@cloud-copilot/iam-data 0.2.202408312 → 0.2.202409011
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -0
- package/data/actions/a2c.json +4 -4
- package/data/actions/a4b.json +96 -96
- package/data/actions/access-analyzer.json +34 -34
- package/data/actions/account.json +16 -16
- package/data/actions/acm-pca.json +23 -23
- package/data/actions/acm.json +15 -15
- package/data/actions/activate.json +8 -8
- package/data/actions/airflow.json +11 -11
- package/data/actions/amplify.json +37 -37
- package/data/actions/amplifybackend.json +31 -31
- package/data/actions/amplifyuibuilder.json +29 -29
- package/data/actions/aoss.json +39 -39
- package/data/actions/apigateway.json +9 -9
- package/data/actions/app-integrations.json +28 -28
- package/data/actions/appconfig.json +45 -45
- package/data/actions/appfabric.json +26 -26
- package/data/actions/appflow.json +31 -31
- package/data/actions/application-autoscaling.json +13 -13
- package/data/actions/application-cost-profiler.json +6 -6
- package/data/actions/application-signals.json +15 -15
- package/data/actions/application-transformation.json +14 -14
- package/data/actions/applicationinsights.json +34 -34
- package/data/actions/appmesh-preview.json +39 -39
- package/data/actions/appmesh.json +42 -42
- package/data/actions/apprunner.json +42 -42
- package/data/actions/appstream.json +80 -80
- package/data/actions/appstudio.json +5 -5
- package/data/actions/appsync.json +70 -70
- package/data/actions/apptest.json +24 -24
- package/data/actions/aps.json +42 -42
- package/data/actions/arc-zonal-shift.json +13 -13
- package/data/actions/arsenal.json +1 -1
- package/data/actions/artifact.json +10 -10
- package/data/actions/athena.json +79 -79
- package/data/actions/auditmanager.json +62 -62
- package/data/actions/autoscaling-plans.json +6 -6
- package/data/actions/autoscaling.json +65 -65
- package/data/actions/aws-marketplace-management.json +13 -13
- package/data/actions/aws-marketplace.json +54 -54
- package/data/actions/aws-portal.json +9 -9
- package/data/actions/awsconnector.json +3 -3
- package/data/actions/b2bi.json +27 -27
- package/data/actions/backup-gateway.json +27 -27
- package/data/actions/backup-storage.json +15 -15
- package/data/actions/backup.json +96 -96
- package/data/actions/batch.json +25 -25
- package/data/actions/bcm-data-exports.json +12 -12
- package/data/actions/bedrock.json +129 -129
- package/data/actions/billing.json +13 -13
- package/data/actions/billingconductor.json +32 -32
- package/data/actions/braket.json +17 -17
- package/data/actions/budgets.json +13 -13
- package/data/actions/bugbust.json +17 -17
- package/data/actions/cases.json +35 -35
- package/data/actions/cassandra.json +17 -17
- package/data/actions/ce.json +53 -53
- package/data/actions/chatbot.json +31 -31
- package/data/actions/chime.json +309 -309
- package/data/actions/cleanrooms-ml.json +25 -25
- package/data/actions/cleanrooms.json +80 -80
- package/data/actions/cloud9.json +30 -30
- package/data/actions/clouddirectory.json +66 -66
- package/data/actions/cloudformation.json +93 -93
- package/data/actions/cloudfront-keyvaluestore.json +6 -6
- package/data/actions/cloudfront.json +117 -117
- package/data/actions/cloudhsm.json +18 -18
- package/data/actions/cloudsearch.json +29 -29
- package/data/actions/cloudshell.json +10 -10
- package/data/actions/cloudtrail-data.json +1 -1
- package/data/actions/cloudtrail.json +55 -55
- package/data/actions/cloudwatch.json +53 -53
- package/data/actions/codeartifact.json +51 -51
- package/data/actions/codebuild.json +58 -58
- package/data/actions/codecatalyst.json +30 -30
- package/data/actions/codecommit.json +90 -90
- package/data/actions/codeconnections.json +38 -38
- package/data/actions/codedeploy-commands-secure.json +4 -4
- package/data/actions/codedeploy.json +48 -48
- package/data/actions/codeguru-profiler.json +23 -23
- package/data/actions/codeguru-reviewer.json +17 -17
- package/data/actions/codeguru-security.json +15 -15
- package/data/actions/codeguru.json +1 -1
- package/data/actions/codepipeline.json +43 -43
- package/data/actions/codestar-connections.json +38 -38
- package/data/actions/codestar-notifications.json +13 -13
- package/data/actions/codestar.json +22 -22
- package/data/actions/codewhisperer.json +18 -18
- package/data/actions/cognito-identity.json +26 -26
- package/data/actions/cognito-idp.json +107 -107
- package/data/actions/cognito-sync.json +19 -19
- package/data/actions/comprehend.json +85 -85
- package/data/actions/comprehendmedical.json +25 -25
- package/data/actions/compute-optimizer.json +26 -26
- package/data/actions/config.json +92 -92
- package/data/actions/connect-campaigns.json +22 -22
- package/data/actions/connect.json +260 -260
- package/data/actions/consoleapp.json +2 -2
- package/data/actions/consolidatedbilling.json +2 -2
- package/data/actions/controlcatalog.json +5 -5
- package/data/actions/controltower.json +64 -64
- package/data/actions/cost-optimization-hub.json +7 -7
- package/data/actions/cur.json +12 -12
- package/data/actions/customer-verification.json +5 -5
- package/data/actions/databrew.json +44 -44
- package/data/actions/dataexchange.json +32 -32
- package/data/actions/datapipeline.json +21 -21
- package/data/actions/datasync.json +60 -60
- package/data/actions/datazone.json +165 -165
- package/data/actions/dax.json +30 -30
- package/data/actions/dbqms.json +13 -13
- package/data/actions/deadline.json +103 -103
- package/data/actions/deepcomposer.json +18 -18
- package/data/actions/deeplens.json +24 -24
- package/data/actions/deepracer.json +51 -51
- package/data/actions/detective.json +36 -36
- package/data/actions/devicefarm.json +77 -77
- package/data/actions/devops-guru.json +31 -31
- package/data/actions/directconnect.json +63 -63
- package/data/actions/discovery.json +29 -29
- package/data/actions/dlm.json +8 -8
- package/data/actions/dms.json +134 -134
- package/data/actions/docdb-elastic.json +16 -16
- package/data/actions/drs.json +90 -90
- package/data/actions/ds.json +77 -77
- package/data/actions/dynamodb.json +69 -69
- package/data/actions/ebs.json +6 -6
- package/data/actions/ec2-instance-connect.json +3 -3
- package/data/actions/ec2.json +641 -641
- package/data/actions/ec2messages.json +6 -6
- package/data/actions/ecr-public.json +23 -23
- package/data/actions/ecr.json +51 -51
- package/data/actions/ecs.json +58 -58
- package/data/actions/eks-auth.json +1 -1
- package/data/actions/eks.json +57 -57
- package/data/actions/elastic-inference.json +7 -7
- package/data/actions/elasticache.json +77 -77
- package/data/actions/elasticbeanstalk.json +50 -50
- package/data/actions/elasticfilesystem.json +36 -36
- package/data/actions/elasticloadbalancing.json +67 -67
- package/data/actions/elasticmapreduce.json +82 -82
- package/data/actions/elastictranscoder.json +17 -17
- package/data/actions/elemental-activations.json +13 -13
- package/data/actions/elemental-appliances-software.json +14 -14
- package/data/actions/elemental-support-cases.json +5 -5
- package/data/actions/elemental-support-content.json +1 -1
- package/data/actions/emr-containers.json +23 -23
- package/data/actions/emr-serverless.json +18 -18
- package/data/actions/entityresolution.json +39 -39
- package/data/actions/es.json +97 -97
- package/data/actions/events.json +59 -59
- package/data/actions/evidently.json +38 -38
- package/data/actions/execute-api.json +3 -3
- package/data/actions/finspace-api.json +1 -1
- package/data/actions/finspace.json +59 -59
- package/data/actions/firehose.json +12 -12
- package/data/actions/fis.json +27 -27
- package/data/actions/fms.json +42 -42
- package/data/actions/forecast.json +70 -70
- package/data/actions/frauddetector.json +74 -74
- package/data/actions/freertos.json +20 -20
- package/data/actions/freetier.json +3 -3
- package/data/actions/fsx.json +53 -53
- package/data/actions/gamelift.json +108 -108
- package/data/actions/geo.json +60 -60
- package/data/actions/glacier.json +33 -33
- package/data/actions/globalaccelerator.json +56 -56
- package/data/actions/glue.json +258 -258
- package/data/actions/grafana.json +25 -25
- package/data/actions/greengrass.json +112 -112
- package/data/actions/groundstation.json +33 -33
- package/data/actions/groundtruthlabeling.json +16 -16
- package/data/actions/guardduty.json +75 -75
- package/data/actions/health.json +14 -14
- package/data/actions/healthlake.json +24 -24
- package/data/actions/honeycode.json +30 -30
- package/data/actions/iam.json +171 -171
- package/data/actions/identity-sync.json +13 -13
- package/data/actions/identitystore-auth.json +3 -3
- package/data/actions/identitystore.json +19 -19
- package/data/actions/imagebuilder.json +73 -73
- package/data/actions/importexport.json +6 -6
- package/data/actions/inspector-scan.json +1 -1
- package/data/actions/inspector.json +37 -37
- package/data/actions/inspector2.json +59 -59
- package/data/actions/internetmonitor.json +17 -17
- package/data/actions/invoicing.json +4 -4
- package/data/actions/iot-device-tester.json +5 -5
- package/data/actions/iot.json +271 -271
- package/data/actions/iot1click.json +26 -26
- package/data/actions/iotanalytics.json +34 -34
- package/data/actions/iotdeviceadvisor.json +14 -14
- package/data/actions/iotevents.json +39 -39
- package/data/actions/iotfleethub.json +8 -8
- package/data/actions/iotfleetwise.json +52 -52
- package/data/actions/iotjobsdata.json +4 -4
- package/data/actions/iotroborunner.json +20 -20
- package/data/actions/iotsitewise.json +86 -86
- package/data/actions/iottwinmaker.json +40 -40
- package/data/actions/iotwireless.json +113 -113
- package/data/actions/iq-permission.json +9 -9
- package/data/actions/iq.json +63 -63
- package/data/actions/ivs.json +63 -63
- package/data/actions/ivschat.json +17 -17
- package/data/actions/kafka-cluster.json +19 -19
- package/data/actions/kafka.json +52 -52
- package/data/actions/kafkaconnect.json +16 -16
- package/data/actions/kendra-ranking.json +9 -9
- package/data/actions/kendra.json +66 -66
- package/data/actions/kinesis.json +32 -32
- package/data/actions/kinesisanalytics.json +34 -34
- package/data/actions/kinesisvideo.json +44 -44
- package/data/actions/kms.json +55 -55
- package/data/actions/lakeformation.json +53 -53
- package/data/actions/lambda.json +70 -70
- package/data/actions/launchwizard.json +37 -37
- package/data/actions/lex.json +145 -145
- package/data/actions/license-manager-linux-subscriptions.json +11 -11
- package/data/actions/license-manager-user-subscriptions.json +11 -11
- package/data/actions/license-manager.json +50 -50
- package/data/actions/lightsail.json +161 -161
- package/data/actions/logs.json +82 -82
- package/data/actions/lookoutequipment.json +49 -49
- package/data/actions/lookoutmetrics.json +30 -30
- package/data/actions/lookoutvision.json +25 -25
- package/data/actions/m2.json +34 -34
- package/data/actions/machinelearning.json +28 -28
- package/data/actions/macie2.json +81 -81
- package/data/actions/managedblockchain-query.json +9 -9
- package/data/actions/managedblockchain.json +34 -34
- package/data/actions/mapcredits.json +3 -3
- package/data/actions/marketplacecommerceanalytics.json +2 -2
- package/data/actions/mechanicalturk.json +39 -39
- package/data/actions/mediaconnect.json +54 -54
- package/data/actions/mediaconvert.json +29 -29
- package/data/actions/mediaimport.json +1 -1
- package/data/actions/medialive.json +92 -92
- package/data/actions/mediapackage-vod.json +17 -17
- package/data/actions/mediapackage.json +19 -19
- package/data/actions/mediapackagev2.json +27 -27
- package/data/actions/mediastore.json +26 -26
- package/data/actions/mediatailor.json +44 -44
- package/data/actions/medical-imaging.json +21 -21
- package/data/actions/memorydb.json +39 -39
- package/data/actions/mgh.json +21 -21
- package/data/actions/mgn.json +104 -104
- package/data/actions/migrationhub-orchestrator.json +34 -34
- package/data/actions/migrationhub-strategy.json +31 -31
- package/data/actions/mobileanalytics.json +3 -3
- package/data/actions/mobiletargeting.json +123 -123
- package/data/actions/monitron.json +18 -18
- package/data/actions/mq.json +24 -24
- package/data/actions/neptune-db.json +32 -32
- package/data/actions/neptune-graph.json +32 -32
- package/data/actions/network-firewall.json +36 -36
- package/data/actions/networkmanager-chat.json +7 -7
- package/data/actions/networkmanager.json +85 -85
- package/data/actions/networkmonitor.json +12 -12
- package/data/actions/nimble.json +51 -51
- package/data/actions/notifications-contacts.json +9 -9
- package/data/actions/notifications.json +21 -21
- package/data/actions/oam.json +15 -15
- package/data/actions/omics.json +82 -82
- package/data/actions/one.json +27 -27
- package/data/actions/opsworks-cm.json +19 -19
- package/data/actions/opsworks.json +74 -74
- package/data/actions/organizations.json +55 -55
- package/data/actions/osis.json +15 -15
- package/data/actions/outposts.json +33 -33
- package/data/actions/panorama.json +36 -36
- package/data/actions/partnercentral-account-management.json +3 -3
- package/data/actions/payment-cryptography.json +31 -31
