Setting up permissions for AWS IoT Events - AWS IoT Events

Setting up permissions for AWS IoT Events

Implementing proper permissions is important for secure and effective use of AWS IoT Events. This section describes the permissions that are required to use some features of AWS IoT Events. You can use AWS CLI commands or the AWS Identity and Access Management (IAM) console to create roles and associated permission policies to access resources or perform certain functions in AWS IoT Events.

The IAM User Guide has more detailed information about securely controlling permissions to access AWS resources. For information specific to AWS IoT Events, see Actions, resources, and condition keys for AWS IoT Events.

To use the IAM console to create and manage roles and permissions, see IAM tutorial: Delegate access across AWS accounts using IAM roles.

Note

Keys can be 1-128 characters and can include:

  • uppercase or lowercase letters a-z

  • numbers 0-9

  • special characters -, _, or :.