Identity and access management for WorkSpaces Instances - Amazon WorkSpaces Core

Identity and access management for WorkSpaces Instances

By default, IAM users don't have permissions for WorkSpaces Instances resources and operations. To allow IAM users to manage WorkSpaces resources Instances, you must create an IAM policy that explicitly grants them permissions, and attach the policy to the IAM users or groups that require those permissions.

To provide access, add permissions to your users, groups, or roles:

Following are additional resources for IAM:

Amazon WorkSpaces Instances example policies

The following example shows policy statements that you could use to grant access to perform WorkSpaces Instances tasks.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "workspaces-instances:*" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "ec2:CreateTags", "ec2:DescribeVolumes", "ec2:DescribeInstances", "ec2:DescribeInstanceStatus" "ec2:StopInstances", "ec2:StartInstances", ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "ec2:RunInstances", "ec2:TerminateInstances", "ec2:DeleteVolume", "ec2:CreateVolume", "ec2:AttachVolume", "ec2:DetachVolume" ], "Resource": "*", "Condition": { "ForAnyValue:StringEquals": { "aws:CalledVia": "workspaces-instances.amazonaws.com" } } }, { "Effect": "Allow", "Action": [ "kms:Encrypt", "kms:Decrypt", "kms:GenerateDataKey*" ], "Resource": "*" } ] }
Note

In place of *, grant permissions to the specific KMS key that you are using.

If you are using the Amazon WorkSpaces Console, you will also need to add the following permissions:

iam:GetRole iam:CreateServiceLinkedRole
Note

If you have already onboarded using Amazon WorkSpaces Console, iam:CreateServiceLinkedRole is optional.

Additional permissions may be required for specific partner requirements. For more information on partner permissions, refer to your partner specific guides.

Specify WorkSpaces resources in an IAM policy

To specify an WorkSpaces Instances resource in the Resource element of the policy statement, use the Amazon Resource Name (ARN) of the resource. You control access to your WorkSpaces Instances resources by either allowing or denying permissions to use the API actions that are specified in the Action element of your IAM policy statement. WorkSpaces Instances defines ARNs for WorkSpaces Instances, bundles, IP groups, and directories.

WorkSpaces Instances Instance ARN

A WorkSpaces Instances ARN has the syntax shown in the following example.

arn:aws:workspaces-instances:region:account_id:workspaceinstance/workspace_instance_identifier
region

The Region that the WorkSpaces Instance is in (for example, us-east-1).

account_id

The ID of the AWS account, with no hyphens (for example, 123456789012).

workspace_instance_identifier

The ID of the WorkSpaces Instance (for example, "Resource": "arn:aws:workspaces-instances:region:account_id:workspaceinstance/workspace_instance_identifier").

You can use the * wildcard to specify all WorkSpaces Instances that belong to a specific account in a specific Region.