- package/data/actions/payments.json +12 -12
- package/data/actions/pca-connector-ad.json +25 -25
- package/data/actions/pca-connector-scep.json +12 -12
- package/data/actions/pcs.json +19 -19
- package/data/actions/personalize.json +82 -82
- package/data/actions/pi.json +13 -13
- package/data/actions/pipes.json +10 -10
- package/data/actions/polly.json +9 -9
- package/data/actions/pricing.json +5 -5
- package/data/actions/private-networks.json +26 -26
- package/data/actions/profile.json +54 -54
- package/data/actions/proton.json +111 -111
- package/data/actions/purchase-orders.json +14 -14
- package/data/actions/q.json +12 -12
- package/data/actions/qapps.json +32 -32
- package/data/actions/qbusiness.json +65 -65
- package/data/actions/qldb.json +35 -35
- package/data/actions/quicksight.json +204 -204
- package/data/actions/ram.json +34 -34
- package/data/actions/rbin.json +10 -10
- package/data/actions/rds-data.json +6 -6
- package/data/actions/rds.json +167 -167
- package/data/actions/redshift-data.json +10 -10
- package/data/actions/redshift-serverless.json +56 -56
- package/data/actions/redshift.json +155 -155
- package/data/actions/refactor-spaces.json +24 -24
- package/data/actions/rekognition.json +76 -76
- package/data/actions/repostspace.json +11 -11
- package/data/actions/resiliencehub.json +60 -60
- package/data/actions/resource-explorer-2.json +24 -24
- package/data/actions/resource-explorer.json +3 -3
- package/data/actions/resource-groups.json +24 -24
- package/data/actions/rhelkb.json +1 -1
- package/data/actions/robomaker.json +59 -59
- package/data/actions/rolesanywhere.json +30 -30
- package/data/actions/route53-recovery-cluster.json +4 -4
- package/data/actions/route53-recovery-control-config.json +25 -25
- package/data/actions/route53-recovery-readiness.json +32 -32
- package/data/actions/route53.json +70 -70
- package/data/actions/route53domains.json +34 -34
- package/data/actions/route53profiles.json +18 -18
- package/data/actions/route53resolver.json +68 -68
- package/data/actions/rum.json +17 -17
- package/data/actions/s3-object-lambda.json +26 -26
- package/data/actions/s3-outposts.json +48 -48
- package/data/actions/s3.json +159 -159
- package/data/actions/s3express.json +7 -7
- package/data/actions/sagemaker-geospatial.json +19 -19
- package/data/actions/sagemaker-groundtruth-synthetic.json +12 -12
- package/data/actions/sagemaker-mlflow.json +45 -45
- package/data/actions/sagemaker.json +366 -366
- package/data/actions/savingsplans.json +10 -10
- package/data/actions/scheduler.json +12 -12
- package/data/actions/schemas.json +31 -31
- package/data/actions/scn.json +16 -16
- package/data/actions/sdb.json +10 -10
- package/data/actions/secretsmanager.json +23 -23
- package/data/actions/securityhub.json +89 -89
- package/data/actions/securitylake.json +31 -31
- package/data/actions/serverlessrepo.json +15 -15
- package/data/actions/servicecatalog.json +114 -114
- package/data/actions/servicediscovery.json +27 -27
- package/data/actions/serviceextract.json +1 -1
- package/data/actions/servicequotas.json +19 -19
- package/data/actions/ses.json +193 -193
- package/data/actions/shield.json +36 -36
- package/data/actions/signer.json +19 -19
- package/data/actions/signin.json +2 -2
- package/data/actions/simspaceweaver.json +16 -16
- package/data/actions/sms-voice.json +87 -87
- package/data/actions/sms.json +37 -37
- package/data/actions/snow-device-management.json +13 -13
- package/data/actions/snowball.json +27 -27
- package/data/actions/sns.json +41 -41
- package/data/actions/sqlworkbench.json +70 -70
- package/data/actions/sqs.json +20 -20
- package/data/actions/ssm-contacts.json +40 -40
- package/data/actions/ssm-guiconnect.json +3 -3
- package/data/actions/ssm-incidents.json +31 -31
- package/data/actions/ssm-quicksetup.json +12 -12
- package/data/actions/ssm-sap.json +24 -24
- package/data/actions/ssm.json +149 -149
- package/data/actions/ssmmessages.json +4 -4
- package/data/actions/sso-directory.json +52 -52
- package/data/actions/sso-oauth.json +1 -1
- package/data/actions/sso.json +126 -126
- package/data/actions/states.json +39 -39
- package/data/actions/storagegateway.json +91 -91
- package/data/actions/sts.json +12 -12
- package/data/actions/support.json +25 -25
- package/data/actions/supportapp.json +13 -13
- package/data/actions/supportplans.json +4 -4
- package/data/actions/supportrecommendations.json +2 -2
- package/data/actions/sustainability.json +1 -1
- package/data/actions/swf.json +51 -51
- package/data/actions/synthetics.json +21 -21
- package/data/actions/tag.json +8 -8
- package/data/actions/tax.json +14 -14
- package/data/actions/textract.json +25 -25
- package/data/actions/thinclient.json +17 -17
- package/data/actions/timestream-influxdb.json +11 -11
- package/data/actions/timestream.json +37 -37
- package/data/actions/tiros.json +5 -5
- package/data/actions/tnb.json +33 -33
- package/data/actions/transcribe.json +49 -49
- package/data/actions/transfer.json +60 -60
- package/data/actions/translate.json +19 -19
- package/data/actions/trustedadvisor.json +52 -52
- package/data/actions/ts.json +9 -9
- package/data/actions/user-subscriptions.json +6 -6
- package/data/actions/vendor-insights.json +24 -24
- package/data/actions/verified-access.json +1 -1
- package/data/actions/verifiedpermissions.json +24 -24
- package/data/actions/voiceid.json +31 -31
- package/data/actions/vpc-lattice-svcs.json +2 -2
- package/data/actions/vpc-lattice.json +51 -51
- package/data/actions/waf-regional.json +81 -81
- package/data/actions/waf.json +77 -77
- package/data/actions/wafv2.json +56 -56
- package/data/actions/wam.json +1 -1
- package/data/actions/wellarchitected.json +73 -73
- package/data/actions/wickr.json +8 -8
- package/data/actions/wisdom.json +47 -47
- package/data/actions/workdocs.json +61 -61
- package/data/actions/worklink.json +34 -34
- package/data/actions/workmail.json +118 -118
- package/data/actions/workmailmessageflow.json +2 -2
- package/data/actions/workspaces-web.json +58 -58
- package/data/actions/workspaces.json +89 -89
- package/data/actions/xray.json +33 -33
- package/data/conditionKeys/a4b.json +5 -5
- package/data/conditionKeys/access-analyzer.json +3 -3
- package/data/conditionKeys/account.json +5 -5
- package/data/conditionKeys/acm-pca.json +4 -4
- package/data/conditionKeys/acm.json +8 -8
- package/data/conditionKeys/airflow.json +3 -3
- package/data/conditionKeys/amplify.json +3 -3
- package/data/conditionKeys/amplifyuibuilder.json +15 -15
- package/data/conditionKeys/aoss.json +4 -4
- package/data/conditionKeys/apigateway.json +28 -28
- package/data/conditionKeys/app-integrations.json +3 -3
- package/data/conditionKeys/appconfig.json +3 -3
- package/data/conditionKeys/appfabric.json +3 -3
- package/data/conditionKeys/appflow.json +3 -3
- package/data/conditionKeys/application-autoscaling.json +3 -3
- package/data/conditionKeys/application-signals.json +3 -3
- package/data/conditionKeys/applicationinsights.json +3 -3
- package/data/conditionKeys/appmesh.json +3 -3
- package/data/conditionKeys/apprunner.json +10 -10
- package/data/conditionKeys/appstream.json +4 -4
- package/data/conditionKeys/appsync.json +4 -4
- package/data/conditionKeys/apptest.json +3 -3
- package/data/conditionKeys/aps.json +3 -3
- package/data/conditionKeys/arc-zonal-shift.json +2 -2
- package/data/conditionKeys/artifact.json +2 -2
- package/data/conditionKeys/athena.json +3 -3
- package/data/conditionKeys/auditmanager.json +3 -3
- package/data/conditionKeys/autoscaling.json +19 -19
- package/data/conditionKeys/aws-marketplace.json +8 -8
- package/data/conditionKeys/b2bi.json +3 -3
- package/data/conditionKeys/backup-gateway.json +3 -3
- package/data/conditionKeys/backup.json +9 -9
- package/data/conditionKeys/batch.json +17 -17
- package/data/conditionKeys/bcm-data-exports.json +3 -3
- package/data/conditionKeys/bedrock.json +5 -5
- package/data/conditionKeys/billingconductor.json +3 -3
- package/data/conditionKeys/braket.json +3 -3
- package/data/conditionKeys/budgets.json +3 -3
- package/data/conditionKeys/bugbust.json +3 -3
- package/data/conditionKeys/cases.json +4 -4
- package/data/conditionKeys/cassandra.json +3 -3
- package/data/conditionKeys/ce.json +3 -3
- package/data/conditionKeys/chime.json +3 -3
- package/data/conditionKeys/cleanrooms-ml.json +4 -4
- package/data/conditionKeys/cleanrooms.json +3 -3
- package/data/conditionKeys/cloud9.json +10 -10
- package/data/conditionKeys/cloudformation.json +10 -10
- package/data/conditionKeys/cloudfront.json +3 -3
- package/data/conditionKeys/cloudhsm.json +3 -3
- package/data/conditionKeys/cloudshell.json +3 -3
- package/data/conditionKeys/cloudtrail-data.json +3 -3
- package/data/conditionKeys/cloudtrail.json +3 -3
- package/data/conditionKeys/cloudwatch.json +6 -6
- package/data/conditionKeys/codeartifact.json +3 -3
- package/data/conditionKeys/codebuild.json +3 -3
- package/data/conditionKeys/codecatalyst.json +3 -3
- package/data/conditionKeys/codecommit.json +4 -4
- package/data/conditionKeys/codeconnections.json +15 -15
- package/data/conditionKeys/codedeploy.json +3 -3
- package/data/conditionKeys/codeguru-profiler.json +3 -3
- package/data/conditionKeys/codeguru-reviewer.json +3 -3
- package/data/conditionKeys/codeguru-security.json +3 -3
- package/data/conditionKeys/codepipeline.json +3 -3
- package/data/conditionKeys/codestar-connections.json +15 -15
- package/data/conditionKeys/codestar-notifications.json +4 -4
- package/data/conditionKeys/codestar.json +4 -4
- package/data/conditionKeys/codewhisperer.json +3 -3
- package/data/conditionKeys/cognito-identity.json +3 -3
- package/data/conditionKeys/cognito-idp.json +3 -3
- package/data/conditionKeys/comprehend.json +10 -10
- package/data/conditionKeys/comprehendmedical.json +1 -1
- package/data/conditionKeys/compute-optimizer.json +1 -1
- package/data/conditionKeys/config.json +3 -3
- package/data/conditionKeys/connect-campaigns.json +3 -3
- package/data/conditionKeys/connect.json +10 -10
- package/data/conditionKeys/controltower.json +3 -3
- package/data/conditionKeys/cur.json +3 -3
- package/data/conditionKeys/databrew.json +3 -3
- package/data/conditionKeys/dataexchange.json +4 -4
- package/data/conditionKeys/datapipeline.json +6 -6
- package/data/conditionKeys/datasync.json +3 -3
- package/data/conditionKeys/datazone.json +3 -3
- package/data/conditionKeys/dax.json +1 -1
- package/data/conditionKeys/deadline.json +11 -11
- package/data/conditionKeys/deepcomposer.json +3 -3
- package/data/conditionKeys/deepracer.json +5 -5
- package/data/conditionKeys/detective.json +3 -3
- package/data/conditionKeys/devicefarm.json +3 -3
- package/data/conditionKeys/devops-guru.json +1 -1
- package/data/conditionKeys/directconnect.json +3 -3
- package/data/conditionKeys/discovery.json +1 -1
- package/data/conditionKeys/dlm.json +3 -3
- package/data/conditionKeys/dms.json +15 -15
- package/data/conditionKeys/docdb-elastic.json +3 -3
- package/data/conditionKeys/drs.json +5 -5
- package/data/conditionKeys/ds.json +3 -3
- package/data/conditionKeys/dynamodb.json +7 -7
- package/data/conditionKeys/ebs.json +6 -6
- package/data/conditionKeys/ec2-instance-connect.json +5 -5
- package/data/conditionKeys/ec2.json +120 -120
- package/data/conditionKeys/ec2messages.json +2 -2
- package/data/conditionKeys/ecr-public.json +4 -4
- package/data/conditionKeys/ecr.json +4 -4
- package/data/conditionKeys/ecs.json +5 -5
- package/data/conditionKeys/eks-auth.json +1 -1
- package/data/conditionKeys/eks.json +15 -15
- package/data/conditionKeys/elasticache.json +21 -21
- package/data/conditionKeys/elasticbeanstalk.json +10 -10
- package/data/conditionKeys/elasticfilesystem.json +7 -7
- package/data/conditionKeys/elasticloadbalancing.json +11 -11
- package/data/conditionKeys/elasticmapreduce.json +6 -6
- package/data/conditionKeys/emr-containers.json +5 -5
- package/data/conditionKeys/emr-serverless.json +3 -3
- package/data/conditionKeys/entityresolution.json +3 -3
- package/data/conditionKeys/es.json +3 -3
- package/data/conditionKeys/events.json +10 -10
- package/data/conditionKeys/evidently.json +3 -3
- package/data/conditionKeys/finspace.json +3 -3
- package/data/conditionKeys/firehose.json +3 -3
- package/data/conditionKeys/fis.json +7 -7
- package/data/conditionKeys/fms.json +3 -3
- package/data/conditionKeys/forecast.json +3 -3
- package/data/conditionKeys/frauddetector.json +3 -3
- package/data/conditionKeys/freertos.json +3 -3
- package/data/conditionKeys/fsx.json +9 -9
- package/data/conditionKeys/gamelift.json +3 -3
- package/data/conditionKeys/geo.json +5 -5
- package/data/conditionKeys/glacier.json +4 -4
- package/data/conditionKeys/globalaccelerator.json +3 -3
- package/data/conditionKeys/glue.json +8 -8
- package/data/conditionKeys/grafana.json +3 -3
- package/data/conditionKeys/greengrass.json +3 -3
- package/data/conditionKeys/groundstation.json +12 -12
- package/data/conditionKeys/guardduty.json +3 -3
- package/data/conditionKeys/health.json +1 -1
- package/data/conditionKeys/healthlake.json +3 -3
