud Storage Console provides early access to the eu-west-2 region, with data center presence in the London region.
Customers can now securely store their data to the new Impossible Cloud Storage region. The early-access is available for all Impossible Cloud Storage Console users and offers full functionalities such as bucket versioning and object lock.
You can find the new eu-west-2 region listed when creating a bucket from the Impossible Cloud Storage Console. The S3, IAM, and STS endpoints are listed in our .
Impossible Cloud Storage generally stores objects in a flat structure. However, you may create a virtual structure yourself by simulating a directory. For this purpose, you can use our 'create a folder' feature.
Simply navigate to 'buckets' and the particular bucket or sub-folder within a bucket. Afterward, click on 'Create Folder' and define a name. Note that you cannot upload a folder to our console and only create it inside the bucket.
There are two main interactions for objects - downloading and deleting. For more sophisticated interactions, see our relevant documentation for as well as :
Download: Navigate to the particular bucket and click on the object or use the download button next to the specific object to download it. Afterward, the object will be downloaded to the default location on your device.
Delete: Navigate to the particular bucket and click on the delete button next to the specific object to delete it. Alternatively, you can remove multiple objects by marking an object(s) and click 'Remove x object' on the upper right-hand side of the panel. Note that the delete action is irreversible unless versioning is enabled.
Please copy and save the secret key somewhere once it's created. The secret key is only shown once! After you leave the window, the secret key is hidden and you will need to create a new key pair to obtain a complete set of keys.
In order to enhance security and support for meeting compliance standard across all Impossible Cloud Storage regions, SSE-S3 (Server-Side Encryption with Amazon S3-Managed Keys) is now supported in eu-central-2, eu-west-1, and eu-east-1.
Enable SSE-S3 to add additional server-side encryption of your data and effortlessly improve your security and compliance. Learn more about server-side encryption in Impossible Cloud in our documentation.
Managing identity and access to your storage solutions plays a crucial role for maintaining strong security standards and compliance. Impossible Cloud has further enhanced its Identity and Access Management (IAM) capabilities by expanding support for all S3 IAM Policy effects and actions. This enhancements provide users with greater granularity for controlling access and permissions within Impossible Cloud Storage.
Learn more about Impossible Cloud Storage IAM features in our documentation.
Click 'Add' to finalize the process and a new bucket will be created.
We recommend choosing a bucket name that reflects the objects you will store in that bucket as it is visible in the URL. For details on naming rules, see our relevant documentation.
If you need to create a bucket in a specific region, you have to use the appropriate regional endpoint to make a request. For example if you need to create a new bucket in the eu-west-1 region:
aws s3api create-bucket --profile impossiblecloud --endpoint-url https://eu-west-1.storage.impossibleapi.net --bucket mytestbucket If you were using another regional endpoint, then the bucket will be created in that endpoint. The parameters --region and --create-bucket-configuration LocationConstraint are ignored.
aws s3api list-objects --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1 --bucket="my-new-bucket"aws s3api list-objects-v2 --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1 --bucket="my-new-bucket"aws s3api list-object-versions --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1 --bucket="my-new-bucket"aws s3api get-object --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1 --bucket="my-new-bucket" --key="myfile.txt" "myfile.txt"aws s3api get-bucket-cors --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1 --bucket="my-new-bucket"aws s3api put-bucket-cors --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1 --cors-configuration file://cors.json --bucket="my-new-bucket"aws s3api delete-bucket-cors --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1 --bucket="my-new-bucket"aws s3api list-buckets --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --region us-west-1aws s3api create-bucket --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --bucket="my-new-bucket" --region us-west-1aws s3api delete-bucket --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net --bucket="my-new-bucket" --region us-west-1Interact with files and folders
Delete files, folders or buckets





In Impossible Cloud Storage, groups are used to define and manage access permissions for specific resources. These groups follow the Industry S3 policy standard, ensuring compatibility and familiarity for users with experience in other environments.
By linking a list of users with one or more policies, a Group enables role-based access control at Impossible Cloud Storage Console. For instance, access for group of user in the same department can be restricted to only a list of buckets.
The Group management at Impossible Cloud Storage Console can be done in Groups tab. From there, you can add, filter and delete groups as well as edit each group's assigned users and policies.
The Groups tab is only visible for root users - and accordingly, also conducting any of the above actions.
To add groups, follow these instructions:
Navigate to the Groups tab
Click the Add Group button on the top-right of the console.
Fill in the Group Name.
(Optional) Assign users and policies that you want to apply. These details can be added/edited later.
To edit a group, follow these instructions:
Navigate to the Groups tab
Click the respective button next to the group you want to edit.
Edit the Group's members or the assigned policies.
Finish the update by Clicking Save at the top-right corner of the page.
To delete a group, follow these instructions:
Navigate to the Group tab in left-pane menu.
Click on the Delete button next to the group.
Confirm the deletion.
Cross-Origin Resource Sharing, or CORS, is a process that allows web applications from one domain to interact with resources from a different domain.
Let's illustrate CORS with a simple example.
Imagine you have a bucket full of pictures in Impossible Cloud Storage. You also have a website that lets your users browse these pictures. Essentially, your website (let's say, "mysite.com") is connected to your Impossible Cloud Storage bucket.
But there's a catch - web browsers have safety measures. They don't like it when a website tries to load content from a different domain. In this case, your website "mysite.com" is trying to fetch pictures from Impossible Cloud Storage, which is a different domain.
This is where CORS comes in. By setting up CORS on your Impossible Cloud Storage bucket, you're telling the browsers, "It's OK, mysite.com is allowed to access these pictures." With CORS, the browser will happily display your photos to your users.
Without CORS, your users would be staring at a blank screen instead of admiring your stunning pictures. That's why CORS is important for connecting your Impossible Cloud Storage with your web application.
A root user has a few more MFA options under the Organization-wide policies. You will see a list of sub-users linked to your main account and you will be able to manage their MFA settings.
One important feature is the Enforce MFA policy to all users in your organization checkbox. If you enable this checkbox and confirm the change, the MFA becomes mandatory for all users, including you. Essentially, it locks in the MFA policy across your organization, making it impossible for any sub-user to disable MFA.
As for individual sub-users, while they cannot disable MFA once the organization-wide policy is in effect, they can still reset their own MFA. Please note that this process is only possible while you are logged into your Impossible Cloud Storage account and your session is active.
There is also a Reset MFA button for each sub-user in the Organization-Wide Policies list.
Organization-Wide Policies are exclusively available for root users. Sub-users do not have access to these functions.
To make it easier to access third-party S3 providers, you can use the awscli-plugin-endpoint plugin, but you will need to create an additional profile along with the default one. To create this profile, you can add a "profile" line at the end of the config file located in the ".aws" directory in your home directory.
Add a line profile line at the end of the config file like this at the end of the file:
After you've added the "profile" line to the config file, be sure to save the file.
Once you have created a profile, you can follow the instructions provided on the plugin's GitHub page, which you can find at this link: https://github.com/wbinglee/awscli-plugin-endpoint. By doing so, you should be able to use "--profile impossiblecloud" after every command instead of having to type out the entire URL.
For instance, if you wish to list your buckets using the AWS CLI, simply type:
If you need to create a bucket in a specific region, you have to use the appropriate regional endpoint to make a request. For example if you need to create a new bucket in the eu-west-1 region:
aws s3api create-bucket --profile impossiblecloud --endpoint-url https://eu-west-1.storage.impossibleapi.net --bucket mytestbucket If you were using another regional endpoint, then the bucket will be created in that endpoint. The parameters --region and --create-bucket-configuration LocationConstraint are ignored.
aws s3 ls --endpoint-url=https://eu-central-2.storage.impossibleapi.netaws s3 ls --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net[profile impossiblecloud]aws s3 ls --profile=impossiblecloud
You can use the 'Upload File' feature.
Open the relevant bucket in the console, click on the 'Upload File' button and select the relevant objects for the upload.

Please install and use the AWS CLI version 2
Download the installation file
Unzip the installer
Run the install program
Download and run the AWS CLI MSI installer for Windows (64-bit):
Alternatively, you can run the msiexec command to run the MSI installer.
To confirm the installation, open the Start menu, search for cmd to open a command prompt window, and at the command prompt use the aws --version command.
Download the file using the curl command. The -o option specifies the file name that the downloaded package is written to. In this example, the file is written to AWSCLIV2.pkg in the current folder.
Run the standard macOS installer program, specifying the downloaded .pkg file as the source. Use the -pkg
When interacting with objects in a versioning-enabled bucket, you have several options:
Add different versions: In a non-versioning bucket, uploading the same object multiple times overwrites the previous object. In versioning, every version is kept - as long as the file name incl. the name extension is precisely like the one previously uploaded.
Add delete markers and reverse the action: You can add a delete marker to any object - which subsequently hides the respective object. In other words, the object and its previous versions no longer appear as items in the bucket. This action can be reversed - by restoring all previous versions of the object.
Download specific versions: You can either download the latest version of an object or any particular version that was uploaded previously. This can even be done when a delete marker is placed on an object.
Permanently delete specific versions: When you have uploaded multiple versions, you can delete particular versions. This will remove them from our platform - making a recovery of the deleted version impossible.
To add different versions, simply re-upload an object that you have already uploaded previously. The name must precisely be the same as before - incl. the object's extension.
To add a delete marker and hide an object, click on the delete button next to the object. Note that the delete button next to each version behaves differently and triggers object version operations rather than object operations. It's essential to ensure that 'Delete all versions' is disabled. To reverse this action, simply choose to show deleted files and restore the object.
To download specific versions, you can either download the object - which in turn downloads the latest version - or you can choose a particular version. This latter feature also works when a delete marker is placed on the object.
To permanently delete objects, you can either delete a specific version or delete the entire object. Note that these actions are irreversible.
The Impossible Cloud Storage Console (ICSC) is an enterprise-grade cloud storage management tool that offers Identity and Access Management (IAM). This feature enables Role-Based Access Management (RBAC) for securing your storage and complying to data governance rules and regulatory requirements.
The Impossible Cloud Storage is S3 compatible and is built based on the industry-standard. Thus, users can expect the underlying IAM features to be similar to what they are accustomed to. The Impossible Cloud Storage's IAM features can be configured through the Storage Console (GUI) as well as using the AWS IAM API.
There are three main concepts that should be considered when using Impossible Cloud Storage's IAM features: Users, Policies, and Groups - each with a dedicated tab in the GUI.
: A specific account with a dedicated login mail and password. This can either be a root user or a sub-user. A user represents an individual that can access the Impossible Cloud Storage Console. For instance, an employee in a marketing department.
: A set of permissions defining what individuals can see and do. These rules are defined on a group level, which consists of dedicated users. For instance, this could comprise of permissions for the marketing department to access marketing-relevant content.
: A representation of an organizational unit comprising of user accounts assigned to selected policies. For instance, this could be a marketing department.
To provide true S3 compatibility, our object storage supports all S3 actions and effects. This means that permissions can be assigned at the most granular level. For instance:
List: Shows a list of buckets authorized for the respective group. This is a minimum requirement for any sub-user in that group to see the assigned buckets.
Read: This allows the assigned group's sub-users to retrieve objects with their previous versions and configurations (e.g. object lock status, retention periods, and legal hold status).
Write: This allows sub-users of the assigned group to delete and/or add an object to a bucket.
Refer to AWS documentation on S3 and for more details.
In Impossible Cloud Storage, IAM policies are used to define and manage access permissions for specific resources. These policies follow the Industry S3 policy standard, ensuring compatibility and familiarity for users with experience in other environments. Each policy is written in JSON format, allowing for precise and structured permission definitions.
IAM Policy management at Impossible Cloud Storage Console can be done in Policies tab. From there, you can add, filter, delete as well as edit an existing policy.
The Policies tab is only visible for root users - and accordingly, also conducting any of the above actions.
To simplify policy creation, the Impossible Cloud Storage Console includes a built-in JSON editor. This editor provides a convenient interface for writing and editing policies directly within the Console, making it easy to define access rules according to your requirements.
To create a policy, follow these instructions:
Navigate to the Policies tab in left-pane menu.
Click the Add Policy button on the top-right of the console.
