Failure to Grant Permissions to Create & Manage Access Keys on AWS console

0

I wanted to allow a general user to create and manage access key on AWS console. To grant those permissions to that user, I created 2 IAM policies below referring to https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html .

{ "Version": "2012-10-17", "Statement": [ { "Sid": "CreateOwnAccessKeys", "Effect": "Allow", "Action": [ "iam:CreateAccessKey", "iam:GetUser", "iam:ListAccessKeys" ], "Resource": "arn:aws:iam::*:user/${aws:username}" } ] }

{ "Version": "2012-10-17", "Statement": [ { "Sid": "ManageOwnAccessKeys", "Effect": "Allow", "Action": [ "iam:CreateAccessKey", "iam:DeleteAccessKey", "iam:GetAccessKeyLastUsed", "iam:GetUser", "iam:ListAccessKeys", "iam:UpdateAccessKey" ], "Resource": "arn:aws:iam::*:user/${aws:username}" } ] }

With the 2 IAM policies, still, that user could not create and manage access key on AWS console and found error messages as follows.

User: arn:aws:iam::711268734740:user/testuser is not authorized to perform: iam:ListAccessKeys on resource: user testuser with an explicit deny in an identity-based policy

How do I grant permissions to that user to create and manage own access keys?

已提问 1 年前420 查看次数
1 回答
0
已接受的回答

Explicitly created deny statements take precedence over any allow rules for same action. Are you creating a statement such as "Action: iam:*, Effect: Deny" other than the two policies? The error message indicates that there is an explicit deny rule for "iam:ListAccessKeys".

imiky
已回答 1 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则