Basic AWS IoT Core policy variables
AWS IoT Core defines the following basic policy variables:
-
aws:SourceIp
: The IP address of the client connected to the AWS IoT Core message broker. -
iot:ClientId
: The client ID used to connect to the AWS IoT Core message broker. -
iot:DomainName
: The domain name of the client connected to AWS IoT Core.
Examples
Examples of ClientId
and
SourceIp
policy variables
The following AWS IoT Core policy shows a policy that uses policy variables.
aws:SourceIp
can be used in the Condition element of your
policy to allow principals to make API requests only within a specific address
range. For examples, see Authorizing users and cloud services to use
AWS IoT Jobs.
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "iot:Connect" ], "Resource": [ "arn:aws:iot:
us-east-1
:123456789012
:client/clientid1
" ] }, { "Effect": "Allow", "Action": [ "iot:Publish" ], "Resource": [ "arn:aws:iot:us-east-1
:123456789012
:topic/my/topic/${iot:ClientId}
" ], "Condition": { "IpAddress": { "aws:SourceIp": "123.45.167.89
" } } } ] }
In these examples, ${iot:ClientId}
is replaced by the ID of the
client connected to the AWS IoT Core message broker when the policy is evaluated.
When you use policy variables like ${iot:ClientId}
, you can
inadvertently open access to unintended topics. For example, if you use a policy
that uses ${iot:ClientId}
to specify a topic filter:
{ "Effect": "Allow", "Action": [ "iot:Subscribe" ], "Resource": [ "arn:aws:iot:
us-east-1
:123456789012
:topicfilter/my/${iot:ClientId}/topic
" ] }
A client can connect using +
as the client ID. This would allow
the user to subscribe to any topic that matches the topic filter
my/+/topic
. To protect against such security gaps, use the
iot:Connect
policy action to control which client IDs can
connect. For example, this policy allows only those clients whose client ID is
clientid1
to connect:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "iot:Connect" ], "Resource": [ "arn:aws:iot:
us-east-1
:123456789012
:client/clientid
" ] } ] }
Note
Using the policy variable ${iot:ClientId}
with
Connect
is not recommended. There is no check on the value
of ClientId
, so an attacher with a different client's ID can
pass the validation but cause disconnection. Because any
ClientId
is allowed, setting a random client ID can bypass
thing group policies.
Examples of
iot:DomainName
policy variable
You can add the iot:DomainName
policy variable to restrict
which domains are allowed to use. Adding the iot:DomainName
policy variable allows devices to connect to only specific configured
endpoints.
The following policy allows devices to connect to the specified domain.
{ "Version": "2012-10-17", "Statement": { "Sid": "AllowConnectionsToSpecifiedDomain", "Effect": "Allow", "Action": [ "iot:Connect" ], "Resource": "arn:aws:iot:
us-east-1
:123456789012
:client/clientid
", "Condition": { "StringEquals": { "iot:DomainName": "d1234567890abcdefghij-ats.iot.us-east-1.amazonaws.com" } } } }
The following policy denies devices to connect to the specified domain.
{ "Version": "2012-10-17", "Statement": { "Sid": "DenyConnectionsToSpecifiedDomain", "Effect": "Deny", "Action": [ "iot:Connect" ], "Resource": "arn:aws:iot:
us-east-1
:123456789012
:client/clientid
", "Condition": { "StringEquals": { "iot:DomainName": "d1234567890abcdefghij-ats.iot.us-east-1.amazonaws.com" } } } }
For more information about policy conditional operator, see IAM JSON policy elements: Condition operators. For more information about domain configurations, see What is a domain configuration?.