Fill in the Policy name
(Optional) Fill in the description of the policy.
Write the S3 policy in the built-in JSON editor.
Click Create Policy on the top-right corner of your screen to confirm the creation of the policy.
When you update a policy using the Graphical User Interface (GUI) in the Impossible Cloud Storage Console, a new version of that policy is automatically created. This versioning system allows you to easily revert to a previous version if needed.
To edit a policy, follow these instructions:
Navigate to the Policies tab in left-pane menu.
Click the Edit button next to the policy you want to modify.
You can edit the policy using the built-in JSON editor, just like when creating a new policy.
Click the Save button in the top-right corner to create a new version.
Deleting a policy will automatically remove the access and permissions for the corresponding group(s) of users.
To delete a policy, follow these instructions:
Navigate to the Policies tab in left-pane menu.
Click on the Delete button next to the policy.
Confirm the deletion.
The 'Empty Bucket' feature provides a straightforward way for root users to delete all objects within a selected bucket via the Impossible Cloud interface. This tool is especially valuable when you need to ensure a bucket is completely cleared of its contents, which can be challenging to accomplish manually if dealing with large quantities of data, various object versions, or protected items. It simplifies what would otherwise require scripting expertise and command-line operations.
Note that this feature will only delete the contents of the bucket. The bucket itself will remain intact. If you wish to delete the bucket entirely, this must be done as a separate action after emptying the contents.
You must have root access to the Impossible Cloud account.
Ensure the bucket you choose is the one you intend to empty.
Access Bucket Settings
Navigate to the 'Buckets' tab on your Impossible Cloud dashboard.
Click the cogwheel icon beside the bucket you wish to empty to open its settings.
Schedule the Emptying Process
Impossible Cloud Storage integrates seamlessly with different media management applications. The following overview provides detailed information and links to the relevant resources in our knowledge base:
Iconik
🟢
S3-compatible
Since Impossible Cloud is S3-compatible many other applications that are not on this list work seamlessly as well. If you are interested in using such a solution, simply fill in this form and we provide you with compatibility advice for any available solution on the market.
Setting up CORS involves using the aws command-line interface (CLI) utility and working with a few commands.
Here are the commands you'll be using:
get-bucket-cors: Retrieve the current CORS configuration for your bucket.
put-bucket-cors: Apply a new CORS configuration to your bucket.
delete-bucket-cors: Remove the existing CORS configuration from your bucket.
We understand that these commands might sound technical. But don't worry, we've got handy CLI examples .
Remember, setting up CORS correctly helps secure your data and allows for safe interaction between your bucket and other websites. If you run into any issues or need further assistance, feel free to reach out to our .
Impossible Cloud Storage integrates seamlessly with a range of cloud storage browsers. The following overview provides detailed information and links to the relevant resources in our knowledge base:
Cyberduck
🟢
S3-compatible
S3 Browser
🟢
Since Impossible Cloud is S3-compatible many other applications that are not on this list work seamlessly as well. If you are interested in using such a solution, simply fill in and we provide you with compatibility advice for any available solution on the market.
If you lose access to your authenticator device or need to reset your Multi-Factor Authentication (MFA), you can reset your MFA settings by following the steps in this section.
The steps are as follows:
Navigate to the Profile Settings page.
In the MFA section, click on the Reset MFA for this account button.
A message will appear confirming the successful reset of your MFA.
This reset process allows you to link a new device with your MFA-enabled account, should your previous device be lost or malfunction.
It's important to note that active sessions expire after 30 days of inactivity. If you are unable to log in and reset your MFA due to an expired session, you will need to for assistance.
Once the MFA reset process is completed, you will be prompted to set up MFA again at your next login with a new device using an authenticator application.
For root users who need to reset Multi-Factor Authentication (MFA) settings for other sub-users within their organization, MFA reset button is available under the section for each sub-user.
This guide guides you through creating public links for your files stored on Impossible Cloud, allowing you to share them with anyone, even if they don't have an Impossible Cloud account. A public link, or a pre-signed URL, is a secure way to provide access to a specific file in your bucket for a limited time. You generate this link directly from the Impossible Cloud interface, and it can be used by anyone to download the file until the link expires. This is an effective way to distribute files without altering your bucket's overall privacy settings or sharing your access credentials.
You have logged in to your Impossible Cloud account.
You have files uploaded to your bucket that you wish to share.
Navigate to Your Bucket
Access the 'Buckets' section on your Impossible Cloud dashboard.
Select the desired bucket that contains the file you want to share.
Locate the File to Share
The panel is always displayed on the right-hand side of any page. It is the key area for user interaction - e.g., for managing buckets and the underlying objects.
The information is set up to show 10 rows per page by default but you can adjust it up to 100 per page. At the bottom right-hand side of the panel, you can navigate to the different pages by clicking on a designated number or using the '<' and '>' buttons.
You can also search for any sub-item within the selected menu item. Simply use the search bar located at the upper part of the panel. The console will then show all related items that match the entered search string - e.g., buckets or folders within a bucket.
If you use the AWS CLI tool for your operations and application implementation, it's important to note that the CLI searches for credentials and configuration data in a specific hierarchical order.
For example: using options like "--profile", "--region", "--output" etc...
If the necessary data is not found through command line options, the CLI will check for environmental variables.
As an enterprise-grade cloud service provider, we offer sophisticated versioning and object lock features in our Impossible Cloud Storage product. These features are designed to provide our users with advanced data protection and management capabilities. Our product is built following the industry standard, Amazon S3, so users can expect the underlying features to be similar to what they're accustomed to from other cloud providers.
Versioning: Our versioning feature allows you to save, retrieve, and restore any version of an object saved in a bucket. Versioning provides an extra layer of security by offering a way to restore deleted or overwritten items. This makes it simple to recover from user or application errors. Versioning is also helpful for data archiving and preservation.
By default, your Impossible Cloud Storage account does not have Multi-Factor Authentication (MFA) enabled. However, turning on MFA is a snap and it significantly boosts the security of your account.
Impossible Cloud Storage Console provides the ability to enable MFA for you and your organization.
Navigate to the Profile Settings page.
