Epic: IAM SOS MVP
Implement this scenario across all SDKs and use the service action calls to create API examples.
Scenario
Assume a role with limited permissions
How to let a user assume a role with limited permissions and perform actions on an AWS service.
- Create a user that has no permissions.
- Create a role and policy that grant s3:ListAllMyBuckets permission.
- Grant the user permission to assume the role.
- Create an S3 client object as the user and try to list buckets (this should fail).
- Get temporary credentials by assuming the role.
- Create an S3 client object with the temporary credentials and list the buckets (this should succeed).
- Delete all the resources.
Service actions
These are the top customer actions per metrics and must be included as single-API examples.
ListRoles GetRole ListUsers ListPolicies ListGroups CreateServiceLinkedRole AttachRolePolicy CreateRole GetAccountPasswordPolicy ListAttachedRolePolicies ListSAMLProviders GetPolicy ListRolePolicies
These additional actions are used in the above scenario and may also be included as single-API examples.
CreateUser CreateAccessKeyPair CreatePolicy CreateUserPolicy STS:AssumeRole DetachRolePolicy DeletePolicy DeleteRole DeleteUserPolicy DeleteAccessKeys DeleteUser
Prototype
User stories
- [x] #2561
- [x] #2645
- [x] #2652
- [x] #2653
- [x] #2646
- [x] #2647
- [x] #2648
- [x] #2654
- [x] #2649
- [x] #2650
- [ ] #3590