Menu
AWS Identity and Access Management
User Guide

AWS Services That Work with IAM

Many AWS services are integrated with AWS Identity and Access Management. The following tables group these services by category and show the IAM permission types each service supports, tips to help you write policies to control service access, and links to related information.

Specifically, each table provides the following information:

  • Action-level permissions. The service supports specifying individual actions in a policy's Action element. If the service does not support action-level permissions, policies for the service use * in the Action element. For a list of all of the permissions for the AWS services can be used in IAM policies, see AWS Service Actions and Condition Context Keys for Use in IAM Policies.

  • Resource-level permissions. The service has one or more APIs that support specifying individual resources (using ARNs) in the policy's Resource element. If an API does not support resource-level permissions then that statement in the policy must use * in the Resource element. See the footnotes after each table for more information.

  • Resource-based permissions. The service enables you to attach policies to the service's resources in addition to IAM users, groups, and roles. The policies specify who can access that resource by including a Principal element.

  • Tag-based permissions. The service supports testing resource tags in a Condition element.

  • Temporary security credentials. The service lets users make requests using temporary security credentials that are obtained by calling AWS STS APIs like AssumeRole or GetFederationToken. Temporary credentials are commonly used in federation scenarios. For more information, see Temporary Security Credentials.

  • More information. Links to more information in the documentation of the product.

Compute Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon Elastic Compute Cloud (Amazon EC2)YesYes¹NoYes¹Yes
Amazon EC2 Container Registry (Amazon ECR)YesYesNoYes
Amazon EC2 Container Service (Amazon ECS)YesYes²NoNoYes
AWS Elastic BeanstalkYesYes³NoNoYes
AWS LambdaYesYesYes⁴NoYes
Auto ScalingYesNoNoNoYes
Elastic Load BalancingYesYes⁵NoNoYes

¹ Amazon EC2 supports resource-level permissions and tags only for some APIs. For more information, see Supported Resources and Conditions for Amazon EC2 API Actions in the Amazon EC2 User Guide for Linux Instances.

² Amazon ECS supports resource-level permissions only for some APIs. For more information, see Supported Resource-Level Permissions for Amazon ECS API Actions in the Amazon EC2 Container Service Developer Guide.

³ Only some API actions for Elastic Beanstalk can be used as permissions against specific resources. For more information, see Resources and Conditions for Elastic Beanstalk Actions in the AWS Elastic Beanstalk Developer Guide.

⁴ The only AWS Lambda API action that can be specified in a resource-based policy is lambda:InvokeFunction. For more information, see Using Resource-Based Policies for AWS Lambda (Lambda Function Policies) in the AWS Lambda Developer Guide.

⁵ Only some API actions for Elastic Load Balancing can be used as permissions against specific resources. For more information, see Control Access to Your Load Balancer in the Elastic Load Balancing User Guide.

Storage and Content Delivery Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon Simple Storage Service (Amazon S3)YesYesYesYesYes
Amazon Elastic Block Store (Amazon EBS)YesYes¹NoYesYes
Amazon EFSYesYesNoNoYes
Amazon GlacierYesYesYesYesYes
AWS Snowball and AWS Snowball EdgeYesNoNoNoYes
AWS Storage GatewayYesYesNoNoYes

¹ For information about which EBS actions support resource-level permissions, see Supported Resources and Conditions for Amazon EC2 API Actions in the Amazon EC2 User Guide for Linux Instances.

Database Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon Relational Database Service (Amazon RDS)YesYesNoYesYes
Amazon DynamoDBYesYesNoNoYes
Amazon ElastiCacheYesNoNoNoYes
Amazon RedshiftYesYesNoNoYes
Amazon SimpleDBYesYesNoNoYes

Networking and Content Delivery Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon Virtual Private Cloud (Amazon VPC)YesYes¹Yes²YesYes

Amazon CloudFront

Yes³NoNoNoYes
AWS Direct ConnectYesNoNoNoYes
Amazon Route 53YesYesNoNoYes

¹ In an IAM user policy, you cannot restrict permissions to a specific Amazon VPC endpoint. Any Action element that includes the ec2:*VpcEndpoint* or ec2:DescribePrefixLists API actions must specify ""Resource": "*"". For more information, see Controlling the Use of Endpoints in the Amazon VPC User Guide.

² Amazon VPC supports attaching a single resource policy to a VPC endpoint to restrict what can be accessed through that endpoint. For more information about using resource-based policies to control access to resources from specific Amazon VPC endpoints, see Using Endpoint Policies in the Amazon VPC User Guide.

³ CloudFront does not support action-level permissions for creating CloudFront key pairs. You must use an AWS root account to create a CloudFront key pair. For more information, see Creating CloudFront Key Pairs for Your Trusted Signers in the Amazon CloudFront Developer Guide.