Impossible Cloud Storage integrates seamlessly with multiple leading NAS applications. The following overview provides detailed information and links to the relevant resources in our :
After receiving your account details as a root user or an IAM user, you can log in with your unique credentials to ICSC:
Navigate to our and login with your credentials
Depending on your user type, select the correct login form.
Click on the newly created version and set it as the default to activate the version.
Find and activate the 'Emptying the bucket' setting, noted as not scheduled by default.
Confirm the Deletion Process
Read the pop-up details regarding the permanence of the action and exceptions for Object Lock.
Type "permanently delete" to confirm and activate the 'Permanently Delete' button.
Finalize the Schedule
Click on the ‘Permanently Delete’ button to confirm the deletion. This action will initiate the bucket emptying process, which will begin in 24 hours from the time of confirmation. This 24-hour delay is fixed and cannot be altered by the user.
The settings page will then display the scheduled time for the process.
Monitor Status or Cancel
On the bucket's page, a notification will inform you of the scheduled emptying.
As a root user, you can cancel the process before it commences if necessary.
Check Completion
After the scheduled time, the bucket's page will indicate the completion of the emptying process.
Verify that the bucket is empty before using it again.
Scroll or search for the file in your bucket's object list.
Once you have located the file, you’ll notice a 'share' icon to the right of the file name.
Initiate the Sharing Process
Click on the 'share' icon.
A dialog titled 'Share object with a pre-signed URL' will appear, displaying the name of the object you are sharing.
Set the Expiration Interval
In the dialog, you will see an option to set the 'Expiration interval'.
You can specify how long the pre-signed URL will be valid, choosing between 1 minute and 12 hours. The time can be set in minute or hour increments.
Generate the Pre-Signed URL
After setting the expiration time, click the 'Share' button.
A notification will confirm that a pre-signed URL has been generated and copied to your clipboard.
Save and Distribute the Pre-Signed URL
Since the link can only be generated once, immediately paste and save it in a secure location.
Share the pre-signed URL with your intended recipients. They will be able to access the file until the expiration time is reached.
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
AWS_SESSION_TOKEN
AWS_DEFAULT_REGION
... and so on. If the data is still not found, the CLI will look for it in the CLI credentials file, which can be found at the following locations:
For Linux: ~/.aws/credentials
For Windows: C:\Users\<user-name>\.aws\credentials
Finally, if the data is still not found, the CLI will search for it in the CLI configuration file, which can be found at the following locations:
For Linux: ~/.aws/config
For Windows: C:\Users<user-name>.aws\config
Object lock differs from versioning in that object lock prevents users from permanently deleting each version of the object - while versioning simply allows users to create and delete versions of an object. Thus, with object lock you can store objects using a write-once-read-many (WORM) model.
There are three different types of retention modes:
Compliance: A protected object version can neither be overwritten nor deleted by any user. Additionally, its retention mode cannot be changed, and its retention period cannot be shortened. This enables the highest data protection functionality.
Governance: A protected object can neither be overwritten nor deleted. Additionally, its lock settings cannot be altered unless the user has been assigned the necessary permissions. Therefore, you can still grant some users permission to modify the retention settings or delete the object if required. You can also use governance mode to test retention-period settings before creating a compliance mode retention period.
Legal hold: This operation prevents an object version from being overwritten or deleted even if the retention period expires. Only designated users can overrule this hold.
Object lock can, for instance, help you meet regulatory requirements that require WORM storage or protect you from ransomware cases - as objects remain unchanged on our platform. For details, see our use cases.
Click the Multi-Factor Authentication switcher button to enable MFA. You will notice the switcher turn green, indicating that MFA is now active.
Once you have enabled MFA, you will be asked to set it up at your next login. You will need an authenticator application to generate a unique code to login to Impossible Cloud Storage Console.
The Impossible Cloud Storage Console's Multi-Factor Authentication supports various third-party authenticator applications, such as Google Authenticator, Microsoft Authenticator, or others. Once you set up the MFA authentication, Impossible Cloud Storage Console will ask for the unique code that is generated on your chosen authenticator application at every log in.
As a root user in Impossible Cloud Storage Console, you have the option to enable/disable MFA for sub-users linked to your account. Additionally, root users can also enforce MFA policy to the whole organization to protect all access to Impossible Cloud Storage Console. Learn more about this on Organization-Wide Policies section.
Go to the Profile Settings page.
Click the Multi-Factor Authentication switcher button to disable MFA. The switcher will turn grey, indicating that MFA is now inactive.
Please note, disabling MFA will revert your login process to using only your username and password.
S3-compatible
CloudBerry Explorer
🟢
S3-compatible
CloudBerry Drive
🟢
S3-compatible















The Impossible Cloud Storage Console allows users to change their password. To change password, you must enter their current password and enter the new password. The password must follow the password requirements:
Password must be at least 8 characters
Password should include lower-case (a-z), upper-case (A-Z) and number (0-9) characters
Password must contain at least one special character
The new password and its confirmation must be identical
You will receive the following error message if one or more of the requirements are not met:
Either the new password does not conform to the account password policy or the old password was incorrect.
-target //usr/local/aws-cli/usr/local/binsudoAfter installation is complete, debug logs are written to /var/log/install.log.
To verify that the shell can find and run the aws command in your $PATH, use the following commands:
curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"unzip awscliv2.zipsudo ./aws/installc:\ msiexec.exe /i https://awscli.amazonaws.com/AWSCLIV2.msic:\ aws --version
aws-cli/2.7.24 Python/3.8.8 Windows/10 exe/AMD64 prompt/offcurl "https://awscli.amazonaws.com/AWSCLIV2.pkg" -o "AWSCLIV2.pkg"sudo installer -pkg ./AWSCLIV2.pkg -target /$ which aws
/usr/local/bin/aws$ aws --version
aws-cli/2.9.23 Python/3.9.11 Linux/5.15.0-1030-aws exe/x86_64.ubuntu.22 prompt/oObject names are primarily limited by the local operating system and filesystem. Some operating systems such as Windows restrict certain characters in file names, such as:
; ^ / * | " &
Please note that this list may not be exhaustive and the restrictions may vary based on the operating system and filesystem in use. Consult the documentation of your operating system vendor or filesystem for a comprehensive list of restrictions for your specific situation.
