Service Authorization Reference
Service Authorization Reference
Service Authorization Reference
Amazon's trademarks and trade dress may not be used in connection with any product or service that is not
Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or
discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may
or may not be affiliated with, connected to, or sponsored by Amazon.
Service Authorization Reference
Service Authorization Reference
Table of Contents
Reference .......................................................................................................................................... 1
Actions, resources, and condition keys .......................................................................................... 1
Actions table ..................................................................................................................... 1
Resource types table .......................................................................................................... 2
Condition keys table ........................................................................................................... 2
AWS Accounts .................................................................................................................... 9
AWS Activate ................................................................................................................... 10
Alexa for Business ............................................................................................................ 11
AWS Amplify ................................................................................................................... 19
AWS Amplify Admin ......................................................................................................... 23
Amazon API Gateway ........................................................................................................ 28
AWS App Mesh ................................................................................................................ 29
AWS App Mesh Preview .................................................................................................... 35
AWS AppConfig ................................................................................................................ 40
Amazon AppFlow ............................................................................................................. 47
Application Auto Scaling ................................................................................................... 51
Application Discovery ........................................................................................................ 52
Application Discovery Arsenal ............................................................................................ 56
Amazon AppStream 2.0 .................................................................................................... 57
AWS AppSync .................................................................................................................. 66
AWS Artifact .................................................................................................................... 70
Amazon Athena ............................................................................................................... 72
AWS Audit Manager .......................................................................................................... 76
AWS Auto Scaling ............................................................................................................ 82
AWS Backup .................................................................................................................... 83
AWS Backup storage ......................................................................................................... 89
AWS Batch ...................................................................................................................... 90
AWS Billing ...................................................................................................................... 95
Amazon Braket ................................................................................................................ 96
AWS Budget Service ......................................................................................................... 98
AWS Certificate Manager ................................................................................................. 101
AWS Certificate Manager Private Certificate Authority ......................................................... 103
AWS Chatbot ................................................................................................................. 107
Amazon Chime ............................................................................................................... 109
Amazon Cloud Directory .................................................................................................. 132
AWS Cloud Map ............................................................................................................. 139
AWS Cloud9 ................................................................................................................... 142
AWS CloudFormation ...................................................................................................... 146
Amazon CloudFront ........................................................................................................ 156
AWS CloudHSM .............................................................................................................. 162
Amazon CloudSearch ...................................................................................................... 166
AWS CloudShell .............................................................................................................. 169
AWS CloudTrail .............................................................................................................. 171
Amazon CloudWatch ....................................................................................................... 174
CloudWatch Application Insights ...................................................................................... 178
Amazon CloudWatch Logs ............................................................................................... 180
Amazon CloudWatch Synthetics ....................................................................................... 185
AWS CodeArtifact ........................................................................................................... 187
AWS CodeBuild .............................................................................................................. 192
AWS CodeCommit .......................................................................................................... 198
AWS CodeDeploy ............................................................................................................ 208
Amazon CodeGuru .......................................................................................................... 214
Amazon CodeGuru Profiler .............................................................................................. 215
Amazon CodeGuru Reviewer ............................................................................................ 219
iii
Service Authorization Reference
Service Authorization Reference
iv
Service Authorization Reference
Service Authorization Reference
v
Service Authorization Reference
Service Authorization Reference
vi
Service Authorization Reference
Service Authorization Reference
vii
Service Authorization Reference
Service Authorization Reference
Actions, resources, and condition keys
Reference
The Service Authorization Reference provides a list of the actions, resources, and condition keys that are
supported by each AWS service. You can specify actions, resources, and condition keys in AWS Identity
and Access Management (IAM) policies to manage access to AWS resources.
Contents
• Actions, resources, and condition keys for AWS services (p. 1)
• Related resources (p. 1632)
Each topic consists of tables that provide the list of available actions, resources, and condition keys.
• The Access level column describes how the action is classified (List, Read, Write, Permissions
management, or Tagging). This classification can help you understand the level of access that an action
grants when you use it in a policy. For more information about access levels, see Understanding access
level summaries within policy summaries.
• The Resource types column indicates whether the action supports resource-level permissions. If the
column is empty, then the action does not support resource-level permissions and you must specify all
resources ("*") in your policy. If the column includes a resource type, then you can specify the resource
ARN in the Resource element of your policy. For more information about that resource, refer to that
row in the Resource types table. All actions and resources that are included in one statement must be
compatible with each other. If you specify a resource that is not valid for the action, any request to use
that action fails, and the statement's Effect does not apply.
Required resources are indicated in the table with an asterisk (*). If you specify a resource-level
permission ARN in a statement using this action, then it must be of this type. Some actions support
multiple resource types. If the resource type is optional (not indicated as required), then you can
choose to use one but not the other.
• The Condition keys column includes keys that you can specify in a policy statement's Condition
element. Condition keys might be supported with an action, or with an action and a specific resource.
Pay close attention to whether the key is in the same row as a specific resource type. This table does
1
Service Authorization Reference
Service Authorization Reference
Resource types table
not include global condition keys that are available for any action or under unrelated circumstances.
For more information about global condition keys, see AWS global condition context keys.
• The Dependent actions column includes any additional permissions that you must have, in addition
to the permission for the action itself, to successfully call the action. This can be required if the action
accesses more than one resource.
• The ARN column specifies the Amazon Resource Name (ARN) format that you must use to reference
resources of this type. The portions that are preceded by a $ must be replaced by the actual values for
your scenario. For example, if you see $user-name in an ARN, you must replace that string with either
the actual IAM user's name or a policy variable that contains an IAM user's name. For more information
about ARNs, see IAM ARNs.
• The Condition keys column specifies condition context keys that you can include in an IAM policy
statement only when both this resource and a supporting action from the table above are included in
the statement.
• The Type column specifies the data type of the condition key. This data type determines which
condition operators you can use to compare values in the request with the values in the policy
statement. You must use an operator that is appropriate for the data type. If you use an incorrect
operator, then the match always fails and the policy statement never applies.
If the Type column specifies a "List of …" one of the simple types, then you can use multiple
keys and values in your policies. Do this using condition set prefixes with your operators. Use the
ForAllValues prefix to specify that all values in the request must match a value in the policy
statement. Use the ForAnyValue prefix to specify that at least one value in the request matches one
of the values in the policy statement.
Topics
• Actions, resources, and condition keys for AWS Accounts (p. 9)
• Actions, resources, and condition keys for AWS Activate (p. 10)
• Actions, resources, and condition keys for Alexa for Business (p. 11)
• Actions, resources, and condition keys for AWS Amplify (p. 19)
• Actions, resources, and condition keys for AWS Amplify Admin (p. 23)
• Actions, resources, and condition keys for Amazon API Gateway (p. 28)
• Actions, resources, and condition keys for AWS App Mesh (p. 29)
• Actions, resources, and condition keys for AWS App Mesh Preview (p. 35)
• Actions, resources, and condition keys for AWS AppConfig (p. 40)
2
Service Authorization Reference
Service Authorization Reference
Condition keys table
• Actions, resources, and condition keys for Amazon AppFlow (p. 47)
• Actions, resources, and condition keys for Application Auto Scaling (p. 51)
• Actions, resources, and condition keys for Application Discovery (p. 52)
• Actions, resources, and condition keys for Application Discovery Arsenal (p. 56)
• Actions, resources, and condition keys for Amazon AppStream 2.0 (p. 57)
• Actions, resources, and condition keys for AWS AppSync (p. 66)
• Actions, resources, and condition keys for AWS Artifact (p. 70)
• Actions, resources, and condition keys for Amazon Athena (p. 72)
• Actions, resources, and condition keys for AWS Audit Manager (p. 76)
• Actions, resources, and condition keys for AWS Auto Scaling (p. 82)
• Actions, resources, and condition keys for AWS Backup (p. 83)
• Actions, resources, and condition keys for AWS Backup storage (p. 89)
• Actions, resources, and condition keys for AWS Batch (p. 90)
• Actions, resources, and condition keys for AWS Billing (p. 95)
• Actions, resources, and condition keys for Amazon Braket (p. 96)
• Actions, resources, and condition keys for AWS Budget Service (p. 98)
• Actions, resources, and condition keys for AWS Certificate Manager (p. 101)
• Actions, resources, and condition keys for AWS Certificate Manager Private Certificate
Authority (p. 103)
• Actions, resources, and condition keys for AWS Chatbot (p. 107)
• Actions, resources, and condition keys for Amazon Chime (p. 109)
• Actions, resources, and condition keys for Amazon Cloud Directory (p. 132)
• Actions, resources, and condition keys for AWS Cloud Map (p. 139)
• Actions, resources, and condition keys for AWS Cloud9 (p. 142)
• Actions, resources, and condition keys for AWS CloudFormation (p. 146)
• Actions, resources, and condition keys for Amazon CloudFront (p. 156)
• Actions, resources, and condition keys for AWS CloudHSM (p. 162)
• Actions, resources, and condition keys for Amazon CloudSearch (p. 166)
• Actions, resources, and condition keys for AWS CloudShell (p. 169)
• Actions, resources, and condition keys for AWS CloudTrail (p. 171)
• Actions, resources, and condition keys for Amazon CloudWatch (p. 174)
• Actions, resources, and condition keys for CloudWatch Application Insights (p. 178)
• Actions, resources, and condition keys for Amazon CloudWatch Logs (p. 180)
• Actions, resources, and condition keys for Amazon CloudWatch Synthetics (p. 185)
• Actions, resources, and condition keys for AWS CodeArtifact (p. 187)
• Actions, resources, and condition keys for AWS CodeBuild (p. 192)
• Actions, resources, and condition keys for AWS CodeCommit (p. 198)
• Actions, resources, and condition keys for AWS CodeDeploy (p. 208)
• Actions, resources, and condition keys for Amazon CodeGuru (p. 214)
• Actions, resources, and condition keys for Amazon CodeGuru Profiler (p. 215)
• Actions, resources, and condition keys for Amazon CodeGuru Reviewer (p. 219)
• Actions, resources, and condition keys for AWS CodePipeline (p. 221)
• Actions, resources, and condition keys for AWS CodeStar (p. 226)
3
Service Authorization Reference
Service Authorization Reference
Condition keys table
• Actions, resources, and condition keys for AWS CodeStar Connections (p. 230)
• Actions, resources, and condition keys for AWS CodeStar Notifications (p. 235)
• Actions, resources, and condition keys for Amazon Cognito Identity (p. 239)
• Actions, resources, and condition keys for Amazon Cognito Sync (p. 243)
• Actions, resources, and condition keys for Amazon Cognito User Pools (p. 245)
• Actions, resources, and condition keys for Amazon Comprehend (p. 254)
• Actions, resources, and condition keys for Comprehend Medical (p. 263)
• Actions, resources, and condition keys for Compute Optimizer (p. 265)
• Actions, resources, and condition keys for AWS Config (p. 266)
• Actions, resources, and condition keys for Amazon Connect (p. 275)
• Actions, resources, and condition keys for Amazon Connect Customer Profiles (p. 290)
• Actions, resources, and condition keys for AWS Connector Service (p. 294)
• Actions, resources, and condition keys for AWS Cost and Usage Report (p. 295)
• Actions, resources, and condition keys for AWS Cost Explorer Service (p. 296)
• Actions, resources, and condition keys for AWS Data Exchange (p. 300)
• Actions, resources, and condition keys for Amazon Data Lifecycle Manager (p. 304)
• Actions, resources, and condition keys for Data Pipeline (p. 306)
• Actions, resources, and condition keys for AWS Database Migration Service (p. 309)
• Actions, resources, and condition keys for Database Query Metadata Service (p. 318)
• Actions, resources, and condition keys for DataSync (p. 320)
• Actions, resources, and condition keys for AWS DeepComposer (p. 324)
• Actions, resources, and condition keys for AWS DeepLens (p. 328)
• Actions, resources, and condition keys for AWS DeepRacer (p. 331)
• Actions, resources, and condition keys for Amazon Detective (p. 335)
• Actions, resources, and condition keys for AWS Device Farm (p. 337)
• Actions, resources, and condition keys for Amazon DevOps Guru (p. 347)
• Actions, resources, and condition keys for AWS Direct Connect (p. 350)
• Actions, resources, and condition keys for AWS Directory Service (p. 358)
• Actions, resources, and condition keys for Amazon DynamoDB (p. 365)
• Actions, resources, and condition keys for Amazon DynamoDB Accelerator (DAX) (p. 375)
• Actions, resources, and condition keys for Amazon EC2 (p. 379)
• Actions, resources, and condition keys for Amazon EC2 Auto Scaling (p. 662)
• Actions, resources, and condition keys for Amazon EC2 Image Builder (p. 673)
• Actions, resources, and condition keys for Amazon EC2 Instance Connect (p. 680)
• Actions, resources, and condition keys for AWS Elastic Beanstalk (p. 682)
• Actions, resources, and condition keys for Amazon Elastic Block Store (p. 691)
• Actions, resources, and condition keys for Amazon Elastic Container Registry (p. 693)
• Actions, resources, and condition keys for Amazon Elastic Container Registry Public (p. 697)
• Actions, resources, and condition keys for Amazon Elastic Container Service (p. 700)
• Actions, resources, and condition keys for Amazon Elastic Container Service for Kubernetes (p. 710)
• Actions, resources, and condition keys for Amazon Elastic File System (p. 715)
• Actions, resources, and condition keys for Amazon Elastic Inference (p. 720)
4
Service Authorization Reference
Service Authorization Reference
Condition keys table
• Actions, resources, and condition keys for Elastic Load Balancing (p. 721)
• Actions, resources, and condition keys for Elastic Load Balancing V2 (p. 725)
• Actions, resources, and condition keys for Amazon Elastic MapReduce (p. 733)
• Actions, resources, and condition keys for Amazon Elastic Transcoder (p. 738)
• Actions, resources, and condition keys for Amazon ElastiCache (p. 741)
• Actions, resources, and condition keys for Amazon Elasticsearch Service (p. 751)
• Actions, resources, and condition keys for Elemental Activations (p. 755)
• Actions, resources, and condition keys for AWS Elemental Appliances and Software (p. 757)
• Actions, resources, and condition keys for AWS Elemental MediaConnect (p. 760)
• Actions, resources, and condition keys for AWS Elemental MediaConvert (p. 762)
• Actions, resources, and condition keys for AWS Elemental MediaLive (p. 766)
• Actions, resources, and condition keys for AWS Elemental MediaPackage (p. 773)
• Actions, resources, and condition keys for AWS Elemental MediaPackage VOD (p. 777)
• Actions, resources, and condition keys for AWS Elemental MediaStore (p. 780)
• Actions, resources, and condition keys for AWS Elemental MediaTailor (p. 783)
• Actions, resources, and condition keys for Elemental Support Cases (p. 785)
• Actions, resources, and condition keys for Elemental Support Content (p. 786)
• Actions, resources, and condition keys for Amazon EMR on EKS (EMR Containers) (p. 787)
• Actions, resources, and condition keys for Amazon EventBridge (p. 790)
• Actions, resources, and condition keys for Amazon EventBridge Schemas (p. 797)
• Actions, resources, and condition keys for AWS Firewall Manager (p. 801)
• Actions, resources, and condition keys for Fleet Hub for AWS IoT Device Management (p. 806)
• Actions, resources, and condition keys for Amazon Forecast (p. 809)
• Actions, resources, and condition keys for Amazon Fraud Detector (p. 814)
• Actions, resources, and condition keys for Amazon FreeRTOS (p. 827)
• Actions, resources, and condition keys for Amazon FSx (p. 829)
• Actions, resources, and condition keys for Amazon GameLift (p. 833)
• Actions, resources, and condition keys for Amazon Glacier (p. 842)
• Actions, resources, and condition keys for AWS Global Accelerator (p. 846)
• Actions, resources, and condition keys for AWS Glue (p. 851)
• Actions, resources, and condition keys for AWS Glue DataBrew (p. 867)
• Actions, resources, and condition keys for AWS Ground Station (p. 872)
• Actions, resources, and condition keys for Amazon GroundTruth Labeling (p. 876)
• Actions, resources, and condition keys for Amazon GuardDuty (p. 877)
• Actions, resources, and condition keys for AWS Health APIs and Notifications (p. 885)
• Actions, resources, and condition keys for Amazon Honeycode (p. 887)
• Actions, resources, and condition keys for IAM Access Analyzer (p. 890)
• Actions, resources, and condition keys for Identity And Access Management (p. 893)
• Actions, resources, and condition keys for AWS Identity Store (p. 908)
• Actions, resources, and condition keys for AWS Import Export Disk Service (p. 909)
• Actions, resources, and condition keys for Amazon Inspector (p. 910)
• Actions, resources, and condition keys for Amazon Interactive Video Service (p. 914)
5
Service Authorization Reference
Service Authorization Reference
Condition keys table
• Actions, resources, and condition keys for AWS IoT (p. 919)
• Actions, resources, and condition keys for AWS IoT 1-Click (p. 942)
• Actions, resources, and condition keys for AWS IoT Analytics (p. 945)
• Actions, resources, and condition keys for AWS IoT Core Device Advisor (p. 950)
• Actions, resources, and condition keys for AWS IoT Core for LoRaWAN (p. 953)
• Actions, resources, and condition keys for AWS IoT Device Tester (p. 959)
• Actions, resources, and condition keys for AWS IoT Events (p. 960)
• Actions, resources, and condition keys for AWS IoT Greengrass (p. 965)
• Actions, resources, and condition keys for AWS IoT SiteWise (p. 977)
• Actions, resources, and condition keys for AWS IoT Things Graph (p. 985)
• Actions, resources, and condition keys for AWS IQ (p. 991)
• Actions, resources, and condition keys for AWS IQ Permissions (p. 992)
• Actions, resources, and condition keys for Amazon Kendra (p. 993)
• Actions, resources, and condition keys for AWS Key Management Service (p. 998)
• Actions, resources, and condition keys for Amazon Keyspaces (for Apache Cassandra) (p. 1010)
• Actions, resources, and condition keys for Amazon Kinesis (p. 1013)
• Actions, resources, and condition keys for Amazon Kinesis Analytics (p. 1017)
• Actions, resources, and condition keys for Amazon Kinesis Analytics V2 (p. 1019)
• Actions, resources, and condition keys for Amazon Kinesis Firehose (p. 1022)
• Actions, resources, and condition keys for Amazon Kinesis Video Streams (p. 1025)
• Actions, resources, and condition keys for AWS Lake Formation (p. 1029)
• Actions, resources, and condition keys for AWS Lambda (p. 1031)
• Actions, resources, and condition keys for Launch Wizard (p. 1039)
• Actions, resources, and condition keys for Amazon Lex (p. 1040)
• Actions, resources, and condition keys for AWS License Manager (p. 1046)
• Actions, resources, and condition keys for Amazon Lightsail (p. 1051)
• Actions, resources, and condition keys for Amazon Location (p. 1063)
• Actions, resources, and condition keys for Amazon Lookout for Vision (p. 1067)
• Actions, resources, and condition keys for Amazon Machine Learning (p. 1069)
• Actions, resources, and condition keys for Amazon Macie (p. 1073)
• Actions, resources, and condition keys for Amazon Macie Classic (p. 1080)
• Actions, resources, and condition keys for Manage Amazon API Gateway (p. 1082)
• Actions, resources, and condition keys for Amazon Managed Blockchain (p. 1084)
• Actions, resources, and condition keys for Amazon Managed Service for Prometheus (p. 1087)
• Actions, resources, and condition keys for Amazon Managed Streaming for Apache Kafka (p. 1089)
• Actions, resources, and condition keys for Amazon Managed Workflows for Apache Airflow (p. 1093)
• Actions, resources, and condition keys for AWS Marketplace (p. 1096)
• Actions, resources, and condition keys for AWS Marketplace Catalog (p. 1099)
• Actions, resources, and condition keys for AWS Marketplace Commerce Analytics Service (p. 1101)
• Actions, resources, and condition keys for AWS Marketplace Entitlement Service (p. 1102)
• Actions, resources, and condition keys for AWS Marketplace Image Building Service (p. 1103)
• Actions, resources, and condition keys for AWS Marketplace Management Portal (p. 1104)
6
Service Authorization Reference
Service Authorization Reference
Condition keys table
• Actions, resources, and condition keys for AWS Marketplace Metering Service (p. 1106)
• Actions, resources, and condition keys for AWS Marketplace Procurement Systems
Integration (p. 1107)
• Actions, resources, and condition keys for Amazon Mechanical Turk (p. 1108)
• Actions, resources, and condition keys for Amazon Message Delivery Service (p. 1113)
• Actions, resources, and condition keys for AWS Migration Hub (p. 1114)
• Actions, resources, and condition keys for Amazon Mobile Analytics (p. 1117)
• Actions, resources, and condition keys for AWS Mobile Hub (p. 1118)
• Actions, resources, and condition keys for Amazon Monitron (p. 1120)
• Actions, resources, and condition keys for Amazon MQ (p. 1123)
• Actions, resources, and condition keys for Amazon Neptune (p. 1127)
• Actions, resources, and condition keys for AWS Network Firewall (p. 1128)
• Actions, resources, and condition keys for Network Manager (p. 1133)
• Actions, resources, and condition keys for AWS OpsWorks (p. 1141)
• Actions, resources, and condition keys for AWS OpsWorks Configuration Management (p. 1146)
• Actions, resources, and condition keys for AWS Organizations (p. 1148)
• Actions, resources, and condition keys for AWS Outposts (p. 1157)
• Actions, resources, and condition keys for AWS Panorama (p. 1158)
• Actions, resources, and condition keys for AWS Performance Insights (p. 1164)
• Actions, resources, and condition keys for Amazon Personalize (p. 1165)
• Actions, resources, and condition keys for Amazon Pinpoint (p. 1169)
• Actions, resources, and condition keys for Amazon Pinpoint Email Service (p. 1181)
• Actions, resources, and condition keys for Amazon Pinpoint SMS and Voice Service (p. 1188)
• Actions, resources, and condition keys for Amazon Polly (p. 1190)
• Actions, resources, and condition keys for AWS Price List (p. 1191)
• Actions, resources, and condition keys for AWS Private Marketplace (p. 1193)
• Actions, resources, and condition keys for AWS Proton (p. 1197)
• Actions, resources, and condition keys for AWS Purchase Orders Console (p. 1202)
• Actions, resources, and condition keys for Amazon QLDB (p. 1203)
• Actions, resources, and condition keys for Amazon QuickSight (p. 1206)
• Actions, resources, and condition keys for Amazon RDS (p. 1220)
• Actions, resources, and condition keys for Amazon RDS Data API (p. 1242)
• Actions, resources, and condition keys for Amazon RDS IAM Authentication (p. 1244)
• Actions, resources, and condition keys for Amazon Redshift (p. 1245)
• Actions, resources, and condition keys for Amazon Redshift Data API (p. 1260)
• Actions, resources, and condition keys for Amazon Rekognition (p. 1261)
• Actions, resources, and condition keys for AWS Resource Access Manager (p. 1266)
• Actions, resources, and condition keys for Amazon Resource Group Tagging API (p. 1273)
• Actions, resources, and condition keys for AWS Resource Groups (p. 1275)
• Actions, resources, and condition keys for AWS RoboMaker (p. 1278)
• Actions, resources, and condition keys for Amazon Route 53 (p. 1286)
• Actions, resources, and condition keys for Amazon Route 53 Resolver (p. 1293)
• Actions, resources, and condition keys for Amazon Route53 Domains (p. 1298)
7
Service Authorization Reference
Service Authorization Reference
Condition keys table
8
Service Authorization Reference
Service Authorization Reference
AWS Accounts
• Actions, resources, and condition keys for Amazon WorkSpaces (p. 1623)
• Actions, resources, and condition keys for Amazon WorkSpaces Application Manager (p. 1627)
• Actions, resources, and condition keys for AWS X-Ray (p. 1628)
References:
Topics
• Actions defined by AWS Accounts (p. 9)
• Resource types defined by AWS Accounts (p. 10)
• Condition keys for AWS Accounts (p. 10)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
9
Service Authorization Reference
Service Authorization Reference
AWS Activate
To view the global condition keys that are available to all services, see Available global condition keys.