- package/data/conditionKeys/iam.json +14 -14
- package/data/conditionKeys/identitystore.json +1 -1
- package/data/conditionKeys/imagebuilder.json +8 -8
- package/data/conditionKeys/inspector2.json +3 -3
- package/data/conditionKeys/internetmonitor.json +3 -3
- package/data/conditionKeys/iot.json +8 -8
- package/data/conditionKeys/iot1click.json +3 -3
- package/data/conditionKeys/iotanalytics.json +3 -3
- package/data/conditionKeys/iotdeviceadvisor.json +3 -3
- package/data/conditionKeys/iotevents.json +4 -4
- package/data/conditionKeys/iotfleethub.json +3 -3
- package/data/conditionKeys/iotfleetwise.json +6 -6
- package/data/conditionKeys/iotjobsdata.json +1 -1
- package/data/conditionKeys/iotroborunner.json +4 -4
- package/data/conditionKeys/iotsitewise.json +8 -8
- package/data/conditionKeys/iottwinmaker.json +6 -6
- package/data/conditionKeys/iotwireless.json +3 -3
- package/data/conditionKeys/ivs.json +3 -3
- package/data/conditionKeys/ivschat.json +3 -3
- package/data/conditionKeys/kafka-cluster.json +1 -1
- package/data/conditionKeys/kafka.json +4 -4
- package/data/conditionKeys/kafkaconnect.json +3 -3
- package/data/conditionKeys/kendra-ranking.json +3 -3
- package/data/conditionKeys/kendra.json +3 -3
- package/data/conditionKeys/kinesisanalytics.json +3 -3
- package/data/conditionKeys/kinesisvideo.json +3 -3
- package/data/conditionKeys/kms.json +39 -39
- package/data/conditionKeys/lambda.json +13 -13
- package/data/conditionKeys/launchwizard.json +3 -3
- package/data/conditionKeys/lex.json +6 -6
- package/data/conditionKeys/license-manager-linux-subscriptions.json +3 -3
- package/data/conditionKeys/license-manager.json +3 -3
- package/data/conditionKeys/lightsail.json +3 -3
- package/data/conditionKeys/logs.json +5 -5
- package/data/conditionKeys/lookoutequipment.json +4 -4
- package/data/conditionKeys/lookoutmetrics.json +3 -3
- package/data/conditionKeys/lookoutvision.json +3 -3
- package/data/conditionKeys/m2.json +3 -3
- package/data/conditionKeys/macie2.json +3 -3
- package/data/conditionKeys/managedblockchain.json +3 -3
- package/data/conditionKeys/mediaconvert.json +6 -6
- package/data/conditionKeys/medialive.json +3 -3
- package/data/conditionKeys/mediapackage-vod.json +3 -3
- package/data/conditionKeys/mediapackage.json +3 -3
- package/data/conditionKeys/mediapackagev2.json +3 -3
- package/data/conditionKeys/mediastore.json +3 -3
- package/data/conditionKeys/mediatailor.json +3 -3
- package/data/conditionKeys/medical-imaging.json +3 -3
- package/data/conditionKeys/memorydb.json +5 -5
- package/data/conditionKeys/mgn.json +4 -4
- package/data/conditionKeys/migrationhub-orchestrator.json +3 -3
- package/data/conditionKeys/mobiletargeting.json +3 -3
- package/data/conditionKeys/monitron.json +3 -3
- package/data/conditionKeys/mq.json +3 -3
- package/data/conditionKeys/neptune-db.json +1 -1
- package/data/conditionKeys/neptune-graph.json +4 -4
- package/data/conditionKeys/network-firewall.json +3 -3
- package/data/conditionKeys/networkmanager.json +10 -10
- package/data/conditionKeys/networkmonitor.json +3 -3
- package/data/conditionKeys/nimble.json +8 -8
- package/data/conditionKeys/notifications-contacts.json +3 -3
- package/data/conditionKeys/notifications.json +3 -3
- package/data/conditionKeys/oam.json +4 -4
- package/data/conditionKeys/omics.json +8 -8
- package/data/conditionKeys/one.json +3 -3
- package/data/conditionKeys/organizations.json +5 -5
- package/data/conditionKeys/osis.json +3 -3
- package/data/conditionKeys/outposts.json +3 -3
- package/data/conditionKeys/panorama.json +3 -3
- package/data/conditionKeys/payment-cryptography.json +11 -11
- package/data/conditionKeys/payments.json +3 -3
- package/data/conditionKeys/pca-connector-ad.json +3 -3
- package/data/conditionKeys/pca-connector-scep.json +3 -3
- package/data/conditionKeys/pcs.json +3 -3
- package/data/conditionKeys/pi.json +4 -4
- package/data/conditionKeys/pipes.json +3 -3
- package/data/conditionKeys/private-networks.json +3 -3
- package/data/conditionKeys/profile.json +3 -3
- package/data/conditionKeys/proton.json +5 -5
- package/data/conditionKeys/purchase-orders.json +3 -3
- package/data/conditionKeys/qapps.json +7 -7
- package/data/conditionKeys/qbusiness.json +3 -3
- package/data/conditionKeys/qldb.json +4 -4
- package/data/conditionKeys/quicksight.json +10 -10
- package/data/conditionKeys/ram.json +13 -13
- package/data/conditionKeys/rbin.json +5 -5
- package/data/conditionKeys/rds-data.json +2 -2
- package/data/conditionKeys/rds.json +28 -28
- package/data/conditionKeys/redshift-data.json +1 -1
- package/data/conditionKeys/redshift-serverless.json +9 -9
- package/data/conditionKeys/redshift.json +10 -10
- package/data/conditionKeys/refactor-spaces.json +8 -8
- package/data/conditionKeys/rekognition.json +3 -3
- package/data/conditionKeys/repostspace.json +3 -3
- package/data/conditionKeys/resiliencehub.json +3 -3
- package/data/conditionKeys/resource-explorer-2.json +3 -3
- package/data/conditionKeys/resource-groups.json +3 -3
- package/data/conditionKeys/robomaker.json +3 -3
- package/data/conditionKeys/rolesanywhere.json +3 -3
- package/data/conditionKeys/route53-recovery-cluster.json +1 -1
- package/data/conditionKeys/route53-recovery-control-config.json +3 -3
- package/data/conditionKeys/route53-recovery-readiness.json +3 -3
- package/data/conditionKeys/route53.json +3 -3
- package/data/conditionKeys/route53profiles.json +3 -3
- package/data/conditionKeys/route53resolver.json +3 -3
- package/data/conditionKeys/rum.json +3 -3
- package/data/conditionKeys/s3-object-lambda.json +3 -3
- package/data/conditionKeys/s3-outposts.json +8 -8
- package/data/conditionKeys/s3.json +22 -22
- package/data/conditionKeys/s3express.json +6 -6
- package/data/conditionKeys/sagemaker-geospatial.json +3 -3
- package/data/conditionKeys/sagemaker.json +49 -49
- package/data/conditionKeys/savingsplans.json +3 -3
- package/data/conditionKeys/scheduler.json +3 -3
- package/data/conditionKeys/schemas.json +3 -3
- package/data/conditionKeys/scn.json +3 -3
- package/data/conditionKeys/secretsmanager.json +20 -20
- package/data/conditionKeys/securityhub.json +5 -5
- package/data/conditionKeys/securitylake.json +3 -3
- package/data/conditionKeys/serverlessrepo.json +1 -1
- package/data/conditionKeys/servicecatalog.json +8 -8
- package/data/conditionKeys/servicediscovery.json +7 -7
- package/data/conditionKeys/servicequotas.json +3 -3
- package/data/conditionKeys/ses.json +13 -13
- package/data/conditionKeys/shield.json +3 -3
- package/data/conditionKeys/signer.json +4 -4
- package/data/conditionKeys/simspaceweaver.json +3 -3
- package/data/conditionKeys/sms-voice.json +3 -3
- package/data/conditionKeys/snow-device-management.json +3 -3
- package/data/conditionKeys/sns.json +5 -5
- package/data/conditionKeys/sqlworkbench.json +3 -3
- package/data/conditionKeys/sqs.json +3 -3
- package/data/conditionKeys/ssm-contacts.json +3 -3
- package/data/conditionKeys/ssm-incidents.json +3 -3
- package/data/conditionKeys/ssm-quicksetup.json +3 -3
- package/data/conditionKeys/ssm-sap.json +3 -3
- package/data/conditionKeys/ssm.json +16 -16
- package/data/conditionKeys/ssmmessages.json +2 -2
- package/data/conditionKeys/sso.json +4 -4
- package/data/conditionKeys/states.json +6 -6
- package/data/conditionKeys/storagegateway.json +3 -3
- package/data/conditionKeys/sts.json +17 -17
- package/data/conditionKeys/swf.json +17 -17
- package/data/conditionKeys/synthetics.json +4 -4
- package/data/conditionKeys/textract.json +3 -3
- package/data/conditionKeys/thinclient.json +3 -3
- package/data/conditionKeys/timestream-influxdb.json +3 -3
- package/data/conditionKeys/timestream.json +3 -3
- package/data/conditionKeys/tnb.json +3 -3
- package/data/conditionKeys/transcribe.json +7 -7
- package/data/conditionKeys/transfer.json +3 -3
- package/data/conditionKeys/translate.json +3 -3
- package/data/conditionKeys/ts.json +3 -3
- package/data/conditionKeys/vendor-insights.json +3 -3
- package/data/conditionKeys/voiceid.json +3 -3
- package/data/conditionKeys/vpc-lattice-svcs.json +8 -8
- package/data/conditionKeys/vpc-lattice.json +10 -10
- package/data/conditionKeys/waf-regional.json +3 -3
- package/data/conditionKeys/waf.json +3 -3
- package/data/conditionKeys/wafv2.json +5 -5
- package/data/conditionKeys/wellarchitected.json +4 -4
- package/data/conditionKeys/wickr.json +3 -3
- package/data/conditionKeys/wisdom.json +4 -4
- package/data/conditionKeys/worklink.json +3 -3
- package/data/conditionKeys/workmail.json +3 -3
- package/data/conditionKeys/workspaces-web.json +3 -3
- package/data/conditionKeys/workspaces.json +4 -4
- package/data/conditionKeys/xray.json +3 -3
- package/data/resourceTypes/access-analyzer.json +2 -2
- package/data/resourceTypes/account.json +1 -1
- package/data/resourceTypes/amplifyuibuilder.json +4 -4
- package/data/resourceTypes/aoss.json +2 -2
- package/data/resourceTypes/apigateway.json +59 -59
- package/data/resourceTypes/application-autoscaling.json +1 -1
- package/data/resourceTypes/appmesh-preview.json +5 -5
- package/data/resourceTypes/appmesh.json +5 -5
- package/data/resourceTypes/appsync.json +2 -2
- package/data/resourceTypes/apptest.json +4 -4
- package/data/resourceTypes/arc-zonal-shift.json +2 -2
- package/data/resourceTypes/auditmanager.json +2 -2
- package/data/resourceTypes/autoscaling.json +2 -2
- package/data/resourceTypes/aws-marketplace.json +4 -4
- package/data/resourceTypes/backup.json +6 -6
- package/data/resourceTypes/budgets.json +1 -1
- package/data/resourceTypes/bugbust.json +1 -1
- package/data/resourceTypes/cases.json +6 -6
- package/data/resourceTypes/chatbot.json +1 -1
- package/data/resourceTypes/clouddirectory.json +3 -3
- package/data/resourceTypes/cloudshell.json +1 -1
- package/data/resourceTypes/codeconnections.json +3 -3
- package/data/resourceTypes/codeguru-profiler.json +1 -1
- package/data/resourceTypes/codeguru-security.json +1 -1
- package/data/resourceTypes/codestar-connections.json +3 -3
- package/data/resourceTypes/config.json +8 -8
- package/data/resourceTypes/consoleapp.json +1 -1
- package/data/resourceTypes/controltower.json +4 -4
- package/data/resourceTypes/databrew.json +6 -6
- package/data/resourceTypes/detective.json +1 -1
- package/data/resourceTypes/dms.json +13 -13
- package/data/resourceTypes/drs.json +6 -6
- package/data/resourceTypes/emr-containers.json +5 -5
- package/data/resourceTypes/emr-serverless.json +1 -1
- package/data/resourceTypes/entityresolution.json +5 -5
- package/data/resourceTypes/evidently.json +5 -5
- package/data/resourceTypes/finspace.json +7 -7
- package/data/resourceTypes/forecast.json +8 -8
- package/data/resourceTypes/gamelift.json +5 -5
- package/data/resourceTypes/glue.json +4 -4
- package/data/resourceTypes/greengrass.json +21 -21
- package/data/resourceTypes/groundstation.json +8 -8
- package/data/resourceTypes/guardduty.json +1 -1
- package/data/resourceTypes/identity-sync.json +2 -2
- package/data/resourceTypes/identitystore.json +7 -7
- package/data/resourceTypes/imagebuilder.json +13 -13
- package/data/resourceTypes/inspector2.json +3 -3
- package/data/resourceTypes/internetmonitor.json +3 -3
- package/data/resourceTypes/iotdeviceadvisor.json +2 -2
- package/data/resourceTypes/iotevents.json +2 -2
- package/data/resourceTypes/iotroborunner.json +4 -4
- package/data/resourceTypes/iottwinmaker.json +3 -3
- package/data/resourceTypes/iotwireless.json +11 -11
- package/data/resourceTypes/iq.json +2 -2
- package/data/resourceTypes/ivs.json +10 -10
- package/data/resourceTypes/ivschat.json +2 -2
- package/data/resourceTypes/kinesis.json +1 -1
- package/data/resourceTypes/lambda.json +2 -2
- package/data/resourceTypes/lightsail.json +19 -19
- package/data/resourceTypes/lookoutmetrics.json +3 -3
- package/data/resourceTypes/m2.json +2 -2
- package/data/resourceTypes/macie2.json +5 -5
- package/data/resourceTypes/mediaconnect.json +7 -7
- package/data/resourceTypes/mediaconvert.json +5 -5
- package/data/resourceTypes/mediapackagev2.json +3 -3
- package/data/resourceTypes/mediatailor.json +5 -5
- package/data/resourceTypes/mgh.json +2 -2
- package/data/resourceTypes/mgn.json +10 -10
- package/data/resourceTypes/network-firewall.json +5 -5
- package/data/resourceTypes/notifications-contacts.json +1 -1
- package/data/resourceTypes/notifications.json +3 -3
- package/data/resourceTypes/oam.json +2 -2
- package/data/resourceTypes/omics.json +11 -11
- package/data/resourceTypes/panorama.json +1 -1
- package/data/resourceTypes/pca-connector-ad.json +5 -5
- package/data/resourceTypes/pca-connector-scep.json +2 -2
- package/data/resourceTypes/personalize.json +10 -10
- package/data/resourceTypes/quicksight.json +4 -4
- package/data/resourceTypes/redshift-serverless.json +2 -2
- package/data/resourceTypes/robomaker.json +9 -9
- package/data/resourceTypes/rum.json +1 -1
- package/data/resourceTypes/sagemaker-geospatial.json +3 -3
- package/data/resourceTypes/secretsmanager.json +1 -1
- package/data/resourceTypes/servicecatalog.json +4 -4
- package/data/resourceTypes/simspaceweaver.json +1 -1
- package/data/resourceTypes/sms-voice.json +9 -9