Impossible Cloud Storage currently does not support the following object names:
Forward slashes at the beginning.
Empty path segments.
Max size of any object
50 TiB
Min size of any object
0 B
Max length for bucket names
63
Max length for object names
1024
Max length for / separated object name segment
255
Objects must have names that are unique and do not conflict with their parent objects. To prevent naming conflicts, applications must assign keys to objects that are unique and non-conflicting. For instance, the second PUT operation in the following sequence will fail because of a naming conflict with the object created by the first operation:
To avoid issues, please ensure that object names are always unique and do not conflict with their parent objects.
PUT <bucketname>/xxx/yyy/textfile.txt
PUT <bucketname>/xxx/yyyPUT <bucketname>/xxx/yyy
PUT <bucketname>/xxx/yyy/textfile.txtSince Impossible Cloud is S3-compatible many other applications that are not on this list work seamlessly as well. If you are interested in using such a solution, simply fill in this form and we provide you with compatibility advice for any available solution on the market.
QNAP Hybrid Backup Sync
🟢
S3-compatible
Synology Hyper Backup
🟢
S3-compatible
If you forgot your password or logging in for the first time, you can navigate to 'Forgot password' and put in your email. You will then receive an email with instructions to reset your password.

This section is designed to explain the most important concepts and notations used in the set of high-level 's3' commands.
aws s3 --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net <ACTION> <FILE SOURCE> <FILE DESTINATION>cp- copy
mv- move
ls - list buckets
rm - remove an object
mb - make a bucket
rb - remove a bucket
sync - sync directories with new and updated files
Add the --recursive flag for multiple objects operations
Most commands have --exclude "<value>" and --include "<value>" parameters that can achieve the desired result. These parameters perform pattern matching to either ex- or include a particular file or object. The following pattern symbols are supported:
*: Matches everything
?: Matches any single character
[sequence]: Matches any character in sequence
[!sequence]
See more information on the AWS CLI here:
You can access the console's features from the menu on the left-hand side of any page. Note that most of these are only visible for the root user - not the IAM users:
S3 Storage features:
Buckets: Manage your buckets and underlying objects (see guide).
Usage: See details of your plan and storage as well as egress consumption ().
IAM features ():
Keys: Find all information for authentication on your S3 API ().
Users: Add, delete or edit details of your IAM users ().
Additional features:
Help Center: Opens the link. You may expect to receive feedback per our SLA according to the ticket's priority. Please see our document for more information.
Profile Settings: Modify the profile settings of your user. For example, you can enable Multi-Factor Authentication (MFA).
Here is a comprehensive list of currently supported IAM CLI operations by our Impossible Cloud Storage, enabling you to manage IAM effectively:
CreateUser, DeleteUser, GetUser, ListUsers
CreateGroup, DeleteGroup, GetGroup, ListGroups
AddUserToGroup, RemoveUserFromGroup, ListGroupsForUser
CreateLoginProfile, UpdateLoginProfile, DeleteLoginProfile
ChangePassword
CreatePolicy, CreatePolicyVersion, SetDefaultPolicyVersion
AttachUserPolicy, DetachUserPolicy
AttachGroupPolicy, DetachGroupPolicy
PutUserPolicy, PutGroupPolicy
CreateAccessKey, DeleteAccessKey, ListAccessKeys
CreateAccountAlias, DeleteAccountAlias, ListAccountAliases
GetCallerIdentity, GetFederationToken
TagUser, UntagUser, ListUserTags
TagPolicy, UntagPolicy, ListPolicyTags
GetContextKeysForCustomPolicy
ListEntitiesForPolicy
When accessing the Impossible Cloud Storage Console as a root user, you can create sub-users to give other people access to the console.
The Users tab serves as the single-source-of-truth for all users registered in your organization. You can add, filter, and delete users (sub-users) as well as edit the assigned rights, including assigning group memberships, tags, inline policies, access keys, and console access.
To add users, follow these instructions:
Navigate to the Users tab on the left-pane.
Click on the Add User button on the top-right of the console.
Fill in the required email
(optional) Fill in password to give them access to the console.
Filling in password for sub-users is only applicable when you want to enable console access for the user. The email and password you set up in this section will be used to login to ICSC.
Read our knowledge base article about to learn more.
Inform the recipient about the account details.
To delete users, follow these instructions:
Navigate to the Users tab on the left-pane.
Click on the delete icon next to the user.
Confirm the deletion.
The root user has full administrative control, including the ability to manage access and permissions for all sub-users in the account. This includes assigning permissions, managing access keys, and updating user metadata such as tags.
Permissions for sub-users can be managed in two ways:
Group-Based Policies: Sub-users assigned to one or more groups will automatically inherit the permissions defined by the policies attached to those groups.
Inline Policies: Alternatively, policies can be assigned directly to individual users through inline policies. This allows for more granular permission control when group-based management is not sufficient.
Additionally, the root user can also create or delete access keys for any sub-user. This facilitates easier key rotation and credential management without requiring direct login access to the sub-user's account.
To manage a sub-user’s settings:
Navigate to the Users tab in the Console.
Click on the desired sub-user to open their management panel.
Use the available tabs — Groups, Tags, Access Keys, and Inline Policies — to manage each aspect of the sub-user's configuration.
These tools give the root user fine-grained control over user permissions and credentials, helping enforce security and compliance standards efficiently.
When connecting to an Impossible Cloud service programmatically, an endpoint is used. This endpoint is essentially the URL that serves as the gateway to an Impossible Cloud storage/IAM service. Tools like the AWS SDKs and the AWS Command Line Interface (AWS CLI) can be used to target the endpoint of each service within a specific region.
Please use either of the below addresses to log in to the Impossible Cloud Storage Console:
aws s3 <Command> [<Arg> ...]DeletePolicy, DeletePolicyVersion, DeleteUserPolicy, DeleteGroupPolicy
ListAttachedUserPolicies, ListAttachedGroupPolicies
GetUserPolicy, GetGroupPolicy, ListUserPolicies, ListGroupPolicies
aws s3 ls --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.netaws s3 mb --profile=impossiblecloud --endpoint-url=https://us-west-1.storage.impossibleapi.net s3://my-new-bucket-nameaws s3 rb --profile=impossiblecloud --endpoint-url=https://us-west-1.storage.impossibleapi.net s3://my-new-bucket-nameaws s3 --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net cp myfile.txt s3://your-company-bucket-name/aws s3 --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net mv s3://your-company-bucket-name/ s3://your-company-bucket-name2 --recursive

Policies: Add, delete or edit details of group-specific policies (see guide).