References:
Topics
• Actions defined by AWS Activate (p. 10)
• Resource types defined by AWS Activate (p. 11)
• Condition keys for AWS Activate (p. 11)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
10
Service Authorization Reference
Service Authorization Reference
Alexa for Business
References:
Topics
• Actions defined by Alexa for Business (p. 12)
• Resource types defined by Alexa for Business (p. 18)
11
Service Authorization Reference
Service Authorization Reference
Alexa for Business
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
contact*
(p. 18)
room*
(p. 18)
12
Service Authorization Reference
Service Authorization Reference
Alexa for Business
13
Service Authorization Reference
Service Authorization Reference
Alexa for Business
contact*
(p. 18)
14
Service Authorization Reference
Service Authorization Reference
Alexa for Business
room
(p. 18)
user
(p. 18)
15
Service Authorization Reference
Service Authorization Reference
Alexa for Business
16
Service Authorization Reference
Service Authorization Reference
Alexa for Business
room
(p. 18)
user
(p. 18)
room
(p. 18)
user
(p. 18)
17
Service Authorization Reference
Service Authorization Reference
Alexa for Business
profile arn:${Partition}:a4b:${Region}:
${Account}:profile/${Resource_id}
skillgroup arn:${Partition}:a4b:${Region}:
${Account}:skill-group/${Resource_id}
addressbook arn:${Partition}:a4b:${Region}:
${Account}:address-book/${Resource_id}
arn:${Partition}:a4b:${Region}:
conferenceprovider
${Account}:conference-provider/
${Resource_id}
contact arn:${Partition}:a4b:${Region}:
${Account}:contact/${Resource_id}
schedule arn:${Partition}:a4b:${Region}:
${Account}:schedule/${Resource_id}
arn:${Partition}:a4b:${Region}:
networkprofile ${Account}:network-profile/${Resource_id}
To view the global condition keys that are available to all services, see Available global condition keys.
18
Service Authorization Reference
Service Authorization Reference
AWS Amplify
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
References:
Topics
• Actions defined by AWS Amplify (p. 19)
• Resource types defined by AWS Amplify (p. 22)
• Condition keys for AWS Amplify (p. 23)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
19
Service Authorization Reference
Service Authorization Reference
AWS Amplify
aws:RequestTag/
${TagKey}
(p. 23)
aws:TagKeys
(p. 23)
aws:RequestTag/
${TagKey}
(p. 23)
aws:TagKeys
(p. 23)
aws:RequestTag/
${TagKey}
(p. 23)
aws:TagKeys
(p. 23)
20
Service Authorization Reference
Service Authorization Reference
AWS Amplify
21
Service Authorization Reference
Service Authorization Reference
AWS Amplify
branches
(p. 23)
jobs
(p. 23)
aws:TagKeys
(p. 23)
aws:RequestTag/
${TagKey}
(p. 23)
jobs
(p. 23)
aws:TagKeys
(p. 23)
22
Service Authorization Reference
Service Authorization Reference
AWS Amplify Admin
jobs arn:${Partition}:amplify:${Region}:
${Account}:apps/${AppId}/branches/
${BranchName}/jobs/${JobId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ String
${TagKey}
aws:ResourceTag/ String
${TagKey}
aws:TagKeys String
References:
Topics
• Actions defined by AWS Amplify Admin (p. 24)
• Resource types defined by AWS Amplify Admin (p. 27)
• Condition keys for AWS Amplify Admin (p. 27)
23
Service Authorization Reference
Service Authorization Reference
AWS Amplify Admin
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
environment*
(p. 27)
environment*
(p. 27)
24
Service Authorization Reference
Service Authorization Reference
AWS Amplify Admin
environment*
(p. 27)
environment*
(p. 27)
environment*
(p. 27)
environment*
(p. 27)
25
Service Authorization Reference
Service Authorization Reference
AWS Amplify Admin
environment*
(p. 27)
environment*
(p. 27)
environment*
(p. 27)
environment*
(p. 27)
26
Service Authorization Reference
Service Authorization Reference
AWS Amplify Admin
backend arn:${Partition}:amplifybackend:${Region}:
${Account}:backend/${AppId}
environment arn:${Partition}:amplifybackend:${Region}:
${Account}:backend/${AppId}/environments
api arn:${Partition}:amplifybackend:${Region}:
${Account}:backend/${AppId}/api
auth arn:${Partition}:amplifybackend:${Region}:
${Account}:backend/${AppId}/auth
job arn:${Partition}:amplifybackend:${Region}:
${Account}:backend/${AppId}/job
config arn:${Partition}:amplifybackend:${Region}:
${Account}:backend/${AppId}/config
token arn:${Partition}:amplifybackend:${Region}:
${Account}:backend/${AppId}/token
27
Service Authorization Reference
Service Authorization Reference
Amazon API Gateway
References:
Topics
• Actions defined by Amazon API Gateway (p. 28)
• Resource types defined by Amazon API Gateway (p. 29)
• Condition keys for Amazon API Gateway (p. 29)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
28
Service Authorization Reference
Service Authorization Reference
AWS App Mesh
execute-api- arn:${Partition}:execute-api:${Region}:
general ${Account}:${ApiId}/${Stage}/${Method}/
${ApiSpecificResourcePath}
References:
Topics
• Actions defined by AWS App Mesh (p. 29)
• Resource types defined by AWS App Mesh (p. 34)
• Condition keys for AWS App Mesh (p. 35)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
29
Service Authorization Reference
Service Authorization Reference
AWS App Mesh
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
virtualNode
(p. 35)
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
virtualService
(p. 35)
30
Service Authorization Reference
Service Authorization Reference
AWS App Mesh
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
virtualNode
(p. 35)
virtualRouter
(p. 35)
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
31
Service Authorization Reference
Service Authorization Reference
AWS App Mesh
mesh
(p. 34)
route
(p. 35)
virtualGateway
(p. 35)
virtualNode
(p. 35)
virtualRouter
(p. 35)
virtualService
(p. 35)
32
Service Authorization Reference
Service Authorization Reference
AWS App Mesh
route
(p. 35)
virtualGateway
(p. 35)
virtualNode
(p. 35)
virtualRouter
(p. 35)
virtualService
(p. 35)
aws:TagKeys
(p. 35)
aws:RequestTag/
${TagKey}
(p. 35)
mesh
(p. 34)
route
(p. 35)
virtualGateway
(p. 35)
virtualNode
(p. 35)
virtualRouter
(p. 35)
33
Service Authorization Reference
Service Authorization Reference
AWS App Mesh
virtualService
(p. 35)
aws:TagKeys
(p. 35)
virtualRouter
(p. 35)
34
Service Authorization Reference
Service Authorization Reference
AWS App Mesh Preview
arn:${Partition}:appmesh:${Region}: aws:ResourceTag/
virtualGateway ${Account}:mesh/${MeshName}/virtualGateway/ ${TagKey} (p. 35)
${VirtualGatewayName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request.
aws:TagKeys Filters actions based on the presence of tag keys in the String
request.
References:
35
Service Authorization Reference
Service Authorization Reference
AWS App Mesh Preview
Topics
• Actions defined by AWS App Mesh Preview (p. 36)
• Resource types defined by AWS App Mesh Preview (p. 39)
• Condition keys for AWS App Mesh Preview (p. 39)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
virtualNode
(p. 39)
virtualService
(p. 39)
36
Service Authorization Reference
Service Authorization Reference
AWS App Mesh Preview
virtualNode
(p. 39)
virtualRouter
(p. 39)
37
Service Authorization Reference
Service Authorization Reference
AWS App Mesh Preview
38
Service Authorization Reference
Service Authorization Reference
AWS App Mesh Preview
virtualRouter
(p. 39)
mesh arn:${Partition}:appmesh-preview:${Region}:
${Account}:mesh/${MeshName}
virtualService arn:${Partition}:appmesh-preview:${Region}:
${Account}:mesh/${MeshName}/virtualService/
${VirtualServiceName}
virtualNode arn:${Partition}:appmesh-preview:${Region}:
${Account}:mesh/${MeshName}/virtualNode/
${VirtualNodeName}
virtualRouter arn:${Partition}:appmesh-preview:${Region}:
${Account}:mesh/${MeshName}/virtualRouter/
${VirtualRouterName}
route arn:${Partition}:appmesh-preview:${Region}:
${Account}:mesh/${MeshName}/virtualRouter/
${VirtualRouterName}/route/${RouteName}
arn:${Partition}:appmesh-preview:${Region}:
virtualGateway ${Account}:mesh/${MeshName}/virtualGateway/
${VirtualGatewayName}
gatewayRoute arn:${Partition}:appmesh-preview:${Region}:
${Account}:mesh/${MeshName}/virtualGateway/
${VirtualGatewayName}/gatewayRoute/
${GatewayRouteName}
39
Service Authorization Reference
Service Authorization Reference
AWS AppConfig
References:
Topics
• Actions defined by AWS AppConfig (p. 40)
• Resource types defined by AWS AppConfig (p. 46)
• Condition keys for AWS AppConfig (p. 47)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 47)
aws:TagKeys
(p. 47)
configurationprofile*
(p. 46)
40
Service Authorization Reference
Service Authorization Reference
AWS AppConfig
aws:RequestTag/
${TagKey}
(p. 47)
aws:TagKeys
(p. 47)
aws:RequestTag/
${TagKey}
(p. 47)
aws:TagKeys
(p. 47)
environment*
(p. 46)
aws:RequestTag/
${TagKey}
(p. 47)
aws:TagKeys
(p. 47)
configurationprofile*
(p. 46)
hostedconfigurationversion*
(p. 46)
configurationprofile*
(p. 46)
environment*
(p. 46)
41
Service Authorization Reference
Service Authorization Reference
AWS AppConfig
configurationprofile*
(p. 46)
hostedconfigurationversion*
(p. 46)
aws:ResourceTag/
${TagKey}
(p. 47)
configurationprofile*
(p. 46)
environment*
(p. 46)
aws:ResourceTag/
${TagKey}
(p. 47)
aws:ResourceTag/
${TagKey}
(p. 47)
deployment*
(p. 46)
environment*
(p. 46)
aws:ResourceTag/
${TagKey}
(p. 47)
42
Service Authorization Reference
Service Authorization Reference
AWS AppConfig
aws:ResourceTag/
${TagKey}
(p. 47)
environment*
(p. 46)
aws:ResourceTag/
${TagKey}
(p. 47)
hostedconfigurationversion*
(p. 46)
environment*
(p. 46)
43
Service Authorization Reference
Service Authorization Reference
AWS AppConfig
deployment
(p. 46)
deploymentstrategy
(p. 46)
environment
(p. 46)
aws:ResourceTag/
${TagKey}
(p. 47)
configurationprofile*
(p. 46)
deployment*
(p. 46)
deploymentstrategy*
(p. 46)
environment*
(p. 46)
deployment*
(p. 46)
environment*
(p. 46)
configurationprofile
(p. 46)
deployment
(p. 46)
deploymentstrategy
(p. 46)
environment
(p. 46)
44
Service Authorization Reference
Service Authorization Reference
AWS AppConfig
aws:TagKeys
(p. 47)
aws:RequestTag/
${TagKey}
(p. 47)
aws:ResourceTag/
${TagKey}
(p. 47)
configurationprofile
(p. 46)
deployment
(p. 46)
deploymentstrategy
(p. 46)
environment
(p. 46)
aws:TagKeys
(p. 47)
aws:ResourceTag/
${TagKey}
(p. 47)
configurationprofile*
(p. 46)
aws:ResourceTag/
${TagKey}
(p. 47)
aws:ResourceTag/
${TagKey}
(p. 47)
45
Service Authorization Reference
Service Authorization Reference
AWS AppConfig
environment*
(p. 46)
aws:ResourceTag/
${TagKey}
(p. 47)
configurationprofile*
(p. 46)
arn:${Partition}:appconfig: aws:ResourceTag/
configurationprofile
${Region}:${Account}:application/ ${TagKey} (p. 47)
${ApplicationId}/configurationprofile/
${ConfigurationProfileId}
arn:${Partition}:appconfig:${Region}: aws:ResourceTag/
deploymentstrategy
${Account}:deploymentstrategy/ ${TagKey} (p. 47)
${DeploymentStrategyId}
arn:${Partition}:appconfig:
hostedconfigurationversion
${Region}:${Account}:application/
${ApplicationId}/configurationprofile/
${ConfigurationProfileId}/
hostedconfigurationversion/${VersionNumber}
46
Service Authorization Reference
Service Authorization Reference
Amazon AppFlow
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters 'Create' requests based on the allowed set of values String
${TagKey} for a specified tags
References:
Topics
• Actions defined by Amazon AppFlow (p. 47)
• Resource types defined by Amazon AppFlow (p. 50)
• Condition keys for Amazon AppFlow (p. 50)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
47
Service Authorization Reference
Service Authorization Reference
Amazon AppFlow
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 50)
aws:RequestTag/
${TagKey}
(p. 50)
aws:TagKeys
(p. 50)
48
Service Authorization Reference
Service Authorization Reference
Amazon AppFlow
aws:TagKeys
(p. 50)
aws:RequestTag/
${TagKey}
(p. 50)
49
Service Authorization Reference
Service Authorization Reference
Amazon AppFlow
aws:TagKeys
(p. 50)
arn:${Partition}:appflow:${Region}:
connectorprofile ${Account}:connectorprofile/${profileName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
50
Service Authorization Reference
Service Authorization Reference
Application Auto Scaling
References:
Topics
• Actions defined by Application Auto Scaling (p. 51)
• Resource types defined by Application Auto Scaling (p. 52)
• Condition keys for Application Auto Scaling (p. 52)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
51
Service Authorization Reference
Service Authorization Reference
Application Discovery
References:
52
Service Authorization Reference
Service Authorization Reference
Application Discovery
Topics
• Actions defined by Application Discovery (p. 53)
• Resource types defined by Application Discovery (p. 56)
• Condition keys for Application Discovery (p. 56)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
53
Service Authorization Reference
Service Authorization Reference
Application Discovery
54
Service Authorization Reference
Service Authorization Reference
Application Discovery
55
Service Authorization Reference
Service Authorization Reference
Application Discovery Arsenal
References:
Topics
• Actions defined by Application Discovery Arsenal (p. 56)
• Resource types defined by Application Discovery Arsenal (p. 57)
• Condition keys for Application Discovery Arsenal (p. 57)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
56
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
Topics
• Actions defined by Amazon AppStream 2.0 (p. 57)
• Resource types defined by Amazon AppStream 2.0 (p. 65)
• Condition keys for Amazon AppStream 2.0 (p. 65)
57
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:ResourceTag/
${TagKey}
(p. 66)
58
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
aws:RequestTag/
${TagKey}
(p. 66)
aws:TagKeys
(p. 66)
aws:RequestTag/
${TagKey}
(p. 66)
aws:TagKeys
(p. 66)
aws:ResourceTag/
${TagKey}
(p. 66)
aws:TagKeys
(p. 66)
59
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
aws:ResourceTag/
${TagKey}
(p. 66)
aws:ResourceTag/
${TagKey}
(p. 66)
60
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
61
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
aws:ResourceTag/
${TagKey}
(p. 66)
62
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
aws:ResourceTag/
${TagKey}
(p. 66)
aws:ResourceTag/
${TagKey}
(p. 66)
aws:ResourceTag/
${TagKey}
(p. 66)
aws:ResourceTag/
${TagKey}
(p. 66)
63
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
stack
(p. 65)
aws:RequestTag/
${TagKey}
(p. 66)
aws:TagKeys
(p. 66)
aws:ResourceTag/
${TagKey}
(p. 66)
image-
builder
(p. 65)
stack
(p. 65)
aws:TagKeys
(p. 66)
64
Service Authorization Reference
Service Authorization Reference
Amazon AppStream 2.0
aws:ResourceTag/
${TagKey}
(p. 66)
To view the global condition keys that are available to all services, see Available global condition keys.
65
Service Authorization Reference
Service Authorization Reference
AWS AppSync
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS AppSync (p. 66)
• Resource types defined by AWS AppSync (p. 69)
• Condition keys for AWS AppSync (p. 70)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
66
Service Authorization Reference
Service Authorization Reference
AWS AppSync
aws:TagKeys
(p. 70)
67
Service Authorization Reference
Service Authorization Reference
AWS AppSync
aws:ResourceTag/
${TagKey}
(p. 70)
graphqlapi*
(p. 70)
aws:ResourceTag/
${TagKey}
(p. 70)
68
Service Authorization Reference
Service Authorization Reference
AWS AppSync
aws:RequestTag/
${TagKey}
(p. 70)
aws:ResourceTag/
${TagKey}
(p. 70)
aws:TagKeys
(p. 70)
aws:TagKeys
(p. 70)
aws:ResourceTag/
${TagKey}
(p. 70)
69
Service Authorization Reference
Service Authorization Reference
AWS Artifact
datasource arn:${Partition}:appsync:${Region}:
${Account}:apis/${GraphQLAPIId}/datasources/
${DatasourceName}
field arn:${Partition}:appsync:${Region}:
${Account}:apis/${GraphQLAPIId}/types/
${TypeName}/fields/${FieldName}
type arn:${Partition}:appsync:${Region}:
${Account}:apis/${GraphQLAPIId}/types/
${TypeName}
function arn:${Partition}:appsync:${Region}:
${Account}:apis/${GraphQLAPIId}/functions/
${FunctionId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
70
Service Authorization Reference
Service Authorization Reference
AWS Artifact
Topics
• Actions defined by AWS Artifact (p. 71)
• Resource types defined by AWS Artifact (p. 71)
• Condition keys for AWS Artifact (p. 72)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
71
Service Authorization Reference
Service Authorization Reference
Amazon Athena
report- arn:${Partition}:artifact:::report-package/*
package
customer- arn:${Partition}:artifact::
agreement ${Account}:customer-agreement/*
agreement arn:${Partition}:artifact:::agreement/*
References:
Topics
• Actions defined by Amazon Athena (p. 72)
• Resource types defined by Amazon Athena (p. 75)
• Condition keys for Amazon Athena (p. 75)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
72
Service Authorization Reference
Service Authorization Reference
Amazon Athena
aws:RequestTag/
${TagKey}
(p. 76)
aws:TagKeys
(p. 76)
aws:RequestTag/
${TagKey}
(p. 76)
aws:TagKeys
(p. 76)
73
Service Authorization Reference
Service Authorization Reference
Amazon Athena
workgroup*
(p. 75)
74
Service Authorization Reference
Service Authorization Reference
Amazon Athena
workgroup*
(p. 75)
aws:RequestTag/
${TagKey}
(p. 76)
aws:TagKeys
(p. 76)
workgroup*
(p. 75)
aws:TagKeys
(p. 76)
To view the global condition keys that are available to all services, see Available global condition keys.
75
Service Authorization Reference
Service Authorization Reference
AWS Audit Manager
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS Audit Manager (p. 76)
• Resource types defined by AWS Audit Manager (p. 81)
• Condition keys for AWS Audit Manager (p. 82)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
76
Service Authorization Reference
Service Authorization Reference
AWS Audit Manager
aws:TagKeys
(p. 82)
aws:TagKeys
(p. 82)
77
Service Authorization Reference
Service Authorization Reference
AWS Audit Manager
aws:TagKeys
(p. 82)
aws:RequestTag/
${TagKey}
(p. 82)
aws:TagKeys
(p. 82)
78
Service Authorization Reference
Service Authorization Reference
AWS Audit Manager
79
Service Authorization Reference
Service Authorization Reference
AWS Audit Manager
control
(p. 81)
control
(p. 81)
aws:TagKeys
(p. 82)
aws:RequestTag/
${TagKey}
(p. 82)
control
(p. 81)
aws:TagKeys
(p. 82)
80
Service Authorization Reference
Service Authorization Reference
AWS Audit Manager
assessment arn:${Partition}:auditmanager:${Region}:
${Account}:assessment/${assessmentId}
arn:${Partition}:auditmanager:
assessmentFramework
${Region}:${Account}:assessment/
${assessmentFrameworkId}
arn:${Partition}:auditmanager:${Region}:
assessmentControlSet
${Account}:assessment/${assessmentId}/
controlSet/{controlSetId}
81
Service Authorization Reference
Service Authorization Reference
AWS Auto Scaling
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
References:
Topics
• Actions defined by AWS Auto Scaling (p. 82)
• Resource types defined by AWS Auto Scaling (p. 83)
• Condition keys for AWS Auto Scaling (p. 83)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
82
Service Authorization Reference
Service Authorization Reference
AWS Backup
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
Topics
• Actions defined by AWS Backup (p. 84)
• Resource types defined by AWS Backup (p. 88)
• Condition keys for AWS Backup (p. 88)
83
Service Authorization Reference
Service Authorization Reference
AWS Backup
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 88)
aws:TagKeys
(p. 88)
aws:RequestTag/
${TagKey}
(p. 88)
aws:TagKeys
(p. 88)
84
Service Authorization Reference
Service Authorization Reference
AWS Backup
aws:TagKeys
(p. 88)
85
Service Authorization Reference
Service Authorization Reference
AWS Backup
backupVault
(p. 88)
recoveryPoint
(p. 88)
86
Service Authorization Reference
Service Authorization Reference
AWS Backup
aws:TagKeys
(p. 88)
backupVault
(p. 88)
recoveryPoint
(p. 88)
aws:RequestTag/
${TagKey}
(p. 88)
aws:TagKeys
(p. 88)
backupVault
(p. 88)
recoveryPoint
(p. 88)
aws:TagKeys
(p. 88)
87
Service Authorization Reference
Service Authorization Reference
AWS Backup
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
88
Service Authorization Reference
Service Authorization Reference
AWS Backup storage
References:
Topics
• Actions defined by AWS Backup storage (p. 89)
• Resource types defined by AWS Backup storage (p. 90)
• Condition keys for AWS Backup storage (p. 90)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
89
Service Authorization Reference
Service Authorization Reference
AWS Batch
References:
Topics
• Actions defined by AWS Batch (p. 90)
• Resource types defined by AWS Batch (p. 93)
• Condition keys for AWS Batch (p. 94)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
90
Service Authorization Reference
Service Authorization Reference
AWS Batch
aws:TagKeys
(p. 94)
aws:RequestTag/
${TagKey}
(p. 94)
aws:TagKeys
(p. 94)
job
(p. 94)
job-
definition
(p. 94)
91
Service Authorization Reference
Service Authorization Reference
AWS Batch
job-queue
(p. 94)
batch:Privileged
(p. 94)
batch:Image
(p. 94)
batch:LogDriver
(p. 94)
batch:AWSLogsGroup
(p. 94)
batch:AWSLogsRegion
(p. 94)
batch:AWSLogsStreamPrefix
(p. 94)
batch:AWSLogsCreateGroup
(p. 94)
aws:RequestTag/
${TagKey}
(p. 94)
aws:TagKeys
(p. 94)
job-
queue*
(p. 94)
aws:RequestTag/
${TagKey}
(p. 94)
aws:TagKeys
(p. 94)
job
(p. 94)
92
Service Authorization Reference
Service Authorization Reference
AWS Batch
job-
definition
(p. 94)
job-queue
(p. 94)
aws:RequestTag/
${TagKey}
(p. 94)
aws:TagKeys
(p. 94)
job
(p. 94)
job-
definition
(p. 94)
job-queue
(p. 94)
aws:TagKeys
(p. 94)
93
Service Authorization Reference
Service Authorization Reference
AWS Batch
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request.