- package/data/resourceTypes/sso-oauth.json +1 -1
- package/data/resourceTypes/sso.json +6 -6
- package/data/resourceTypes/vendor-insights.json +2 -2
- package/data/resourceTypes/vpc-lattice-svcs.json +2 -2
- package/data/resourceTypes/vpc-lattice.json +8 -8
- package/data/resourceTypes/wisdom.json +7 -7
- package/data/resourceTypes/workmailmessageflow.json +1 -1
- package/data/resourceTypes/workspaces-web.json +7 -7
- package/data/serviceNames.json +265 -265
- package/data/services.json +265 -265
- package/dist/cjs/actions.d.ts +5 -5
- package/dist/cjs/actions.js +12 -12
- package/dist/cjs/actions.js.map +1 -1
- package/dist/cjs/conditionKeys.d.ts +5 -5
- package/dist/cjs/conditionKeys.js +12 -12
- package/dist/cjs/conditionKeys.js.map +1 -1
- package/dist/cjs/resourceTypes.d.ts +5 -5
- package/dist/cjs/resourceTypes.js +12 -12
- package/dist/cjs/resourceTypes.js.map +1 -1
- package/dist/cjs/services.d.ts +1 -1
- package/dist/cjs/services.js +4 -4
- package/dist/cjs/services.js.map +1 -1
- package/dist/esm/actions.d.ts +5 -5
- package/dist/esm/actions.js +12 -12
- package/dist/esm/actions.js.map +1 -1
- package/dist/esm/conditionKeys.d.ts +5 -5
- package/dist/esm/conditionKeys.js +12 -12
- package/dist/esm/conditionKeys.js.map +1 -1
- package/dist/esm/resourceTypes.d.ts +5 -5
- package/dist/esm/resourceTypes.js +12 -12
- package/dist/esm/resourceTypes.js.map +1 -1
- package/dist/esm/services.d.ts +1 -1
- package/dist/esm/services.js +4 -4
- package/dist/esm/services.js.map +1 -1
- package/package.json +1 -1
package/data/actions/iam.json
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"
|
|
2
|
+
"addclientidtoopenidconnectprovider": {
|
|
3
3
|
"name": "AddClientIDToOpenIDConnectProvider",
|
|
4
4
|
"description": "Grants permission to add a new client ID (audience) to the list of registered IDs for the specified IAM OpenID Connect (OIDC) provider resource",
|
|
5
5
|
"accessLevel": "Write",
|
|
@@ -14,7 +14,7 @@
|
|
|
14
14
|
"conditionKeys": [],
|
|
15
15
|
"dependentActions": []
|
|
16
16
|
},
|
|
17
|
-
"
|
|
17
|
+
"addroletoinstanceprofile": {
|
|
18
18
|
"name": "AddRoleToInstanceProfile",
|
|
19
19
|
"description": "Grants permission to add an IAM role to the specified instance profile",
|
|
20
20
|
"accessLevel": "Write",
|
|
@@ -31,7 +31,7 @@
|
|
|
31
31
|
"iam:PassRole"
|
|
32
32
|
]
|
|
33
33
|
},
|
|
34
|
-
"
|
|
34
|
+
"addusertogroup": {
|
|
35
35
|
"name": "AddUserToGroup",
|
|
36
36
|
"description": "Grants permission to add an IAM user to the specified IAM group",
|
|
37
37
|
"accessLevel": "Write",
|
|
@@ -46,7 +46,7 @@
|
|
|
46
46
|
"conditionKeys": [],
|
|
47
47
|
"dependentActions": []
|
|
48
48
|
},
|
|
49
|
-
"
|
|
49
|
+
"attachgrouppolicy": {
|
|
50
50
|
"name": "AttachGroupPolicy",
|
|
51
51
|
"description": "Grants permission to attach a managed policy to the specified IAM group",
|
|
52
52
|
"accessLevel": "Permissions management",
|
|
@@ -63,7 +63,7 @@
|
|
|
63
63
|
],
|
|
64
64
|
"dependentActions": []
|
|
65
65
|
},
|
|
66
|
-
"
|
|
66
|
+
"attachrolepolicy": {
|
|
67
67
|
"name": "AttachRolePolicy",
|
|
68
68
|
"description": "Grants permission to attach a managed policy to the specified IAM role",
|
|
69
69
|
"accessLevel": "Permissions management",
|
|
@@ -81,7 +81,7 @@
|
|
|
81
81
|
],
|
|
82
82
|
"dependentActions": []
|
|
83
83
|
},
|
|
84
|
-
"
|
|
84
|
+
"attachuserpolicy": {
|
|
85
85
|
"name": "AttachUserPolicy",
|
|
86
86
|
"description": "Grants permission to attach a managed policy to the specified IAM user",
|
|
87
87
|
"accessLevel": "Permissions management",
|
|
@@ -99,7 +99,7 @@
|
|
|
99
99
|
],
|
|
100
100
|
"dependentActions": []
|
|
101
101
|
},
|
|
102
|
-
"
|
|
102
|
+
"changepassword": {
|
|
103
103
|
"name": "ChangePassword",
|
|
104
104
|
"description": "Grants permission to an IAM user to change their own password",
|
|
105
105
|
"accessLevel": "Write",
|
|
@@ -114,7 +114,7 @@
|
|
|
114
114
|
"conditionKeys": [],
|
|
115
115
|
"dependentActions": []
|
|
116
116
|
},
|
|
117
|
-
"
|
|
117
|
+
"createaccesskey": {
|
|
118
118
|
"name": "CreateAccessKey",
|
|
119
119
|
"description": "Grants permission to create access key and secret access key for the specified IAM user",
|
|
120
120
|
"accessLevel": "Write",
|
|
@@ -129,7 +129,7 @@
|
|
|
129
129
|
"conditionKeys": [],
|
|
130
130
|
"dependentActions": []
|
|
131
131
|
},
|
|
132
|
-
"
|
|
132
|
+
"createaccountalias": {
|
|
133
133
|
"name": "CreateAccountAlias",
|
|
134
134
|
"description": "Grants permission to create an alias for your AWS account",
|
|
135
135
|
"accessLevel": "Write",
|
|
@@ -137,7 +137,7 @@
|
|
|
137
137
|
"conditionKeys": [],
|
|
138
138
|
"dependentActions": []
|
|
139
139
|
},
|
|
140
|
-
"
|
|
140
|
+
"creategroup": {
|
|
141
141
|
"name": "CreateGroup",
|
|
142
142
|
"description": "Grants permission to create a new group",
|
|
143
143
|
"accessLevel": "Write",
|
|
@@ -152,7 +152,7 @@
|
|
|
152
152
|
"conditionKeys": [],
|
|
153
153
|
"dependentActions": []
|
|
154
154
|
},
|
|
155
|
-
"
|
|
155
|
+
"createinstanceprofile": {
|
|
156
156
|
"name": "CreateInstanceProfile",
|
|
157
157
|
"description": "Grants permission to create a new instance profile",
|
|
158
158
|
"accessLevel": "Write",
|
|
@@ -170,7 +170,7 @@
|
|
|
170
170
|
],
|
|
171
171
|
"dependentActions": []
|
|
172
172
|
},
|
|
173
|
-
"
|
|
173
|
+
"createloginprofile": {
|
|
174
174
|
"name": "CreateLoginProfile",
|
|
175
175
|
"description": "Grants permission to create a password for the specified IAM user",
|
|
176
176
|
"accessLevel": "Write",
|
|
@@ -185,7 +185,7 @@
|
|
|
185
185
|
"conditionKeys": [],
|
|
186
186
|
"dependentActions": []
|
|
187
187
|
},
|
|
188
|
-
"
|
|
188
|
+
"createopenidconnectprovider": {
|
|
189
189
|
"name": "CreateOpenIDConnectProvider",
|
|
190
190
|
"description": "Grants permission to create an IAM resource that describes an identity provider (IdP) that supports OpenID Connect (OIDC)",
|
|
191
191
|
"accessLevel": "Write",
|
|
@@ -203,7 +203,7 @@
|
|
|
203
203
|
],
|
|
204
204
|
"dependentActions": []
|
|
205
205
|
},
|
|
206
|
-
"
|
|
206
|
+
"createpolicy": {
|
|
207
207
|
"name": "CreatePolicy",
|
|
208
208
|
"description": "Grants permission to create a new managed policy",
|
|
209
209
|
"accessLevel": "Permissions management",
|
|
@@ -221,7 +221,7 @@
|
|
|
221
221
|
],
|
|
222
222
|
"dependentActions": []
|
|
223
223
|
},
|
|
224
|
-
"
|
|
224
|
+
"createpolicyversion": {
|
|
225
225
|
"name": "CreatePolicyVersion",
|
|
226
226
|
"description": "Grants permission to create a new version of the specified managed policy",
|
|
227
227
|
"accessLevel": "Permissions management",
|
|
@@ -236,7 +236,7 @@
|
|
|
236
236
|
"conditionKeys": [],
|
|
237
237
|
"dependentActions": []
|
|
238
238
|
},
|
|
239
|
-
"
|
|
239
|
+
"createrole": {
|
|
240
240
|
"name": "CreateRole",
|
|
241
241
|
"description": "Grants permission to create a new role",
|
|
242
242
|
"accessLevel": "Write",
|
|
@@ -255,7 +255,7 @@
|
|
|
255
255
|
],
|
|
256
256
|
"dependentActions": []
|
|
257
257
|
},
|
|
258
|
-
"
|
|
258
|
+
"createsamlprovider": {
|
|
259
259
|
"name": "CreateSAMLProvider",
|
|
260
260
|
"description": "Grants permission to create an IAM resource that describes an identity provider (IdP) that supports SAML 2.0",
|
|
261
261
|
"accessLevel": "Write",
|
|
@@ -273,7 +273,7 @@
|
|
|
273
273
|
],
|
|
274
274
|
"dependentActions": []
|
|
275
275
|
},
|
|
276
|
-
"
|
|
276
|
+
"createservicelinkedrole": {
|
|
277
277
|
"name": "CreateServiceLinkedRole",
|
|
278
278
|
"description": "Grants permission to create an IAM role that allows an AWS service to perform actions on your behalf",
|
|
279
279
|
"accessLevel": "Write",
|
|
@@ -290,7 +290,7 @@
|
|
|
290
290
|
],
|
|
291
291
|
"dependentActions": []
|
|
292
292
|
},
|
|
293
|
-
"
|
|
293
|
+
"createservicespecificcredential": {
|
|
294
294
|
"name": "CreateServiceSpecificCredential",
|
|
295
295
|
"description": "Grants permission to create a new service-specific credential for an IAM user",
|
|
296
296
|
"accessLevel": "Write",
|
|
@@ -305,7 +305,7 @@
|
|
|
305
305
|
"conditionKeys": [],
|
|
306
306
|
"dependentActions": []
|
|
307
307
|
},
|
|
308
|
-
"
|
|
308
|
+
"createuser": {
|
|
309
309
|
"name": "CreateUser",
|
|
310
310
|
"description": "Grants permission to create a new IAM user",
|
|
311
311
|
"accessLevel": "Write",
|
|
@@ -324,7 +324,7 @@
|
|
|
324
324
|
],
|
|
325
325
|
"dependentActions": []
|
|
326
326
|
},
|
|
327
|
-
"
|
|
327
|
+
"createvirtualmfadevice": {
|
|
328
328
|
"name": "CreateVirtualMFADevice",
|
|
329
329
|
"description": "Grants permission to create a new virtual MFA device",
|
|
330
330
|
"accessLevel": "Write",
|
|
@@ -342,7 +342,7 @@
|
|
|
342
342
|
],
|
|
343
343
|
"dependentActions": []
|
|
344
344
|
},
|
|
345
|
-
"
|
|
345
|
+
"deactivatemfadevice": {
|
|
346
346
|
"name": "DeactivateMFADevice",
|
|
347
347
|
"description": "Grants permission to deactivate the specified MFA device and remove its association with the IAM user for which it was originally enabled",
|
|
348
348
|
"accessLevel": "Write",
|
|
@@ -357,7 +357,7 @@
|
|
|
357
357
|
"conditionKeys": [],
|
|
358
358
|
"dependentActions": []
|
|
359
359
|
},
|
|
360
|
-
"
|
|
360
|
+
"deleteaccesskey": {
|
|
361
361
|
"name": "DeleteAccessKey",
|
|
362
362
|
"description": "Grants permission to delete the access key pair that is associated with the specified IAM user",
|
|
363
363
|
"accessLevel": "Write",
|
|
@@ -372,7 +372,7 @@
|
|
|
372
372
|
"conditionKeys": [],
|
|
373
373
|
"dependentActions": []
|
|
374
374
|
},
|
|
375
|
-
"
|
|
375
|
+
"deleteaccountalias": {
|
|
376
376
|
"name": "DeleteAccountAlias",
|
|
377
377
|
"description": "Grants permission to delete the specified AWS account alias",
|
|
378
378
|
"accessLevel": "Write",
|
|
@@ -380,7 +380,7 @@
|
|
|
380
380
|
"conditionKeys": [],
|
|
381
381
|
"dependentActions": []
|
|
382
382
|
},
|
|
383
|
-
"
|
|
383
|
+
"deleteaccountpasswordpolicy": {
|
|
384
384
|
"name": "DeleteAccountPasswordPolicy",
|
|
385
385
|
"description": "Grants permission to delete the password policy for the AWS account",
|
|
386
386
|
"accessLevel": "Permissions management",
|
|
@@ -388,7 +388,7 @@
|
|
|
388
388
|
"conditionKeys": [],
|
|
389
389
|
"dependentActions": []
|
|
390
390
|
},
|
|
391
|
-
"
|
|
391
|
+
"deletecloudfrontpublickey": {
|
|
392
392
|
"name": "DeleteCloudFrontPublicKey",
|
|
393
393
|
"description": "Grants permission to delete an existing CloudFront public key",
|
|
394
394
|
"accessLevel": "Write",
|
|
@@ -396,7 +396,7 @@
|
|
|
396
396
|
"conditionKeys": [],
|
|
397
397
|
"dependentActions": []
|
|
398
398
|
},
|
|
399
|
-
"
|
|
399
|
+
"deletegroup": {
|
|
400
400
|
"name": "DeleteGroup",
|
|
401
401
|
"description": "Grants permission to delete the specified IAM group",
|
|
402
402
|
"accessLevel": "Write",
|
|
@@ -411,7 +411,7 @@
|
|
|
411
411
|
"conditionKeys": [],
|
|
412
412
|
"dependentActions": []
|
|
413
413
|
},
|
|
414
|
-
"
|
|
414
|
+
"deletegrouppolicy": {
|
|
415
415
|
"name": "DeleteGroupPolicy",
|
|
416
416
|
"description": "Grants permission to delete the specified inline policy from its group",
|
|
417
417
|
"accessLevel": "Permissions management",
|
|
@@ -426,7 +426,7 @@
|
|
|
426
426
|
"conditionKeys": [],
|
|
427
427
|
"dependentActions": []
|
|
428
428
|
},
|
|
429
|
-
"
|
|
429
|
+
"deleteinstanceprofile": {
|
|
430
430
|
"name": "DeleteInstanceProfile",
|
|
431
431
|
"description": "Grants permission to delete the specified instance profile",
|
|
432
432
|
"accessLevel": "Write",
|
|
@@ -441,7 +441,7 @@
|
|
|
441
441
|
"conditionKeys": [],
|
|
442
442
|
"dependentActions": []
|
|
443
443
|
},
|
|
444
|
-
"
|
|
444
|
+
"deleteloginprofile": {
|
|
445
445
|
"name": "DeleteLoginProfile",
|
|
446
446
|
"description": "Grants permission to delete the password for the specified IAM user",
|
|
447
447
|
"accessLevel": "Write",
|
|
@@ -456,7 +456,7 @@
|
|
|
456
456
|
"conditionKeys": [],
|
|
457
457
|
"dependentActions": []
|
|
458
458
|
},
|
|
459
|
-
"
|
|
459
|
+
"deleteopenidconnectprovider": {
|
|
460
460
|
"name": "DeleteOpenIDConnectProvider",
|
|
461
461
|
"description": "Grants permission to delete an OpenID Connect identity provider (IdP) resource object in IAM",
|
|
462
462
|
"accessLevel": "Write",
|
|
@@ -471,7 +471,7 @@
|
|
|
471
471
|
"conditionKeys": [],
|
|
472
472
|
"dependentActions": []
|
|
473
473
|
},
|
|
474
|
-
"
|
|
474
|
+
"deletepolicy": {
|
|
475
475
|
"name": "DeletePolicy",
|
|
476
476
|
"description": "Grants permission to delete the specified managed policy and remove it from any IAM entities (users, groups, or roles) to which it is attached",
|
|
477
477
|
"accessLevel": "Permissions management",
|
|
@@ -486,7 +486,7 @@
|
|
|
486
486
|
"conditionKeys": [],
|
|
487
487
|
"dependentActions": []
|
|
488
488
|
},
|
|
489
|
-
"
|
|
489
|
+
"deletepolicyversion": {
|
|
490
490
|
"name": "DeletePolicyVersion",
|
|
491
491
|
"description": "Grants permission to delete a version from the specified managed policy",
|
|
492
492
|
"accessLevel": "Permissions management",
|
|