After logging in to the Impossible Cloud storage console, you can find the bucket's region and service endpoint under the 'Buckets' tab.
Alternatively, you can use the endpoints listed below for programmatic access. Refer to our CLI User Guide to learn more.
eu-central-2
Europe (Frankfurt)
Germany
eu-west-1
Europe (Amsterdam)
Netherlands
eu-west-2
Europe (London)
GLOBAL
eu-central-2
eu-east-1
eu-west-1
eu-west-2
GLOBAL
eu-central-2
eu-east-1
eu-west-1
eu-west-2
create-user: Create a new user in IAM with the specified parameters.
create-login-profile: Create a password for an IAM user.
delete-user: Delete an existing user from IAM.
list-users: Retrieve a list of all users in IAM.
aws iam create-user --user-name "[email protected]" --endpoint-url https://iam.impossibleapi.net/ --profile aws
aws iam create-login-profile --user-name "[email protected]" --password 'Y0urP@Ssw0rd!' --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam delete-user --user-name "[email protected]" --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam list-users --endpoint-url https://iam.impossibleapi.net --profile aws
create-group: Create a new group in IAM with the given attributes.
delete-group: Delete an existing group from IAM.
list-groups: Retrieve a list of all groups in IAM.
get-group: Retrieve detailed information about a specific group in IAM.
aws iam create-group --group-name your_group_name --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam delete-group --group-name your_group_name --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam list-groups --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam get-group --group-name your_group_name --endpoint-url https://iam.impossibleapi.net --profile aws
add-user-to-group: Add a user to a specific group in IAM.
remove-user-from-group: Remove a user from a specific group in IAM.
list-groups-for-user: Retrieve a list of groups associated with a particular user.
aws iam add-user-to-group --user-name "[email protected]" --group-name your_group_name --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam remove-user-from-group --user-name "[email protected]" --group-name your_group_name --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam list-groups-for-user --user-name "[email protected]" --endpoint-url https://iam.impossibleapi.net --profile aws
create-access-key: Generate a new access key for an IAM user.
list-access-keys: Retrieve a list of access keys associated with an IAM user.
aws iam create-access-key --user-name "[email protected]" --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam list-access-keys --user-name "[email protected]" --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam delete-access-key --user-name "[email protected]" --access-key-id "your access key id" --endpoint-url https://iam.impossibleapi.net --profile aws
Create a new policy in IAM with the specified permissions.
When creating a policy, you have two options for specifying the policy document. You can either include the policy directly in the command using the "--policy-document" parameter, or you can create a separate JSON file (e.g., policy.json) containing the policy and use the "--policy-document file://policy.json" format where file://policy.json is the local path to your policy.json file.
Policies versions are not supported. Please use "--version-id 1" for the get-policy-version subcommand.
Please also beware of the .
delete-policy: Delete an existing policy from IAM.
get-policy-version: Retrieve full information about a specific version of a policy in IAM.
Retrieve a list of all policies in IAM.
aws iam create-policy --policy-name your_policy_name --policy-document '{"Version": "2012-10-17", "Statement": [{"Effect": "Allow", "Action": ["s3:GetObject", "s3:GetObjectVersion", "s3:PutObject"], "Resource": ["arn:aws:s3:::bucket_name/*"]}]}' --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam create-policy --policy-name your_policy_name --policy-document file://policy.json --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam delete-policy --policy-arn arn:ipcld:iam::YourCanonicalID:policy/your_policy_name --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam get-policy-version --policy-arn="arn:ipcld:iam::YourCanonicalID:policy/your_policy_name" --version-id 1 --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam list-policies --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam get-policy --policy-arn="arn:ipcld:iam::YourCanonicalID:policy/your_policy_name" --endpoint-url https://iam.impossibleapi.net --profile aws
attach-group-policy: Attach a policy to a specific group in IAM.
detach-group-policy: Detach a policy from a specific group in IAM.
list-attached-group-policies: Retrieve a list of policies attached to a specific group in IAM.
aws iam attach-group-policy --group-name your_group_name --policy-arn arn:ipcld:iam::YourCanonicalID:policy/your_policy_name --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam detach-group-policy --group-name your_group_name --policy-arn arn:ipcld:iam::YourCanonicalID:policy/your_policy_name --endpoint-url https://iam.impossibleapi.net --profile aws
aws iam list-attached-group-policies --group-name your_group_name --endpoint-url https://iam.impossibleapi.net --profile aws
A Comprehensive Guide to Security in Impossible Cloud Storage
Security is a paramount concern when it comes to cloud storage solutions, and Impossible Cloud Storage is committed to providing robust security measures to protect your valuable data. In this guide, we will delve into the various aspects of security offered by Impossible Cloud Storage, ensuring a comprehensive understanding of the measures in place to safeguard your information.
Ensuring the security of your user accounts is essential, and Impossible Cloud Storage offers support for Multi-Factor Authentication (MFA) to add an extra layer of protection. While enabling MFA is available for the root account, subusers can also leverage this feature for enhanced security. Furthermore, root users can mandate MFA for their subusers, enhancing the overall security of the accounts.
Containerisation provides an added layer of security for clients' data in Impossible Cloud Storage. By running the application in isolated containers, the risk of data exposure or compromise is significantly reduced. Each application container is independent and isolated from others, as well as from the underlying host operating system, ensuring that even if the security of one container is compromised, the integrity and confidentiality of other containers and data remain intact.
Impossible Cloud supports both Amazon S3 Signature Version 2 and Version 4 for API requests. For better security, we recommend using Signature Version 4, as it uses a signing key instead of your secret access key. Please avoid using Version 2 if possible.
Impossible Cloud Storage takes data safety seriously, and as part of our commitment to maintaining high standards, our datacenters hold certifications such as and . These certifications validate our adherence to stringent security protocols, assuring users of the safety and protection of their data.