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request.
batch:Privileged When this parameter is true, the container is given elevated Boolean
privileges on the host container instance (similar to the root
user).
batch:User The user name or numeric uid to use inside the container. String
94
Service Authorization Reference
Service Authorization Reference
AWS Billing
References:
Topics
• Actions defined by AWS Billing (p. 95)
• Resource types defined by AWS Billing (p. 96)
• Condition keys for AWS Billing (p. 96)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
95
Service Authorization Reference
Service Authorization Reference
Amazon Braket
References:
Topics
• Actions defined by Amazon Braket (p. 96)
• Resource types defined by Amazon Braket (p. 98)
• Condition keys for Amazon Braket (p. 98)
96
Service Authorization Reference
Service Authorization Reference
Amazon Braket
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 98)
aws:TagKeys
(p. 98)
aws:RequestTag/
${TagKey}
(p. 98)
aws:TagKeys
(p. 98)
97
Service Authorization Reference
Service Authorization Reference
AWS Budget Service
aws:TagKeys
(p. 98)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
98
Service Authorization Reference
Service Authorization Reference
AWS Budget Service
References:
Topics
• Actions defined by AWS Budget Service (p. 99)
• Resource types defined by AWS Budget Service (p. 100)
• Condition keys for AWS Budget Service (p. 100)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
Note
The actions in this table are not APIs, but are instead permissions that grant access to the AWS
Billing and Cost Management APIs that access budgets.
99
Service Authorization Reference
Service Authorization Reference
AWS Budget Service
budget arn:${Partition}:budgets::${Account}:budget/
${BudgetName}
budgetAction arn:${Partition}:budgets::${Account}:budget/
${BudgetName}/action/${ActionId}
100
Service Authorization Reference
Service Authorization Reference
AWS Certificate Manager
References:
Topics
• Actions defined by AWS Certificate Manager (p. 101)
• Resource types defined by AWS Certificate Manager (p. 103)
• Condition keys for AWS Certificate Manager (p. 103)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 103)
aws:TagKeys
(p. 103)
101
Service Authorization Reference
Service Authorization Reference
AWS Certificate Manager
aws:TagKeys
(p. 103)
aws:TagKeys
(p. 103)
aws:TagKeys
(p. 103)
102
Service Authorization Reference
Service Authorization Reference
AWS Certificate Manager Private Certificate Authority
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS Certificate Manager Private Certificate Authority (p. 104)
• Resource types defined by AWS Certificate Manager Private Certificate Authority (p. 106)
• Condition keys for AWS Certificate Manager Private Certificate Authority (p. 106)
103
Service Authorization Reference
Service Authorization Reference
AWS Certificate Manager Private Certificate Authority
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 107)
104
Service Authorization Reference
Service Authorization Reference
AWS Certificate Manager Private Certificate Authority
acm-
pca:TemplateArn
(p. 107)
105
Service Authorization Reference
Service Authorization Reference
AWS Certificate Manager Private Certificate Authority
aws:TagKeys
(p. 107)
aws:RequestTag/
${TagKey}
(p. 107)
aws:TagKeys
(p. 107)
106
Service Authorization Reference
Service Authorization Reference
AWS Chatbot
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the tags.
Topics
• Actions defined by AWS Chatbot (p. 107)
• Resource types defined by AWS Chatbot (p. 108)
• Condition keys for AWS Chatbot (p. 109)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
107
Service Authorization Reference
Service Authorization Reference
AWS Chatbot
108
Service Authorization Reference
Service Authorization Reference
Amazon Chime
arn:${Partition}:chatbot::${account}:
ChatbotConfiguration
${resourceType}/${resourceName}
References:
Topics
• Actions defined by Amazon Chime (p. 109)
• Resource types defined by Amazon Chime (p. 131)
• Condition keys for Amazon Chime (p. 132)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
109
Service Authorization Reference
Service Authorization Reference
Amazon Chime
110
Service Authorization Reference
Service Authorization Reference
Amazon Chime
app-
instance-
user*
(p. 132)
111
Service Authorization Reference
Service Authorization Reference
Amazon Chime
aws:TagKeys
(p. 132)
aws:RequestTag/
${TagKey}
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
112
Service Authorization Reference
Service Authorization Reference
Amazon Chime
channel*
(p. 132)
113
Service Authorization Reference
Service Authorization Reference
Amazon Chime
app-
instance-
user*
(p. 132)
114
Service Authorization Reference
Service Authorization Reference
Amazon Chime
channel*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
115
Service Authorization Reference
Service Authorization Reference
Amazon Chime
116
Service Authorization Reference
Service Authorization Reference
Amazon Chime
app-
instance-
user*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
117
Service Authorization Reference
Service Authorization Reference
Amazon Chime
channel*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
118
Service Authorization Reference
Service Authorization Reference
Amazon Chime
s3:GetBucketVersioning
s3:GetBucketWebsite
channel*
(p. 132)
119
Service Authorization Reference
Service Authorization Reference
Amazon Chime
120
Service Authorization Reference
Service Authorization Reference
Amazon Chime
121
Service Authorization Reference
Service Authorization Reference
Amazon Chime
app-
instance-
user*
(p. 132)
122
Service Authorization Reference
Service Authorization Reference
Amazon Chime
channel*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
123
Service Authorization Reference
Service Authorization Reference
Amazon Chime
channel*
(p. 132)
channel*
(p. 132)
124
Service Authorization Reference
Service Authorization Reference
Amazon Chime
125
Service Authorization Reference
Service Authorization Reference
Amazon Chime
logs:DescribeLogGroups
logs:GetLogDelivery
logs:ListLogDeliveries
126
Service Authorization Reference
Service Authorization Reference
Amazon Chime
channel*
(p. 132)
127
Service Authorization Reference
Service Authorization Reference
Amazon Chime
channel*
(p. 132)
aws:RequestTag/
${TagKey}
(p. 132)
aws:ResourceTag/
${TagKey}
(p. 132)
128
Service Authorization Reference
Service Authorization Reference
Amazon Chime
aws:TagKeys
(p. 132)
aws:RequestTag/
${TagKey}
(p. 132)
aws:ResourceTag/
${TagKey}
(p. 132)
129
Service Authorization Reference
Service Authorization Reference
Amazon Chime
s3:ListAllMyBuckets
channel*
(p. 132)
channel*
(p. 132)
channel*
(p. 132)
130
Service Authorization Reference
Service Authorization Reference
Amazon Chime
131
Service Authorization Reference
Service Authorization Reference
Amazon Cloud Directory
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Amazon Cloud Directory (p. 133)
132
Service Authorization Reference
Service Authorization Reference
Amazon Cloud Directory
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
133
Service Authorization Reference
Service Authorization Reference
Amazon Cloud Directory
developmentSchema*
(p. 138)
developmentSchema*
(p. 138)
publishedSchema*
(p. 138)
134
Service Authorization Reference
Service Authorization Reference
Amazon Cloud Directory
publishedSchema*
(p. 138)
developmentSchema*
(p. 138)
publishedSchema*
(p. 138)
publishedSchema*
(p. 138)
135
Service Authorization Reference
Service Authorization Reference
Amazon Cloud Directory
developmentSchema*
(p. 138)
publishedSchema*
(p. 138)
developmentSchema*
(p. 138)
publishedSchema*
(p. 138)
136
Service Authorization Reference
Service Authorization Reference
Amazon Cloud Directory
publishedSchema*
(p. 138)
publishedSchema*
(p. 138)
137
Service Authorization Reference
Service Authorization Reference
Amazon Cloud Directory
arn:${Partition}:clouddirectory:${Region}:
appliedSchema ${Account}:directory/${DirectoryId}/schema/
${SchemaName}/${Version}
arn:${Partition}:clouddirectory:${Region}:
developmentSchema
${Account}:schema/development/${SchemaName}
directory arn:${Partition}:clouddirectory:${Region}:
${Account}:directory/${DirectoryId}
arn:${Partition}:clouddirectory:${Region}:
publishedSchema${Account}:schema/published/${SchemaName}/
${Version}
138
Service Authorization Reference
Service Authorization Reference
AWS Cloud Map
References:
Topics
• Actions defined by AWS Cloud Map (p. 139)
• Resource types defined by AWS Cloud Map (p. 141)
• Condition keys for AWS Cloud Map (p. 142)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 142)
139
Service Authorization Reference
Service Authorization Reference
AWS Cloud Map
servicediscovery:NamespaceArn
(p. 142)
aws:TagKeys
(p. 142)
aws:RequestTag/
${TagKey}
(p. 142)
140
Service Authorization Reference
Service Authorization Reference
AWS Cloud Map
aws:RequestTag/
${TagKey}
(p. 142)
aws:RequestTag/
${TagKey}
(p. 142)
141
Service Authorization Reference
Service Authorization Reference
AWS Cloud9
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
A filter that lets you get objects by specifying the Amazon String
servicediscovery:NamespaceArn
Resource Name (ARN) for the related namespace.
A filter that lets you get objects by specifying the name of String
servicediscovery:NamespaceName
the related namespace.
A filter that lets you get objects by specifying the Amazon String
servicediscovery:ServiceArn
Resource Name (ARN) for the related service.
A filter that lets you get objects by specifying the name of String
servicediscovery:ServiceName
the related service.
References:
142
Service Authorization Reference
Service Authorization Reference
AWS Cloud9
Topics
• Actions defined by AWS Cloud9 (p. 143)
• Resource types defined by AWS Cloud9 (p. 145)
• Condition keys for AWS Cloud9 (p. 145)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
cloud9:UserArn
(p. 146)
cloud9:EnvironmentId
(p. 146)
cloud9:Permissions
(p. 146)
143
Service Authorization Reference
Service Authorization Reference
AWS Cloud9
cloud9:EnvironmentId
(p. 146)
aws:RequestTag/
${TagKey}
(p. 145)
aws:TagKeys
(p. 146)
aws:TagKeys
(p. 146)
144
Service Authorization Reference
Service Authorization Reference
AWS Cloud9
cloud9:EnvironmentId
(p. 146)
cloud9:Permissions
(p. 146)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
145
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
cloud9:SubnetId Filters access by the subnet ID that the AWS Cloud9 String
environment will be created in
References:
Topics
• Actions defined by AWS CloudFormation (p. 146)
• Resource types defined by AWS CloudFormation (p. 155)
• Condition keys for AWS CloudFormation (p. 155)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
146
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
cloudformation:ChangeSetName
(p. 156)
cloudformation:ResourceTypes
(p. 156)
cloudformation:ImportResourceTypes
(p. 156)
cloudformation:RoleArn
(p. 156)
cloudformation:StackPolicyUrl
(p. 156)
cloudformation:TemplateUrl
(p. 156)
aws:RequestTag/
${TagKey}
(p. 155)
aws:TagKeys
(p. 155)
cloudformation:RoleArn
(p. 156)
cloudformation:StackPolicyUrl
(p. 156)
147
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
aws:RequestTag/
${TagKey}
(p. 155)
aws:TagKeys
(p. 155)
type
(p. 155)
type
(p. 155)
cloudformation:RoleArn
(p. 156)
cloudformation:TemplateUrl
(p. 156)
aws:RequestTag/
${TagKey}
(p. 155)
aws:TagKeys
(p. 155)
148
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
cloudformation:RoleArn
(p. 156)
type
(p. 155)
stackset-
target
(p. 155)
type
(p. 155)
type
(p. 155)
149
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
type
(p. 155)
type
(p. 155)
150
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
type
(p. 155)
151
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
type
(p. 155)
type
(p. 155)
type
(p. 155)
type
(p. 155)
152
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
cloudformation:StackPolicyUrl
(p. 156)
type
(p. 155)
stackset
(p. 155)
stackset
(p. 155)
153
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
cloudformation:ResourceTypes
(p. 156)
cloudformation:RoleArn
(p. 156)
cloudformation:StackPolicyUrl
(p. 156)
cloudformation:TemplateUrl
(p. 156)
aws:RequestTag/
${TagKey}
(p. 155)
aws:TagKeys
(p. 155)
type
(p. 155)
type
(p. 155)
cloudformation:RoleArn
(p. 156)
cloudformation:TemplateUrl
(p. 156)
aws:RequestTag/
${TagKey}
(p. 155)
aws:TagKeys
(p. 155)
154
Service Authorization Reference
Service Authorization Reference
AWS CloudFormation
changeset arn:${Partition}:cloudformation:${Region}:
${Account}:changeSet/${ChangeSetName}/${Id}
stackset- arn:${Partition}:cloudformation:${Region}:
target ${Account}:stackset-target/${StackSetTarget}
type arn:${Partition}:cloudformation:${Region}:
${Account}:type/resource/${Type}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
155
Service Authorization Reference
Service Authorization Reference
Amazon CloudFront
Filters actions based on the ARN of an IAM service role. Use ARN
cloudformation:RoleArn
to control which service role IAM users can use to work with
stacks or change sets
References:
Topics
• Actions defined by Amazon CloudFront (p. 156)
• Resource types defined by Amazon CloudFront (p. 161)
• Condition keys for Amazon CloudFront (p. 162)
156
Service Authorization Reference
Service Authorization Reference
Amazon CloudFront
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 162)
aws:TagKeys
(p. 162)
157
Service Authorization Reference
Service Authorization Reference
Amazon CloudFront
aws:RequestTag/
${TagKey}
(p. 162)
aws:TagKeys
(p. 162)
158
Service Authorization Reference
Service Authorization Reference
Amazon CloudFront
159
Service Authorization Reference
Service Authorization Reference
Amazon CloudFront
streaming-
distribution
(p. 161)
streaming-
distribution
(p. 161)
aws:RequestTag/
${TagKey}
(p. 162)
aws:TagKeys
(p. 162)
streaming-
distribution
(p. 161)
160
Service Authorization Reference
Service Authorization Reference
Amazon CloudFront
aws:TagKeys
(p. 162)
origin-access- arn:${Partition}:cloudfront::
identity ${Account}:origin-access-identity/${Id}
161
Service Authorization Reference
Service Authorization Reference
AWS CloudHSM
field-level- arn:${Partition}:cloudfront::
encryption ${Account}:field-level-encryption/${Id}
field-level- arn:${Partition}:cloudfront::
encryption- ${Account}:field-level-encryption-profile/
profile ${Id}
cache-policy arn:${Partition}:cloudfront::
${Account}:cache-policy/${Id}
origin- arn:${Partition}:cloudfront::
request-policy ${Account}:origin-request-policy/${Id}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS CloudHSM (p. 163)
• Resource types defined by AWS CloudHSM (p. 165)
• Condition keys for AWS CloudHSM (p. 166)
162
Service Authorization Reference
Service Authorization Reference
AWS CloudHSM
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 166)
aws:TagKeys
(p. 166)
aws:RequestTag/
${TagKey}
(p. 166)
aws:TagKeys
(p. 166)
163
Service Authorization Reference
Service Authorization Reference
AWS CloudHSM
cluster
(p. 166)
164
Service Authorization Reference
Service Authorization Reference
AWS CloudHSM
aws:RequestTag/
${TagKey}
(p. 166)
aws:TagKeys
(p. 166)
aws:TagKeys
(p. 166)
165
Service Authorization Reference
Service Authorization Reference
Amazon CloudSearch
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Amazon CloudSearch (p. 167)
• Resource types defined by Amazon CloudSearch (p. 169)
• Condition keys for Amazon CloudSearch (p. 169)
166
Service Authorization Reference
Service Authorization Reference
Amazon CloudSearch
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
167
Service Authorization Reference
Service Authorization Reference
Amazon CloudSearch
168
Service Authorization Reference
Service Authorization Reference
AWS CloudShell
domain arn:${Partition}:cloudsearch:${Region}:
${Account}:domain/${DomainName}
References:
169
Service Authorization Reference
Service Authorization Reference
AWS CloudShell
Topics
• Actions defined by AWS CloudShell (p. 170)
• Resource types defined by AWS CloudShell (p. 171)
• Condition keys for AWS CloudShell (p. 171)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
170
Service Authorization Reference
Service Authorization Reference
AWS CloudTrail
Environment arn:${Partition}:cloudshell:${Region}:
${Account}:environment/${EnvironmentId}
References:
Topics
• Actions defined by AWS CloudTrail (p. 171)
• Resource types defined by AWS CloudTrail (p. 173)
• Condition keys for AWS CloudTrail (p. 173)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
171
Service Authorization Reference
Service Authorization Reference
AWS CloudTrail
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
172
Service Authorization Reference
Service Authorization Reference
AWS CloudTrail
trail arn:${Partition}:cloudtrail:${Region}:
${Account}:trail/${TrailName}
173
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch
References:
Topics
• Actions defined by Amazon CloudWatch (p. 174)
• Resource types defined by Amazon CloudWatch (p. 178)
• Condition keys for Amazon CloudWatch (p. 178)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
174
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch
175
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch
insight-
rule
(p. 178)
aws:RequestTag/
${TagKey}
(p. 178)
aws:TagKeys
(p. 178)
aws:RequestTag/
${TagKey}
(p. 178)
aws:TagKeys
(p. 178)
176
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch
aws:RequestTag/
${TagKey}
(p. 178)
aws:TagKeys
(p. 178)
insight-
rule
(p. 178)
aws:TagKeys
(p. 178)
aws:RequestTag/
${TagKey}
(p. 178)
aws:TagKeys
(p. 178)
177
Service Authorization Reference
Service Authorization Reference
CloudWatch Application Insights
dashboard arn:${Partition}:cloudwatch::
${Account}:dashboard/${DashboardName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
References:
178
Service Authorization Reference
Service Authorization Reference
CloudWatch Application Insights
Topics
• Actions defined by CloudWatch Application Insights (p. 179)
• Resource types defined by CloudWatch Application Insights (p. 180)
• Condition keys for CloudWatch Application Insights (p. 180)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
179
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch Logs
References:
Topics
• Actions defined by Amazon CloudWatch Logs (p. 181)
• Resource types defined by Amazon CloudWatch Logs (p. 185)
• Condition keys for Amazon CloudWatch Logs (p. 185)
180
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch Logs
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
181
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch Logs
182
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch Logs
183
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch Logs
184
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch Synthetics
log-group arn:${Partition}:logs:${Region}:
${Account}:log-group:${LogGroupName}
log-stream arn:${Partition}:logs:${Region}:
${Account}:log-group:${LogGroupName}:log-
stream:${LogStreamName}
References:
Topics
• Actions defined by Amazon CloudWatch Synthetics (p. 186)
• Resource types defined by Amazon CloudWatch Synthetics (p. 187)
185
Service Authorization Reference
Service Authorization Reference
Amazon CloudWatch Synthetics
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
186
Service Authorization Reference
Service Authorization Reference
AWS CodeArtifact
canary arn:${Partition}:synthetics::
${Account}:canary:${CanaryName}
References:
Topics
• Actions defined by AWS CodeArtifact (p. 187)
• Resource types defined by AWS CodeArtifact (p. 191)
• Condition keys for AWS CodeArtifact (p. 191)
187
Service Authorization Reference
Service Authorization Reference
AWS CodeArtifact
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 192)
aws:TagKeys
(p. 192)
188
Service Authorization Reference
Service Authorization Reference
AWS CodeArtifact
189
Service Authorization Reference
Service Authorization Reference
AWS CodeArtifact
repository
(p. 191)
repository
(p. 191)
aws:RequestTag/
${TagKey}
(p. 191)
aws:TagKeys
(p. 192)
repository
(p. 191)
190
Service Authorization Reference
Service Authorization Reference
AWS CodeArtifact
aws:TagKeys
(p. 192)
package arn:${Partition}:codeartifact:${Region}:
${Account}:package/${DomainName}/
${RepositoryName}/${PackageFormat}/
${PackageNamespace}/${PackageName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
191
Service Authorization Reference
Service Authorization Reference
AWS CodeBuild
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS CodeBuild (p. 192)
• Resource types defined by AWS CodeBuild (p. 197)
• Condition keys for AWS CodeBuild (p. 198)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
192
Service Authorization Reference
Service Authorization Reference
AWS CodeBuild
aws:RequestTag/
${TagKey}
(p. 198)
aws:TagKeys
(p. 198)
aws:RequestTag/
${TagKey}
(p. 198)
aws:TagKeys
(p. 198)
193
Service Authorization Reference
Service Authorization Reference
AWS CodeBuild
194
Service Authorization Reference
Service Authorization Reference
AWS CodeBuild
195
Service Authorization Reference
Service Authorization Reference
AWS CodeBuild
196
Service Authorization Reference
Service Authorization Reference
AWS CodeBuild
aws:RequestTag/
${TagKey}
(p. 198)
aws:TagKeys
(p. 198)
aws:RequestTag/
${TagKey}
(p. 198)
aws:TagKeys
(p. 198)
build arn:${Partition}:codebuild:${Region}:
${Account}:build/${BuildId}
build-batch arn:${Partition}:codebuild:${Region}:
${Account}:build-batch/${BuildBatchId}
197
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
report arn:${Partition}:codebuild:${Region}:
${Account}:report/${ReportGroupName}:
${ReportId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS CodeCommit (p. 198)
• Resource types defined by AWS CodeCommit (p. 207)
• Condition keys for AWS CodeCommit (p. 208)
198
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
199
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
aws:RequestTag/
${TagKey}
(p. 208)
aws:TagKeys
(p. 208)
200
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
201
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
202
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
203
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
204
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
205
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
aws:RequestTag/
${TagKey}
(p. 208)
aws:TagKeys
(p. 208)
206
Service Authorization Reference
Service Authorization Reference
AWS CodeCommit
207
Service Authorization Reference
Service Authorization Reference
AWS CodeDeploy
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS CodeDeploy (p. 208)
• Resource types defined by AWS CodeDeploy (p. 213)
• Condition keys for AWS CodeDeploy (p. 213)
208
Service Authorization Reference
Service Authorization Reference
AWS CodeDeploy
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
209
Service Authorization Reference
Service Authorization Reference
AWS CodeDeploy
aws:RequestTag/
${TagKey}
(p. 214)
aws:TagKeys
(p. 214)
aws:TagKeys
(p. 214)
210
Service Authorization Reference
Service Authorization Reference
AWS CodeDeploy
211
Service Authorization Reference
Service Authorization Reference
AWS CodeDeploy
aws:RequestTag/
${TagKey}
(p. 214)
aws:TagKeys
(p. 214)
212
Service Authorization Reference
Service Authorization Reference
AWS CodeDeploy
application arn:${Partition}:codedeploy:${Region}:
${Account}:application:${ApplicationName}
arn:${Partition}:codedeploy:
deploymentconfig${Region}:${Account}:deploymentconfig:
${DeploymentConfigurationName}
arn:${Partition}:codedeploy:
deploymentgroup${Region}:${Account}:deploymentgroup:
${ApplicationName}/${DeploymentGroupName}
instance arn:${Partition}:codedeploy:${Region}:
${Account}:instance:${InstanceName}
To view the global condition keys that are available to all services, see Available global condition keys.