@@ -501,7 +501,7 @@
|
|
|
501
501
|
"conditionKeys": [],
|
|
502
502
|
"dependentActions": []
|
|
503
503
|
},
|
|
504
|
-
"
|
|
504
|
+
"deleterole": {
|
|
505
505
|
"name": "DeleteRole",
|
|
506
506
|
"description": "Grants permission to delete the specified role",
|
|
507
507
|
"accessLevel": "Write",
|
|
@@ -516,7 +516,7 @@
|
|
|
516
516
|
"conditionKeys": [],
|
|
517
517
|
"dependentActions": []
|
|
518
518
|
},
|
|
519
|
-
"
|
|
519
|
+
"deleterolepermissionsboundary": {
|
|
520
520
|
"name": "DeleteRolePermissionsBoundary",
|
|
521
521
|
"description": "Grants permission to remove the permissions boundary from a role",
|
|
522
522
|
"accessLevel": "Permissions management",
|
|
@@ -533,7 +533,7 @@
|
|
|
533
533
|
],
|
|
534
534
|
"dependentActions": []
|
|
535
535
|
},
|
|
536
|
-
"
|
|
536
|
+
"deleterolepolicy": {
|
|
537
537
|
"name": "DeleteRolePolicy",
|
|
538
538
|
"description": "Grants permission to delete the specified inline policy from the specified role",
|
|
539
539
|
"accessLevel": "Permissions management",
|
|
@@ -550,7 +550,7 @@
|
|
|
550
550
|
],
|
|
551
551
|
"dependentActions": []
|
|
552
552
|
},
|
|
553
|
-
"
|
|
553
|
+
"deletesamlprovider": {
|
|
554
554
|
"name": "DeleteSAMLProvider",
|
|
555
555
|
"description": "Grants permission to delete a SAML provider resource in IAM",
|
|
556
556
|
"accessLevel": "Write",
|
|
@@ -565,7 +565,7 @@
|
|
|
565
565
|
"conditionKeys": [],
|
|
566
566
|
"dependentActions": []
|
|
567
567
|
},
|
|
568
|
-
"
|
|
568
|
+
"deletesshpublickey": {
|
|
569
569
|
"name": "DeleteSSHPublicKey",
|
|
570
570
|
"description": "Grants permission to delete the specified SSH public key",
|
|
571
571
|
"accessLevel": "Write",
|
|
@@ -580,7 +580,7 @@
|
|
|
580
580
|
"conditionKeys": [],
|
|
581
581
|
"dependentActions": []
|
|
582
582
|
},
|
|
583
|
-
"
|
|
583
|
+
"deleteservercertificate": {
|
|
584
584
|
"name": "DeleteServerCertificate",
|
|
585
585
|
"description": "Grants permission to delete the specified server certificate",
|
|
586
586
|
"accessLevel": "Write",
|
|
@@ -595,7 +595,7 @@
|
|
|
595
595
|
"conditionKeys": [],
|
|
596
596
|
"dependentActions": []
|
|
597
597
|
},
|
|
598
|
-
"
|
|
598
|
+
"deleteservicelinkedrole": {
|
|
599
599
|
"name": "DeleteServiceLinkedRole",
|
|
600
600
|
"description": "Grants permission to delete an IAM role that is linked to a specific AWS service, if the service is no longer using it",
|
|
601
601
|
"accessLevel": "Write",
|
|
@@ -610,7 +610,7 @@
|
|
|
610
610
|
"conditionKeys": [],
|
|
611
611
|
"dependentActions": []
|
|
612
612
|
},
|
|
613
|
-
"
|
|
613
|
+
"deleteservicespecificcredential": {
|
|
614
614
|
"name": "DeleteServiceSpecificCredential",
|
|
615
615
|
"description": "Grants permission to delete the specified service-specific credential for an IAM user",
|
|
616
616
|
"accessLevel": "Write",
|
|
@@ -625,7 +625,7 @@
|
|
|
625
625
|
"conditionKeys": [],
|
|
626
626
|
"dependentActions": []
|
|
627
627
|
},
|
|
628
|
-
"
|
|
628
|
+
"deletesigningcertificate": {
|
|
629
629
|
"name": "DeleteSigningCertificate",
|
|
630
630
|
"description": "Grants permission to delete a signing certificate that is associated with the specified IAM user",
|
|
631
631
|
"accessLevel": "Write",
|
|
@@ -640,7 +640,7 @@
|
|
|
640
640
|
"conditionKeys": [],
|
|
641
641
|
"dependentActions": []
|
|
642
642
|
},
|
|
643
|
-
"
|
|
643
|
+
"deleteuser": {
|
|
644
644
|
"name": "DeleteUser",
|
|
645
645
|
"description": "Grants permission to delete the specified IAM user",
|
|
646
646
|
"accessLevel": "Write",
|
|
@@ -655,7 +655,7 @@
|
|
|
655
655
|
"conditionKeys": [],
|
|
656
656
|
"dependentActions": []
|
|
657
657
|
},
|
|
658
|
-
"
|
|
658
|
+
"deleteuserpermissionsboundary": {
|
|
659
659
|
"name": "DeleteUserPermissionsBoundary",
|
|
660
660
|
"description": "Grants permission to remove the permissions boundary from the specified IAM user",
|
|
661
661
|
"accessLevel": "Permissions management",
|
|
@@ -672,7 +672,7 @@
|
|
|
672
672
|
],
|
|
673
673
|
"dependentActions": []
|
|
674
674
|
},
|
|
675
|
-
"
|
|
675
|
+
"deleteuserpolicy": {
|
|
676
676
|
"name": "DeleteUserPolicy",
|
|
677
677
|
"description": "Grants permission to delete the specified inline policy from an IAM user",
|
|
678
678
|
"accessLevel": "Permissions management",
|
|
@@ -689,7 +689,7 @@
|
|
|
689
689
|
],
|
|
690
690
|
"dependentActions": []
|
|
691
691
|
},
|
|
692
|
-
"
|
|
692
|
+
"deletevirtualmfadevice": {
|
|
693
693
|
"name": "DeleteVirtualMFADevice",
|
|
694
694
|
"description": "Grants permission to delete a virtual MFA device",
|
|
695
695
|
"accessLevel": "Write",
|
|
@@ -710,7 +710,7 @@
|
|
|
710
710
|
"conditionKeys": [],
|
|
711
711
|
"dependentActions": []
|
|
712
712
|
},
|
|
713
|
-
"
|
|
713
|
+
"detachgrouppolicy": {
|
|
714
714
|
"name": "DetachGroupPolicy",
|
|
715
715
|
"description": "Grants permission to detach a managed policy from the specified IAM group",
|
|
716
716
|
"accessLevel": "Permissions management",
|
|
@@ -727,7 +727,7 @@
|
|
|
727
727
|
],
|
|
728
728
|
"dependentActions": []
|
|
729
729
|
},
|
|
730
|
-
"
|
|
730
|
+
"detachrolepolicy": {
|
|
731
731
|
"name": "DetachRolePolicy",
|
|
732
732
|
"description": "Grants permission to detach a managed policy from the specified role",
|
|
733
733
|
"accessLevel": "Permissions management",
|
|
@@ -745,7 +745,7 @@
|
|
|
745
745
|
],
|
|
746
746
|
"dependentActions": []
|
|
747
747
|
},
|
|
748
|
-
"
|
|
748
|
+
"detachuserpolicy": {
|
|
749
749
|
"name": "DetachUserPolicy",
|
|
750
750
|
"description": "Grants permission to detach a managed policy from the specified IAM user",
|
|
751
751
|
"accessLevel": "Permissions management",
|
|
@@ -763,7 +763,7 @@
|
|
|
763
763
|
],
|
|
764
764
|
"dependentActions": []
|
|
765
765
|
},
|
|
766
|
-
"
|
|
766
|
+
"enablemfadevice": {
|
|
767
767
|
"name": "EnableMFADevice",
|
|
768
768
|
"description": "Grants permission to enable an MFA device and associate it with the specified IAM user",
|
|
769
769
|
"accessLevel": "Write",
|
|
@@ -783,7 +783,7 @@
|
|
|
783
783
|
],
|
|
784
784
|
"dependentActions": []
|
|
785
785
|
},
|
|
786
|
-
"
|
|
786
|
+
"generatecredentialreport": {
|
|
787
787
|
"name": "GenerateCredentialReport",
|
|
788
788
|
"description": "Grants permission to generate a credential report for the AWS account",
|
|
789
789
|
"accessLevel": "Read",
|
|
@@ -791,7 +791,7 @@
|
|
|
791
791
|
"conditionKeys": [],
|
|
792
792
|
"dependentActions": []
|
|
793
793
|
},
|
|
794
|
-
"
|
|
794
|
+
"generateorganizationsaccessreport": {
|
|
795
795
|
"name": "GenerateOrganizationsAccessReport",
|
|
796
796
|
"description": "Grants permission to generate an access report for an AWS Organizations entity",
|
|
797
797
|
"accessLevel": "Read",
|
|
@@ -815,7 +815,7 @@
|
|
|
815
815
|
],
|
|
816
816
|
"dependentActions": []
|
|
817
817
|
},
|
|
818
|
-
"
|
|
818
|
+
"generateservicelastaccesseddetails": {
|
|
819
819
|
"name": "GenerateServiceLastAccessedDetails",
|
|
820
820
|
"description": "Grants permission to generate a service last accessed data report for an IAM resource",
|
|
821
821
|
"accessLevel": "Read",
|
|
@@ -848,7 +848,7 @@
|
|
|
848
848
|
"conditionKeys": [],
|
|
849
849
|
"dependentActions": []
|
|
850
850
|
},
|
|
851
|
-
"
|
|
851
|
+
"getaccesskeylastused": {
|
|
852
852
|
"name": "GetAccessKeyLastUsed",
|
|
853
853
|
"description": "Grants permission to retrieve information about when the specified access key was last used",
|
|
854
854
|
"accessLevel": "Read",
|
|
@@ -863,7 +863,7 @@
|
|
|
863
863
|
"conditionKeys": [],
|
|
864
864
|
"dependentActions": []
|
|
865
865
|
},
|
|
866
|
-
"
|
|
866
|
+
"getaccountauthorizationdetails": {
|
|
867
867
|
"name": "GetAccountAuthorizationDetails",
|
|
868
868
|
"description": "Grants permission to retrieve information about all IAM users, groups, roles, and policies in your AWS account, including their relationships to one another",
|
|
869
869
|
"accessLevel": "Read",
|
|
@@ -871,7 +871,7 @@
|
|
|
871
871
|
"conditionKeys": [],
|
|
872
872
|
"dependentActions": []
|
|
873
873
|
},
|
|
874
|
-
"
|
|
874
|
+
"getaccountemailaddress": {
|
|
875
875
|
"name": "GetAccountEmailAddress",
|
|
876
876
|
"description": "Grants permission to retrieve the email address that is associated with the account",
|
|
877
877
|
"accessLevel": "Read",
|
|
@@ -879,7 +879,7 @@
|
|
|
879
879
|
"conditionKeys": [],
|
|
880
880
|
"dependentActions": []
|
|
881
881
|
},
|
|
882
|
-
"
|
|
882
|
+
"getaccountname": {
|
|
883
883
|
"name": "GetAccountName",
|
|
884
884
|
"description": "Grants permission to retrieve the account name that is associated with the account",
|
|
885
885
|
"accessLevel": "Read",
|
|
@@ -887,7 +887,7 @@
|
|
|
887
887
|
"conditionKeys": [],
|
|
888
888
|
"dependentActions": []
|
|
889
889
|
},
|
|
890
|
-
"
|
|
890
|
+
"getaccountpasswordpolicy": {
|
|
891
891
|
"name": "GetAccountPasswordPolicy",
|
|
892
892
|
"description": "Grants permission to retrieve the password policy for the AWS account",
|
|
893
893
|
"accessLevel": "Read",
|
|
@@ -895,7 +895,7 @@
|
|
|
895
895
|
"conditionKeys": [],
|
|
896
896
|
"dependentActions": []
|
|
897
897
|
},
|
|
898
|
-
"
|
|
898
|
+
"getaccountsummary": {
|
|
899
899
|
"name": "GetAccountSummary",
|
|
900
900
|
"description": "Grants permission to retrieve information about IAM entity usage and IAM quotas in the AWS account",
|
|
901
901
|
"accessLevel": "List",
|
|
@@ -903,7 +903,7 @@
|
|
|
903
903
|
"conditionKeys": [],
|
|
904
904
|
"dependentActions": []
|
|
905
905
|
},
|
|
906
|
-
"
|
|
906
|
+
"getcloudfrontpublickey": {
|
|
907
907
|
"name": "GetCloudFrontPublicKey",
|
|
908
908
|
"description": "Grants permission to retrieve information about the specified CloudFront public key",
|
|
909
909
|
"accessLevel": "Read",
|
|
@@ -911,7 +911,7 @@
|
|
|
911
911
|
"conditionKeys": [],
|
|
912
912
|
"dependentActions": []
|
|
913
913
|
},
|
|
914
|
-
"
|
|
914
|
+
"getcontextkeysforcustompolicy": {
|
|
915
915
|
"name": "GetContextKeysForCustomPolicy",
|
|
916
916
|
"description": "Grants permission to retrieve a list of all of the context keys that are referenced in the specified policy",
|
|
917
917
|
"accessLevel": "Read",
|
|
@@ -919,7 +919,7 @@
|
|
|
919
919
|
"conditionKeys": [],
|
|
920
920
|
"dependentActions": []
|
|
921
921
|
},
|
|
922
|
-
"
|
|
922
|
+
"getcontextkeysforprincipalpolicy": {
|
|
923
923
|
"name": "GetContextKeysForPrincipalPolicy",
|
|
924
924
|
"description": "Grants permission to retrieve a list of all context keys that are referenced in all IAM policies that are attached to the specified IAM identity (user, group, or role)",
|
|
925
925
|
"accessLevel": "Read",
|
|
@@ -946,7 +946,7 @@
|
|
|
946
946
|
"conditionKeys": [],
|
|
947
947
|
"dependentActions": []
|
|
948
948
|
},
|
|
949
|
-
"
|
|
949
|
+
"getcredentialreport": {
|
|
950
950
|
"name": "GetCredentialReport",
|
|
951
951
|
"description": "Grants permission to retrieve a credential report for the AWS account",
|
|
952
952
|
"accessLevel": "Read",
|
|
@@ -954,7 +954,7 @@
|
|
|
954
954
|
"conditionKeys": [],
|
|
955
955
|
"dependentActions": []
|
|
956
956
|
},
|
|
957
|
-
"
|
|
957
|
+
"getgroup": {
|
|
958
958
|
"name": "GetGroup",
|
|
959
959
|
"description": "Grants permission to retrieve a list of IAM users in the specified IAM group",
|
|
960
960
|
"accessLevel": "Read",
|
|
@@ -969,7 +969,7 @@
|
|
|
969
969
|
"conditionKeys": [],
|
|
970
970
|
"dependentActions": []
|
|
971
971
|
},
|
|
972
|
-
"
|
|
972
|
+
"getgrouppolicy": {
|
|
973
973
|
"name": "GetGroupPolicy",
|
|
974
974
|
"description": "Grants permission to retrieve an inline policy document that is embedded in the specified IAM group",
|
|
975
975
|
"accessLevel": "Read",
|
|
@@ -984,7 +984,7 @@
|
|
|
984
984
|
"conditionKeys": [],
|
|
985
985
|
"dependentActions": []
|
|
986
986
|
},
|
|
987
|
-
"
|
|
987
|
+
"getinstanceprofile": {
|
|
988
988
|
"name": "GetInstanceProfile",
|
|
989
989
|
"description": "Grants permission to retrieve information about the specified instance profile, including the instance profile's path, GUID, ARN, and role",
|
|
990
990
|
"accessLevel": "Read",
|
|
@@ -999,7 +999,7 @@
|
|
|
999
999
|
"conditionKeys": [],
|
|
1000
1000
|
"dependentActions": []
|
|
1001
1001
|
},
|
|
1002
|
-
"
|
|
1002
|
+
"getloginprofile": {
|
|
1003
1003
|
"name": "GetLoginProfile",
|
|
1004
1004
|
"description": "Grants permission to retrieve the user name and password creation date for the specified IAM user",
|
|
1005
1005
|
"accessLevel": "List",
|
|
@@ -1014,7 +1014,7 @@
|
|
|
1014
1014
|
"conditionKeys": [],
|
|
1015
1015
|
"dependentActions": []
|
|
1016
1016
|
},
|
|
1017
|
-
"
|
|
1017
|
+
"getmfadevice": {
|
|
1018
1018
|
"name": "GetMFADevice",
|
|
1019
1019
|
"description": "Grants permission to retrieve information about an MFA device for the specified user",
|
|
1020
1020
|
"accessLevel": "Read",
|
|
@@ -1029,7 +1029,7 @@
|
|
|
1029
1029
|
"conditionKeys": [],
|
|
1030
1030
|
"dependentActions": []
|
|
1031
1031
|
},
|
|
1032
|
-
"
|
|
1032
|
+
"getopenidconnectprovider": {
|
|
1033
1033
|
"name": "GetOpenIDConnectProvider",
|
