Using service-linked roles for Systems Manager - AWS Systems Manager

Using service-linked roles for Systems Manager

AWS Systems Manager uses AWS Identity and Access Management (IAM) service-linked roles. A service-linked role is a unique type of IAM role that is linked directly to Systems Manager. Service-linked roles are predefined by Systems Manager and include all the permissions that the service requires to call other AWS services on your behalf.

Note

A service role role differs from a service-linked role. A service role is a type of AWS Identity and Access Management (IAM) role that grants permissions to an AWS service so that the service can access AWS resources. Only a few Systems Manager scenarios require a service role. When you create a service role for Systems Manager, you choose the permissions to grant so that it can access or interact with other AWS resources.

You can use the Systems Manager service-linked role AWSServiceRoleforAmazonSSM for the following:

  • The Systems Manager Inventory capability uses the service-linked role AWSServiceRoleforAmazonSSM to collect inventory metadata from tags and resource groups.

  • The Explorer capability uses the service-linked role AWSServiceRoleforAmazonSSM to enable viewing OpsData and OpsItems from multiple accounts. This service-linked role also allows Explorer to create a managed rule when you enable Security Hub as a data source from Explorer or OpsCenter.