213
Service Authorization Reference
Service Authorization Reference
Amazon CodeGuru
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Amazon CodeGuru (p. 214)
• Resource types defined by Amazon CodeGuru (p. 215)
• Condition keys for Amazon CodeGuru (p. 215)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
214
Service Authorization Reference
Service Authorization Reference
Amazon CodeGuru Profiler
References:
Topics
• Actions defined by Amazon CodeGuru Profiler (p. 215)
• Resource types defined by Amazon CodeGuru Profiler (p. 218)
• Condition keys for Amazon CodeGuru Profiler (p. 218)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
215
Service Authorization Reference
Service Authorization Reference
Amazon CodeGuru Profiler
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 218)
216
Service Authorization Reference
Service Authorization Reference
Amazon CodeGuru Profiler
aws:RequestTag/
${TagKey}
(p. 218)
217
Service Authorization Reference
Service Authorization Reference
Amazon CodeGuru Profiler
aws:TagKeys
(p. 218)
aws:RequestTag/
${TagKey}
(p. 218)
arn:${Partition}:codeguru-profiler: aws:ResourceTag/
ProfilingGroup ${Region}:${Account}:profilingGroup/ ${TagKey} (p. 218)
${profilingGroupName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
218
Service Authorization Reference
Service Authorization Reference
Amazon CodeGuru Reviewer
References:
Topics
• Actions defined by Amazon CodeGuru Reviewer (p. 219)
• Resource types defined by Amazon CodeGuru Reviewer (p. 220)
• Condition keys for Amazon CodeGuru Reviewer (p. 221)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
events:PutRule
events:PutTargets
iam:CreateServiceLinkedR
219
Service Authorization Reference
Service Authorization Reference
Amazon CodeGuru Reviewer
events:RemoveTargets
220
Service Authorization Reference
Service Authorization Reference
AWS CodePipeline
association arn:${Partition}:codeguru-reviewer::
${Account}:association:${ResourceId}
codereview arn:${Partition}:codeguru-reviewer::
${Account}:.+:.+
To view the global condition keys that are available to all services, see Available global condition keys.
References:
Topics
• Actions defined by AWS CodePipeline (p. 221)
• Resource types defined by AWS CodePipeline (p. 226)
• Condition keys for AWS CodePipeline (p. 226)
221
Service Authorization Reference
Service Authorization Reference
AWS CodePipeline
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 226)
aws:RequestTag/
${TagKey}
(p. 226)
aws:TagKeys
(p. 226)
222
Service Authorization Reference
Service Authorization Reference
AWS CodePipeline
223
Service Authorization Reference
Service Authorization Reference
AWS CodePipeline
pipeline
(p. 226)
webhook
(p. 226)
webhook*
(p. 226)
224
Service Authorization Reference
Service Authorization Reference
AWS CodePipeline
aws:RequestTag/
${TagKey}
(p. 226)
aws:TagKeys
(p. 226)
pipeline
(p. 226)
webhook
(p. 226)
aws:RequestTag/
${TagKey}
(p. 226)
aws:TagKeys
(p. 226)
webhook
(p. 226)
aws:TagKeys
(p. 226)
225
Service Authorization Reference
Service Authorization Reference
AWS CodeStar
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
226
Service Authorization Reference
Service Authorization Reference
AWS CodeStar
References:
Topics
• Actions defined by AWS CodeStar (p. 227)
• Resource types defined by AWS CodeStar (p. 229)
• Condition keys for AWS CodeStar (p. 229)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 230)
227
Service Authorization Reference
Service Authorization Reference
AWS CodeStar
228
Service Authorization Reference
Service Authorization Reference
AWS CodeStar
aws:RequestTag/
${TagKey}
(p. 230)
aws:TagKeys
(p. 230)
aws:TagKeys
(p. 230)
To view the global condition keys that are available to all services, see Available global condition keys.
229
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Connections
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the tags.
iam:ResourceTag/ String
${TagKey}
References:
Topics
• Actions defined by AWS CodeStar Connections (p. 230)
• Resource types defined by AWS CodeStar Connections (p. 233)
• Condition keys for AWS CodeStar Connections (p. 233)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
230
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Connections
aws:TagKeys
(p. 234)
codestar-
connections:ProviderType
(p. 234)
231
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Connections
aws:TagKeys
(p. 234)
aws:RequestTag/
${TagKey}
(p. 234)
aws:RequestTag/
${TagKey}
(p. 234)
aws:TagKeys
(p. 234)
codestar-
connections:ListInstallatio
codestar-
connections:StartOAuthH
232
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Connections
codestar-
connections:InstallationId
(p. 234)
codestar-
connections:ProviderAction
(p. 234)
codestar-
connections:ProviderPermissionsRequi
(p. 234)
Connection arn:${Partition}:codestar-connections:
${Region}:${Account}:connection/
${ConnectionId}
Host arn:${Partition}:codestar-connections:
${Region}:${Account}:host/${HostId}
To view the global condition keys that are available to all services, see Available global condition keys.
233
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Connections
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
codestar- Filters access by the branch name that is passed in the String
connections:BranchName
request. Applies only to UseConnection requests for access
to a specific repository branch
codestar- Filters access by the repository that is passed in the request. String
connections:FullRepositoryId
Applies only to UseConnection requests for access to a
specific repository
codestar- Filters access by the host resource associated with the String
connections:HostArn connection used in the request
codestar- Filters access by the service to which the principal is allowed String
connections:PassedToService
to pass a Connection
codestar- Filters access by the repository name that is passed in the String
connections:RepositoryName
request. Applies only to UseConnection requests for creating
new repositories
234
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Notifications
References:
Topics
• Actions defined by AWS CodeStar Notifications (p. 235)
• Resource types defined by AWS CodeStar Notifications (p. 238)
• Condition keys for AWS CodeStar Notifications (p. 239)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
codestar-
notifications:NotificationsForResource
(p. 239)
235
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Notifications
aws:ResourceTag/
${TagKey}
(p. 239)
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
codestar-
notifications:NotificationsForResource
(p. 239)
aws:TagKeys
(p. 239)
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
codestar-
notifications:NotificationsForResource
(p. 239)
236
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Notifications
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
aws:TagKeys
(p. 239)
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
codestar-
notifications:NotificationsForResource
(p. 239)
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
237
Service Authorization Reference
Service Authorization Reference
AWS CodeStar Notifications
aws:ResourceTag/
${TagKey}
(p. 239)
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
codestar-
notifications:NotificationsForResource
(p. 239)
aws:TagKeys
(p. 239)
aws:ResourceTag/
${TagKey}
(p. 239)
aws:RequestTag/
${TagKey}
(p. 239)
aws:TagKeys
(p. 239)
codestar-
notifications:NotificationsForResource
(p. 239)
238
Service Authorization Reference
Service Authorization Reference
Amazon Cognito Identity
arn:${Partition}:codestar-notifications: aws:ResourceTag/
notificationrule ${Region}:${Account}:notificationrule/ ${TagKey} (p. 239)
${NotificationRuleId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
codestar- Filters access based on the ARN of the resource for which ARN
notifications:NotificationsForResource
notifications are configured
References:
Topics
• Actions defined by Amazon Cognito Identity (p. 240)
• Resource types defined by Amazon Cognito Identity (p. 242)
• Condition keys for Amazon Cognito Identity (p. 242)
239
Service Authorization Reference
Service Authorization Reference
Amazon Cognito Identity
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 243)
aws:ResourceTag/
${TagKey}
(p. 243)
240
Service Authorization Reference
Service Authorization Reference
Amazon Cognito Identity
241
Service Authorization Reference
Service Authorization Reference
Amazon Cognito Identity
aws:RequestTag/
${TagKey}
(p. 243)
aws:TagKeys
(p. 243)
aws:ResourceTag/
${TagKey}
(p. 243)
aws:ResourceTag/
${TagKey}
(p. 243)
242
Service Authorization Reference
Service Authorization Reference
Amazon Cognito Sync
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request.
References:
Topics
• Actions defined by Amazon Cognito Sync (p. 243)
• Resource types defined by Amazon Cognito Sync (p. 245)
• Condition keys for Amazon Cognito Sync (p. 245)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
243
Service Authorization Reference
Service Authorization Reference
Amazon Cognito Sync
244
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
dataset arn:${Partition}:cognito-sync:${Region}:
${Account}:identitypool/${IdentityPoolId}/
identity/${IdentityId}/dataset/
${DatasetName}
identity arn:${Partition}:cognito-sync:${Region}:
${Account}:identitypool/${IdentityPoolId}/
identity/${IdentityId}
identitypool arn:${Partition}:cognito-sync:${Region}:
${Account}:identitypool/${IdentityPoolId}
245
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
References:
Topics
• Actions defined by Amazon Cognito User Pools (p. 246)
• Resource types defined by Amazon Cognito User Pools (p. 253)
• Condition keys for Amazon Cognito User Pools (p. 253)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
246
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
247
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
248
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
aws:TagKeys
(p. 254)
aws:ResourceTag/
${TagKey}
(p. 254)
249
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
250
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
251
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
aws:RequestTag/
${TagKey}
(p. 253)
aws:TagKeys
(p. 254)
aws:TagKeys
(p. 254)
252
Service Authorization Reference
Service Authorization Reference
Amazon Cognito User Pools
aws:RequestTag/
${TagKey}
(p. 253)
aws:TagKeys
(p. 254)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request.
253
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
References:
Topics
• Actions defined by Amazon Comprehend (p. 254)
• Resource types defined by Amazon Comprehend (p. 262)
• Condition keys for Amazon Comprehend (p. 263)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
254
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
comprehend:VolumeKmsKey
(p. 263)
comprehend:OutputKmsKey
(p. 263)
comprehend:VpcSecurityGroupIds
(p. 263)
comprehend:VpcSubnets
(p. 263)
255
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
aws:RequestTag/
${TagKey}
(p. 263)
aws:TagKeys
(p. 263)
aws:TagKeys
(p. 263)
comprehend:VolumeKmsKey
(p. 263)
comprehend:VpcSecurityGroupIds
(p. 263)
comprehend:VpcSubnets
(p. 263)
256
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
257
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
258
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
document-
classifier-
endpoint
(p. 263)
entity-
recognizer
(p. 263)
entity-
recognizer-
endpoint
(p. 263)
comprehend:VolumeKmsKey
(p. 263)
comprehend:OutputKmsKey
(p. 263)
comprehend:VpcSecurityGroupIds
(p. 263)
comprehend:VpcSubnets
(p. 263)
comprehend:VpcSecurityGroupIds
(p. 263)
comprehend:VpcSubnets
(p. 263)
259
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
comprehend:OutputKmsKey
(p. 263)
comprehend:VpcSecurityGroupIds
(p. 263)
comprehend:VpcSubnets
(p. 263)
comprehend:VpcSecurityGroupIds
(p. 263)
comprehend:VpcSubnets
(p. 263)
comprehend:VpcSecurityGroupIds
(p. 263)
comprehend:VpcSubnets
(p. 263)
260
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
comprehend:VpcSubnets
(p. 263)
document-
classifier-
endpoint
(p. 263)
entity-
recognizer
(p. 263)
entity-
recognizer-
endpoint
(p. 263)
261
Service Authorization Reference
Service Authorization Reference
Amazon Comprehend
aws:RequestTag/
${TagKey}
(p. 263)
aws:TagKeys
(p. 263)
document-
classifier-
endpoint
(p. 263)
entity-
recognizer
(p. 263)
entity-
recognizer-
endpoint
(p. 263)
aws:TagKeys
(p. 263)
entity-
recognizer-
endpoint*
(p. 263)
262
Service Authorization Reference
Service Authorization Reference
Comprehend Medical
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access to create requests based on the allowed set of String
${TagKey} values for each of the mandatory tags
Filters access by the output KMS key associated with the ARN
comprehend:OutputKmsKey
resource in the request.
Filters access by the volume KMS key associated with the ARN
comprehend:VolumeKmsKey
resource in the request.
Filters access by the list of all VPC security group ids ArrayOfString
comprehend:VpcSecurityGroupIds
associated with the resource in the request.
Filters access by the list of all VPC subnets associated with ArrayOfString
comprehend:VpcSubnets
the resource in the request.
References:
263
Service Authorization Reference
Service Authorization Reference
Comprehend Medical
Topics
• Actions defined by Comprehend Medical (p. 264)
• Resource types defined by Comprehend Medical (p. 264)
• Condition keys for Comprehend Medical (p. 264)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
264
Service Authorization Reference
Service Authorization Reference
Compute Optimizer
References:
Topics
• Actions defined by Compute Optimizer (p. 265)
• Resource types defined by Compute Optimizer (p. 266)
• Condition keys for Compute Optimizer (p. 266)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
265
Service Authorization Reference
Service Authorization Reference
AWS Config
References:
Topics
• Actions defined by AWS Config (p. 267)
266
Service Authorization Reference
Service Authorization Reference
AWS Config
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
267
Service Authorization Reference
Service Authorization Reference
AWS Config
268
Service Authorization Reference
Service Authorization Reference
AWS Config
269
Service Authorization Reference
Service Authorization Reference
AWS Config
270
Service Authorization Reference
Service Authorization Reference
AWS Config
ConfigRule
(p. 275)
ConfigurationAggregator
(p. 274)
271
Service Authorization Reference
Service Authorization Reference
AWS Config
aws:RequestTag/
${TagKey}
(p. 275)
aws:TagKeys
(p. 275)
aws:TagKeys
(p. 275)
aws:TagKeys
(p. 275)
272
Service Authorization Reference
Service Authorization Reference
AWS Config
273
Service Authorization Reference
Service Authorization Reference
AWS Config
ConfigurationAggregator
(p. 274)
ConformancePack
(p. 275)
aws:RequestTag/
${TagKey}
(p. 275)
aws:TagKeys
(p. 275)
ConfigRule
(p. 275)
ConfigurationAggregator
(p. 274)
ConformancePack
(p. 275)
aws:TagKeys
(p. 275)
arn:${Partition}:config:${Region}: aws:ResourceTag/
AggregationAuthorization
${Account}:aggregation-authorization/ ${TagKey} (p. 275)
${AggregatorAccount}/${AggregatorRegion}
arn:${Partition}:config:${Region}: aws:ResourceTag/
ConfigurationAggregator
${Account}:config-aggregator/${AggregatorId} ${TagKey} (p. 275)
274
Service Authorization Reference
Service Authorization Reference
Amazon Connect
arn:${Partition}:config:${Region}: aws:ResourceTag/
ConformancePack${Account}:conformance-pack/ ${TagKey} (p. 275)
${ConformancePackName}/${ConformancePackId}
arn:${Partition}:config:${Region}:
OrganizationConfigRule
${Account}:organization-config-rule/
${OrganizationConfigRuleId}
arn:${Partition}:config:${Region}:
OrganizationConformancePack
${Account}:organization-conformance-pack/
${OrganizationConformancePackId}
arn:${Partition}:config:${Region}:
RemediationConfiguration
${Account}:remediation-configuration/
${RemediationConfigurationId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
References:
275
Service Authorization Reference
Service Authorization Reference
Amazon Connect
Topics
• Actions defined by Amazon Connect (p. 276)
• Resource types defined by Amazon Connect (p. 288)
• Condition keys for Amazon Connect (p. 289)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
iam:PutRolePolicy
kinesis:DescribeStream
kms:CreateGrant
kms:DescribeKey
s3:GetBucketAcl
s3:GetBucketLocation
connect:StorageResourceType
(p. 289)
276
Service Authorization Reference
Service Authorization Reference
Amazon Connect
aws:ResourceTag/
${TagKey}
(p. 289)
aws:RequestTag/
${TagKey}
(p. 289)
aws:TagKeys
(p. 289)
277
Service Authorization Reference
Service Authorization Reference
Amazon Connect
ds:CreateDirectory
ds:CreateIdentityPoolDire
ds:DescribeDirectories
ds:UnauthorizeApplicatio
firehose:DescribeDelivery
firehose:ListDeliveryStrea
iam:AttachRolePolicy
iam:CreateServiceLinkedR
iam:PutRolePolicy
kinesis:DescribeStream
kinesis:ListStreams
kms:CreateGrant
kms:DescribeKey
kms:ListAliases
kms:RetireGrant
logs:CreateLogGroup
s3:CreateBucket
s3:GetBucketLocation
s3:ListAllMyBuckets
aws:RequestTag/
${TagKey}
(p. 289)
aws:TagKeys
(p. 289)
278
Service Authorization Reference
Service Authorization Reference
Amazon Connect
security-
profile*
(p. 289)
user*
(p. 288)
hierarchy-
group
(p. 289)
aws:RequestTag/
${TagKey}
(p. 289)
aws:TagKeys
(p. 289)
aws:ResourceTag/
${TagKey}
(p. 289)
279
Service Authorization Reference
Service Authorization Reference
Amazon Connect
kinesis:DescribeStream
kinesis:ListStreams
kms:DescribeKey
kms:ListAliases
s3:ListAllMyBuckets
aws:ResourceTag/
${TagKey}
(p. 289)
280
Service Authorization Reference
Service Authorization Reference
Amazon Connect
281
Service Authorization Reference
Service Authorization Reference
Amazon Connect
282
Service Authorization Reference
Service Authorization Reference
Amazon Connect
aws:ResourceTag/
${TagKey}
(p. 289)
routing-
profile
(p. 289)
user
(p. 288)
aws:ResourceTag/
${TagKey}
(p. 289)
283
Service Authorization Reference
Service Authorization Reference
Amazon Connect
kms:DescribeKey
kms:ListAliases
kms:RetireGrant
s3:CreateBucket
s3:GetBucketLocation
s3:ListAllMyBuckets
284
Service Authorization Reference
Service Authorization Reference
Amazon Connect
routing-
profile
(p. 289)
user
(p. 288)
aws:TagKeys
(p. 289)
aws:RequestTag/
${TagKey}
(p. 289)
aws:ResourceTag/
${TagKey}
(p. 289)
routing-
profile
(p. 289)
user
(p. 288)
aws:TagKeys
(p. 289)
aws:ResourceTag/
${TagKey}
(p. 289)
285
Service Authorization Reference
Service Authorization Reference
Amazon Connect
aws:ResourceTag/
${TagKey}
(p. 289)
logs:CreateLogGroup
connect:AttributeType
(p. 289)
kinesis:DescribeStream
kms:CreateGrant
kms:DescribeKey
s3:GetBucketAcl
s3:GetBucketLocation
connect:StorageResourceType
(p. 289)
286
Service Authorization Reference
Service Authorization Reference
Amazon Connect
aws:ResourceTag/
${TagKey}
(p. 289)
aws:ResourceTag/
${TagKey}
(p. 289)
aws:ResourceTag/
${TagKey}
(p. 289)
287
Service Authorization Reference
Service Authorization Reference
Amazon Connect
user*
(p. 288)
aws:ResourceTag/
${TagKey}
(p. 289)
user*
(p. 288)
aws:ResourceTag/
${TagKey}
(p. 289)
instance arn:${Partition}:connect:${Region}:
${Account}:instance/${InstanceId}
contact arn:${Partition}:connect:${Region}:
${Account}:instance/${InstanceId}/contact/
${ContactId}
288
Service Authorization Reference
Service Authorization Reference
Amazon Connect
security- arn:${Partition}:connect:${Region}:
profile ${Account}:instance/${InstanceId}/security-
profile/${SecurityProfileId}
hierarchy- arn:${Partition}:connect:${Region}:
group ${Account}:instance/${InstanceId}/agent-
group/${HierarchyGroupId}
queue arn:${Partition}:connect:${Region}:
${Account}:instance/${InstanceId}/queue/
${QueueId}
hours-of- arn:${Partition}:connect:${Region}:
operation ${Account}:instance/${InstanceId}/operating-
hours/${HoursOfOperationId}
phone- arn:${Partition}:connect:${Region}:
number ${Account}:instance/${InstanceId}/phone-
numbers/${PhoneNumberId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request.
aws:TagKeys Filters actions based on the presence of tag keys in the String
request.
289
Service Authorization Reference
Service Authorization Reference
Amazon Connect Customer Profiles
References:
Topics
• Actions defined by Amazon Connect Customer Profiles (p. 290)
• Resource types defined by Amazon Connect Customer Profiles (p. 293)
• Condition keys for Amazon Connect Customer Profiles (p. 293)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 294)
290
Service Authorization Reference
Service Authorization Reference
Amazon Connect Customer Profiles
integrations*
(p. 293)
object-
types*
(p. 293)
integrations*
(p. 293)
291
Service Authorization Reference
Service Authorization Reference
Amazon Connect Customer Profiles
object-
types*
(p. 293)
integrations*
(p. 293)
aws:RequestTag/
${TagKey}
(p. 294)
aws:TagKeys
(p. 294)
object-
types*
(p. 293)
aws:RequestTag/
${TagKey}
(p. 294)
aws:TagKeys
(p. 294)
292
Service Authorization Reference
Service Authorization Reference
Amazon Connect Customer Profiles
aws:TagKeys
(p. 294)
aws:TagKeys
(p. 294)
To view the global condition keys that are available to all services, see Available global condition keys.
293
Service Authorization Reference
Service Authorization Reference
AWS Connector Service
aws:RequestTag/ Filters access by a key that is present in the request the user String
${TagKey} makes to the pinpoint service.
aws:TagKeys Filters access by the list of all the tag key names present in String
the request the user makes to the pinpoint service.
