paws.security.identity (version 0.1.0)

iam_update_assume_role_policy: Updates the policy that grants an IAM entity permission to assume a role

Description

Updates the policy that grants an IAM entity permission to assume a role. This is typically referred to as the "role trust policy". For more information about roles, go to Using Roles to Delegate Permissions and Federate Identities.

Usage

iam_update_assume_role_policy(RoleName, PolicyDocument)

Arguments

RoleName

[required] The name of the role to update with the new policy.

This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: \_+=,.@-

PolicyDocument

[required] The policy that grants an entity permission to assume the role.

The regex pattern used to validate this parameter is a string of characters consisting of the following:

  • Any printable ASCII character ranging from the space character (U+0020) through the end of the ASCII character range

  • The printable characters in the Basic Latin and Latin-1 Supplement character set (through U+00FF)

  • The special characters tab (U+0009), line feed (U+000A), and carriage return (U+000D)

Request syntax

svc$update_assume_role_policy(
  RoleName = "string",
  PolicyDocument = "string"
)

Examples

Run this code
# NOT RUN {
# The following command updates the role trust policy for the role named
# Test-Role:
# }
# NOT RUN {
svc$update_assume_role_policy(
  PolicyDocument = "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",...",
  RoleName = "S3AccessForEC2Instances"
)
# }
# NOT RUN {
# }

Run the code above in your browser using DataLab