AWS services or capabilities described in AWS Documentation may vary by region/location. Click Getting Started with Amazon AWS to see specific differences applicable to the China (Beijing) Region.
Get-IAMContextKeysForPrincipalPolicy-PolicyInputList <String[]>-PolicySourceArn <String>-Select <String>-ClientConfig <AmazonIdentityManagementServiceConfig>
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Required? | True | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Aliases | AK | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByValue, ByPropertyName) | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByValue, ByPropertyName) | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Aliases | AWSProfilesLocation, ProfilesLocation | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Aliases | StoredCredentials, AWSProfileName | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Aliases | RegionToCall | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Aliases | SK, SecretAccessKey | 
| Required? | False | 
| Position? | Named | 
| Accept pipeline input? | True (ByPropertyName) | 
| Aliases | ST | 
$policy1 = '{"Version":"2012-10-17","Statement":{"Effect":"Allow","Action":"dynamodb:*","Resource":"arn:aws:dynamodb:us-west-2:123456789012:table/","Condition":{"DateGreaterThan":{"aws:CurrentTime":"2015-08-16T12:00:00Z"}}}}'
$policy2 = '{"Version":"2012-10-17","Statement":{"Effect":"Allow","Action":"dynamodb:*","Resource":"arn:aws:dynamodb:us-west-2:123456789012:table/"}}'
Get-IAMContextKeysForPrincipalPolicy -PolicyInputList $policy1,$policy2 -PolicySourceArn arn:aws:iam::852640994763:user/TestUserThis example fetches all the context keys present in the provided policy json and the policies attached to IAM entity(user/role etc.). For -PolicyInputList you can provide multiple values list as comma separated values.
AWS Tools for PowerShell: 2.x.y.z