References:
Topics
• Actions defined by AWS Connector Service (p. 294)
• Resource types defined by AWS Connector Service (p. 295)
• Condition keys for AWS Connector Service (p. 295)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
294
Service Authorization Reference
Service Authorization Reference
AWS Cost and Usage Report
References:
Topics
• Actions defined by AWS Cost and Usage Report (p. 295)
• Resource types defined by AWS Cost and Usage Report (p. 296)
• Condition keys for AWS Cost and Usage Report (p. 296)
295
Service Authorization Reference
Service Authorization Reference
AWS Cost Explorer Service
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
cur arn:${Partition}:cur:${Region}:
${Account}:definition/${ReportName}
296
Service Authorization Reference
Service Authorization Reference
AWS Cost Explorer Service
References:
Topics
• Actions defined by AWS Cost Explorer Service (p. 297)
• Resource types defined by AWS Cost Explorer Service (p. 300)
• Condition keys for AWS Cost Explorer Service (p. 300)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
297
Service Authorization Reference
Service Authorization Reference
AWS Cost Explorer Service
298
Service Authorization Reference
Service Authorization Reference
AWS Cost Explorer Service
299
Service Authorization Reference
Service Authorization Reference
AWS Data Exchange
References:
Topics
• Actions defined by AWS Data Exchange (p. 301)
• Resource types defined by AWS Data Exchange (p. 303)
• Condition keys for AWS Data Exchange (p. 304)
300
Service Authorization Reference
Service Authorization Reference
AWS Data Exchange
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:ResourceTag/
${TagKey}
(p. 304)
aws:TagKeys
(p. 304)
aws:ResourceTag/
${TagKey}
(p. 304)
aws:TagKeys
(p. 304)
aws:ResourceTag/
${TagKey}
(p. 304)
301
Service Authorization Reference
Service Authorization Reference
AWS Data Exchange
302
Service Authorization Reference
Service Authorization Reference
AWS Data Exchange
aws:RequestTag/
${TagKey}
(p. 304)
aws:TagKeys
(p. 304)
aws:TagKeys
(p. 304)
data-sets arn:${Partition}:dataexchange:${Region}:
${Account}:data-sets/${DataSetId}
revisions arn:${Partition}:dataexchange:${Region}:
${Account}:data-sets/${DataSetId}/revisions/
${RevisionId}
assets arn:${Partition}:dataexchange:${Region}:
${Account}:data-sets/${DataSetId}/revisions/
${RevisionId}/assets/${AssetId}
303
Service Authorization Reference
Service Authorization Reference
Amazon Data Lifecycle Manager
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the mandatory tags.
Filters actions based on the tag value associated with the String
aws:ResourceTag/ resource.
${TagKey}
References:
Topics
• Actions defined by Amazon Data Lifecycle Manager (p. 304)
• Resource types defined by Amazon Data Lifecycle Manager (p. 305)
• Condition keys for Amazon Data Lifecycle Manager (p. 306)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
304
Service Authorization Reference
Service Authorization Reference
Amazon Data Lifecycle Manager
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
305
Service Authorization Reference
Service Authorization Reference
Data Pipeline
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Data Pipeline (p. 306)
• Resource types defined by Data Pipeline (p. 309)
• Condition keys for Data Pipeline (p. 309)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
306
Service Authorization Reference
Service Authorization Reference
Data Pipeline
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
datapipeline:workerGroup
(p. 309)
datapipeline:Tag
(p. 309)
datapipeline:Tag
(p. 309)
datapipeline:workerGroup
(p. 309)
datapipeline:Tag
(p. 309)
datapipeline:Tag
(p. 309)
307
Service Authorization Reference
Service Authorization Reference
Data Pipeline
datapipeline:Tag
(p. 309)
datapipeline:workerGroup
(p. 309)
datapipeline:workerGroup
(p. 309)
datapipeline:Tag
(p. 309)
308
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
datapipeline:workerGroup
(p. 309)
To view the global condition keys that are available to all services, see Available global condition keys.
309
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
References:
Topics
• Actions defined by AWS Database Migration Service (p. 310)
• Resource types defined by AWS Database Migration Service (p. 316)
• Condition keys for AWS Database Migration Service (p. 317)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
EventSubscription
(p. 317)
ReplicationInstance
(p. 317)
ReplicationSubnetGroup
(p. 317)
ReplicationTask
(p. 317)
aws:RequestTag/
${TagKey}
(p. 318)
310
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
dms:req-
tag/
${TagKey}
(p. 318)
aws:TagKeys
(p. 318)
dms:req-
tag/
${TagKey}
(p. 318)
aws:TagKeys
(p. 318)
dms:req-
tag/
${TagKey}
(p. 318)
aws:TagKeys
(p. 318)
dms:req-
tag/
${TagKey}
(p. 318)
311
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
aws:TagKeys
(p. 318)
dms:req-
tag/
${TagKey}
(p. 318)
aws:RequestTag/
${TagKey}
(p. 318)
aws:TagKeys
(p. 318)
dms:req-
tag/
${TagKey}
(p. 318)
312
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
313
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
aws:ResourceTag/
${TagKey}
(p. 318)
aws:TagKeys
(p. 318)
ReplicationTaskAssessmentRun
(p. 317)
314
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
aws:TagKeys
(p. 318)
Endpoint
(p. 317)
EventSubscription
(p. 317)
ReplicationInstance
(p. 317)
ReplicationSubnetGroup
(p. 317)
ReplicationTask
(p. 317)
Certificate
(p. 317)
315
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
ReplicationInstance*
(p. 317)
EventSubscription
(p. 317)
ReplicationInstance
(p. 317)
ReplicationSubnetGroup
(p. 317)
ReplicationTask
(p. 317)
aws:TagKeys
(p. 318)
316
Service Authorization Reference
Service Authorization Reference
AWS Database Migration Service
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
dms:cert-tag/
${TagKey} (p. 318)
dms:endpoint-tag/
${TagKey} (p. 318)
arn:${Partition}:dms:${Region}: aws:ResourceTag/
EventSubscription${Account}:es:* ${TagKey} (p. 318)
dms:es-tag/${TagKey}
(p. 318)
arn:${Partition}:dms:${Region}: aws:ResourceTag/
ReplicationInstance
${Account}:rep:* ${TagKey} (p. 318)
dms:rep-tag/${TagKey}
(p. 318)
arn:${Partition}:dms:${Region}: aws:ResourceTag/
ReplicationSubnetGroup
${Account}:subgrp:* ${TagKey} (p. 318)
dms:subgrp-tag/
${TagKey} (p. 318)
arn:${Partition}:dms:${Region}: aws:ResourceTag/
ReplicationTask ${Account}:task:* ${TagKey} (p. 318)
dms:task-tag/
${TagKey} (p. 318)
arn:${Partition}:dms:${Region}:
ReplicationTaskAssessmentRun
${Account}:assessment-run:*
arn:${Partition}:dms:${Region}:
ReplicationTaskIndividualAssessment
${Account}:individual-assessment:*
To view the global condition keys that are available to all services, see Available global condition keys.
317
Service Authorization Reference
Service Authorization Reference
Database Query Metadata Service
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters access based on the presence of tag keys in the String
request
dms:cert-tag/ Filters access based on the presence of tag keys in the String
${TagKey} request for Certificate
dms:endpoint- Filters access based on the presence of tag keys in the String
tag/${TagKey} request for Endpoint
dms:es-tag/ Filters access based on the presence of tag keys in the String
${TagKey} request for EventSubscription
dms:rep-tag/ Filters access based on the presence of tag keys in the String
${TagKey} request for ReplicationInstance
dms:req-tag/ Filters access based on the presence of tag key-value pairs in String
${TagKey} the request
dms:subgrp-tag/ Filters access based on the presence of tag keys in the String
${TagKey} request for ReplicationSubnetGroup
dms:task-tag/ Filters access based on the presence of tag keys in the String
${TagKey} request for ReplicationTask
References:
Topics
• Actions defined by Database Query Metadata Service (p. 319)
• Resource types defined by Database Query Metadata Service (p. 319)
• Condition keys for Database Query Metadata Service (p. 320)
318
Service Authorization Reference
Service Authorization Reference
Database Query Metadata Service
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
319
Service Authorization Reference
Service Authorization Reference
DataSync
References:
Topics
• Actions defined by DataSync (p. 320)
• Resource types defined by DataSync (p. 323)
• Condition keys for DataSync (p. 324)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
320
Service Authorization Reference
Service Authorization Reference
DataSync
aws:TagKeys
(p. 324)
aws:TagKeys
(p. 324)
aws:TagKeys
(p. 324)
aws:TagKeys
(p. 324)
aws:TagKeys
(p. 324)
aws:TagKeys
(p. 324)
aws:TagKeys
(p. 324)
321
Service Authorization Reference
Service Authorization Reference
DataSync
322
Service Authorization Reference
Service Authorization Reference
DataSync
task
(p. 324)
location
(p. 324)
task
(p. 324)
aws:RequestTag/
${TagKey}
(p. 324)
aws:TagKeys
(p. 324)
task
(p. 324)
aws:TagKeys
(p. 324)
323
Service Authorization Reference
Service Authorization Reference
AWS DeepComposer
taskexecution arn:${Partition}:datasync:${Region}:
${AccountId}:task/${TaskId}/execution/
${ExecutionId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the tags.
References:
Topics
• Actions defined by AWS DeepComposer (p. 325)
• Resource types defined by AWS DeepComposer (p. 327)
324
Service Authorization Reference
Service Authorization Reference
AWS DeepComposer
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
325
Service Authorization Reference
Service Authorization Reference
AWS DeepComposer
model
(p. 327)
aws:ResourceTag/
${TagKey}
(p. 328)
model
(p. 327)
326
Service Authorization Reference
Service Authorization Reference
AWS DeepComposer
aws:TagKeys
(p. 328)
aws:RequestTag/
${TagKey}
(p. 328)
aws:ResourceTag/
${TagKey}
(p. 328)
model
(p. 327)
aws:TagKeys
(p. 328)
aws:RequestTag/
${TagKey}
(p. 328)
aws:ResourceTag/
${TagKey}
(p. 328)
327
Service Authorization Reference
Service Authorization Reference
AWS DeepLens
audio arn:${Partition}:deepcomposer:${Region}:
${Account}:audio/${AudioId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
Topics
• Actions defined by AWS DeepLens (p. 328)
• Resource types defined by AWS DeepLens (p. 330)
• Condition keys for AWS DeepLens (p. 331)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
328
Service Authorization Reference
Service Authorization Reference
AWS DeepLens
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
329
Service Authorization Reference
Service Authorization Reference
AWS DeepLens
device arn:${Partition}:deeplens:${Region}:
${Account}:device/${DeviceName}
project arn:${Partition}:deeplens:${Region}:
${Account}:project/${ProjectName}
330
Service Authorization Reference
Service Authorization Reference
AWS DeepRacer
model arn:${Partition}:deeplens:${Region}:
${Account}:model/${ModelName}
References:
Topics
• Actions defined by AWS DeepRacer (p. 331)
• Resource types defined by AWS DeepRacer (p. 334)
• Condition keys for AWS DeepRacer (p. 335)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
331
Service Authorization Reference
Service Authorization Reference
AWS DeepRacer
332
Service Authorization Reference
Service Authorization Reference
AWS DeepRacer
333
Service Authorization Reference
Service Authorization Reference
AWS DeepRacer
arn:${Partition}:deepracer:${Region}:
reinforcement_learning_model
${Account}:model/reinforcement_learning/
${ResourceId}
training_job arn:${Partition}:deepracer:${Region}:
${Account}:training_job/${ResourceId}
arn:${Partition}:deepracer:${Region}:
evaluation_job ${Account}: evaluation_job/${ResourceId}
arn:${Partition}:deepracer:${Region}:
leaderboard_evaluation_job
${Account}:leaderboard_evaluation_job/
${ResourceId}
track arn:${Partition}:deepracer:${Region}::track/
${ResourceId}
leaderboard arn:${Partition}:deepracer:
${Region}::leaderboard/${ResourceId}
334
Service Authorization Reference
Service Authorization Reference
Amazon Detective
References:
Topics
• Actions defined by Amazon Detective (p. 335)
• Resource types defined by Amazon Detective (p. 337)
• Condition keys for Amazon Detective (p. 337)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
335
Service Authorization Reference
Service Authorization Reference
Amazon Detective
336
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
Graph arn:${Partition}:detective:${Region}:
${Account}:graph:${ResourceId}
References:
Topics
• Actions defined by AWS Device Farm (p. 338)
• Resource types defined by AWS Device Farm (p. 346)
337
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 347)
deviceinstance
(p. 346)
upload
(p. 346)
338
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
339
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
upload
(p. 346)
testgrid-
session
(p. 347)
340
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
run
(p. 346)
suite
(p. 346)
test
(p. 346)
341
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
deviceinstance
(p. 346)
devicepool
(p. 347)
instanceprofile
(p. 347)
networkprofile
(p. 346)
project
(p. 346)
run
(p. 346)
session
(p. 347)
testgrid-
project
(p. 347)
testgrid-
session
(p. 347)
vpceconfiguration
(p. 347)
342
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
devicepool
(p. 347)
upload
(p. 346)
project*
(p. 346)
upload
(p. 346)
343
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
upload
(p. 346)
deviceinstance
(p. 346)
devicepool
(p. 347)
instanceprofile
(p. 347)
networkprofile
(p. 346)
project
(p. 346)
run
(p. 346)
session
(p. 347)
testgrid-
project
(p. 347)
testgrid-
session
(p. 347)
vpceconfiguration
(p. 347)
aws:RequestTag/
${TagKey}
(p. 347)
aws:TagKeys
(p. 347)
344
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
deviceinstance
(p. 346)
devicepool
(p. 347)
instanceprofile
(p. 347)
networkprofile
(p. 346)
project
(p. 346)
run
(p. 346)
session
(p. 347)
testgrid-
project
(p. 347)
testgrid-
session
(p. 347)
vpceconfiguration
(p. 347)
aws:TagKeys
(p. 347)
instanceprofile
(p. 347)
345
Service Authorization Reference
Service Authorization Reference
AWS Device Farm
job arn:${Partition}:devicefarm:${Region}:
${Account}:job:${ResourceId}
suite arn:${Partition}:devicefarm:${Region}:
${Account}:suite:${ResourceId}
test arn:${Partition}:devicefarm:${Region}:
${Account}:test:${ResourceId}
upload arn:${Partition}:devicefarm:${Region}:
${Account}:upload:${ResourceId}
artifact arn:${Partition}:devicefarm:${Region}:
${Account}:artifact:${ResourceId}
sample arn:${Partition}:devicefarm:${Region}:
${Account}:sample:${ResourceId}
arn:${Partition}:devicefarm:${Region}: aws:ResourceTag/
networkprofile ${Account}:networkprofile:${ResourceId} ${TagKey} (p. 347)
arn:${Partition}:devicefarm: aws:ResourceTag/
deviceinstance ${Region}::deviceinstance:${ResourceId} ${TagKey} (p. 347)
346
Service Authorization Reference
Service Authorization Reference
Amazon DevOps Guru
arn:${Partition}:devicefarm:${Region}: aws:ResourceTag/
instanceprofile ${Account}:instanceprofile:${ResourceId} ${TagKey} (p. 347)
arn:${Partition}:devicefarm:${Region}: aws:ResourceTag/
vpceconfiguration${Account}:vpceconfiguration:${ResourceId} ${TagKey} (p. 347)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
References:
347
Service Authorization Reference
Service Authorization Reference
Amazon DevOps Guru
• Learn how to secure this service and its resources by using IAM permission policies.
Topics
• Actions defined by Amazon DevOps Guru (p. 348)
• Resource types defined by Amazon DevOps Guru (p. 349)
• Condition keys for Amazon DevOps Guru (p. 350)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
348
Service Authorization Reference
Service Authorization Reference
Amazon DevOps Guru
349
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
topic arn:${Partition}:sns:${Region}:${Account}:
${TopicName}
References:
Topics
• Actions defined by AWS Direct Connect (p. 350)
• Resource types defined by AWS Direct Connect (p. 357)
• Condition keys for AWS Direct Connect (p. 357)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
350
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
aws:RequestTag/
${TagKey}
(p. 358)
aws:TagKeys
(p. 358)
aws:RequestTag/
${TagKey}
(p. 358)
aws:TagKeys
(p. 358)
aws:RequestTag/
${TagKey}
(p. 358)
aws:TagKeys
(p. 358)
aws:RequestTag/
${TagKey}
(p. 358)
351
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
dxlag*
(p. 357)
dxlag
(p. 357)
dxlag
(p. 357)
aws:TagKeys
(p. 358)
352
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
aws:TagKeys
(p. 358)
aws:TagKeys
(p. 358)
dxlag
(p. 357)
aws:RequestTag/
${TagKey}
(p. 358)
aws:TagKeys
(p. 358)
dxlag
(p. 357)
353
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
aws:RequestTag/
${TagKey}
(p. 358)
aws:TagKeys
(p. 358)
dxlag
(p. 357)
aws:RequestTag/
${TagKey}
(p. 358)
aws:TagKeys
(p. 358)
354
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
dxvif
(p. 357)
355
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
dxlag
(p. 357)
dxvif
(p. 357)
dxlag*
(p. 357)
dxvif
(p. 357)
aws:RequestTag/
${TagKey}
(p. 358)
aws:TagKeys
(p. 358)
356
Service Authorization Reference
Service Authorization Reference
AWS Direct Connect
dxvif
(p. 357)
aws:TagKeys
(p. 358)
dx-gateway arn:${Partition}:directconnect::
${Account}:dx-gateway/
${DirectConnectGatewayId}
To view the global condition keys that are available to all services, see Available global condition keys.
357
Service Authorization Reference
Service Authorization Reference
AWS Directory Service
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS Directory Service (p. 358)
• Resource types defined by AWS Directory Service (p. 365)
• Condition keys for AWS Directory Service (p. 365)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
358
Service Authorization Reference
Service Authorization Reference
AWS Directory Service
aws:TagKeys
(p. 365)
aws:TagKeys ec2:CreateNetworkInterfa
(p. 365)
ec2:CreateSecurityGroup
ec2:CreateTags
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
359
Service Authorization Reference
Service Authorization Reference
AWS Directory Service
aws:TagKeys ec2:CreateNetworkInterfa
(p. 365)
ec2:CreateSecurityGroup
ec2:CreateTags
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
aws:TagKeys ec2:CreateNetworkInterfa
(p. 365)
ec2:CreateSecurityGroup
ec2:CreateTags
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
360
Service Authorization Reference
Service Authorization Reference
AWS Directory Service
ec2:DescribeNetworkInter
ec2:RevokeSecurityGroup
ec2:RevokeSecurityGroup
361
Service Authorization Reference
Service Authorization Reference
AWS Directory Service
Read directory*
GetAuthorizedApplicationDetails (p. 365)
[permission
only]
362
Service Authorization Reference
Service Authorization Reference
AWS Directory Service
aws:RequestTag/
${TagKey}
(p. 365)
aws:TagKeys
(p. 365)
363
Service Authorization Reference
Service Authorization Reference
AWS Directory Service
364
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ String
${TagKey}
aws:ResourceTag/ String
${TagKey}
aws:TagKeys String
References:
365
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
Topics
• Actions defined by Amazon DynamoDB (p. 366)
• Resource types defined by Amazon DynamoDB (p. 373)
• Condition keys for Amazon DynamoDB (p. 374)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:Select
(p. 374)
dynamodb:Attributes
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
366
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:ReturnValues
(p. 374)
table*
(p. 373)
dynamodb:Attributes
(p. 374)
dynamodb:EnclosingOperation
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:ReturnValues
(p. 374)
367
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
368
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
dynamodb:EnclosingOperation
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:Select
(p. 374)
369
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
dynamodb:EnclosingOperation
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnValues
(p. 374)
dynamodb:EnclosingOperation
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:Attributes
(p. 374)
dynamodb:EnclosingOperation
(p. 374)
dynamodb:FullTableScan
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:Select
(p. 374)
370
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
dynamodb:Attributes
(p. 374)
dynamodb:EnclosingOperation
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnValues
(p. 374)
dynamodb:Attributes
(p. 374)
dynamodb:EnclosingOperation
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:ReturnValues
(p. 374)
dynamodb:Attributes
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:ReturnValues
(p. 374)
dynamodb:Select
(p. 374)
371
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
table*
(p. 373)
dynamodb:Attributes
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:ReturnValues
(p. 374)
dynamodb:Select
(p. 374)
table*
(p. 373)
table*
(p. 373)
372
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
dynamodb:EnclosingOperation
(p. 374)
dynamodb:LeadingKeys
(p. 374)
dynamodb:ReturnConsumedCapacity
(p. 374)
dynamodb:ReturnValues
(p. 374)
index arn:${Partition}:dynamodb:${Region}:
${Account}:table/${TableName}/index/
${IndexName}
stream arn:${Partition}:dynamodb:${Region}:
${Account}:table/${TableName}/stream/
${StreamLabel}
table arn:${Partition}:dynamodb:${Region}:
${Account}:table/${TableName}
373
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB
backup arn:${Partition}:dynamodb:${Region}:
${Account}:table/${TableName}/backup/
${BackupName}
export arn:${Partition}:dynamodb:${Region}:
${Account}:table/${TableName}/export/
${exportName}
global-table arn:${Partition}:dynamodb::
${Account}:global-table/${GlobalTableName}
To view the global condition keys that are available to all services, see Available global condition keys.
Note
For information about how to use context keys to refine DynamoDB access using an IAM policy,
see Using IAM Policy Conditions for Fine-Grained Access Control in the Amazon DynamoDB
Developer Guide.
Used to block Transactions APIs calls and allow the non- String
dynamodb:EnclosingOperation
Transaction APIs calls and vice-versa.
374
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB Accelerator (DAX)
References:
Topics
• Actions defined by Amazon DynamoDB Accelerator (DAX) (p. 375)
• Resource types defined by Amazon DynamoDB Accelerator (DAX) (p. 378)
• Condition keys for Amazon DynamoDB Accelerator (DAX) (p. 378)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
375
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB Accelerator (DAX)
ec2:CreateNetworkInterfa
ec2:DeleteNetworkInterfa
ec2:DescribeNetworkInter
ec2:DescribeSecurityGrou
ec2:DescribeSubnets
ec2:DescribeVpcs
iam:GetRole
iam:PassRole
376
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB Accelerator (DAX)
377
Service Authorization Reference
Service Authorization Reference
Amazon DynamoDB Accelerator (DAX)
application arn:${Partition}:dax:${Region}:
${Account}:cache/${ClusterName}
To view the global condition keys that are available to all services, see Available global condition keys.
378
Service Authorization Reference
Service Authorization Reference
Amazon EC2
Used to block Transactions APIs calls and allow the non- String
dax:EnclosingOperation
Transaction APIs calls and vice-versa.
