iam_update_assume_role_policy: Updates the policy that grants an IAM entity permission to...

Description Usage Arguments Request syntax Examples

View source: R/iam_operations.R

Description

Updates the policy that grants an IAM entity permission to assume a role. This is typically referred to as the \"role trust policy\". For more information about roles, go to Using Roles to Delegate Permissions and Federate Identities.

Usage

1
iam_update_assume_role_policy(RoleName, PolicyDocument)

Arguments

RoleName

[required] The name of the role to update with the new policy.

This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: \_+=,[email protected]

PolicyDocument

[required] The policy that grants an entity permission to assume the role.

You must provide policies in JSON format in IAM. However, for AWS CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation always converts a YAML policy to JSON format before submitting it to IAM.

The regex pattern used to validate this parameter is a string of characters consisting of the following:

  • Any printable ASCII character ranging from the space character (U+0020) through the end of the ASCII character range

  • The printable characters in the Basic Latin and Latin-1 Supplement character set (through U+00FF)

  • The special characters tab (U+0009), line feed (U+000A), and carriage return (U+000D)

Request syntax

1
2
3
4
svc$update_assume_role_policy(
  RoleName = "string",
  PolicyDocument = "string"
)

Examples

1
2
3
4
5
6
# The following command updates the role trust policy for the role named
# Test-Role:
svc$update_assume_role_policy(
  PolicyDocument = "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",...",
  RoleName = "S3AccessForEC2Instances"
)

paws.security.identity documentation built on Jan. 14, 2020, 5:08 p.m.