Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Object Storage
    • Overview
    • Identity and Access Management
    • Access control list (ACL)
    • Bucket policy
    • Public access
    • Pre-signed URLs
    • Security Token Service
    • Ephemeral keys
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Bucket logs
  • Release notes
  • FAQ

In this article:

  • Ephemeral key format
  • Key ID
  • Secret key
  • Session token
  1. Access management
  2. Ephemeral keys

Ephemeral access keys compatible with AWS APIs

Written by
Yandex Cloud
Updated at February 24, 2026
  • Ephemeral key format
    • Key ID
    • Secret key
    • Session token

Ephemeral access keys are temporary credentials for authenticating Yandex accounts, federated accounts, local users, and service accounts.

Authentication with ephemeral access keys is only supported in Yandex Object Storage.

You can create an ephemeral key for the current user or for a service account you have access to.

Ephemeral keys are issued based on the current session's IAM token. They may be valid from 15 minutes to 12 hours. If lifetime is not set during creation, it is limited to the IAM token's validity period.

Warning

You cannot revoke an ephemeral key. It automatically expires after its lifetime.

To set up access permissions for the key, you need an access policy in JSON format based on this schema.

Tip

If a service account has roles in Object Storage for a folder, users with temporary keys will get view access to buckets in that folder. We recommend assigning service account roles for specific buckets, rather than a folder.

Ephemeral key formatEphemeral key format

Ephemeral keys consist of three parts:

  • Key ID
  • Secret key
  • Session token

Requests to the AWS-compatible API use all the three parts. The key ID is specified in open format. The secret key is used to sign request parameters, and the session token serves to verify temporary credentials.

Key IDKey ID

Consists of 20 characters. These characters may include:

  • Latin letters
  • Numbers

Here is an example of a key ID: abcdefg1234h********.

Secret keySecret key

A secret key consists of 43 characters and always starts with YC. Other characters may include:

  • Latin letters
  • Numbers
  • Underscores (_) and hyphens (-)

Here is an example of a secret key: YCabcdefg1234hi5678jk9AbCdEfG1234hI********.

Session tokenSession token

The session token has a variable length of approximately 285 characters and is used to verify temporary credentials. Token example: s1.9muilY....

See alsoSee also

  • Access management methods in Object Storage: Overview
  • Security Token Service
  • Accessing a bucket using an ephemeral access key

Was the article helpful?

Previous
Security Token Service
Next
Pricing policy
© 2026 Direct Cursus Technology L.L.C.