Failure to Grant Permissions to Create & Manage Access Keys on AWS console

0

I wanted to allow a general user to create and manage access key on AWS console. To grant those permissions to that user, I created 2 IAM policies below referring to https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html .

{ "Version": "2012-10-17", "Statement": [ { "Sid": "CreateOwnAccessKeys", "Effect": "Allow", "Action": [ "iam:CreateAccessKey", "iam:GetUser", "iam:ListAccessKeys" ], "Resource": "arn:aws:iam::*:user/${aws:username}" } ] }

{ "Version": "2012-10-17", "Statement": [ { "Sid": "ManageOwnAccessKeys", "Effect": "Allow", "Action": [ "iam:CreateAccessKey", "iam:DeleteAccessKey", "iam:GetAccessKeyLastUsed", "iam:GetUser", "iam:ListAccessKeys", "iam:UpdateAccessKey" ], "Resource": "arn:aws:iam::*:user/${aws:username}" } ] }

With the 2 IAM policies, still, that user could not create and manage access key on AWS console and found error messages as follows.

User: arn:aws:iam::711268734740:user/testuser is not authorized to perform: iam:ListAccessKeys on resource: user testuser with an explicit deny in an identity-based policy

How do I grant permissions to that user to create and manage own access keys?

asked a year ago408 views
1 Answer
0
Accepted Answer

Explicitly created deny statements take precedence over any allow rules for same action. Are you creating a statement such as "Action: iam:*, Effect: Deny" other than the two policies? The error message indicates that there is an explicit deny rule for "iam:ListAccessKeys".

imiky
answered a year ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions