本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWSRolesAnywhereFullAccess
描述:提供对 IAM Roles Anywhere 资源的所有权限,包括但不限于: CreateProfile、 DeleteTrustAnchor、disableCrl、。 ResetNotificationSettings
AWSRolesAnywhereFullAccess
是一项 AWS 托管式策略。
使用此策略
您可以将 AWSRolesAnywhereFullAccess
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:世界标准时间 2025 年 7 月 16 日 14:52
-
编辑时间:世界标准时间 2025 年 7 月 16 日 14:52
-
ARN:
arn:aws:iam::aws:policy/AWSRolesAnywhereFullAccess
策略版本
策略版本:v1(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "TrustAnchors", "Effect" : "Allow", "Action" : [ "rolesanywhere:ListTrustAnchors", "rolesanywhere:GetTrustAnchor", "rolesanywhere:CreateTrustAnchor", "rolesanywhere:DeleteTrustAnchor", "rolesanywhere:DisableTrustAnchor", "rolesanywhere:EnableTrustAnchor", "rolesanywhere:UpdateTrustAnchor" ], "Resource" : [ "arn:aws:rolesanywhere:*:*:trust-anchor/*" ] }, { "Sid" : "Profiles", "Effect" : "Allow", "Action" : [ "rolesanywhere:ListProfiles", "rolesanywhere:GetProfile", "rolesanywhere:CreateProfile", "rolesanywhere:DeleteProfile", "rolesanywhere:DisableProfile", "rolesanywhere:EnableProfile", "rolesanywhere:UpdateProfile" ], "Resource" : [ "arn:aws:rolesanywhere:*:*:profile/*" ] }, { "Sid" : "CRLs", "Effect" : "Allow", "Action" : [ "rolesanywhere:ListCrls", "rolesanywhere:GetCrl", "rolesanywhere:DeleteCrl", "rolesanywhere:DisableCrl", "rolesanywhere:EnableCrl", "rolesanywhere:ImportCrl", "rolesanywhere:UpdateCrl" ], "Resource" : [ "arn:aws:rolesanywhere:*:*:crl/*" ] }, { "Sid" : "Subjects", "Effect" : "Allow", "Action" : [ "rolesanywhere:ListSubjects", "rolesanywhere:GetSubject" ], "Resource" : [ "arn:aws:rolesanywhere:*:*:subject/*" ] }, { "Sid" : "OtherRolesAnywherePermissions", "Effect" : "Allow", "Action" : [ "rolesanywhere:PutAttributeMapping", "rolesanywhere:DeleteAttributeMapping", "rolesanywhere:ResetNotificationSettings", "rolesanywhere:ListTagsForResource", "rolesanywhere:TagResource", "rolesanywhere:UntagResource", "rolesanywhere:PutNotificationSettings" ], "Resource" : "*" }, { "Sid" : "PassRoleToRolesAnywhere", "Effect" : "Allow", "Action" : "iam:PassRole", "Resource" : "*", "Condition" : { "StringEquals" : { "iam:PassedToService" : "rolesanywhere.amazonaws.com" } } }, { "Sid" : "CreateRolesAnywhereServiceLinkedRole", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "*", "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "rolesanywhere.amazonaws.com" } } } ] }