To ensure end-to-end encryption and give users full control over their data, Impossible Cloud Storage fully supports client-side encryption. This means that you can encrypt your data on the client side using your preferred encryption algorithms or tools, and Impossible Cloud Storage seamlessly integrates with the encrypted data without interference.
As part of our commitment to data security, Impossible Cloud Storage exclusively supports HTTPS/TLS encryption for data transmission. This ensures that data moving between your devices and our storage infrastructure remains encrypted and protected, mitigating the risk of unauthorised access or data interception. Supported versions of TLS are 1.2 and higher.
As part of this commitment, HTTP, the unencrypted counterpart, is not supported. By enforcing HTTPS/TLS encryption, all data exchanged between your devices and the storage infrastructure is encrypted, significantly reducing the risk of unauthorised access or interception of sensitive information.
Server-side encryption in Impossible Cloud refers to the automatic encryption of your data before it is stored and the decryption of your data when it is accessed. This process is conducted on the individual objects within your bucket.
If you have enabled SSE-S3 (Server-Side Encryption with Amazon S3-Managed Keys) on a bucket, this encryption becomes the default setting for all objects in the bucket. This means that any data placed in the bucket is automatically encrypted.
Even if you have not enabled SSE-S3 on a bucket, it's still possible to apply encryption to individual objects during the 'put-object' or 'copy-object' operations. This can be done using the AWS Command Line Interface (CLI).
Regardless of whether your data is encrypted or unencrypted, accessing your data remains consistent. As long as you have authenticated your request and possess the necessary permissions, you can retrieve your data seamlessly. For instance, if you share your data via a presigned URL, it will function the same way for both encrypted and unencrypted objects.
Additionally, when you request a list of objects in your bucket, all objects will be returned, regardless of their encryption status.
Please note that:
Currently, Impossible Cloud only supports 'SSE-S3' for server-side encryption. Other encryption methods, such as SSE-KMS (Server-Side Encryption with AWS Key Management Service) and SSE-C (Server-Side Encryption with Customer-Provided Keys), are not supported.
At Impossible Cloud Storage, we prioritise the security of your data at rest. To achieve this, we implement keys managed by Impossible Cloud which are used for server-side encryption, protecting your data while it is stored in our infrastructure.
In line with industry standards and compatibility with AWS S3, Impossible Cloud Storage Object Lock functionality. Object Lock enables you to enforce retention periods, ensuring data immutability and compliance with regulatory requirements. Whether you need to preserve data for regulatory compliance, legal holds, data preservation, ransomware protection, disaster recovery, immutable backups, or auditing purposes, Object Lock provides the necessary governance and compliance features to meet your needs.
Impossible Cloud Storage is designed to provide robust data resilience. At the time of upload (PUT) to the primary storage, data integrity measures are in place to ensure that your data remains intact and protected. The signature algorithm is SHA256 with RSA. Additionally, our infrastructure incorporates bit-rot protection, safeguarding against data corruption or loss due to hardware failures.
To mitigate the risks associated with disk failure, Impossible Cloud Storage leverages advanced data protection techniques. Our backend employs erasure coding, a data redundancy method that distributes data across multiple drives, ensuring data integrity and resiliency in the event of a disk failure.
Security is an ongoing process, and Impossible Cloud Storage continuously monitors and updates its security measures to stay ahead of emerging threats. Through regular security assessments, vulnerability scanning, and proactive monitoring, we strive to ensure the integrity, confidentiality, and availability of your data.
Security is of utmost importance when it comes to cloud storage, and Impossible Cloud Storage takes comprehensive measures to safeguard your data. By implementing features such as MFA support, client-side encryption, in-transit and at-rest encryption, object lock functionality, data resilience, and protection against disk and data center failures, we prioritize the confidentiality, integrity, and availability of your data. With our commitment to compliance, ongoing security updates, and robust network security measures, you can trust Impossible Cloud Storage to provide a secure and reliable storage solution for your valuable data.
Impossible Cloud supports IAM policies that allow its users to have granular control over the use, access and administration of their cloud storage. Currently the Impossible Cloud Console can manage the following types of policies:
Managed Policies
Inline Policies
An inline policy is attached directly to a specific IAM user. If that user is deleted, the inline policy is deleted too, it can’t be reused.
A managed policy exists as its own separate item in IAM. If the group or user it’s linked to is deleted, the policy still exists and can be attached to another IAM user.
Managed Policies are a reusable set of permissions that you can attach to multiple users or groups to control what actions they can perform. Impossible Cloud allows you to have custom policies created and managed by you. Customer managed policies offer greater flexibility as you can define specific permissions based on your requirements. You can also reuse these policies across multiple users or groups within your ICSC environment.
You can either put this on a .JSON and attach via CLI or paste in the ICSC console under “Policies”. A Managed Policy can look like this:
File example: my-impossible-cloud-policy.json
To attach that Managed Policy to an IAM User using CLI, you can write:
Inline policies are directly embedded into a single IAM user or group. These type of policies have the following conditions:
Directly Attached: When you create an inline policy, it becomes part of that specific user or group.
Unique to the Identity: It cannot be attached to any other user or group.
No Versioning: Unlike managed policies, inline policies do not have versioning, meaning you can't easily roll back to a previous version of the policy.
Lifecycle: If you delete the IAM identity, the inline policy is also automatically deleted.
