Use service-linked roles for Verified Access
AWS Verified Access uses an IAM service-linked role, which is a type of IAM role that is linked directly to an AWS service. The service-linked roles for Verified Access are defined by Verified Access and include all the permissions that the service requires to call other AWS services on your behalf.
A service-linked role makes setting up Verified Access easier because you don’t have to manually add the necessary permissions. Verified Access defines the permissions of its service-linked roles, and unless defined otherwise, only Verified Access can assume its roles. The defined permissions include the trust policy and the permissions policy, and this permissions policy cannot be attached to any other IAM entity.
Service-linked role permissions for Verified Access
Verified Access uses the service-linked role named AWSServiceRoleForVPCVerifiedAccess to provision resources in your account that are required to use the service.
The AWSServiceRoleForVPCVerifiedAccess service-linked role trusts the following services to assume the role:
-
verified-access.amazonaws.com
The role permissions policy, named AWSVPCVerifiedAccessServiceRolePolicy, allows Verified Access to complete the following actions on the specified resources:
-
Action
ec2:CreateNetworkInterface
on all subnets and security groups, as well as all network interfaces with the tagVerifiedAccessManaged=true
-
Action
ec2:CreateTags
on all network interfaces at creation time -
Action
ec2:DeleteNetworkInterface
on all network interfaces with the tagVerifiedAccessManaged=true
-
Action
ec2:ModifyNetworkInterfaceAttribute
on all security groups and all network interfaces with the tagVerifiedAccessManaged=true
You can also view the permissions for this policy in the AWS Managed Policy Reference Guide; see AWSVPCVerifiedAccessServiceRolePolicy.
You must configure permissions to allow an IAM entity (such as a user, group, or role) to create, edit, or delete a service-linked role. For more information, see Service-linked role permissions in the IAM User Guide.
Create a service-linked role for Verified Access
You don't need to manually create a service-linked role. When you call CreateVerifiedAccessEndpoint in the AWS Management Console, the AWS CLI, or the AWS API, Verified Access creates the service-linked role for you.
If you delete this service-linked role, and then need to create it again, you can use the same process to recreate the role in your account. When you call CreateVerifiedAccessEndpoint once again, Verified Access creates the service-linked role for you again.
Edit a service-linked role for Verified Access
Verified Access does not allow you to edit the AWSServiceRoleForVPCVerifiedAccess service-linked role. After you create a service-linked role, you cannot change the name of the role because various entities might reference the role. However, you can edit the description of the role using IAM. For more information, see Edit a service-linked role description in the IAM User Guide.
Delete a service-linked role for Verified Access
You don't need to manually delete the AWSServiceRoleForVPCVerifiedAccess role. When you call DeleteVerifiedAccessEndpoint in the AWS Management Console, the AWS CLI, or the AWS API, Verified Access cleans up the resources and deletes the service-linked role for you.
To manually delete the service-linked role using IAM
Use the IAM console, the AWS CLI, or the AWS API to delete the AWSServiceRoleForVPCVerifiedAccess service-linked role. For more information, see Delete a service-linked role in the IAM User Guide.
Supported Regions for Verified Access service-linked roles
Verified Access supports using service-linked roles in all of the AWS Regions where the service is available. For more information, see AWS Regions and endpoints.