AWS Identity and Access Management
User Guide

AWS: Allows Specific Access Using MFA Within Specific Dates

This example shows how you might create a policy that uses multiple conditions, which are evaluated using a logical AND. It allows full access to the service named SERVICE-NAME-1, and access to the ACTION-NAME-A and ACTION-NAME-B actions in the service named SERVICE-NAME-2. These actions are allowed only when the user is authenticated using multifactor authentication (MFA). Access is restricted to actions that occur between July 1, 2017 and December 31, 2017 (UTC), inclusive. This policy grants the permissions necessary to complete this action from the AWS API or AWS CLI only. To use this policy, replace the red italicized text in the example policy with your own information.

To learn about using multiple conditions within the Condition block of an IAM policy, see Multiple Values in a Condition.

{ "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": [ "<SERVICE-NAME-1>:*", "<SERVICE-NAME-2>:<ACTION-NAME-A>", "<SERVICE-NAME-2>:<ACTION-NAME-B>" ], "Resource": "*", "Condition": { "Bool": {"aws:MultiFactorAuthPresent": true}, "DateGreaterThan": {"aws:CurrentTime": "2017-07-01T00:00:00Z"}, "DateLessThan": {"aws:CurrentTime": "2017-12-31T23:59:59Z"} } } }