I understand that you are trying to write a condition for a resource policy and that you are trying to grant permissions to a role that is assumed with an Administrator Identity.
In order to achieve this, make sure you have created your IAM roles, see reference .
Since you are using a Amazon Resource Name (ARN) condition, please refer to the documentation on reference  for ARN condition operators.
SOMEASSUMEDROLE is the name of the AWS Identity and Access Management (IAM) role you are trying to assume therefore you can refer to reference  for providing access to IAM users.
Please also see reference  for reference identifiers.
Policy that allows only one SSO user to access a resourceAccepted Answerasked 25 days ago
Resource Policy Condition to restrict accessasked 2 months ago
Deny EFS actions to all but specific userAccepted Answerasked 7 months ago
Using EC2 IAM role principal in SecretsManager resource policy together with autoscalingAccepted Answerasked 8 months ago
Policy Condition for federated usersasked a month ago
grant access to one role in another account to all objects in an S3 bucket?asked a year ago
Not Able To Create a New Bucket - Policy Permissions Appear Correctasked 9 months ago
KMS Key policy ignored over IAM RoleAccepted Answerasked 3 years ago
Permission boundary on IAM role trust policyasked 2 months ago
IAM Policy that allows only access to "Switch Role"asked 3 months ago