我试图锁定用户帐户,仅限于、Lambda和S3。我能够将权限授予S3和Lambda,但无法找到Amazon的权限。我已经看过文档等等,但是我找不到那个服务的正确名称,所以我可以为它写一份政策。你能帮忙吗?
发布于 2018-03-21 12:44:57
IAM中有一个用于策略的生成器(进入IAM -> policy -> Create),选择connect将给出以下策略:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"connect:DescribeInstance",
"connect:CreateInstance",
"connect:ModifyInstance",
"connect:ListInstances",
"connect:GetFederationTokens",
"connect:DestroyInstance",
"connect:GetFederationToken"
],
"Resource": "*"
}
]
}行动部分有一个警告说:
他们每个人都说:
若要允许实体调用“DescribeInstance”,请授予下列所有所需权限。
若要允许实体调用“CreateInstance”,请授予下列所有所需权限。
若要允许实体调用“ModifyInstance”,请授予下列所有所需权限。
一旦编译,就会在不对任何资源进行过滤时提供以下策略:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"connect:DescribeInstance",
"connect:ModifyInstance",
"connect:GetFederationTokens",
"s3:CreateBucket",
"kinesis:DescribeStream",
"kms:RetireGrant",
"connect:DestroyInstance",
"firehose:DescribeDeliveryStream",
"kinesis:ListStreams",
"connect:CreateInstance",
"s3:ListAllMyBuckets",
"connect:ListInstances",
"kms:ListAliases",
"ds:DescribeDirectories",
"kms:DescribeKey",
"firehose:ListDeliveryStreams",
"ds:CreateAlias",
"kms:CreateGrant",
"connect:GetFederationToken",
"ds:DeleteDirectory"
],
"Resource": "*"
}
]
}https://devops.stackexchange.com/questions/3687
复制相似问题