Migration Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
AWS Import/ExportYesNoNoNoYes

Developer Tools and Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
AWS CodeCommitYesYesNoNoYes
AWS CodeBuildYesYesNoNoYes
AWS CodeDeployYesYesNoNoYes
AWS CodePipelineYesYes¹NoNoYes

¹ Only some API actions for AWS CodePipeline can be used as permissions against specific resources. For more information, see the "Operation and Resource Syntax" section of AWS CodePipeline Access Permissions Reference in the AWS CodePipeline User Guide.

Management Tools and Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon CloudWatchYesNoNoNoYes
Amazon CloudWatch EventsYesYesNoNoYes
Amazon CloudWatch LogsYesYesNoNoYes
AWS CloudFormationYesYesNoNoYes
AWS CloudTrailYesYesNoNoYes
AWS ConfigYesNoNoNoYes
AWS OpsWorksYesYesYesNoYes
AWS Service CatalogYesYesNoNoYes
AWS Trusted AdvisorYesYesNoNoYes
AWS HealthYesNoNoNoYes

Security, Identity, and Compliance Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
AWS Identity and Access Management (IAM)YesYesNoNoYes¹
AWS Security Token Service (AWS STS)YesYes²NoNoYes²
AWS ArtifactYesYesNoNoYes
AWS Certificate Manager (ACM)YesYesNoNoYes
AWS Directory ServiceYesNoNoNoYes
AWS CloudHSMYesNoNoNoNo
AWS Key Management Service (AWS KMS)YesYesYesNoYes
AWS WAFYesYesNoNoYes

¹ Only some of the API actions for IAM can be called with temporary credentials. For more information, see Comparing your API options

² AWS STS does not have "resources", but does allow restricting access in a similar way to users. For more information, see Denying Access to Temporary Security Credentials by Name. Only some of the APIs for AWS STS support calling with temporary credentials. For more information, see Comparing your API options.

Analytics Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon EMRYesNoNoYesYes
Amazon CloudSearchYesYesNoNoYes
Amazon Elasticsearch ServiceYesYesYesNoYes
Amazon KinesisYesYesNoNoYes
Amazon Kinesis AnalyticsYesYesNoNoYes
AWS Data PipelineYesYesNoYesYes

Artificial Intelligence

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon PollyYesYesNoNoYes
Amazon Machine LearningYesYesNoNoYes

Internet of Things

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
AWS IoTYes¹Yes²Yes³NoYes

¹ For more information about AWS IoT action-level permissions, see AWS IoT Policy Actions in the AWS IoT User Guide.

² For information about which AWS IoT actions support resource-level permissions and which resources you can specify for each, see Action Resources in the AWS IoT Developer Guide.

³ Devices connected to AWS IoT are authenticated by using X.509 certificates. You can attach AWS IoT policies to an X.509 certificate to control what the device is authorized to do. For more information, see Create an AWS IoT Policy in the AWS IoT Developer Guide.

Game Development Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon GameLiftYesNoNoNoYes

Mobile Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon CognitoYesYesNoNoYes
AWS Device FarmYesNoNoNoYes
Amazon Mobile AnalyticsYesNoNoNoYes
Amazon PinpointYesYesNoNoYes

Application Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon API GatewayYesYesNoNoYes
Amazon Elastic TranscoderYesYesNoNoYes
Amazon Simple Workflow Service (Amazon SWF)YesYesNoYesYes

Messaging Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon Simple Notification Service (Amazon SNS)YesYesYesNoYes
Amazon Simple Email Service (Amazon SES)YesYes¹NoNoYes²
Amazon Simple Queue Service (Amazon SQS)YesYesYesNoYes

¹ Amazon SES supports resource-level permissions in policies that grant permissions to delegate senders to access specific SES identities.

² Only the Amazon SES API supports temporary security credentials. The Amazon SES SMTP interface does not support SMTP credentials that are derived from temporary security credentials.

Business Productivity

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon WorkDocsYesNoNoNoYes
Amazon WorkMailYesNoNoNoYes

Desktop and App Streaming Services

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
Amazon WorkSpacesYesYesNoNoYes
Amazon WAMYesNoNoNoYes
Amazon AppStreamYesNoNoNoYes
Amazon AppStream 2.0YesNoNoNoYes

Additional Resources

 

Service and Related IAM Info
Supports the following permissions
Action LevelResource LevelResource BasedTag BasedTemporary Credentials
AWS Billing and Cost ManagementYesNoNoNoYes
AWS MarketplaceYesYesNoNoYes
AWS SupportNoNoNoNoYes
AWS Trusted AdvisorYes¹YesNoNoYes¹

¹ API access to Trusted Advisor is through the AWS Support API and is controlled by AWS Support IAM policies.