not authorized to perform: sts:AssumeRole

0

AWSSecurityTokenServiceException: User: arn:aws:iam::xxx is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::xxx (Service: AWSSecurityTokenService; Status Code: 403; Error Code: AccessDenied; Request ID: xxx; Proxy: null) at io.mitigant.mitigantapi.aws.ssmdocuments.AWSSimpleSystemsManagementDocumentsSecurityRule.lambda$apply$5(AWSSimpleSystemsManagementDocumentsSecurityRule.java:66) ... (39 additional frame(s) were not displayed)

CompletionException: com.amazonaws.services.securitytoken.model.AWSSecurityTokenServiceException: User: arn:aws:iam::xxx is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::xxx (Service: AWSSecurityTokenService; Status Code: 403; Error Code: AccessDenied; Request ID: xxx; Proxy: null) at java.util.concurrent.CompletableFuture.encodeThrowable(CompletableFuture.java:314) at java.util.concurrent.CompletableFuture.completeThrowable(CompletableFuture.java:319) at java.util.concurrent.CompletableFuture$AsyncSupply.run(CompletableFuture.java:1702) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) ...

Free free to send us meeting invite online also

(1 additional frame(s) were not displayed)

2回答
1

Here is an AWS Support Knowledge Center article that may give you pointers on how to debug this - https://aws.amazon.com/premiumsupport/knowledge-center/iam-assume-role-error/

profile pictureAWS
エキスパート
回答済み 2年前
0

Just to add a bit more detail to Indranil's answer: Your IAM User does not have permission to call the sts:AssumeRole action to assume the role.

Adding that permission to the user (for the role resource that you're attempting to assume) will fix the error.

profile picture
rowanu
回答済み 2年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