You can assign inline policies via CLI like this:
United Kingdom
eu-east-1
Europe (Poznań)
Poland
eu-north-1
Europe (Copenhagen)
Denmark
us-east-1
United States (New York)
United States
eu-north-1
eu-north-1
{
"Statement": [
{
"Action": [
"s3:ListAllMyBuckets",
"s3:PutObject",
"s3:ListBucket"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::my-impossible-cloud-bucket",
"arn:aws:s3:::my-impossible-cloud-bucket/*"
],
"Sid": "AllowCommonS3Actions"
}
],
"Version": "2012-10-17"
}aws configure --profile your-profile-nameaws iam create-policy \
--policy-name MyICPolicy \
--policy-document file://my-impossible-cloud-policy.json \
--endpoint-url https://iam.impossibleapi.net \
--profile your-profile-name
aws iam attach-user-policy \
--user-name "[email protected]" \
--policy-arn arn:aws:iam::123456789012:policy/MyICPolicy \
--endpoint-url https://iam.impossibleapi.net/
--profile your-profile-nameaws iam put-user-policy \
--user-name "[email protected]" \
--policy-name CustomInlinePolicy \
--policy-document file://my-impossible-cloud-policy.json \
--endpoint-url https://iam.impossibleapi.net/ \
--profile your-profile-nameImpossible Cloud Storage integrates seamlessly with a wide range of industry-leading backup applications. The following overview provides detailed information and links to the relevant resources in our knowledge base:
Acronis
🟢
Native
Acronis Cyberfit Accelerated Alliance Partner
Since Impossible Cloud is S3-compatible many other applications that are not on this list work seamlessly as well. If you are interested in using such a solution, simply fill in and we provide you with compatibility advice for any available solution on the market.
Interacting with buckets and objects provides several options unless all settings for the bucket were defined during creation. In this latter case, only legal hold settings can be changed. It's important to note that most of these actions are irreversible once implemented. Additionally, all of the following interactions require the appropriate permissions:
To change the retention of a bucket, you can edit the policy within the bucket's settings. This change will apply to all uploaded objects - including all versions, both those already uploaded as well as those not yet uploaded. Note that the retention policy can only be changed when no such policy is already defined.
To modify retention properties for a specific object or one of its versions, you can edit the retention policy for that item. It's important to note that any changes to an object's retention policy will only apply to its latest version.
Add a delete marker to an object: Similar to versioning, you can add a respective delete marker to objects. These objects with delete markers can be restored by showing deleted files. In contrast to versioning, you are unable to delete files with a defined retention policy:
Backup Exec (Veritas)
🟢
S3-compatible
Veritas Technology Ecosystem (VTE)
/
Comet Backup
🟢
Native
Comet Explorer Alliance Program
Commvault
🟢
S3-compatible
Tested by IC
/
Duplicati
🟢
S3-compatible
Tested by IC
/
Hornetsecurity
🟢
Native
Tested by IC and Hornetsecurity
/
HYCU
🟢
S3-compatible
HYCU Global Partner PACE Program
/
MSP360
🟢
S3-compatible
MSP360 Advantage Partner Program
Nakivo
🟢
S3-compatible
Certified by NAKIVO
NovaBACKUP
🟢
S3-compatible
Tested by NovaBACKUP
/
Nutanix
🟢
S3-compatible
Nutanix Ready
/
Tiger Bridge
🟢
S3-compatible
Tested by IC
/
Rubrik
🟢
S3-compatible
Tested by IC
/
Storware
🟢
Native
Tested by IC and Storware
/
Veeam
🟢
S3-compatible
Veeam Ready
Xopero
🟢
S3-compatible
Tested by IC
/








Action
Command
CreateBucket
aws s3api create-bucket
DeleteBucket
aws s3api delete-bucket
HeadBucket
aws s3api head-bucket
GetBucketLocation
aws s3api get-bucket-location
GetBucketCORS
aws s3api get-bucket-cors
PutBucketCORS
aws s3api put-bucket-cors
Action
Command
HeadObject
aws s3api head-object
GetObject
aws s3api get-object
GetObjectVersion
aws s3api get-object
GetObjectAttributes
aws s3api get-object-attributes
GetObjectVersionAttributes
aws s3api get-object-attributes
GetObjectTagging
aws s3api get-object-tagging
Action
Command
CreateMultipartUpload
aws s3api create-multipart-upload
UploadPart
aws s3api upload-part
UploadPartCopy
aws s3api upload-part-copy
ListParts
aws s3api list-parts
CompleteMultipartUpload
aws s3api complete-multipart-upload
AbortMultipartUpload
aws s3api abort-multipart-upload
You can find examples of some most useful commands here.
You can find more information in the AWS CLI user guide and developers guide.
aws s3api --profile=impossiblecloud --endpoint-url=https://eu-central-2.storage.impossibleapi.net <ACTION> <FILE SOURCE> <FILE DESTINATION>aws s3api <Command> [<Arg> ...]DeleteBucketCORS
aws s3api delete-bucket-cors
GetBucketEncryption (GetEncryptionConfiguration)
aws s3api get-bucket-encryption
PutBucketEncryption (PutEncryptionConfiguration)
aws s3api put-bucket-encryption
DeleteBucketEncryption
aws s3api delete-bucket-encryption
GetBucketTagging
aws s3api get-bucket-tagging
PutBucketTagging
aws s3api put-bucket-tagging
DeleteBucketTagging
aws s3api delete-bucket-tagging
GetBucketVersioning
aws s3api get-bucket-versioning
PutBucketVersioning
aws s3api put-bucket-versioning
GetObjectLockConfiguration (bucket)
aws s3api get-object-lock-configuration
PutObjectLockConfiguration (bucket)
aws s3api put-object-lock-configuration
ListBucket (ListObjects)
aws s3api list-objects
ListBucketVersions
aws s3api list-object-versions
ListBucketMultipartUploads
aws s3api list-multipart-uploads
ListBuckets
aws s3api list-buckets
GetObjectVersionTagging
aws s3api get-object-tagging
PutObject
aws s3api put-object
PutObjectTagging
aws s3api put-object-tagging
PutObjectVersionTagging
aws s3api put-object-tagging
DeleteObject
aws s3api delete-object
DeleteObjectVersion
aws s3api delete-object
DeleteObjectTagging
aws s3api delete-object-tagging
DeleteObjectVersionTagging
aws s3api delete-object-tagging
PutObjectRetention
aws s3api put-object-retention
GetObjectRetention
aws s3api get-object-retention
PutObjectLegalHold
aws s3api put-object-legal-hold
GetObjectLegalHold
aws s3api get-object-legal-hold
CopyObject
aws s3api copy-object
ListObjects
aws s3api list-objects
ListObjectsV2
aws s3api list-objects-v2
DeleteObjects (batch)
aws s3api delete-objects
BypassGovernanceRetention (flag)
(use with delete-object / delete-objects; e.g., add --bypass-governance-retention after the bucket)