|
1034
1034
|
"description": "Grants permission to retrieve information about the specified OpenID Connect (OIDC) provider resource in IAM",
|
|
1035
1035
|
"accessLevel": "Read",
|
|
@@ -1044,7 +1044,7 @@
|
|
|
1044
1044
|
"conditionKeys": [],
|
|
1045
1045
|
"dependentActions": []
|
|
1046
1046
|
},
|
|
1047
|
-
"
|
|
1047
|
+
"getorganizationsaccessreport": {
|
|
1048
1048
|
"name": "GetOrganizationsAccessReport",
|
|
1049
1049
|
"description": "Grants permission to retrieve an AWS Organizations access report",
|
|
1050
1050
|
"accessLevel": "Read",
|
|
@@ -1052,7 +1052,7 @@
|
|
|
1052
1052
|
"conditionKeys": [],
|
|
1053
1053
|
"dependentActions": []
|
|
1054
1054
|
},
|
|
1055
|
-
"
|
|
1055
|
+
"getpolicy": {
|
|
1056
1056
|
"name": "GetPolicy",
|
|
1057
1057
|
"description": "Grants permission to retrieve information about the specified managed policy, including the policy's default version and the total number of identities to which the policy is attached",
|
|
1058
1058
|
"accessLevel": "Read",
|
|
@@ -1067,7 +1067,7 @@
|
|
|
1067
1067
|
"conditionKeys": [],
|
|
1068
1068
|
"dependentActions": []
|
|
1069
1069
|
},
|
|
1070
|
-
"
|
|
1070
|
+
"getpolicyversion": {
|
|
1071
1071
|
"name": "GetPolicyVersion",
|
|
1072
1072
|
"description": "Grants permission to retrieve information about a version of the specified managed policy, including the policy document",
|
|
1073
1073
|
"accessLevel": "Read",
|
|
@@ -1082,7 +1082,7 @@
|
|
|
1082
1082
|
"conditionKeys": [],
|
|
1083
1083
|
"dependentActions": []
|
|
1084
1084
|
},
|
|
1085
|
-
"
|
|
1085
|
+
"getrole": {
|
|
1086
1086
|
"name": "GetRole",
|
|
1087
1087
|
"description": "Grants permission to retrieve information about the specified role, including the role's path, GUID, ARN, and the role's trust policy",
|
|
1088
1088
|
"accessLevel": "Read",
|
|
@@ -1097,7 +1097,7 @@
|
|
|
1097
1097
|
"conditionKeys": [],
|
|
1098
1098
|
"dependentActions": []
|
|
1099
1099
|
},
|
|
1100
|
-
"
|
|
1100
|
+
"getrolepolicy": {
|
|
1101
1101
|
"name": "GetRolePolicy",
|
|
1102
1102
|
"description": "Grants permission to retrieve an inline policy document that is embedded with the specified IAM role",
|
|
1103
1103
|
"accessLevel": "Read",
|
|
@@ -1112,7 +1112,7 @@
|
|
|
1112
1112
|
"conditionKeys": [],
|
|
1113
1113
|
"dependentActions": []
|
|
1114
1114
|
},
|
|
1115
|
-
"
|
|
1115
|
+
"getsamlprovider": {
|
|
1116
1116
|
"name": "GetSAMLProvider",
|
|
1117
1117
|
"description": "Grants permission to retrieve the SAML provider metadocument that was uploaded when the IAM SAML provider resource was created or updated",
|
|
1118
1118
|
"accessLevel": "Read",
|
|
@@ -1127,7 +1127,7 @@
|
|
|
1127
1127
|
"conditionKeys": [],
|
|
1128
1128
|
"dependentActions": []
|
|
1129
1129
|
},
|
|
1130
|
-
"
|
|
1130
|
+
"getsshpublickey": {
|
|
1131
1131
|
"name": "GetSSHPublicKey",
|
|
1132
1132
|
"description": "Grants permission to retrieve the specified SSH public key, including metadata about the key",
|
|
1133
1133
|
"accessLevel": "Read",
|
|
@@ -1142,7 +1142,7 @@
|
|
|
1142
1142
|
"conditionKeys": [],
|
|
1143
1143
|
"dependentActions": []
|
|
1144
1144
|
},
|
|
1145
|
-
"
|
|
1145
|
+
"getservercertificate": {
|
|
1146
1146
|
"name": "GetServerCertificate",
|
|
1147
1147
|
"description": "Grants permission to retrieve information about the specified server certificate stored in IAM",
|
|
1148
1148
|
"accessLevel": "Read",
|
|
@@ -1157,7 +1157,7 @@
|
|
|
1157
1157
|
"conditionKeys": [],
|
|
1158
1158
|
"dependentActions": []
|
|
1159
1159
|
},
|
|
1160
|
-
"
|
|
1160
|
+
"getservicelastaccesseddetails": {
|
|
1161
1161
|
"name": "GetServiceLastAccessedDetails",
|
|
1162
1162
|
"description": "Grants permission to retrieve information about the service last accessed data report",
|
|
1163
1163
|
"accessLevel": "Read",
|
|
@@ -1165,7 +1165,7 @@
|
|
|
1165
1165
|
"conditionKeys": [],
|
|
1166
1166
|
"dependentActions": []
|
|
1167
1167
|
},
|
|
1168
|
-
"
|
|
1168
|
+
"getservicelastaccesseddetailswithentities": {
|
|
1169
1169
|
"name": "GetServiceLastAccessedDetailsWithEntities",
|
|
1170
1170
|
"description": "Grants permission to retrieve information about the entities from the service last accessed data report",
|
|
1171
1171
|
"accessLevel": "Read",
|
|
@@ -1173,7 +1173,7 @@
|
|
|
1173
1173
|
"conditionKeys": [],
|
|
1174
1174
|
"dependentActions": []
|
|
1175
1175
|
},
|
|
1176
|
-
"
|
|
1176
|
+
"getservicelinkedroledeletionstatus": {
|
|
1177
1177
|
"name": "GetServiceLinkedRoleDeletionStatus",
|
|
1178
1178
|
"description": "Grants permission to retrieve an IAM service-linked role deletion status",
|
|
1179
1179
|
"accessLevel": "Read",
|
|
@@ -1188,7 +1188,7 @@
|
|
|
1188
1188
|
"conditionKeys": [],
|
|
1189
1189
|
"dependentActions": []
|
|
1190
1190
|
},
|
|
1191
|
-
"
|
|
1191
|
+
"getuser": {
|
|
1192
1192
|
"name": "GetUser",
|
|
1193
1193
|
"description": "Grants permission to retrieve information about the specified IAM user, including the user's creation date, path, unique ID, and ARN",
|
|
1194
1194
|
"accessLevel": "Read",
|
|
@@ -1203,7 +1203,7 @@
|
|
|
1203
1203
|
"conditionKeys": [],
|
|
1204
1204
|
"dependentActions": []
|
|
1205
1205
|
},
|
|
1206
|
-
"
|
|
1206
|
+
"getuserpolicy": {
|
|
1207
1207
|
"name": "GetUserPolicy",
|
|
1208
1208
|
"description": "Grants permission to retrieve an inline policy document that is embedded in the specified IAM user",
|
|
1209
1209
|
"accessLevel": "Read",
|
|
@@ -1218,7 +1218,7 @@
|
|
|
1218
1218
|
"conditionKeys": [],
|
|
1219
1219
|
"dependentActions": []
|
|
1220
1220
|
},
|
|
1221
|
-
"
|
|
1221
|
+
"listaccesskeys": {
|
|
1222
1222
|
"name": "ListAccessKeys",
|
|
1223
1223
|
"description": "Grants permission to list information about the access key IDs that are associated with the specified IAM user",
|
|
1224
1224
|
"accessLevel": "List",
|
|
@@ -1233,7 +1233,7 @@
|
|
|
1233
1233
|
"conditionKeys": [],
|
|
1234
1234
|
"dependentActions": []
|
|
1235
1235
|
},
|
|
1236
|
-
"
|
|
1236
|
+
"listaccountaliases": {
|
|
1237
1237
|
"name": "ListAccountAliases",
|
|
1238
1238
|
"description": "Grants permission to list the account alias that is associated with the AWS account",
|
|
1239
1239
|
"accessLevel": "List",
|
|
@@ -1241,7 +1241,7 @@
|
|
|
1241
1241
|
"conditionKeys": [],
|
|
1242
1242
|
"dependentActions": []
|
|
1243
1243
|
},
|
|
1244
|
-
"
|
|
1244
|
+
"listattachedgrouppolicies": {
|
|
1245
1245
|
"name": "ListAttachedGroupPolicies",
|
|
1246
1246
|
"description": "Grants permission to list all managed policies that are attached to the specified IAM group",
|
|
1247
1247
|
"accessLevel": "List",
|
|
@@ -1256,7 +1256,7 @@
|
|
|
1256
1256
|
"conditionKeys": [],
|
|
1257
1257
|
"dependentActions": []
|
|
1258
1258
|
},
|
|
1259
|
-
"
|
|
1259
|
+
"listattachedrolepolicies": {
|
|
1260
1260
|
"name": "ListAttachedRolePolicies",
|
|
1261
1261
|
"description": "Grants permission to list all managed policies that are attached to the specified IAM role",
|
|
1262
1262
|
"accessLevel": "List",
|
|
@@ -1271,7 +1271,7 @@
|
|
|
1271
1271
|
"conditionKeys": [],
|
|
1272
1272
|
"dependentActions": []
|
|
1273
1273
|
},
|
|
1274
|
-
"
|
|
1274
|
+
"listattacheduserpolicies": {
|
|
1275
1275
|
"name": "ListAttachedUserPolicies",
|
|
1276
1276
|
"description": "Grants permission to list all managed policies that are attached to the specified IAM user",
|
|
1277
1277
|
"accessLevel": "List",
|
|
@@ -1286,7 +1286,7 @@
|
|
|
1286
1286
|
"conditionKeys": [],
|
|
1287
1287
|
"dependentActions": []
|
|
1288
1288
|
},
|
|
1289
|
-
"
|
|
1289
|
+
"listcloudfrontpublickeys": {
|
|
1290
1290
|
"name": "ListCloudFrontPublicKeys",
|
|
1291
1291
|
"description": "Grants permission to list all current CloudFront public keys for the account",
|
|
1292
1292
|
"accessLevel": "List",
|
|
@@ -1294,7 +1294,7 @@
|
|
|
1294
1294
|
"conditionKeys": [],
|
|
1295
1295
|
"dependentActions": []
|
|
1296
1296
|
},
|
|
1297
|
-
"
|
|
1297
|
+
"listentitiesforpolicy": {
|
|
1298
1298
|
"name": "ListEntitiesForPolicy",
|
|
1299
1299
|
"description": "Grants permission to list all IAM identities to which the specified managed policy is attached",
|
|
1300
1300
|
"accessLevel": "List",
|
|
@@ -1309,7 +1309,7 @@
|
|
|
1309
1309
|
"conditionKeys": [],
|
|
1310
1310
|
"dependentActions": []
|
|
1311
1311
|
},
|
|
1312
|
-
"
|
|
1312
|
+
"listgrouppolicies": {
|
|
1313
1313
|
"name": "ListGroupPolicies",
|
|
1314
1314
|
"description": "Grants permission to list the names of the inline policies that are embedded in the specified IAM group",
|
|
1315
1315
|
"accessLevel": "List",
|
|
@@ -1324,7 +1324,7 @@
|
|
|
1324
1324
|
"conditionKeys": [],
|
|
1325
1325
|
"dependentActions": []
|
|
1326
1326
|
},
|
|
1327
|
-
"
|
|
1327
|
+
"listgroups": {
|
|
1328
1328
|
"name": "ListGroups",
|
|
1329
1329
|
"description": "Grants permission to list the IAM groups that have the specified path prefix",
|
|
1330
1330
|
"accessLevel": "List",
|
|
@@ -1332,7 +1332,7 @@
|
|
|
1332
1332
|
"conditionKeys": [],
|
|
1333
1333
|
"dependentActions": []
|
|
1334
1334
|
},
|
|
1335
|
-
"
|
|
1335
|
+
"listgroupsforuser": {
|
|
1336
1336
|
"name": "ListGroupsForUser",
|
|
1337
1337
|
"description": "Grants permission to list the IAM groups that the specified IAM user belongs to",
|
|
1338
1338
|
"accessLevel": "List",
|
|
@@ -1347,7 +1347,7 @@
|
|
|
1347
1347
|
"conditionKeys": [],
|
|
1348
1348
|
"dependentActions": []
|
|
1349
1349
|
},
|
|
1350
|
-
"
|
|
1350
|
+
"listinstanceprofiletags": {
|
|
1351
1351
|
"name": "ListInstanceProfileTags",
|
|
1352
1352
|
"description": "Grants permission to list the tags that are attached to the specified instance profile",
|
|
1353
1353
|
"accessLevel": "List",
|
|
@@ -1362,7 +1362,7 @@
|
|
|
1362
1362
|
"conditionKeys": [],
|
|
1363
1363
|
"dependentActions": []
|
|
1364
1364
|
},
|
|
1365
|
-
"
|
|
1365
|
+
"listinstanceprofiles": {
|
|
1366
1366
|
"name": "ListInstanceProfiles",
|
|
1367
1367
|
"description": "Grants permission to list the instance profiles that have the specified path prefix",
|
|
1368
1368
|
"accessLevel": "List",
|
|
@@ -1370,7 +1370,7 @@
|
|
|
1370
1370
|
"conditionKeys": [],
|
|
1371
1371
|
"dependentActions": []
|
|
1372
1372
|
},
|
|
1373
|
-
"
|
|
1373
|
+
"listinstanceprofilesforrole": {
|
|
1374
1374
|
"name": "ListInstanceProfilesForRole",
|
|
1375
1375
|
"description": "Grants permission to list the instance profiles that have the specified associated IAM role",
|
|
1376
1376
|
"accessLevel": "List",
|
|
@@ -1385,7 +1385,7 @@
|
|
|
1385
1385
|
"conditionKeys": [],
|
|
1386
1386
|
"dependentActions": []
|
|
1387
1387
|
},
|
|
1388
|
-
"
|
|
1388
|
+
"listmfadevicetags": {
|
|
1389
1389
|
"name": "ListMFADeviceTags",
|
|
1390
1390
|
"description": "Grants permission to list the tags that are attached to the specified virtual mfa device",
|
|
1391
1391
|
"accessLevel": "List",
|
|
@@ -1400,7 +1400,7 @@
|
|
|
1400
1400
|
"conditionKeys": [],
|
|
1401
1401
|
"dependentActions": []
|
|
1402
1402
|
},
|
|
1403
|
-
"
|
|
1403
|
+
"listmfadevices": {
|
|
1404
1404
|
"name": "ListMFADevices",
|
|
1405
1405
|
"description": "Grants permission to list the MFA devices for an IAM user",
|
|
1406
1406
|
"accessLevel": "List",
|
|
@@ -1415,7 +1415,7 @@
|
|
|
1415
1415
|
"conditionKeys": [],
|
|
1416
1416
|
"dependentActions": []
|
|
1417
1417
|
},
|
|
1418
|
-
"
|
|
1418
|
+
"listopenidconnectprovidertags": {
|
|
1419
1419
|
"name": "ListOpenIDConnectProviderTags",
|
|
1420
1420
|
"description": "Grants permission to list the tags that are attached to the specified OpenID Connect provider",
|
|
1421
1421
|
"accessLevel": "List",
|
|
@@ -1430,7 +1430,7 @@
|
|
|
1430
1430
|
"conditionKeys": [],
|
|
1431
1431
|
"dependentActions": []
|
|
1432
1432
|
},
|
|
1433
|
-
"
|
|
1433
|
+
"listopenidconnectproviders": {
|
|
1434
1434
|
"name": "ListOpenIDConnectProviders",
|
|
1435
1435
|
"description": "Grants permission to list information about the IAM OpenID Connect (OIDC) provider resource objects that are defined in the AWS account",
|
|
1436
1436
|
"accessLevel": "List",
|
|
@@ -1438,7 +1438,7 @@
|
|
|
1438
1438
|
"conditionKeys": [],
|
|
1439
1439
|
"dependentActions": []
|
|
1440
1440
|
},
|
|
1441
|
-
"
|
|
1441
|
+
"listpolicies": {
|
|
1442
1442
|
"name": "ListPolicies",
|
|
1443
1443
|
"description": "Grants permission to list all managed policies",
|
|
1444
1444
|
"accessLevel": "List",
|
|
@@ -1446,7 +1446,7 @@
|
|
|
1446
1446
|
"conditionKeys": [],
|
|
1447
1447
|
"dependentActions": []
|
|
1448
1448
|
},
|
|
1449
|
-
"
|
|
1449
|
+
"listpoliciesgrantingserviceaccess": {
|
|
1450
1450
|
"name": "ListPoliciesGrantingServiceAccess",
|
|
1451
1451
|
"description": "Grants permission to list information about the policies that grant an entity access to a specific service",
|
|
1452
1452
|
"accessLevel": "List",
|
|
@@ -1473,7 +1473,7 @@
|
|
|
1473
1473
|
"conditionKeys": [],
|
|
1474
1474
|
"dependentActions": []
|
|
1475
1475
|
},
|
|
1476
|
-
"
|
|
1476
|
+
"listpolicytags": {
|
|
1477
1477
|
"name": "ListPolicyTags",
|
|
1478
1478
|
