Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Authentication and access in AWS Cloud WAN

Focus mode
Authentication and access in AWS Cloud WAN - AWS Network Manager

AWS Cloud WAN uses service-linked roles for the permissions that it requires to call other AWS services on your behalf. For more information on the Network Manager service-lined role, see AWS Global Networks for Transit Gateways service-linked roles.

Identity and access management for AWS Cloud WAN

AWS Identity and Access Management (IAM) is an AWS service that helps an administrator securely control access to AWS resources. IAM administrators control who can be authenticated (signed in) and authorized (have permissions) to use AWS Cloud WAN resources. IAM is an AWS service that you can use with no additional charge. You can use features of IAM to allow other users, services, and applications to use your AWS resources fully or in a limited way, without sharing your security credentials.

By default, IAM users don't have permission to create, view, or modify AWS resources. To allow an IAM user to access resources, such as a global network, and perform tasks, you must:

  • Create an IAM policy that grants the user permission to use the specific resources and API actions they need

  • Attach the policy to the IAM user or to the group to which the user belongs

When you attach a policy to a user or group of users, it allows or denies the user permissions to perform the specified tasks on the specified resources.

Important

If you grant access to a global network you grant access to all AWS service data associated with the core network edges across all AWS Regions. For more information, see How Network Manager works with IAM.

Condition keys

The Condition element (or Condition block) lets you specify conditions in which a statement is in effect. The Condition element is optional. You can build conditional expressions that use condition operators, such as equals or less than, to match the condition in the policy with values in the request. For more information, see IAM JSON policy elements: Condition operators in the AWS Identity and Access Management User Guide.

If you specify multiple Condition elements in a statement, or multiple keys in a single Condition element, AWS evaluates them using a logical AND operation. If you specify multiple values for a single condition key, AWS evaluates the condition using a logical OR operation. All of the conditions must be met before the statement's permissions are granted.

You can also use placeholder variables when you specify conditions. For example, you can grant an IAM user permission to access a resource only if it is tagged with their IAM user name.

You can attach tags to AWS Cloud WAN resources or pass tags in a request to Cloud WAN. To control access based on tags, you provide tag information in the condition element of a policy using the aws:ResourceTag/key-name, aws:RequestTag/key-name, or aws:TagKeys condition keys. See IAM JSON policy elements: Condition in the AWS Identity and Access Management User Guide for more information.

To see all AWS global condition keys, see AWS global condition context keys in the AWS Identity and Access Management User Guide.

AWS Cloud WAN supports the following condition keys:

  • networkmanager:vpcArn — Filters access by which VPC can be used to create or update an attachment.

  • networkmanager:subnetArns — Filters access by which VPC subnets can be added or removed from a VPC attachment.

  • networkmanager:vpnConnectionArn — Filters access by which site-to-site VPN can be used to create or update an attachment.

For more information see the following:

Tag core network resources

A tag is a metadata label that either you or AWS assigns to an AWS resource. Each tag consists of a key and a value. For tags that you assign, you define the key and the value. For example, you might define the key as purpose and the value as test for one resource. Tags help you do the following:

  • Identify and organize your AWS resources. Many AWS services support tagging, so you can assign the same tag to resources from different services to indicate that the resources are related.

  • Control access to your AWS resources. For more information, see Controlling access to AWS resources using tags in the AWS Identify and Access Management User Guide.

Supported resources

The following core network resources support tagging:

  • Core network

  • Core network attachments

  • Connect peer

For tagging supported resources, see Tag your Network Manager resources.

PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.