References:
Topics
• Actions defined by Amazon EC2 (p. 379)
• Resource types defined by Amazon EC2 (p. 638)
• Condition keys for Amazon EC2 (p. 658)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
ec2:AvailabilityZone
(p. 659)
379
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
380
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc- aws:ResourceTag/
endpoint- ${TagKey}
service* (p. 658)
(p. 655)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
vpc- aws:ResourceTag/
peering- ${TagKey}
connection* (p. 658)
(p. 656)
ec2:AccepterVpc
(p. 658)
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
381
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
382
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
security- aws:ResourceTag/
group* ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
383
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
384
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
ec2:ResourceTag/
${TagKey}
(p. 661)
385
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
386
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
387
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet* aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
388
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
389
Service Authorization Reference
Service Authorization Reference
Amazon EC2
internet- aws:ResourceTag/
gateway ${TagKey}
(p. 644) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
vpn- aws:ResourceTag/
gateway ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
390
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment* (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
391
Service Authorization Reference
Service Authorization Reference
Amazon EC2
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ipv6pool- aws:ResourceTag/
ec2 ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
392
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
security- aws:ResourceTag/
group* ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
393
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
394
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
395
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface* ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
396
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
397
Service Authorization Reference
Service Authorization Reference
Amazon EC2
volume* aws:ResourceTag/
(p. 654) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
398
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpn- aws:ResourceTag/
gateway* ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
399
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
400
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
export- aws:ResourceTag/
instance- ${TagKey}
task (p. 658)
(p. 642)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
401
Service Authorization Reference
Service Authorization Reference
Amazon EC2
import- aws:ResourceTag/
snapshot- ${TagKey}
task (p. 658)
(p. 643)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
402
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
403
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
404
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Tenancy
(p. 661)
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
405
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
406
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
vpc aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
407
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
subnet* aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
408
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
409
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
410
Service Authorization Reference
Service Authorization Reference
Amazon EC2
image aws:ResourceTag/
(p. 643) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
411
Service Authorization Reference
Service Authorization Reference
Amazon EC2
launch- aws:ResourceTag/
template ${TagKey}
(p. 645) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
412
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
413
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
414
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
415
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
vpc aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
416
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
417
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
418
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance* aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
419
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
420
Service Authorization Reference
Service Authorization Reference
Amazon EC2
capacity- aws:ResourceTag/
reservation ${TagKey}
(p. 638) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
dedicated- aws:ResourceTag/
host ${TagKey}
(p. 640) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
421
Service Authorization Reference
Service Authorization Reference
Amazon EC2
image aws:ResourceTag/
(p. 643) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
422
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
placement- aws:ResourceTag/
group ${TagKey}
(p. 649) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
423
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
424
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
capacity- aws:ResourceTag/
reservation ${TagKey}
(p. 638) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
425
Service Authorization Reference
Service Authorization Reference
Amazon EC2
dedicated- aws:ResourceTag/
host ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
image aws:ResourceTag/
(p. 643) ${TagKey}
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
426
Service Authorization Reference
Service Authorization Reference
Amazon EC2
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
placement- aws:ResourceTag/
group ${TagKey}
(p. 649) (p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
427
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
428
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
virtual- (p. 658)
interface-
group* ec2:Region
(p. 647) (p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
429
Service Authorization Reference
Service Authorization Reference
Amazon EC2
local- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table-vpc-
association* aws:RequestTag/
(p. 646) ${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
430
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
natgateway* aws:ResourceTag/
(p. 647) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
431
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet* aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
432
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
433
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
434
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet* aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
435
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
436
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:InstanceType
(p. 659)
ec2:Region
(p. 661)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
carrier- aws:ResourceTag/
gateway ${TagKey}
(p. 639) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Tenancy
(p. 661)
437
Service Authorization Reference
Service Authorization Reference
Amazon EC2
egress- aws:ResourceTag/
only- ${TagKey}
internet- (p. 658)
gateway
(p. 641) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
internet- aws:ResourceTag/
gateway ${TagKey}
(p. 644) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
438
Service Authorization Reference
Service Authorization Reference
Amazon EC2
local- aws:ResourceTag/
gateway ${TagKey}
(p. 646) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
natgateway aws:ResourceTag/
(p. 647) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
439
Service Authorization Reference
Service Authorization Reference
Amazon EC2
prefix-list aws:ResourceTag/
(p. 649) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway ${TagKey}
(p. 653) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc- aws:ResourceTag/
peering- ${TagKey}
connection (p. 658)
(p. 656)
ec2:AccepterVpc
(p. 658)
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpn- aws:ResourceTag/
gateway ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
440
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
441
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
442
Service Authorization Reference
Service Authorization Reference
Amazon EC2
volume* aws:ResourceTag/
(p. 654) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
443
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
444
Service Authorization Reference
Service Authorization Reference
Amazon EC2
snapshot* aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
445
Service Authorization Reference
Service Authorization Reference
Amazon EC2
volume* aws:ResourceTag/
(p. 654) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
446
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
spot- ec2:ResourceTag/
instances- ${TagKey}
request* (p. 661)
(p. 651)
aws:ResourceTag/
${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
447
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet* aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
448
Service Authorization Reference
Service Authorization Reference
Amazon EC2
client- aws:ResourceTag/
vpn- ${TagKey}
endpoint (p. 658)
(p. 639)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
customer- aws:ResourceTag/
gateway ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
449
Service Authorization Reference
Service Authorization Reference
Amazon EC2
dedicated- aws:ResourceTag/
host ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
dhcp- aws:ResourceTag/
options ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
egress- aws:ResourceTag/
only- ${TagKey}
internet- (p. 658)
gateway
(p. 641) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
450
Service Authorization Reference
Service Authorization Reference
Amazon EC2
elastic- aws:ResourceTag/
gpu ${TagKey}
(p. 641) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ElasticGpuType
(p. 659)
elastic-ip aws:ResourceTag/
(p. 638) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
export- aws:ResourceTag/
image- ${TagKey}
task (p. 658)
(p. 641)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
export- aws:ResourceTag/
instance- ${TagKey}
task (p. 658)
(p. 642)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
451
Service Authorization Reference
Service Authorization Reference
Amazon EC2
fleet aws:ResourceTag/
(p. 642) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
fpga- aws:ResourceTag/
image ${TagKey}
(p. 642) (p. 658)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
host- aws:ResourceTag/
reservation ${TagKey}
(p. 642) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
452
Service Authorization Reference
Service Authorization Reference
Amazon EC2
image aws:ResourceTag/
(p. 643) ${TagKey}
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
import- aws:ResourceTag/
image- ${TagKey}
task (p. 658)
(p. 643)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
import- aws:ResourceTag/
snapshot- ${TagKey}
task (p. 658)
(p. 643)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
453
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
internet- aws:ResourceTag/
gateway ${TagKey}
(p. 644) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ipv4pool- aws:ResourceTag/
ec2 ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
454
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ipv6pool- aws:ResourceTag/
ec2 ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
launch- aws:ResourceTag/
template ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway ${TagKey}
(p. 646) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table
(p. 646) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
455
Service Authorization Reference
Service Authorization Reference
Amazon EC2
local- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table-
virtual- ec2:Region
interface- (p. 661)
group-
association ec2:ResourceTag/
(p. 646) ${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table-vpc-
association ec2:Region
(p. 646) (p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
virtual- (p. 658)
interface
(p. 647) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
virtual- (p. 658)
interface-
group ec2:Region
(p. 647) (p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
456
Service Authorization Reference
Service Authorization Reference
Amazon EC2
natgateway aws:ResourceTag/
(p. 647) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
network- aws:ResourceTag/
acl ${TagKey}
(p. 647) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
457
Service Authorization Reference
Service Authorization Reference
Amazon EC2
placement- aws:ResourceTag/
group ${TagKey}
(p. 649) (p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
prefix-list aws:ResourceTag/
(p. 649) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
reserved- aws:ResourceTag/
instances ${TagKey}
(p. 649) (p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Region
(p. 661)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
458
Service Authorization Reference
Service Authorization Reference
Amazon EC2
route- aws:ResourceTag/
table ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
459
Service Authorization Reference
Service Authorization Reference
Amazon EC2
spot- aws:ResourceTag/
fleet- ${TagKey}
request (p. 658)
(p. 651)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
spot- aws:ResourceTag/
instances- ${TagKey}
request (p. 658)
(p. 651)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
traffic- aws:ResourceTag/
mirror- ${TagKey}
filter (p. 658)
(p. 651)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
460
Service Authorization Reference
Service Authorization Reference
Amazon EC2
traffic- aws:ResourceTag/
mirror- ${TagKey}
session (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
traffic- aws:ResourceTag/
mirror- ${TagKey}
target (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway ${TagKey}
(p. 653) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
connect- (p. 658)
peer
(p. 652) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
461
Service Authorization Reference
Service Authorization Reference
Amazon EC2
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
volume aws:ResourceTag/
(p. 654) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
462
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
vpc- aws:ResourceTag/
endpoint ${TagKey}
(p. 654) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc- aws:ResourceTag/
endpoint- ${TagKey}
service (p. 658)
(p. 655)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
vpc- aws:ResourceTag/
flow-log ${TagKey}
(p. 655) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
463
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc- aws:ResourceTag/
peering- ${TagKey}
connection (p. 658)
(p. 656)
ec2:AccepterVpc
(p. 658)
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
464
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpn- aws:ResourceTag/
connection ${TagKey}
(p. 657) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
465
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
vpn- aws:ResourceTag/
gateway ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:CreateAction
(p. 659)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
traffic- ec2:Region
mirror- (p. 661)
filter-rule*
(p. 652)
466
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
traffic- aws:ResourceTag/
mirror- ${TagKey}
filter* (p. 658)
(p. 651)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
467
Service Authorization Reference
Service Authorization Reference
Amazon EC2
traffic- aws:ResourceTag/
mirror- ${TagKey}
session* (p. 658)
(p. 652)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
traffic- aws:ResourceTag/
mirror- ${TagKey}
target* (p. 658)
(p. 652)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
468
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
469
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain*
(p. 653) aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
470
Service Authorization Reference
Service Authorization Reference
Amazon EC2
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment* (p. 658)
(p. 652)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
471
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
472
Service Authorization Reference
Service Authorization Reference
Amazon EC2
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment* (p. 658)
(p. 652)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
473
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
474
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
475
Service Authorization Reference
Service Authorization Reference
Amazon EC2
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
476
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ipv6pool- aws:ResourceTag/
ec2 ${TagKey}
(p. 645) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
477
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc- aws:ResourceTag/
endpoint* ${TagKey}
(p. 654) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
route- aws:ResourceTag/
table ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
478
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
479
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc- aws:ResourceTag/
endpoint- ${TagKey}
service (p. 658)
(p. 655)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
480
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc- aws:ResourceTag/
peering- ${TagKey}
connection* (p. 658)
(p. 656)
ec2:AccepterVpc
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
481
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpn- aws:ResourceTag/
connection* ${TagKey}
(p. 657) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
482
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RekeyFuzzPercentage
(p. 661)
ec2:RekeyMarginTimeSeconds
(p. 661)
ec2:RoutingType
(p. 661)
transit- aws:ResourceTag/
gateway ${TagKey}
(p. 653) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpn- aws:ResourceTag/
gateway ${TagKey}
(p. 658) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
483
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
484
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Tenancy
(p. 661)
485
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
486
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
487
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
488
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
489
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
490
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
491
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
492
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Region
(p. 661)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
prefix-list aws:ResourceTag/
(p. 649) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
493
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
494
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
495
Service Authorization Reference
Service Authorization Reference
Amazon EC2
client- aws:ResourceTag/
vpn- ${TagKey}
endpoint (p. 658)
(p. 639)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
customer- aws:ResourceTag/
gateway ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
496
Service Authorization Reference
Service Authorization Reference
Amazon EC2
dedicated- aws:ResourceTag/
host ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
dhcp- aws:ResourceTag/
options ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
egress- aws:ResourceTag/
only- ${TagKey}
internet- (p. 658)
gateway
(p. 641) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
497
Service Authorization Reference
Service Authorization Reference
Amazon EC2
elastic- aws:ResourceTag/
gpu ${TagKey}
(p. 641) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ElasticGpuType
(p. 659)
elastic-ip aws:ResourceTag/
(p. 638) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
export- aws:ResourceTag/
image- ${TagKey}
task (p. 658)
(p. 641)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
export- aws:ResourceTag/
instance- ${TagKey}
task (p. 658)
(p. 642)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
498
Service Authorization Reference
Service Authorization Reference
Amazon EC2
fleet aws:ResourceTag/
(p. 642) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
fpga- aws:ResourceTag/
image ${TagKey}
(p. 642) (p. 658)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
host- aws:ResourceTag/
reservation ${TagKey}
(p. 642) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
499
Service Authorization Reference
Service Authorization Reference
Amazon EC2
image aws:ResourceTag/
(p. 643) ${TagKey}
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
import- aws:ResourceTag/
image- ${TagKey}
task (p. 658)
(p. 643)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
import- aws:ResourceTag/
snapshot- ${TagKey}
task (p. 658)
(p. 643)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
500
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
internet- aws:ResourceTag/
gateway ${TagKey}
(p. 644) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ipv4pool- aws:ResourceTag/
ec2 ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
501
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ipv6pool- aws:ResourceTag/
ec2 ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
launch- aws:ResourceTag/
template ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway ${TagKey}
(p. 646) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table
(p. 646) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
502
Service Authorization Reference
Service Authorization Reference
Amazon EC2
local- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table-
virtual- ec2:Region
interface- (p. 661)
group-
association ec2:ResourceTag/
(p. 646) ${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table-vpc-
association ec2:Region
(p. 646) (p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
virtual- (p. 658)
interface
(p. 647) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
local- aws:ResourceTag/
gateway- ${TagKey}
virtual- (p. 658)
interface-
group ec2:Region
(p. 647) (p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
503
Service Authorization Reference
Service Authorization Reference
Amazon EC2
natgateway aws:ResourceTag/
(p. 647) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
network- aws:ResourceTag/
acl ${TagKey}
(p. 647) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
504
Service Authorization Reference
Service Authorization Reference
Amazon EC2
placement- aws:ResourceTag/
group ${TagKey}
(p. 649) (p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
prefix-list aws:ResourceTag/
(p. 649) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
reserved- aws:ResourceTag/
instances ${TagKey}
(p. 649) (p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Region
(p. 661)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
505
Service Authorization Reference
Service Authorization Reference
Amazon EC2
route- aws:ResourceTag/
table ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
506
Service Authorization Reference
Service Authorization Reference
Amazon EC2
spot- aws:ResourceTag/
fleet- ${TagKey}
request (p. 658)
(p. 651)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
spot- aws:ResourceTag/
instances- ${TagKey}
request (p. 658)
(p. 651)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
traffic- aws:ResourceTag/
mirror- ${TagKey}
filter (p. 658)
(p. 651)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
507
Service Authorization Reference
Service Authorization Reference
Amazon EC2
traffic- aws:ResourceTag/
mirror- ${TagKey}
session (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
traffic- aws:ResourceTag/
mirror- ${TagKey}
target (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway ${TagKey}
(p. 653) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
connect- (p. 658)
peer
(p. 652) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
508
Service Authorization Reference
Service Authorization Reference
Amazon EC2
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
volume aws:ResourceTag/
(p. 654) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
509
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
vpc- aws:ResourceTag/
endpoint ${TagKey}
(p. 654) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc- aws:ResourceTag/
endpoint- ${TagKey}
service (p. 658)
(p. 655)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
vpc- aws:ResourceTag/
flow-log ${TagKey}
(p. 655) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
510
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpc- aws:ResourceTag/
peering- ${TagKey}
connection (p. 658)
(p. 656)
ec2:AccepterVpc
(p. 658)
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
511
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpn- aws:ResourceTag/
connection ${TagKey}
(p. 657) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
512
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
vpn- aws:ResourceTag/
gateway ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
513
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
514
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
515
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
516
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc- aws:ResourceTag/
endpoint- ${TagKey}
service* (p. 658)
(p. 655)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
517
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
518
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
519
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
520
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
521
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
522
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
523
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
524
Service Authorization Reference
Service Authorization Reference
Amazon EC2
525
Service Authorization Reference
Service Authorization Reference
Amazon EC2
526
Service Authorization Reference
Service Authorization Reference
Amazon EC2
527
Service Authorization Reference
Service Authorization Reference
Amazon EC2
528
Service Authorization Reference
Service Authorization Reference
Amazon EC2
529
Service Authorization Reference
Service Authorization Reference
Amazon EC2
530
Service Authorization Reference
Service Authorization Reference
Amazon EC2
531
Service Authorization Reference
Service Authorization Reference
Amazon EC2
532
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
533
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc* aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
534
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
535
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface* ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
536
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
537
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
538
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpn- aws:ResourceTag/
gateway* ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
539
Service Authorization Reference
Service Authorization Reference
Amazon EC2
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
vpn- aws:ResourceTag/
gateway* ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
540
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
541
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
542
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
543
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
544
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
545
Service Authorization Reference
Service Authorization Reference
Amazon EC2
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment* (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
546
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
547
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
vpn- aws:ResourceTag/
gateway* ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
548
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
549
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
550
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
551
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
552
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
553
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
554
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
555
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
556
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:InstanceType
(p. 659)
ec2:Region
(p. 661)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
557
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
558
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
559
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
560
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
561
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
562
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
vpc aws:ResourceTag/
(p. 655) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
563
Service Authorization Reference
Service Authorization Reference
Amazon EC2
image aws:ResourceTag/
(p. 643) ${TagKey}
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
launch- aws:ResourceTag/
template ${TagKey}
(p. 645) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
564
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
565
Service Authorization Reference
Service Authorization Reference
Amazon EC2
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
566
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
567
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
568
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
volume aws:ResourceTag/
(p. 654) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
569
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
capacity- aws:ResourceTag/
reservation ${TagKey}
(p. 638) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
570
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
571
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
572
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
573
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
574
Service Authorization Reference
Service Authorization Reference
Amazon EC2
dedicated- aws:ResourceTag/
host ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
placement- aws:ResourceTag/
group ${TagKey}
(p. 649) (p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
575
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
576
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
577
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Region
(p. 661)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
578
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
traffic- ec2:Region
mirror- (p. 661)
filter-rule*
(p. 652)
579
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
traffic- aws:ResourceTag/
mirror- ${TagKey}
filter (p. 658)
(p. 651)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
traffic- aws:ResourceTag/
mirror- ${TagKey}
target (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
580
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
route- (p. 658)
table*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
581
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
582
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
583
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
route- aws:ResourceTag/
table ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
584
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc- aws:ResourceTag/
endpoint- ${TagKey}
service* (p. 658)
(p. 655)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
585
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Tenancy
(p. 661)
586
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
587
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
customer- aws:ResourceTag/
gateway ${TagKey}
(p. 640) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway ${TagKey}
(p. 653) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpn- aws:ResourceTag/
gateway ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
588
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
589
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
590
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
591
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
592
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
593
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
594
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
595
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
596
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
597
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain*
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
598
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
multicast- (p. 658)
domain
(p. 653) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
599
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc- aws:ResourceTag/
endpoint- ${TagKey}
service* (p. 658)
(p. 655)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
600
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:Quantity
(p. 661)
ec2:HostRecovery
(p. 659)
601
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
602
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
carrier- aws:ResourceTag/
gateway ${TagKey}
(p. 639) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:Tenancy
(p. 661)
egress- aws:ResourceTag/
only- ${TagKey}
internet- (p. 658)
gateway
(p. 641) ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
603
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
internet- aws:ResourceTag/
gateway ${TagKey}
(p. 644) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
604
Service Authorization Reference
Service Authorization Reference
Amazon EC2
local- aws:ResourceTag/
gateway ${TagKey}
(p. 646) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
natgateway aws:ResourceTag/
(p. 647) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
605
Service Authorization Reference
Service Authorization Reference
Amazon EC2
prefix-list aws:ResourceTag/
(p. 649) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway ${TagKey}
(p. 653) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpc- aws:ResourceTag/
peering- ${TagKey}
connection (p. 658)
(p. 656)
ec2:AccepterVpc
(p. 658)
ec2:Region
(p. 661)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
vpn- aws:ResourceTag/
gateway ${TagKey}
(p. 658) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
606
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
ec2:ResourceTag/
${TagKey}
(p. 661)
transit- aws:ResourceTag/
gateway- ${TagKey}
attachment (p. 658)
(p. 652)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
607
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
608
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
609
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
610
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
611
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
612
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
613
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
614
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
615
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance* aws:ResourceTag/
(p. 644) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
616
Service Authorization Reference
Service Authorization Reference
Amazon EC2
network- aws:ResourceTag/
interface* ${TagKey}
(p. 648) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
security- aws:ResourceTag/
group* ${TagKey}
(p. 650) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
617
Service Authorization Reference
Service Authorization Reference
Amazon EC2
subnet* aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
618
Service Authorization Reference
Service Authorization Reference
Amazon EC2
volume* aws:ResourceTag/
(p. 654) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
619
Service Authorization Reference
Service Authorization Reference
Amazon EC2
capacity- aws:ResourceTag/
reservation ${TagKey}
(p. 638) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
elastic- aws:ResourceTag/
gpu ${TagKey}
(p. 641) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ElasticGpuType
(p. 659)
elastic-
inference
(p. 641)
620
Service Authorization Reference
Service Authorization Reference
Amazon EC2
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
launch- aws:ResourceTag/
template ${TagKey}
(p. 645) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
621
Service Authorization Reference
Service Authorization Reference
Amazon EC2
placement- aws:ResourceTag/
group ${TagKey}
(p. 649) (p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
aws:RequestTag/
${TagKey}
(p. 658)
aws:TagKeys
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
622
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance*
(p. 644)
security-
group*
(p. 650)
volume*
(p. 654)
key-pair
(p. 645)
placement-
group
(p. 649)
snapshot
(p. 650)
instance*
(p. 644)
security-
group*
(p. 650)
key-pair
(p. 645)
placement-
group
(p. 649)
snapshot
(p. 650)
623
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance*
(p. 644)
network-
interface*
(p. 648)
security-
group*
(p. 650)
volume*
(p. 654)
key-pair
(p. 645)
placement-
group
(p. 649)
snapshot
(p. 650)
624
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance*
(p. 644)
network-
interface*
(p. 648)
security-
group*
(p. 650)
subnet*
(p. 651)
volume*
(p. 654)
key-pair
(p. 645)
placement-
group
(p. 649)
snapshot
(p. 650)
instance*
(p. 644)
network-
interface*
(p. 648)
security-
group*
(p. 650)
key-pair
(p. 645)
placement-
group
(p. 649)
snapshot
(p. 650)
625
Service Authorization Reference
Service Authorization Reference
Amazon EC2
instance*
(p. 644)
network-
interface*
(p. 648)
security-
group*
(p. 650)
subnet*
(p. 651)
key-pair
(p. 645)
placement-
group
(p. 649)
snapshot
(p. 650)
ec2:ImageType
(p. 659)
ec2:Owner
(p. 660)
ec2:Public
(p. 661)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
626
Service Authorization Reference
Service Authorization Reference
Amazon EC2
key-pair aws:ResourceTag/
(p. 645) ${TagKey}
(p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
network- aws:ResourceTag/
interface ${TagKey}
(p. 648) (p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
placement- aws:ResourceTag/
group ${TagKey}
(p. 649) (p. 658)
ec2:PlacementGroupStrategy
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
627
Service Authorization Reference
Service Authorization Reference
Amazon EC2
security- aws:ResourceTag/
group ${TagKey}
(p. 650) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
snapshot aws:ResourceTag/
(p. 650) ${TagKey}
(p. 658)
ec2:Owner
(p. 660)
ec2:ParentVolume
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
subnet aws:ResourceTag/
(p. 651) ${TagKey}
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
628
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
629
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
630
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
631
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
632
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:ServerCertificateArn
(p. 661)
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:SamlProviderArn
(p. 661)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
633
Service Authorization Reference
Service Authorization Reference
Amazon EC2
vpn- aws:ResourceTag/
connection ${TagKey}
(p. 657) (p. 658)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
634
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
635
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Subnet
(p. 661)
ec2:Vpc
(p. 662)
ec2:AssociatePublicIpAddress
(p. 658)
636
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:RootDeviceType
(p. 661)
ec2:Tenancy
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
637
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Region
(p. 661)
ec2:ResourceTag/
${TagKey}
(p. 661)
ec2:Vpc
(p. 662)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
638
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
certificate arn:${Partition}:acm:${Region}:
${Account}:certificate/${CertificateId}
ec2:ClientRootCertificateChainArn
(p. 659)
ec2:CloudwatchLogGroupArn
(p. 659)
ec2:CloudwatchLogStreamArn
(p. 659)
ec2:DirectoryArn
(p. 659)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:SamlProviderArn
(p. 661)
ec2:ServerCertificateArn
(p. 661)
639
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:AutoPlacement
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:HostRecovery
(p. 659)
ec2:InstanceType
(p. 659)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
640
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ElasticGpuType
(p. 659)
ec2:ResourceTag/
${TagKey} (p. 661)
elastic- arn:${Partition}:elastic-inference:
inference ${Region}:${Account}:elastic-inference-
accelerator/${ElasticInferenceAcceleratorId}
ec2:ResourceTag/
${TagKey} (p. 661)
641
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
642
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ImageType
(p. 659)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:RootDeviceType
(p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
643
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:ResourceTag/
${TagKey} (p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:EbsOptimized
(p. 659)
ec2:InstanceProfile
(p. 659)
ec2:InstanceType
(p. 659)
ec2:PlacementGroup
(p. 660)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:RootDeviceType
(p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
644
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
645
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
646
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
647
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:AssociatePublicIpAddress
(p. 658)
ec2:AuthorizedService
(p. 659)
ec2:AvailabilityZone
(p. 659)
ec2:ResourceTag/
${TagKey} (p. 661)
648
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:PlacementGroupStrategy
(p. 660)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:AvailabilityZone
(p. 659)
ec2:InstanceType
(p. 659)
ec2:ReservedInstancesOfferingType
(p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
role arn:${Partition}:iam::${Account}:role/
${RoleNameWithPath}
649
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ParentVolume
(p. 660)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:SnapshotTime
(p. 661)
ec2:VolumeSize
(p. 662)
650
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
651
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
652
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
653
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:ResourceTag/
${TagKey} (p. 658)
ec2:AvailabilityZone
(p. 659)
ec2:Encrypted
(p. 659)
ec2:ParentSnapshot
(p. 660)
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:VolumeIops
(p. 662)
ec2:VolumeSize
(p. 662)
ec2:VolumeThroughput
(p. 662)
ec2:VolumeType
(p. 662)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
654
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ResourceTag/
${TagKey} (p. 661)
ec2:VpceServicePrivateDnsName
(p. 662)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
655
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:AccepterVpc
(p. 658)
ec2:RequesterVpc
(p. 661)
ec2:ResourceTag/
${TagKey} (p. 661)
656
Service Authorization Reference
Service Authorization Reference
Amazon EC2
aws:ResourceTag/
${TagKey} (p. 658)
ec2:AuthenticationType
(p. 658)
ec2:DPDTimeoutSeconds
(p. 659)
ec2:GatewayType
(p. 659)
ec2:IKEVersions
(p. 659)
ec2:InsideTunnelCidr
(p. 659)
ec2:Phase1DHGroupNumbers
(p. 660)
ec2:Phase1EncryptionAlgorithms
(p. 660)
ec2:Phase1IntegrityAlgorithms
(p. 660)
ec2:Phase1LifetimeSeconds
(p. 660)
ec2:Phase2DHGroupNumbers
(p. 660)
ec2:Phase2EncryptionAlgorithms
(p. 660)
ec2:Phase2IntegrityAlgorithms
(p. 660)
ec2:Phase2LifetimeSeconds
(p. 660)
ec2:PresharedKeys
(p. 661)
ec2:RekeyFuzzPercentage
(p. 661)
ec2:RekeyMarginTimeSeconds
(p. 661)
657
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:RoutingType
(p. 661)
aws:ResourceTag/
${TagKey} (p. 658)
ec2:ResourceTag/
${TagKey} (p. 661)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by a tag key and value pair that is allowed in String
${TagKey} the request
Filters access by the preface string for a tag key and value String
aws:ResourceTag/ pair that are attached to a resource
aws:TagKeys Filters access by a list of tag keys that are allowed in the String
request
Filters access by the authentication type for the VPN tunnel String
ec2:AuthenticationType
endpoints
658
Service Authorization Reference
Service Authorization Reference
Amazon EC2
Filters access by the AWS service that has permission to use String
ec2:AuthorizedService
a resource
Filters access by the ARN of the client root certificate chain ARN
ec2:ClientRootCertificateChainArn
Filters access by the ARN of the CloudWatch Logs log group ARN
ec2:CloudwatchLogGroupArn
Filters access by the ARN of the CloudWatch Logs log stream ARN
ec2:CloudwatchLogStreamArn
ec2:GatewayType Filters access by the gateway type for a VPN endpoint on the String
AWS side of a VPN connection
ec2:IKEVersions Filters access by the internet key exchange (IKE) versions String
that are permitted for a VPN tunnel
ec2:ImageType Filters access by the type of image (machine, aki, or ari) String
659
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:Owner Filters access by the owner of the resource (amazon, aws- String
marketplace, or an AWS account ID)
Filters access by the ARN of the parent volume from which ARN
ec2:ParentVolume the snapshot was created
660
Service Authorization Reference
Service Authorization Reference
Amazon EC2
ec2:ProductCode Filters access by the product code that is associated with the String
AMI
ec2:Public Filters access by whether the image has public launch Bool
permissions
Filters access by the margin time before the phase 2 lifetime Numeric
ec2:RekeyMarginTimeSeconds
expires for a VPN tunnel
ec2:RequesterVpc Filters access by the ARN of a requester VPC in a VPC peering ARN
connection
ec2:ResourceTag/ Filters access by the preface string for a tag key and value String
pair that are attached to a resource
ec2:ResourceTag/ Filters access by a tag key and value pair of a resource String
${TagKey}
ec2:RoleDelivery Filters access by the version of the instance metadata service Numeric
for retrieving IAM role credentials for EC2
Filters access by the root device type of the instance (ebs or String
ec2:RootDeviceType instance-store)
ec2:RoutingType Filters access by the routing type for the VPN connection String
Filters access by the ARN of the IAM SAML identity provider ARN
ec2:SamlProviderArn
Filters access by the ARN of the instance from which the ARN
ec2:SourceInstanceARN
request originated
ec2:Tenancy Filters access by the tenancy of the VPC or instance (default, String
dedicated, or host)
661
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
ec2:VolumeType Filters access by the type of volume (gp2, gp3, io1, io2, st1, String
sc1, or standard)
Filters access by the private DNS name of the VPC endpoint String
ec2:VpceServicePrivateDnsName
service
References:
Topics
• Actions defined by Amazon EC2 Auto Scaling (p. 662)
• Resource types defined by Amazon EC2 Auto Scaling (p. 671)
• Condition keys for Amazon EC2 Auto Scaling (p. 672)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
662
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
autoscaling:TargetGroupARNs
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
autoscaling:LoadBalancerNames
(p. 672)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
663
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
aws:ResourceTag/
${TagKey}
(p. 673)
autoscaling:InstanceTypes
(p. 672)
autoscaling:LaunchConfigurationName
(p. 672)
autoscaling:LaunchTemplateVersionSp
(p. 672)
autoscaling:LoadBalancerNames
(p. 672)
autoscaling:MaxSize
(p. 672)
autoscaling:MinSize
(p. 672)
autoscaling:TargetGroupARNs
(p. 673)
autoscaling:VPCZoneIdentifiers
(p. 673)
aws:RequestTag/
${TagKey}
(p. 673)
aws:TagKeys
(p. 673)
664
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
autoscaling:ImageId
(p. 672)
autoscaling:InstanceType
(p. 672)
autoscaling:SpotPrice
(p. 673)
autoscaling:MetadataHttpTokens
(p. 672)
autoscaling:MetadataHttpPutResponse
(p. 672)
autoscaling:MetadataHttpEndpoint
(p. 672)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:RequestTag/
${TagKey}
(p. 673)
aws:TagKeys
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
665
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:RequestTag/
${TagKey}
(p. 673)
aws:TagKeys
(p. 673)
666
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
667
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
autoscaling:TargetGroupARNs
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
autoscaling:LoadBalancerNames
(p. 672)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
668
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
669
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
autoscaling:MaxSize
(p. 672)
autoscaling:MinSize
(p. 672)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
670
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
aws:ResourceTag/
${TagKey}
(p. 673)
aws:ResourceTag/
${TagKey}
(p. 673)
autoscaling:InstanceTypes
(p. 672)
autoscaling:LaunchConfigurationName
(p. 672)
autoscaling:LaunchTemplateVersionSp
(p. 672)
autoscaling:MaxSize
(p. 672)
autoscaling:MinSize
(p. 672)
autoscaling:VPCZoneIdentifiers
(p. 673)
671
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Auto Scaling
arn:${Partition}:autoscaling: autoscaling:ResourceTag/
autoScalingGroup${Region}:${Account}:autoScalingGroup: ${TagKey} (p. 673)
${GroupId}:autoScalingGroupName/
${GroupFriendlyName} aws:ResourceTag/
${TagKey} (p. 673)
arn:${Partition}:autoscaling:${Region}:
launchConfiguration
${Account}:launchConfiguration:
${Id}:launchConfigurationName/
${LaunchConfigurationName}
To view the global condition keys that are available to all services, see Available global condition keys.
672
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Image Builder
References:
Topics
• Actions defined by Amazon EC2 Image Builder (p. 673)
• Resource types defined by Amazon EC2 Image Builder (p. 679)
• Condition keys for Amazon EC2 Image Builder (p. 680)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
673
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Image Builder
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
kmsKey
(p. 680)
aws:RequestTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
aws:RequestTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
aws:RequestTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
aws:RequestTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
674
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Image Builder
aws:RequestTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
aws:RequestTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
aws:RequestTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
imagebuilder:CreatedResourceTagKeys
(p. 680)
imagebuilder:CreatedResourceTag/
<key>
(p. 680)
675
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Image Builder
aws:ResourceTag/
${TagKey}
(p. 680)
676
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Image Builder
distributionConfiguration
(p. 679)
image
(p. 679)
imagePipeline
(p. 680)
imageRecipe
(p. 679)
infrastructureConfiguration
(p. 680)
aws:ResourceTag/
${TagKey}
(p. 680)
containerRecipe
(p. 680)
677
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Image Builder
distributionConfiguration
(p. 679)
image
(p. 679)
imagePipeline
(p. 680)
imageRecipe
(p. 679)
infrastructureConfiguration
(p. 680)
aws:TagKeys
(p. 680)
aws:RequestTag/
${TagKey}
(p. 680)
aws:ResourceTag/
${TagKey}
(p. 680)
containerRecipe
(p. 680)
distributionConfiguration
(p. 679)
image
(p. 679)
imagePipeline
(p. 680)
imageRecipe
(p. 679)
infrastructureConfiguration
(p. 680)
aws:ResourceTag/
${TagKey}
(p. 680)
aws:TagKeys
(p. 680)
678
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Image Builder
aws:ResourceTag/
${TagKey}
(p. 680)
imagebuilder:CreatedResourceTagKeys
(p. 680)
imagebuilder:CreatedResourceTag/
<key>
(p. 680)
arn:${Partition}:imagebuilder:${Region}: aws:ResourceTag/
componentVersion
${Account}:component/${ComponentName}/ ${TagKey} (p. 680)
${ComponentVersion}
arn:${Partition}:imagebuilder:${Region}: aws:ResourceTag/
distributionConfiguration
${Account}:distribution-configuration/ ${TagKey} (p. 680)
${DistributionConfigurationName}
679
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Instance Connect
arn:${Partition}:imagebuilder: aws:ResourceTag/
containerRecipe ${Region}:${Account}:container- ${TagKey} (p. 680)
recipe/${ContainerRecipeName}/
${ContainerRecipeVersion}
arn:${Partition}:imagebuilder:${Region}: aws:ResourceTag/
infrastructureConfiguration
${Account}:infrastructure-configuration/ ${TagKey} (p. 680)
${ResourceId}
kmsKey arn:${Partition}:kms:${Region}:
${Account}:key/${KeyId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions by the presence of tag key-value pairs in the String
${TagKey} request
aws:TagKeys Filters actions by the presence of tag keys in the request String
References:
680
Service Authorization Reference
Service Authorization Reference
Amazon EC2 Instance Connect
Topics
• Actions defined by Amazon EC2 Instance Connect (p. 681)
• Resource types defined by Amazon EC2 Instance Connect (p. 681)
• Condition keys for Amazon EC2 Instance Connect (p. 682)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
ec2:ResourceTag/
${TagKey} (p. 682)
681
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
To view the global condition keys that are available to all services, see Available global condition keys.
ec2:ResourceTag/ Filters actions based on the tags associated with the String
${TagKey} resource
ec2:osuser Filters access by specifying the default user name for the String
AMI that you used to launch your instance
References:
Topics
• Actions defined by AWS Elastic Beanstalk (p. 682)
• Resource types defined by AWS Elastic Beanstalk (p. 689)
• Condition keys for AWS Elastic Beanstalk (p. 690)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
682
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
configurationtemplate
(p. 690)
environment
(p. 690)
platform
(p. 690)
aws:RequestTag/
${TagKey}
(p. 690)
aws:TagKeys
(p. 690)
aws:RequestTag/
${TagKey}
(p. 690)
683
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
aws:RequestTag/
${TagKey}
(p. 690)
aws:TagKeys
(p. 690)
elasticbeanstalk:FromApplication
(p. 690)
elasticbeanstalk:FromApplicationVersio
(p. 690)
elasticbeanstalk:FromConfigurationTem
(p. 690)
elasticbeanstalk:FromEnvironment
(p. 691)
elasticbeanstalk:FromSolutionStack
(p. 691)
elasticbeanstalk:FromPlatform
(p. 691)
aws:RequestTag/
${TagKey}
(p. 690)
aws:TagKeys
(p. 690)
684
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
elasticbeanstalk:FromApplicationVersio
(p. 690)
elasticbeanstalk:FromConfigurationTem
(p. 690)
elasticbeanstalk:FromSolutionStack
(p. 691)
elasticbeanstalk:FromPlatform
(p. 691)
aws:RequestTag/
${TagKey}
(p. 690)
aws:TagKeys
(p. 690)
aws:TagKeys
(p. 690)
685
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
solutionstack
(p. 690)
configurationtemplate
elasticbeanstalk:InApplication
(p. 690) (p. 691)
686
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
environment elasticbeanstalk:InApplication
(p. 690) (p. 691)
configurationtemplate
(p. 690)
environment
(p. 690)
platform
(p. 690)
687
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
applicationversion
(p. 690)
configurationtemplate
(p. 690)
environment
(p. 690)
platform
(p. 690)
aws:TagKeys
(p. 690)
elasticbeanstalk:FromEnvironment
(p. 691)
688
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
elasticbeanstalk:FromApplication
(p. 690)
elasticbeanstalk:FromApplicationVersio
(p. 690)
elasticbeanstalk:FromConfigurationTem
(p. 690)
elasticbeanstalk:FromEnvironment
(p. 691)
elasticbeanstalk:FromSolutionStack
(p. 691)
elasticbeanstalk:FromPlatform
(p. 691)
elasticbeanstalk:FromApplicationVersio
(p. 690)
elasticbeanstalk:FromConfigurationTem
(p. 690)
elasticbeanstalk:FromSolutionStack
(p. 691)
elasticbeanstalk:FromPlatform
(p. 691)
689
Service Authorization Reference
Service Authorization Reference
AWS Elastic Beanstalk
arn:${Partition}:elasticbeanstalk: aws:ResourceTag/
applicationversion${Region}:${Account}:applicationversion/ ${TagKey} (p. 690)
${ApplicationName}/${VersionLabel}
elasticbeanstalk:InApplication
(p. 691)
arn:${Partition}:elasticbeanstalk: aws:ResourceTag/
configurationtemplate
${Region}:${Account}:configurationtemplate/ ${TagKey} (p. 690)
${ApplicationName}/${TemplateName}
elasticbeanstalk:InApplication
(p. 691)
solutionstack arn:${Partition}:elasticbeanstalk:
${Region}::solutionstack/
${SolutionStackName}
platform arn:${Partition}:elasticbeanstalk:
${Region}::platform/
${PlatformNameWithVersion}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request.
aws:TagKeys Filters actions based on the presence of tag keys in the String
request.
690
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Block Store
References:
Topics
• Actions defined by Amazon Elastic Block Store (p. 691)
• Resource types defined by Amazon Elastic Block Store (p. 692)
• Condition keys for Amazon Elastic Block Store (p. 693)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
691
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Block Store
aws:RequestTag/
${TagKey}
(p. 693)
aws:TagKeys
(p. 693)
aws:ResourceTag/
${TagKey} (p. 693)
692
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Registry
ebs:Description
(p. 693)
ebs:ParentSnapshot
(p. 693)
ebs:VolumeSize
(p. 693)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by a tag key and value pair that is allowed in String
${TagKey} the request
aws:TagKeys Filters access by a list of tag keys that are allowed in the String
request
ebs:VolumeSize Filters access by the size of the volume for the snapshot Numeric
being created, in GiB.
References:
693
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Registry
Topics
• Actions defined by Amazon Elastic Container Registry (p. 694)
• Resource types defined by Amazon Elastic Container Registry (p. 697)
• Condition keys for Amazon Elastic Container Registry (p. 697)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 697)
aws:TagKeys
(p. 697)
694
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Registry
695
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Registry
aws:RequestTag/
${TagKey}
(p. 697)
aws:TagKeys
(p. 697)
696
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Registry Public
ecr:ResourceTag/
${TagKey} (p. 697)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the tags
References:
697
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Registry Public
Topics
• Actions defined by Amazon Elastic Container Registry Public (p. 698)
• Resource types defined by Amazon Elastic Container Registry Public (p. 700)
• Condition keys for Amazon Elastic Container Registry Public (p. 700)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
698
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Registry Public
699
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
repository arn:${Partition}:ecr-public::
${Account}:repository/${RepositoryName}
registry arn:${Partition}:ecr-public::
${Account}:registry/${RegistryId}
References:
Topics
• Actions defined by Amazon Elastic Container Service (p. 700)
• Resource types defined by Amazon Elastic Container Service (p. 708)
• Condition keys for Amazon Elastic Container Service (p. 709)
700
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 709)
aws:TagKeys
(p. 709)
ecs:capacity-
provider
(p. 710)
ecs:task-
definition
(p. 710)
aws:RequestTag/
${TagKey}
(p. 709)
aws:TagKeys
(p. 709)
ecs:service
(p. 710)
701
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
ecs:cluster
(p. 710)
ecs:cluster
(p. 710)
ecs:cluster
(p. 710)
ecs:service
(p. 710)
702
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
ecs:cluster
(p. 710)
ecs:cluster
(p. 710)
ecs:cluster
(p. 710)
ecs:service
(p. 710)
ecs:cluster
(p. 710)
703
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
container-
instance
(p. 708)
task
(p. 709)
task-
definition
(p. 709)
ecs:cluster
(p. 710)
704
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
ecs:cluster
(p. 710)
aws:RequestTag/
${TagKey}
(p. 709)
aws:TagKeys
(p. 709)
aws:TagKeys
(p. 709)
705
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
ecs:cluster
(p. 710)
ecs:capacity-
provider
(p. 710)
aws:RequestTag/
${TagKey}
(p. 709)
aws:TagKeys
(p. 709)
ecs:container-
instances
(p. 710)
aws:RequestTag/
${TagKey}
(p. 709)
aws:TagKeys
(p. 709)
ecs:cluster
(p. 710)
ecs:cluster
(p. 710)
706
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
container-
instance
(p. 708)
service
(p. 709)
task
(p. 709)
task-
definition
(p. 709)
aws:TagKeys
(p. 709)
aws:RequestTag/
${TagKey}
(p. 709)
container-
instance
(p. 708)
service
(p. 709)
task
(p. 709)
task-
definition
(p. 709)
aws:TagKeys
(p. 709)
ecs:cluster
(p. 710)
707
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
ecs:cluster
(p. 710)
ecs:cluster
(p. 710)
ecs:capacity-
provider
(p. 710)
ecs:task-
definition
(p. 710)
ecs:cluster
(p. 710)
ecs:cluster
(p. 710)
ecs:service
(p. 710)
ecs:ResourceTag/
${TagKey} (p. 709)
708
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service
ecs:ResourceTag/
${TagKey} (p. 709)
ecs:ResourceTag/
${TagKey} (p. 709)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request.
aws:ResourceTag/ Filters actions based on tag key-value pairs attached to the String
${TagKey} resource.
aws:TagKeys Filters actions based on the presence of tag keys in the String
request.
ecs:ResourceTag/ Filters actions based on tag key-value pairs attached to the String
${TagKey} resource.
709
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service for Kubernetes
References:
Topics
• Actions defined by Amazon Elastic Container Service for Kubernetes (p. 710)
• Resource types defined by Amazon Elastic Container Service for Kubernetes (p. 714)
• Condition keys for Amazon Elastic Container Service for Kubernetes (p. 714)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
710
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service for Kubernetes
aws:RequestTag/
${TagKey}
(p. 714)
aws:TagKeys
(p. 715)
aws:TagKeys
(p. 715)
aws:RequestTag/
${TagKey}
(p. 714)
aws:TagKeys
(p. 715)
aws:RequestTag/
${TagKey}
(p. 714)
aws:TagKeys
(p. 715)
711
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service for Kubernetes
nodegroup
(p. 714)
cluster
(p. 714)
fargateprofile
(p. 714)
712
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service for Kubernetes
nodegroup
(p. 714)
nodegroup
(p. 714)
cluster
(p. 714)
fargateprofile
(p. 714)
nodegroup
(p. 714)
aws:RequestTag/
${TagKey}
(p. 714)
aws:TagKeys
(p. 715)
cluster
(p. 714)
fargateprofile
(p. 714)
nodegroup
(p. 714)
aws:TagKeys
(p. 715)
713
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Container Service for Kubernetes
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by a key that is present in the request the user String
${TagKey} makes to the EKS service.
