1 réponse
- Le plus récent
- Le plus de votes
- La plupart des commentaires
1
Hi
I think you can add another permission on the policy to recheck if the issue persists again.
{
"Sid": "IAM1",
"Effect": "Allow",
"Action": [ "iam:PassRole","iam:GetRole" ],
"Resource": [ "arn:aws:iam:::role/Pentest-EC2-Role" ],
"Condition": { "StringEquals": { "iam:PassedToService": "ec2.amazonaws.com" },
"StringLike": { "iam:AssociatedResourceARN": [ "arn:aws:ec2:us-west-2::instance/" ] } }
}
Check the EC2 trusted policy is there and its correct.
Test the Policies: You can use AWS IAM simulator to check if the policy permissions are okay https://policysim.aws.amazon.com/home/index.jsp?#
répondu il y a 2 ans
Contenus pertinents
- demandé il y a un an
- demandé il y a 10 mois
- demandé il y a un an
- AWS OFFICIELA mis à jour il y a 3 ans
- AWS OFFICIELA mis à jour il y a 3 mois
- AWS OFFICIELA mis à jour il y a 2 ans
Thanks you! I need to take away the condition from policy! And works)