"description": "Grants permission to list the tags that are attached to the specified managed policy",
|
|
1479
1479
|
"accessLevel": "List",
|
|
@@ -1488,7 +1488,7 @@
|
|
|
1488
1488
|
"conditionKeys": [],
|
|
1489
1489
|
"dependentActions": []
|
|
1490
1490
|
},
|
|
1491
|
-
"
|
|
1491
|
+
"listpolicyversions": {
|
|
1492
1492
|
"name": "ListPolicyVersions",
|
|
1493
1493
|
"description": "Grants permission to list information about the versions of the specified managed policy, including the version that is currently set as the policy's default version",
|
|
1494
1494
|
"accessLevel": "List",
|
|
@@ -1503,7 +1503,7 @@
|
|
|
1503
1503
|
"conditionKeys": [],
|
|
1504
1504
|
"dependentActions": []
|
|
1505
1505
|
},
|
|
1506
|
-
"
|
|
1506
|
+
"listrolepolicies": {
|
|
1507
1507
|
"name": "ListRolePolicies",
|
|
1508
1508
|
"description": "Grants permission to list the names of the inline policies that are embedded in the specified IAM role",
|
|
1509
1509
|
"accessLevel": "List",
|
|
@@ -1518,7 +1518,7 @@
|
|
|
1518
1518
|
"conditionKeys": [],
|
|
1519
1519
|
"dependentActions": []
|
|
1520
1520
|
},
|
|
1521
|
-
"
|
|
1521
|
+
"listroletags": {
|
|
1522
1522
|
"name": "ListRoleTags",
|
|
1523
1523
|
"description": "Grants permission to list the tags that are attached to the specified IAM role",
|
|
1524
1524
|
"accessLevel": "List",
|
|
@@ -1533,7 +1533,7 @@
|
|
|
1533
1533
|
"conditionKeys": [],
|
|
1534
1534
|
"dependentActions": []
|
|
1535
1535
|
},
|
|
1536
|
-
"
|
|
1536
|
+
"listroles": {
|
|
1537
1537
|
"name": "ListRoles",
|
|
1538
1538
|
"description": "Grants permission to list the IAM roles that have the specified path prefix",
|
|
1539
1539
|
"accessLevel": "List",
|
|
@@ -1541,7 +1541,7 @@
|
|
|
1541
1541
|
"conditionKeys": [],
|
|
1542
1542
|
"dependentActions": []
|
|
1543
1543
|
},
|
|
1544
|
-
"
|
|
1544
|
+
"listsamlprovidertags": {
|
|
1545
1545
|
"name": "ListSAMLProviderTags",
|
|
1546
1546
|
"description": "Grants permission to list the tags that are attached to the specified SAML provider",
|
|
1547
1547
|
"accessLevel": "List",
|
|
@@ -1556,7 +1556,7 @@
|
|
|
1556
1556
|
"conditionKeys": [],
|
|
1557
1557
|
"dependentActions": []
|
|
1558
1558
|
},
|
|
1559
|
-
"
|
|
1559
|
+
"listsamlproviders": {
|
|
1560
1560
|
"name": "ListSAMLProviders",
|
|
1561
1561
|
"description": "Grants permission to list the SAML provider resources in IAM",
|
|
1562
1562
|
"accessLevel": "List",
|
|
@@ -1564,7 +1564,7 @@
|
|
|
1564
1564
|
"conditionKeys": [],
|
|
1565
1565
|
"dependentActions": []
|
|
1566
1566
|
},
|
|
1567
|
-
"
|
|
1567
|
+
"listsshpublickeys": {
|
|
1568
1568
|
"name": "ListSSHPublicKeys",
|
|
1569
1569
|
"description": "Grants permission to list information about the SSH public keys that are associated with the specified IAM user",
|
|
1570
1570
|
"accessLevel": "List",
|
|
@@ -1579,7 +1579,7 @@
|
|
|
1579
1579
|
"conditionKeys": [],
|
|
1580
1580
|
"dependentActions": []
|
|
1581
1581
|
},
|
|
1582
|
-
"
|
|
1582
|
+
"liststsregionalendpointsstatus": {
|
|
1583
1583
|
"name": "ListSTSRegionalEndpointsStatus",
|
|
1584
1584
|
"description": "Grants permission to list the status of all active STS regional endpoints",
|
|
1585
1585
|
"accessLevel": "List",
|
|
@@ -1587,7 +1587,7 @@
|
|
|
1587
1587
|
"conditionKeys": [],
|
|
1588
1588
|
"dependentActions": []
|
|
1589
1589
|
},
|
|
1590
|
-
"
|
|
1590
|
+
"listservercertificatetags": {
|
|
1591
1591
|
"name": "ListServerCertificateTags",
|
|
1592
1592
|
"description": "Grants permission to list the tags that are attached to the specified server certificate",
|
|
1593
1593
|
"accessLevel": "List",
|
|
@@ -1602,7 +1602,7 @@
|
|
|
1602
1602
|
"conditionKeys": [],
|
|
1603
1603
|
"dependentActions": []
|
|
1604
1604
|
},
|
|
1605
|
-
"
|
|
1605
|
+
"listservercertificates": {
|
|
1606
1606
|
"name": "ListServerCertificates",
|
|
1607
1607
|
"description": "Grants permission to list the server certificates that have the specified path prefix",
|
|
1608
1608
|
"accessLevel": "List",
|
|
@@ -1610,7 +1610,7 @@
|
|
|
1610
1610
|
"conditionKeys": [],
|
|
1611
1611
|
"dependentActions": []
|
|
1612
1612
|
},
|
|
1613
|
-
"
|
|
1613
|
+
"listservicespecificcredentials": {
|
|
1614
1614
|
"name": "ListServiceSpecificCredentials",
|
|
1615
1615
|
"description": "Grants permission to list the service-specific credentials that are associated with the specified IAM user",
|
|
1616
1616
|
"accessLevel": "List",
|
|
@@ -1625,7 +1625,7 @@
|
|
|
1625
1625
|
"conditionKeys": [],
|
|
1626
1626
|
"dependentActions": []
|
|
1627
1627
|
},
|
|
1628
|
-
"
|
|
1628
|
+
"listsigningcertificates": {
|
|
1629
1629
|
"name": "ListSigningCertificates",
|
|
1630
1630
|
"description": "Grants permission to list information about the signing certificates that are associated with the specified IAM user",
|
|
1631
1631
|
"accessLevel": "List",
|
|
@@ -1640,7 +1640,7 @@
|
|
|
1640
1640
|
"conditionKeys": [],
|
|
1641
1641
|
"dependentActions": []
|
|
1642
1642
|
},
|
|
1643
|
-
"
|
|
1643
|
+
"listuserpolicies": {
|
|
1644
1644
|
"name": "ListUserPolicies",
|
|
1645
1645
|
"description": "Grants permission to list the names of the inline policies that are embedded in the specified IAM user",
|
|
1646
1646
|
"accessLevel": "List",
|
|
@@ -1655,7 +1655,7 @@
|
|
|
1655
1655
|
"conditionKeys": [],
|
|
1656
1656
|
"dependentActions": []
|
|
1657
1657
|
},
|
|
1658
|
-
"
|
|
1658
|
+
"listusertags": {
|
|
1659
1659
|
"name": "ListUserTags",
|
|
1660
1660
|
"description": "Grants permission to list the tags that are attached to the specified IAM user",
|
|
1661
1661
|
"accessLevel": "List",
|
|
@@ -1670,7 +1670,7 @@
|
|
|
1670
1670
|
"conditionKeys": [],
|
|
1671
1671
|
"dependentActions": []
|
|
1672
1672
|
},
|
|
1673
|
-
"
|
|
1673
|
+
"listusers": {
|
|
1674
1674
|
"name": "ListUsers",
|
|
1675
1675
|
"description": "Grants permission to list the IAM users that have the specified path prefix",
|
|
1676
1676
|
"accessLevel": "List",
|
|
@@ -1678,7 +1678,7 @@
|
|
|
1678
1678
|
"conditionKeys": [],
|
|
1679
1679
|
"dependentActions": []
|
|
1680
1680
|
},
|
|
1681
|
-
"
|
|
1681
|
+
"listvirtualmfadevices": {
|
|
1682
1682
|
"name": "ListVirtualMFADevices",
|
|
1683
1683
|
"description": "Grants permission to list virtual MFA devices by assignment status",
|
|
1684
1684
|
"accessLevel": "List",
|
|
@@ -1686,7 +1686,7 @@
|
|
|
1686
1686
|
"conditionKeys": [],
|
|
1687
1687
|
"dependentActions": []
|
|
1688
1688
|
},
|
|
1689
|
-
"
|
|
1689
|
+
"passrole": {
|
|
1690
1690
|
"name": "PassRole",
|
|
1691
1691
|
"isPermissionOnly": true,
|
|
1692
1692
|
"description": "Grants permission to pass a role to a service",
|
|
@@ -1705,7 +1705,7 @@
|
|
|
1705
1705
|
],
|
|
1706
1706
|
"dependentActions": []
|
|
1707
1707
|
},
|
|
1708
|
-
"
|
|
1708
|
+
"putgrouppolicy": {
|
|
1709
1709
|
"name": "PutGroupPolicy",
|
|
1710
1710
|
"description": "Grants permission to create or update an inline policy document that is embedded in the specified IAM group",
|
|
1711
1711
|
"accessLevel": "Permissions management",
|
|
@@ -1720,7 +1720,7 @@
|
|
|
1720
1720
|
"conditionKeys": [],
|
|
1721
1721
|
"dependentActions": []
|
|
1722
1722
|
},
|
|
1723
|
-
"
|
|
1723
|
+
"putrolepermissionsboundary": {
|
|
1724
1724
|
"name": "PutRolePermissionsBoundary",
|
|
1725
1725
|
"description": "Grants permission to set a managed policy as a permissions boundary for a role",
|
|
1726
1726
|
"accessLevel": "Permissions management",
|
|
@@ -1737,7 +1737,7 @@
|
|
|
1737
1737
|
],
|
|
1738
1738
|
"dependentActions": []
|
|
1739
1739
|
},
|
|
1740
|
-
"
|
|
1740
|
+
"putrolepolicy": {
|
|
1741
1741
|
"name": "PutRolePolicy",
|
|
1742
1742
|
"description": "Grants permission to create or update an inline policy document that is embedded in the specified IAM role",
|
|
1743
1743
|
"accessLevel": "Permissions management",
|
|
@@ -1754,7 +1754,7 @@
|
|
|
1754
1754
|
],
|
|
1755
1755
|
"dependentActions": []
|
|
1756
1756
|
},
|
|
1757
|
-
"
|
|
1757
|
+
"putuserpermissionsboundary": {
|
|
1758
1758
|
"name": "PutUserPermissionsBoundary",
|
|
1759
1759
|
"description": "Grants permission to set a managed policy as a permissions boundary for an IAM user",
|
|
1760
1760
|
"accessLevel": "Permissions management",
|
|
@@ -1771,7 +1771,7 @@
|
|
|
1771
1771
|
],
|
|
1772
1772
|
"dependentActions": []
|
|
1773
1773
|
},
|
|
1774
|
-
"
|
|
1774
|
+
"putuserpolicy": {
|
|
1775
1775
|
"name": "PutUserPolicy",
|
|
1776
1776
|
"description": "Grants permission to create or update an inline policy document that is embedded in the specified IAM user",
|
|
1777
1777
|
"accessLevel": "Permissions management",
|
|
@@ -1788,7 +1788,7 @@
|
|
|
1788
1788
|
],
|
|
1789
1789
|
"dependentActions": []
|
|
1790
1790
|
},
|
|
1791
|
-
"
|
|
1791
|
+
"removeclientidfromopenidconnectprovider": {
|
|
1792
1792
|
"name": "RemoveClientIDFromOpenIDConnectProvider",
|
|
1793
1793
|
"description": "Grants permission to remove the client ID (audience) from the list of client IDs in the specified IAM OpenID Connect (OIDC) provider resource",
|
|
1794
1794
|
"accessLevel": "Write",
|
|
@@ -1803,7 +1803,7 @@
|
|
|
1803
1803
|
"conditionKeys": [],
|
|
1804
1804
|
"dependentActions": []
|
|
1805
1805
|
},
|
|
1806
|
-
"
|
|
1806
|
+
"removerolefrominstanceprofile": {
|
|
1807
1807
|
"name": "RemoveRoleFromInstanceProfile",
|
|
1808
1808
|
"description": "Grants permission to remove an IAM role from the specified EC2 instance profile",
|
|
1809
1809
|
"accessLevel": "Write",
|
|
@@ -1818,7 +1818,7 @@
|
|
|
1818
1818
|
"conditionKeys": [],
|
|
1819
1819
|
"dependentActions": []
|
|
1820
1820
|
},
|
|
1821
|
-
"
|
|
1821
|
+
"removeuserfromgroup": {
|
|
1822
1822
|
"name": "RemoveUserFromGroup",
|
|
1823
1823
|
"description": "Grants permission to remove an IAM user from the specified group",
|
|
1824
1824
|
"accessLevel": "Write",
|
|
@@ -1833,7 +1833,7 @@
|
|
|
1833
1833
|
"conditionKeys": [],
|
|
1834
1834
|
"dependentActions": []
|
|
1835
1835
|
},
|
|
1836
|
-
"
|
|
1836
|
+
"resetservicespecificcredential": {
|
|
1837
1837
|
"name": "ResetServiceSpecificCredential",
|
|
1838
1838
|
"description": "Grants permission to reset the password for an existing service-specific credential for an IAM user",
|
|
1839
1839
|
"accessLevel": "Write",
|
|
@@ -1848,7 +1848,7 @@
|
|
|
1848
1848
|
"conditionKeys": [],
|
|
1849
1849
|
"dependentActions": []
|
|
1850
1850
|
},
|
|
1851
|
-
"
|
|
1851
|
+
"resyncmfadevice": {
|
|
1852
1852
|
"name": "ResyncMFADevice",
|
|
1853
1853
|
"description": "Grants permission to synchronize the specified MFA device with its IAM entity (user or role)",
|
|
1854
1854
|
"accessLevel": "Write",
|
|
@@ -1863,7 +1863,7 @@
|
|
|
1863
1863
|
"conditionKeys": [],
|
|
1864
1864
|
"dependentActions": []
|
|
1865
1865
|
},
|
|
1866
|
-
"
|
|
1866
|
+
"setdefaultpolicyversion": {
|
|
1867
1867
|
"name": "SetDefaultPolicyVersion",
|
|
1868
1868
|
"description": "Grants permission to set the version of the specified policy as the policy's default version",
|
|
1869
1869
|
"accessLevel": "Permissions management",
|
|
@@ -1878,7 +1878,7 @@
|
|
|
1878
1878
|
"conditionKeys": [],
|
|
1879
1879
|
"dependentActions": []
|
|
1880
1880
|
},
|
|
1881
|
-
"
|
|
1881
|
+
"setstsregionalendpointstatus": {
|
|
1882
1882
|
"name": "SetSTSRegionalEndpointStatus",
|
|
1883
1883
|
"description": "Grants permission to activate or deactivate an STS regional endpoint",
|
|
1884
1884
|
"accessLevel": "Write",
|
|
@@ -1886,7 +1886,7 @@
|
|
|
1886
1886
|
"conditionKeys": [],
|
|
1887
1887
|
"dependentActions": []
|
|
1888
1888
|
},
|
|
1889
|
-
"
|
|
1889
|
+
"setsecuritytokenservicepreferences": {
|
|
1890
1890
|
"name": "SetSecurityTokenServicePreferences",
|
|
1891
1891
|
"description": "Grants permission to set the STS global endpoint token version",
|
|
1892
1892
|
"accessLevel": "Write",
|
|
@@ -1894,7 +1894,7 @@
|
|
|
1894
1894
|
"conditionKeys": [],
|
|
1895
1895
|
"dependentActions": []
|
|
1896
1896
|
},
|
|
1897
|
-
"
|
|
1897
|
+
"simulatecustompolicy": {
|
|
1898
1898
|
"name": "SimulateCustomPolicy",
|
|
1899
1899
|
"description": "Grants permission to simulate whether an identity-based policy or resource-based policy provides permissions for specific API operations and resources",
|
|
1900
1900
|
"accessLevel": "Read",
|
|
@@ -1902,7 +1902,7 @@
|
|
|
1902
1902
|
"conditionKeys": [],
|
|
1903
1903
|
"dependentActions": []
|
|
1904
1904
|
},
|
|
1905
|
-
"
|
|
1905
|
+
"simulateprincipalpolicy": {
|
|
1906
1906
|
"name": "SimulatePrincipalPolicy",
|
|
1907
1907
|
"description": "Grants permission to simulate whether an identity-based policy that is attached to a specified IAM entity (user or role) provides permissions for specific API operations and resources",
|
|
1908
1908
|
"accessLevel": "Read",
|
|
@@ -1929,7 +1929,7 @@
|
|
|
1929
1929
|
"conditionKeys": [],
|
|
1930
1930
|
"dependentActions": []
|
|
1931
1931
|
},
|
|
1932
|
-
"
|
|
1932
|
+
"taginstanceprofile": {
|
|
1933
1933
|
"name": "TagInstanceProfile",
|
|
1934
1934
|
"description": "Grants permission to add tags to an instance profile",
|
|
1935
1935
|
"accessLevel": "Tagging",
|
|
