Service-linked role permissions for WorkSpaces Secure Browser
WorkSpaces Secure Browser uses the service-linked role named AWSServiceRoleForAmazonWorkSpacesWeb
–
WorkSpaces Secure Browser uses this service-linked role to access Amazon EC2 resources of customer accounts for streaming instances and CloudWatch metrics.
The AWSServiceRoleForAmazonWorkSpacesWeb
service-linked role trusts the following services to assume the
role:
-
workspaces-web.amazonaws.com
The role permissions policy named AmazonWorkSpacesWebServiceRolePolicy
allows WorkSpaces Secure Browser to
complete the following actions on the specified
resources. For more
information, see AWS managed
policy: AmazonWorkSpacesWebServiceRolePolicy.
-
Action:
ec2:DescribeVpcs
onall AWS resources
-
Action:
ec2:DescribeSubnets
onall AWS resources
-
Action:
ec2:DescribeAvailabilityZones
onall AWS resources
-
Action:
ec2:CreateNetworkInterface
withaws:RequestTag/WorkSpacesWebManaged: true
on subnet and security group resources -
Action:
ec2:DescribeNetworkInterfaces
onall AWS resources
-
Action:
ec2:DeleteNetworkInterface
on network interfaces withaws:ResourceTag/WorkSpacesWebManaged: true
-
Action:
ec2:DescribeSubnets
onall AWS resources
-
Action:
ec2:AssociateAddress
onall AWS resources
-
Action:
ec2:DisassociateAddress
onall AWS resources
-
Action:
ec2:DescribeRouteTables
onall AWS resources
-
Action:
ec2:DescribeSecurityGroups
onall AWS resources
-
Action:
ec2:DescribeVpcEndpoints
onall AWS resources
-
Action:
ec2:CreateTags
onec2:CreateNetworkInterface
Operation withaws:TagKeys: ["WorkSpacesWebManaged"]
-
Action:
cloudwatch:PutMetricData
onall AWS resources
-
Action:
kinesis:PutRecord
on Kinesis data streams with names that start withamazon-workspaces-web-
-
Action:
kinesis:PutRecords
on Kinesis data streams with names that start withamazon-workspaces-web-
-
Action:
kinesis:DescribeStreamSummary
on Kinesis data streams with names that start withamazon-workspaces-web-
You must configure permissions to allow an IAM entity (such as a user, group, or role) to create, edit, or delete a service-linked role. For more information, see Service-Linked Role Permissions in the IAM User Guide.