@@ -1947,7 +1947,7 @@
|
|
|
1947
1947
|
],
|
|
1948
1948
|
"dependentActions": []
|
|
1949
1949
|
},
|
|
1950
|
-
"
|
|
1950
|
+
"tagmfadevice": {
|
|
1951
1951
|
"name": "TagMFADevice",
|
|
1952
1952
|
"description": "Grants permission to add tags to a virtual mfa device",
|
|
1953
1953
|
"accessLevel": "Tagging",
|
|
@@ -1965,7 +1965,7 @@
|
|
|
1965
1965
|
],
|
|
1966
1966
|
"dependentActions": []
|
|
1967
1967
|
},
|
|
1968
|
-
"
|
|
1968
|
+
"tagopenidconnectprovider": {
|
|
1969
1969
|
"name": "TagOpenIDConnectProvider",
|
|
1970
1970
|
"description": "Grants permission to add tags to an OpenID Connect provider",
|
|
1971
1971
|
"accessLevel": "Tagging",
|
|
@@ -1983,7 +1983,7 @@
|
|
|
1983
1983
|
],
|
|
1984
1984
|
"dependentActions": []
|
|
1985
1985
|
},
|
|
1986
|
-
"
|
|
1986
|
+
"tagpolicy": {
|
|
1987
1987
|
"name": "TagPolicy",
|
|
1988
1988
|
"description": "Grants permission to add tags to a managed policy",
|
|
1989
1989
|
"accessLevel": "Tagging",
|
|
@@ -2001,7 +2001,7 @@
|
|
|
2001
2001
|
],
|
|
2002
2002
|
"dependentActions": []
|
|
2003
2003
|
},
|
|
2004
|
-
"
|
|
2004
|
+
"tagrole": {
|
|
2005
2005
|
"name": "TagRole",
|
|
2006
2006
|
"description": "Grants permission to add tags to an IAM role",
|
|
2007
2007
|
"accessLevel": "Tagging",
|
|
@@ -2019,7 +2019,7 @@
|
|
|
2019
2019
|
],
|
|
2020
2020
|
"dependentActions": []
|
|
2021
2021
|
},
|
|
2022
|
-
"
|
|
2022
|
+
"tagsamlprovider": {
|
|
2023
2023
|
"name": "TagSAMLProvider",
|
|
2024
2024
|
"description": "Grants permission to add tags to a SAML Provider",
|
|
2025
2025
|
"accessLevel": "Tagging",
|
|
@@ -2037,7 +2037,7 @@
|
|
|
2037
2037
|
],
|
|
2038
2038
|
"dependentActions": []
|
|
2039
2039
|
},
|
|
2040
|
-
"
|
|
2040
|
+
"tagservercertificate": {
|
|
2041
2041
|
"name": "TagServerCertificate",
|
|
2042
2042
|
"description": "Grants permission to add tags to a server certificate",
|
|
2043
2043
|
"accessLevel": "Tagging",
|
|
@@ -2055,7 +2055,7 @@
|
|
|
2055
2055
|
],
|
|
2056
2056
|
"dependentActions": []
|
|
2057
2057
|
},
|
|
2058
|
-
"
|
|
2058
|
+
"taguser": {
|
|
2059
2059
|
"name": "TagUser",
|
|
2060
2060
|
"description": "Grants permission to add tags to an IAM user",
|
|
2061
2061
|
"accessLevel": "Tagging",
|
|
@@ -2073,7 +2073,7 @@
|
|
|
2073
2073
|
],
|
|
2074
2074
|
"dependentActions": []
|
|
2075
2075
|
},
|
|
2076
|
-
"
|
|
2076
|
+
"untaginstanceprofile": {
|
|
2077
2077
|
"name": "UntagInstanceProfile",
|
|
2078
2078
|
"description": "Grants permission to remove the specified tags from the instance profile",
|
|
2079
2079
|
"accessLevel": "Tagging",
|
|
@@ -2090,7 +2090,7 @@
|
|
|
2090
2090
|
],
|
|
2091
2091
|
"dependentActions": []
|
|
2092
2092
|
},
|
|
2093
|
-
"
|
|
2093
|
+
"untagmfadevice": {
|
|
2094
2094
|
"name": "UntagMFADevice",
|
|
2095
2095
|
"description": "Grants permission to remove the specified tags from the virtual mfa device",
|
|
2096
2096
|
"accessLevel": "Tagging",
|
|
@@ -2107,7 +2107,7 @@
|
|
|
2107
2107
|
],
|
|
2108
2108
|
"dependentActions": []
|
|
2109
2109
|
},
|
|
2110
|
-
"
|
|
2110
|
+
"untagopenidconnectprovider": {
|
|
2111
2111
|
"name": "UntagOpenIDConnectProvider",
|
|
2112
2112
|
"description": "Grants permission to remove the specified tags from the OpenID Connect provider",
|
|
2113
2113
|
"accessLevel": "Tagging",
|
|
@@ -2124,7 +2124,7 @@
|
|
|
2124
2124
|
],
|
|
2125
2125
|
"dependentActions": []
|
|
2126
2126
|
},
|
|
2127
|
-
"
|
|
2127
|
+
"untagpolicy": {
|
|
2128
2128
|
"name": "UntagPolicy",
|
|
2129
2129
|
"description": "Grants permission to remove the specified tags from the managed policy",
|
|
2130
2130
|
"accessLevel": "Tagging",
|
|
@@ -2141,7 +2141,7 @@
|
|
|
2141
2141
|
],
|
|
2142
2142
|
"dependentActions": []
|
|
2143
2143
|
},
|
|
2144
|
-
"
|
|
2144
|
+
"untagrole": {
|
|
2145
2145
|
"name": "UntagRole",
|
|
2146
2146
|
"description": "Grants permission to remove the specified tags from the role",
|
|
2147
2147
|
"accessLevel": "Tagging",
|
|
@@ -2158,7 +2158,7 @@
|
|
|
2158
2158
|
],
|
|
2159
2159
|
"dependentActions": []
|
|
2160
2160
|
},
|
|
2161
|
-
"
|
|
2161
|
+
"untagsamlprovider": {
|
|
2162
2162
|
"name": "UntagSAMLProvider",
|
|
2163
2163
|
"description": "Grants permission to remove the specified tags from the SAML Provider",
|
|
2164
2164
|
"accessLevel": "Tagging",
|
|
@@ -2175,7 +2175,7 @@
|
|
|
2175
2175
|
],
|
|
2176
2176
|
"dependentActions": []
|
|
2177
2177
|
},
|
|
2178
|
-
"
|
|
2178
|
+
"untagservercertificate": {
|
|
2179
2179
|
"name": "UntagServerCertificate",
|
|
2180
2180
|
"description": "Grants permission to remove the specified tags from the server certificate",
|
|
2181
2181
|
"accessLevel": "Tagging",
|
|
@@ -2192,7 +2192,7 @@
|
|
|
2192
2192
|
],
|
|
2193
2193
|
"dependentActions": []
|
|
2194
2194
|
},
|
|
2195
|
-
"
|
|
2195
|
+
"untaguser": {
|
|
2196
2196
|
"name": "UntagUser",
|
|
2197
2197
|
"description": "Grants permission to remove the specified tags from the user",
|
|
2198
2198
|
"accessLevel": "Tagging",
|
|
@@ -2209,7 +2209,7 @@
|
|
|
2209
2209
|
],
|
|
2210
2210
|
"dependentActions": []
|
|
2211
2211
|
},
|
|
2212
|
-
"
|
|
2212
|
+
"updateaccesskey": {
|
|
2213
2213
|
"name": "UpdateAccessKey",
|
|
2214
2214
|
"description": "Grants permission to update the status of the specified access key as Active or Inactive",
|
|
2215
2215
|
"accessLevel": "Write",
|
|
@@ -2224,7 +2224,7 @@
|
|
|
2224
2224
|
"conditionKeys": [],
|
|
2225
2225
|
"dependentActions": []
|
|
2226
2226
|
},
|
|
2227
|
-
"
|
|
2227
|
+
"updateaccountemailaddress": {
|
|
2228
2228
|
"name": "UpdateAccountEmailAddress",
|
|
2229
2229
|
"description": "Grants permission to update the email address that is associated with the account",
|
|
2230
2230
|
"accessLevel": "Write",
|
|
@@ -2232,7 +2232,7 @@
|
|
|
2232
2232
|
"conditionKeys": [],
|
|
2233
2233
|
"dependentActions": []
|
|
2234
2234
|
},
|
|
2235
|
-
"
|
|
2235
|
+
"updateaccountname": {
|
|
2236
2236
|
"name": "UpdateAccountName",
|
|
2237
2237
|
"description": "Grants permission to update the account name that is associated with the account",
|
|
2238
2238
|
"accessLevel": "Write",
|
|
@@ -2240,7 +2240,7 @@
|
|
|
2240
2240
|
"conditionKeys": [],
|
|
2241
2241
|
"dependentActions": []
|
|
2242
2242
|
},
|
|
2243
|
-
"
|
|
2243
|
+
"updateaccountpasswordpolicy": {
|
|
2244
2244
|
"name": "UpdateAccountPasswordPolicy",
|
|
2245
2245
|
"description": "Grants permission to update the password policy settings for the AWS account",
|
|
2246
2246
|
"accessLevel": "Write",
|
|
@@ -2248,7 +2248,7 @@
|
|
|
2248
2248
|
"conditionKeys": [],
|
|
2249
2249
|
"dependentActions": []
|
|
2250
2250
|
},
|
|
2251
|
-
"
|
|
2251
|
+
"updateassumerolepolicy": {
|
|
2252
2252
|
"name": "UpdateAssumeRolePolicy",
|
|
2253
2253
|
"description": "Grants permission to update the policy that grants an IAM entity permission to assume a role",
|
|
2254
2254
|
"accessLevel": "Permissions management",
|
|
@@ -2263,7 +2263,7 @@
|
|
|
2263
2263
|
"conditionKeys": [],
|
|
2264
2264
|
"dependentActions": []
|
|
2265
2265
|
},
|
|
2266
|
-
"
|
|
2266
|
+
"updatecloudfrontpublickey": {
|
|
2267
2267
|
"name": "UpdateCloudFrontPublicKey",
|
|
2268
2268
|
"description": "Grants permission to update an existing CloudFront public key",
|
|
2269
2269
|
"accessLevel": "Write",
|
|
@@ -2271,7 +2271,7 @@
|
|
|
2271
2271
|
"conditionKeys": [],
|
|
2272
2272
|
"dependentActions": []
|
|
2273
2273
|
},
|
|
2274
|
-
"
|
|
2274
|
+
"updategroup": {
|
|
2275
2275
|
"name": "UpdateGroup",
|
|
2276
2276
|
"description": "Grants permission to update the name or path of the specified IAM group",
|
|
2277
2277
|
"accessLevel": "Write",
|
|
@@ -2286,7 +2286,7 @@
|
|
|
2286
2286
|
"conditionKeys": [],
|
|
2287
2287
|
"dependentActions": []
|
|
2288
2288
|
},
|
|
2289
|
-
"
|
|
2289
|
+
"updateloginprofile": {
|
|
2290
2290
|
"name": "UpdateLoginProfile",
|
|
2291
2291
|
"description": "Grants permission to change the password for the specified IAM user",
|
|
2292
2292
|
"accessLevel": "Write",
|
|
@@ -2301,7 +2301,7 @@
|
|
|
2301
2301
|
"conditionKeys": [],
|
|
2302
2302
|
"dependentActions": []
|
|
2303
2303
|
},
|
|
2304
|
-
"
|
|
2304
|
+
"updateopenidconnectproviderthumbprint": {
|
|
2305
2305
|
"name": "UpdateOpenIDConnectProviderThumbprint",
|
|
2306
2306
|
"description": "Grants permission to update the entire list of server certificate thumbprints that are associated with an OpenID Connect (OIDC) provider resource",
|
|
2307
2307
|
"accessLevel": "Write",
|
|
@@ -2316,7 +2316,7 @@
|
|
|
2316
2316
|
"conditionKeys": [],
|
|
2317
2317
|
"dependentActions": []
|
|
2318
2318
|
},
|
|
2319
|
-
"
|
|
2319
|
+
"updaterole": {
|
|
2320
2320
|
"name": "UpdateRole",
|
|
2321
2321
|
"description": "Grants permission to update the description or maximum session duration setting of a role",
|
|
2322
2322
|
"accessLevel": "Write",
|
|
@@ -2331,7 +2331,7 @@
|
|
|
2331
2331
|
"conditionKeys": [],
|
|
2332
2332
|
"dependentActions": []
|
|
2333
2333
|
},
|
|
2334
|
-
"
|
|
2334
|
+
"updateroledescription": {
|
|
2335
2335
|
"name": "UpdateRoleDescription",
|
|
2336
2336
|
"description": "Grants permission to update only the description of a role",
|
|
2337
2337
|
"accessLevel": "Write",
|
|
@@ -2346,7 +2346,7 @@
|
|
|
2346
2346
|
"conditionKeys": [],
|
|
2347
2347
|
"dependentActions": []
|
|
2348
2348
|
},
|
|
2349
|
-
"
|
|
2349
|
+
"updatesamlprovider": {
|
|
2350
2350
|
"name": "UpdateSAMLProvider",
|
|
2351
2351
|
"description": "Grants permission to update the metadata document for an existing SAML provider resource",
|
|
2352
2352
|
"accessLevel": "Write",
|
|
@@ -2361,7 +2361,7 @@
|
|
|
2361
2361
|
"conditionKeys": [],
|
|
2362
2362
|
"dependentActions": []
|
|
2363
2363
|
},
|
|
2364
|
-
"
|
|
2364
|
+
"updatesshpublickey": {
|
|
2365
2365
|
"name": "UpdateSSHPublicKey",
|
|
2366
2366
|
"description": "Grants permission to update the status of an IAM user's SSH public key to active or inactive",
|
|
2367
2367
|
"accessLevel": "Write",
|
|
@@ -2376,7 +2376,7 @@
|
|
|
2376
2376
|
"conditionKeys": [],
|
|
2377
2377
|
"dependentActions": []
|
|
2378
2378
|
},
|
|
2379
|
-
"
|
|
2379
|
+
"updateservercertificate": {
|
|
2380
2380
|
"name": "UpdateServerCertificate",
|
|
2381
2381
|
"description": "Grants permission to update the name or the path of the specified server certificate stored in IAM",
|
|
2382
2382
|
"accessLevel": "Write",
|
|
@@ -2391,7 +2391,7 @@
|
|
|
2391
2391
|
"conditionKeys": [],
|
|
2392
2392
|
"dependentActions": []
|
|
2393
2393
|
},
|
|
2394
|
-
"
|
|
2394
|
+
"updateservicespecificcredential": {
|
|
2395
2395
|
"name": "UpdateServiceSpecificCredential",
|
|
2396
2396
|
"description": "Grants permission to update the status of a service-specific credential to active or inactive for an IAM user",
|
|
2397
2397
|
"accessLevel": "Write",
|
|
@@ -2406,7 +2406,7 @@
|
|
|
2406
2406
|
"conditionKeys": [],
|
|
2407
2407
|
"dependentActions": []
|
|
2408
2408
|
},
|
|
2409
|
-
"
|
|
2409
|
+
"updatesigningcertificate": {
|
|
2410
2410
|
"name": "UpdateSigningCertificate",
|
|
2411
2411
|
"description": "Grants permission to update the status of the specified user signing certificate to active or disabled",
|
|
2412
2412
|
"accessLevel": "Write",
|
|
@@ -2421,7 +2421,7 @@
|
|
|
2421
2421
|
"conditionKeys": [],
|
|
2422
2422
|
"dependentActions": []
|
|
2423
2423
|
},
|
|
2424
|
-
"
|
|
2424
|
+
"updateuser": {
|
|
2425
2425
|
"name": "UpdateUser",
|
|
2426
2426
|
"description": "Grants permission to update the name or the path of the specified IAM user",
|
|
2427
2427
|
"accessLevel": "Write",
|
|
@@ -2436,7 +2436,7 @@
|
|
|
2436
2436
|
"conditionKeys": [],
|
|
2437
2437
|
"dependentActions": []
|
|
2438
2438
|
},
|
|
2439
|
-
"
|
|
2439
|
+
"uploadcloudfrontpublickey": {
|
|
2440
2440
|
"name": "UploadCloudFrontPublicKey",
|
|
2441
2441
|
"description": "Grants permission to upload a CloudFront public key",
|
|
2442
2442
|
"accessLevel": "Write",
|
|
@@ -2444,7 +2444,7 @@
|
|
|
2444
2444
|
"conditionKeys": [],
|
|
2445
2445
|
"dependentActions": []
|
|
2446
2446
|
},
|
|
2447
|
-
"
|
|
2447
|
+
"uploadsshpublickey": {
|
|
2448
2448
|
"name": "UploadSSHPublicKey",
|
|
2449
2449
|
"description": "Grants permission to upload an SSH public key and associate it with the specified IAM user",
|
|
2450
2450
|
"accessLevel": "Write",
|
|
@@ -2459,7 +2459,7 @@
|
|
|
2459
2459
|
"conditionKeys": [],
|
|
2460
2460
|
"dependentActions": []
|
|
2461
2461
|
},
|
|
2462
|
-
"
|
|
2462
|
+
"uploadservercertificate": {
|
|
2463
2463
|
"name": "UploadServerCertificate",
|
|
2464
2464
|
"description": "Grants permission to upload a server certificate entity for the AWS account",
|
|
2465
2465
|
"accessLevel": "Write",
|
|
@@ -2477,7 +2477,7 @@
|
|
|
2477
2477
|
],
|
|
2478
2478
|
"dependentActions": []
|
|
2479
2479
|
},
|
|
2480
|
-
"
|
|
2480
|
+
"uploadsigningcertificate": {
|
|
2481
2481
|
"name": "UploadSigningCertificate",
|
|
2482
2482
|
"description": "Grants permission to upload an X.509 signing certificate and associate it with the specified IAM user",
|
|
2483
2483
|
"accessLevel": "Write",
|