714
Service Authorization Reference
Service Authorization Reference
Amazon Elastic File System
aws:TagKeys Filters access by the list of all the tag key names present in String
the request the user makes to the EKS service.
References:
Topics
• Actions defined by Amazon Elastic File System (p. 715)
• Resource types defined by Amazon Elastic File System (p. 719)
• Condition keys for Amazon Elastic File System (p. 719)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
715
Service Authorization Reference
Service Authorization Reference
Amazon Elastic File System
elasticfilesystem:AccessPointArn
(p. 719)
elasticfilesystem:AccessPointArn
(p. 719)
aws:TagKeys
(p. 719)
elasticfilesystem:Encrypted
(p. 720)
aws:RequestTag/
${TagKey}
(p. 719)
aws:TagKeys
(p. 719)
716
Service Authorization Reference
Service Authorization Reference
Amazon Elastic File System
aws:TagKeys
(p. 719)
file-
system
(p. 719)
717
Service Authorization Reference
Service Authorization Reference
Amazon Elastic File System
file-
system
(p. 719)
file-
system
(p. 719)
718
Service Authorization Reference
Service Authorization Reference
Amazon Elastic File System
file-
system
(p. 719)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
The ARN of the access point used to mount the file system String
elasticfilesystem:AccessPointArn
719
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Inference
References:
Topics
• Actions defined by Amazon Elastic Inference (p. 720)
• Resource types defined by Amazon Elastic Inference (p. 720)
• Condition keys for Amazon Elastic Inference (p. 721)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
720
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing
types that can be specified with that action. A resource type can also define which condition keys you
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
accelerator arn:${Partition}:elastic-inference:
${Region}:${Account}:elastic-inference-
accelerator/${AcceleratorId}
References:
Topics
• Actions defined by Elastic Load Balancing (p. 721)
• Resource types defined by Elastic Load Balancing (p. 724)
• Condition keys for Elastic Load Balancing (p. 724)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
721
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing
aws:TagKeys
(p. 725)
aws:RequestTag/
${TagKey}
(p. 725)
aws:TagKeys
(p. 725)
722
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing
723
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing
aws:RequestTag/
${TagKey}
(p. 725)
aws:TagKeys
(p. 725)
To view the global condition keys that are available to all services, see Available global condition keys.
724
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
aws:RequestTag/ A key that is present in the request the user makes to the String
${TagKey} ELB service
aws:TagKeys The list of all the tag key names associated with the resource String
in the request
The preface string for a tag key and value pair attached to a String
elasticloadbalancing:ResourceTag/
resource
References:
Topics
• Actions defined by Elastic Load Balancing V2 (p. 725)
• Resource types defined by Elastic Load Balancing V2 (p. 731)
• Condition keys for Elastic Load Balancing V2 (p. 732)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
725
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
listener/
net*
(p. 731)
listener/
app
(p. 731)
listener/
net
(p. 731)
loadbalancer/
app/
(p. 732)
loadbalancer/
net/
(p. 732)
targetgroup
(p. 732)
aws:RequestTag/
${TagKey}
(p. 732)
aws:TagKeys
(p. 732)
loadbalancer/
net/
(p. 732)
aws:RequestTag/
${TagKey}
(p. 732)
726
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
loadbalancer/
net/
(p. 732)
aws:RequestTag/
${TagKey}
(p. 732)
aws:TagKeys
(p. 732)
listener/
net*
(p. 731)
aws:RequestTag/
${TagKey}
(p. 732)
aws:TagKeys
(p. 732)
aws:RequestTag/
${TagKey}
(p. 732)
aws:TagKeys
(p. 732)
listener/
net*
(p. 731)
727
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
loadbalancer/
net/
(p. 732)
listener-
rule/net*
(p. 732)
listener-
rule/net
(p. 732)
listener/
app
(p. 731)
728
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
listener/
net
(p. 731)
loadbalancer/
app/
(p. 732)
loadbalancer/
net/
(p. 732)
targetgroup
(p. 732)
listener/
net*
(p. 731)
loadbalancer/
net/
(p. 732)
listener-
rule/net*
(p. 732)
729
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
listener/
net*
(p. 731)
listener-
rule/net
(p. 732)
listener/
app
(p. 731)
listener/
net
(p. 731)
loadbalancer/
app/
(p. 732)
loadbalancer/
net/
(p. 732)
targetgroup
(p. 732)
aws:RequestTag/
${TagKey}
(p. 732)
aws:TagKeys
(p. 732)
loadbalancer/
net/
(p. 732)
730
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
listener-
rule/net*
(p. 732)
loadbalancer/
net/
(p. 732)
loadbalancer/
net/
(p. 732)
731
Service Authorization Reference
Service Authorization Reference
Elastic Load Balancing V2
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ A key that is present in the request the user makes to the String
${TagKey} ELB service
aws:TagKeys The list of all the tag key names associated with the resource String
in the request
732
Service Authorization Reference
Service Authorization Reference
Amazon Elastic MapReduce
References:
Topics
• Actions defined by Amazon Elastic MapReduce (p. 733)
• Resource types defined by Amazon Elastic MapReduce (p. 737)
• Condition keys for Amazon Elastic MapReduce (p. 738)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
Note
The DescribeJobFlows API is deprecated and will eventually be removed. We recommend you
use ListClusters, DescribeCluster, ListSteps, ListInstanceGroups and ListBootstrapActions instead.
733
Service Authorization Reference
Service Authorization Reference
Amazon Elastic MapReduce
editor
(p. 737)
aws:RequestTag/
${TagKey}
(p. 738)
aws:TagKeys
(p. 738)
elasticmapreduce:RequestTag/
${TagKey}
(p. 738)
aws:TagKeys
(p. 738)
elasticmapreduce:RequestTag/
${TagKey}
(p. 738)
734
Service Authorization Reference
Service Authorization Reference
Amazon Elastic MapReduce
735
Service Authorization Reference
Service Authorization Reference
Amazon Elastic MapReduce
aws:TagKeys
(p. 738)
736
Service Authorization Reference
Service Authorization Reference
Amazon Elastic MapReduce
aws:TagKeys
(p. 738)
elasticmapreduce:RequestTag/
${TagKey}
(p. 738)
elasticmapreduce:ResourceTag/
${TagKey} (p. 738)
737
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Transcoder
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access based on whether the tag and value pair is String
${TagKey} provided with the action
Filters access based on the tag and value pair associated with String
aws:ResourceTag/ an Amazon EMR resource
${TagKey}
aws:TagKeys Filters access based on whether the tag keys are provided String
with the action regardless of tag value
Filters actions based on whether the tag and value pair is String
elasticmapreduce:RequestTag/
provided with the action
${TagKey}
Filters actions based on the tag and value pair associated String
elasticmapreduce:ResourceTag/
with an Amazon EMR resource
${TagKey}
References:
Topics
• Actions defined by Amazon Elastic Transcoder (p. 739)
• Resource types defined by Amazon Elastic Transcoder (p. 740)
• Condition keys for Amazon Elastic Transcoder (p. 740)
738
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Transcoder
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
preset*
(p. 740)
739
Service Authorization Reference
Service Authorization Reference
Amazon Elastic Transcoder
job arn:${Partition}:elastictranscoder:
${Region}:${Account}:job/${JobId}
pipeline arn:${Partition}:elastictranscoder:
${Region}:${Account}:pipeline/${PipelineId}
preset arn:${Partition}:elastictranscoder:
${Region}:${Account}:preset/${PresetId}
740
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
References:
Topics
• Actions defined by Amazon ElastiCache (p. 741)
• Resource types defined by Amazon ElastiCache (p. 750)
• Condition keys for Amazon ElastiCache (p. 751)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
Note
When you create an ElastiCache policy in IAM you must use the "*" wildcard character for the
Resource block. For information about using the following ElastiCache API actions in an IAM
policy, see ElastiCache Actions and IAM in the Amazon ElastiCache User Guide.
741
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
s3:GetObject
replicationgroup
(p. 750)
replicationgroup
(p. 750)
replicationgroup
(p. 750)
s3:GetBucketAcl
s3:PutObject
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
elasticache:AddTagsToRes
s3:GetObject
cluster
(p. 750)
replicationgroup
(p. 750)
securitygroup
(p. 750)
742
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
snapshot
(p. 751)
subnetgroup
(p. 750)
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
elasticache:AddTagsToRes
s3:GetObject
cluster
(p. 750)
globalreplicationgroup
(p. 751)
replicationgroup
(p. 750)
securitygroup
(p. 750)
snapshot
(p. 751)
subnetgroup
(p. 750)
743
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
usergroup
(p. 751)
s3:PutObject
cluster
(p. 750)
replicationgroup
(p. 750)
usergroup*
(p. 751)
ec2:DescribeSubnets
ec2:DescribeVpcs
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
snapshot
(p. 751)
744
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
snapshot
(p. 751)
The List
DescribeCacheEngineVersions
DescribeCacheEngineVersions
action returns a list of the
available cache engines and
their versions.
745
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
The List
DescribeEngineDefaultParameters
DescribeEngineDefaultParameters
action returns the default
engine and system parameter
information for the specified
cache engine.
746
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
The List
DescribeReservedCacheNodesOfferings
DescribeReservedCacheNodesOfferings
action lists available reserved
cache node offerings.
replicationgroup
(p. 750)
747
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
replicationgroup
(p. 750)
securitygroup
(p. 750)
ec2:DescribeNetworkInter
ec2:DescribeSubnets
ec2:DescribeVpcs
748
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
parametergroup
(p. 750)
securitygroup
(p. 750)
usergroup
(p. 751)
ec2:DescribeVpcs
usergroup*
(p. 751)
749
Service Authorization Reference
Service Authorization Reference
Amazon ElastiCache
ec2:DescribeSubnets
ec2:DescribeVpcs
arn:${Partition}:elasticache:
parametergroup ${Region}:${Account}:parametergroup:
${CacheParameterGroupName}
securitygroup arn:${Partition}:elasticache:
${Region}:${Account}:securitygroup:
${CacheSecurityGroupName}
subnetgroup arn:${Partition}:elasticache:
${Region}:${Account}:subnetgroup:
${CacheSubnetGroupName}
arn:${Partition}:elasticache:
replicationgroup ${Region}:${Account}:replicationgroup:
${ReplicationGroupId}
cluster arn:${Partition}:elasticache:${Region}:
${Account}:cluster:${CacheClusterId}
reserved- arn:${Partition}:elasticache:
instance ${Region}:${Account}:reserved-instance:
${ReservedCacheNodeId}
750
Service Authorization Reference
Service Authorization Reference
Amazon Elasticsearch Service
snapshot arn:${Partition}:elasticache:${Region}:
${Account}:snapshot:${SnapshotName}
arn:${Partition}:elasticache::
globalreplicationgroup
${Account}:globalreplicationgroup:
${GlobalReplicationGroupId}
user arn:${Partition}:elasticache:${Region}:
${Account}:user:${UserId}
usergroup arn:${Partition}:elasticache:${Region}:
${Account}:usergroup:${UserGroupId}
References:
Topics
• Actions defined by Amazon Elasticsearch Service (p. 751)
• Resource types defined by Amazon Elasticsearch Service (p. 755)
• Condition keys for Amazon Elasticsearch Service (p. 755)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
751
Service Authorization Reference
Service Authorization Reference
Amazon Elasticsearch Service
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
752
Service Authorization Reference
Service Authorization Reference
Amazon Elasticsearch Service
753
Service Authorization Reference
Service Authorization Reference
Amazon Elasticsearch Service
754
Service Authorization Reference
Service Authorization Reference
Elemental Activations
domain arn:${Partition}:es:${Region}:
${Account}:domain/${DomainName}
References:
Topics
• Actions defined by Elemental Activations (p. 755)
• Resource types defined by Elemental Activations (p. 756)
• Condition keys for Elemental Activations (p. 757)
755
Service Authorization Reference
Service Authorization Reference
Elemental Activations
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 757)
756
Service Authorization Reference
Service Authorization Reference
AWS Elemental Appliances and Software
types that can be specified with that action. A resource type can also define which condition keys you
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the Arn
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
References:
Topics
• Actions defined by AWS Elemental Appliances and Software (p. 758)
• Resource types defined by AWS Elemental Appliances and Software (p. 759)
• Condition keys for AWS Elemental Appliances and Software (p. 759)
757
Service Authorization Reference
Service Authorization Reference
AWS Elemental Appliances and Software
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 759)
aws:RequestTag/
${TagKey}
(p. 759)
758
Service Authorization Reference
Service Authorization Reference
AWS Elemental Appliances and Software
aws:TagKeys
(p. 759)
To view the global condition keys that are available to all services, see Available global condition keys.
759
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaConnect
References:
Topics
• Actions defined by AWS Elemental MediaConnect (p. 760)
• Resource types defined by AWS Elemental MediaConnect (p. 761)
• Condition keys for AWS Elemental MediaConnect (p. 762)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
760
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaConnect
Entitlement arn:${Partition}:mediaconnect:${Region}:
${Account}:entitlement:${FlowId}:
${EntitlementName}
Flow arn:${Partition}:mediaconnect:${Region}:
${Account}:flow:${FlowId}:${FlowName}
Output arn:${Partition}:mediaconnect:${Region}:
${Account}:output:${OutputId}:${OutputName}
Source arn:${Partition}:mediaconnect:${Region}:
${Account}:source:${SourceId}:${SourceName}
761
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaConvert
References:
Topics
• Actions defined by AWS Elemental MediaConvert (p. 762)
• Resource types defined by AWS Elemental MediaConvert (p. 765)
• Condition keys for AWS Elemental MediaConvert (p. 766)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
762
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaConvert
Queue
(p. 766)
aws:RequestTag/
${TagKey}
(p. 766)
aws:TagKeys
(p. 766)
aws:TagKeys
(p. 766)
aws:TagKeys
(p. 766)
763
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaConvert
Queue
(p. 766)
764
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaConvert
Queue
(p. 766)
aws:RequestTag/
${TagKey}
(p. 766)
aws:TagKeys
(p. 766)
Queue
(p. 766)
aws:TagKeys
(p. 766)
Queue
(p. 766)
765
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaLive
Job arn:${Partition}:mediaconvert:${Region}:
${Account}:jobs/${JobId}
arn:${Partition}:mediaconvert:${Region}:
CertificateAssociation
${Account}:certificates/${CertificateArn}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS Elemental MediaLive (p. 767)
766
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaLive
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
input-
security-
group
(p. 773)
multiplex
(p. 773)
multiplex
(p. 773)
multiplex
(p. 773)
767
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaLive
input*
(p. 772)
aws:RequestTag/
${TagKey}
(p. 773)
aws:TagKeys
(p. 773)
input-
security-
group*
(p. 773)
aws:RequestTag/
${TagKey}
(p. 773)
aws:TagKeys
(p. 773)
aws:RequestTag/
${TagKey}
(p. 773)
aws:TagKeys
(p. 773)
aws:RequestTag/
${TagKey}
(p. 773)
aws:TagKeys
(p. 773)
768
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaLive
input-
security-
group
(p. 773)
multiplex
(p. 773)
reservation
(p. 773)
aws:TagKeys
(p. 773)
aws:RequestTag/
${TagKey}
(p. 773)
input-
security-
group
(p. 773)
769
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaLive
multiplex
(p. 773)
reservation
(p. 773)
aws:TagKeys
(p. 773)
770
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaLive
input-
security-
group
(p. 773)
multiplex
(p. 773)
reservation
(p. 773)
reservation*
(p. 773)
aws:RequestTag/
${TagKey}
(p. 773)
aws:TagKeys
(p. 773)
771
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaLive
input-device arn:${Partition}:medialive:${Region}:
${Account}:inputDevice:*
772
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaPackage
offering arn:${Partition}:medialive:${Region}:
${Account}:offering:*
To view the global condition keys that are available to all services, see Available global condition keys.
References:
Topics
• Actions defined by AWS Elemental MediaPackage (p. 774)
• Resource types defined by AWS Elemental MediaPackage (p. 776)
• Condition keys for AWS Elemental MediaPackage (p. 776)
773
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaPackage
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 776)
aws:TagKeys
(p. 776)
aws:TagKeys
(p. 776)
774
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaPackage
origin_endpoints
(p. 776)
harvest_jobs
(p. 776)
origin_endpoints
(p. 776)
aws:RequestTag/
${TagKey}
(p. 776)
aws:TagKeys
(p. 776)
harvest_jobs
(p. 776)
origin_endpoints
(p. 776)
775
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaPackage
aws:TagKeys
(p. 776)
arn:${Partition}:mediapackage: aws:ResourceTag/
origin_endpoints ${Region}:${Account}:origin_endpoints/ ${TagKey} (p. 776)
${OriginEndpointIdentifier}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ String
${TagKey}
aws:ResourceTag/ String
${TagKey}
aws:TagKeys String
776
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaPackage VOD
References:
Topics
• Actions defined by AWS Elemental MediaPackage VOD (p. 777)
• Resource types defined by AWS Elemental MediaPackage VOD (p. 779)
• Condition keys for AWS Elemental MediaPackage VOD (p. 780)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 780)
aws:TagKeys
(p. 780)
777
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaPackage VOD
aws:TagKeys
(p. 780)
packaging-
groups
(p. 779)
778
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaPackage VOD
packaging-
groups
(p. 779)
aws:RequestTag/
${TagKey}
(p. 780)
aws:TagKeys
(p. 780)
packaging-
groups
(p. 779)
aws:TagKeys
(p. 780)
779
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaStore
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS Elemental MediaStore (p. 780)
• Resource types defined by AWS Elemental MediaStore (p. 783)
• Condition keys for AWS Elemental MediaStore (p. 783)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
780
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaStore
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
781
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaStore
782
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaTailor
container arn:${Partition}:mediastore:${Region}:
${Account}:container/${ContainerName}
References:
Topics
• Actions defined by AWS Elemental MediaTailor (p. 783)
• Resource types defined by AWS Elemental MediaTailor (p. 784)
• Condition keys for AWS Elemental MediaTailor (p. 785)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
783
Service Authorization Reference
Service Authorization Reference
AWS Elemental MediaTailor
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 785)
aws:TagKeys
(p. 785)
aws:TagKeys
(p. 785)
aws:TagKeys
(p. 785)
784
Service Authorization Reference
Service Authorization Reference
Elemental Support Cases
arn:${Partition}:mediatailor:${Region}: aws:ResourceTag/
playbackConfiguration
${Account}:playbackConfiguration/ ${TagKey} (p. 785)
${ResourceId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Elemental Support Cases (p. 785)
• Resource types defined by Elemental Support Cases (p. 786)
• Condition keys for Elemental Support Cases (p. 786)
785
Service Authorization Reference
Service Authorization Reference
Elemental Support Content
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
786
Service Authorization Reference
Service Authorization Reference
Amazon EMR on EKS (EMR Containers)
• Learn how to secure this service and its resources by using IAM permission policies.
Topics
• Actions defined by Elemental Support Content (p. 787)
• Resource types defined by Elemental Support Content (p. 787)
• Condition keys for Elemental Support Content (p. 787)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
787
Service Authorization Reference
Service Authorization Reference
Amazon EMR on EKS (EMR Containers)
Topics
• Actions defined by Amazon EMR on EKS (EMR Containers) (p. 788)
• Resource types defined by Amazon EMR on EKS (EMR Containers) (p. 789)
• Condition keys for Amazon EMR on EKS (EMR Containers) (p. 790)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
virtualCluster*
(p. 790)
aws:TagKeys
(p. 790)
virtualCluster*
(p. 790)
788
Service Authorization Reference
Service Authorization Reference
Amazon EMR on EKS (EMR Containers)
virtualCluster
(p. 790)
aws:RequestTag/
${TagKey}
(p. 790)
aws:TagKeys
(p. 790)
emr-
containers:ExecutionRoleArn
(p. 790)
virtualCluster
(p. 790)
aws:RequestTag/
${TagKey}
(p. 790)
aws:TagKeys
(p. 790)
virtualCluster
(p. 790)
aws:TagKeys
(p. 790)
789
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
emr- Filters actions based on whether the execution role arn is String
containers:ExecutionRoleArn
provided with the action
References:
790
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge
Topics
• Actions defined by Amazon EventBridge (p. 791)
• Resource types defined by Amazon EventBridge (p. 796)
• Condition keys for Amazon EventBridge (p. 796)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 796)
aws:TagKeys
(p. 797)
791
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge
events:creatorAccount
(p. 797)
events:creatorAccount
(p. 797)
events:creatorAccount
(p. 797)
events:creatorAccount
(p. 797)
792
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge
events:creatorAccount
(p. 797)
events:creatorAccount
(p. 797)
793
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge
events:detail-
type
(p. 797)
events:source
(p. 797)
events:eventBusInvocation
(p. 797)
aws:SourceArn
(p. 797)
aws:SourceAccount
(p. 796)
events:detail.userIdentity.principalId
(p. 797)
events:detail-
type
(p. 797)
events:source
(p. 797)
events:detail.service
(p. 797)
events:detail.eventTypeCode
(p. 797)
aws:RequestTag/
${TagKey}
(p. 796)
aws:TagKeys
(p. 797)
events:creatorAccount
(p. 797)
794
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge
events:TargetArn
(p. 797)
events:creatorAccount
(p. 797)
events:creatorAccount
(p. 797)
aws:TagKeys
(p. 797)
aws:RequestTag/
${TagKey}
(p. 796)
events:creatorAccount
(p. 797)
aws:TagKeys
(p. 797)
events:creatorAccount
(p. 797)
795
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge
event-source arn:${Partition}:events:${Region}::event-
source/${EventSourceName}
archive arn:${Partition}:events:${Region}:
${Account}:archive/${ArchiveName}
replay arn:${Partition}:events:${Region}:
${Account}:replay/${ReplayName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
796
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge Schemas
aws:SourceArn Filters actions based on the Amazon Resource Name (ARN) String
of the source making the request
Filters actions based on the account the rule was created in String
events:creatorAccount
events:detail- Matches the literal string of the detail-type filed of the String
type event.
Matches the literal string for the detail.service field of the String
events:detail.service event.
events:source The AWS service or AWS partner event source that String
generated the event. Matches the literal string of the source
field of the event.
References:
Topics
• Actions defined by Amazon EventBridge Schemas (p. 798)
• Resource types defined by Amazon EventBridge Schemas (p. 801)
• Condition keys for Amazon EventBridge Schemas (p. 801)
797
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge Schemas
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
798
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge Schemas
registry*
(p. 801)
schema*
(p. 801)
799
Service Authorization Reference
Service Authorization Reference
Amazon EventBridge Schemas
registry*
(p. 801)
schema*
(p. 801)
aws:TagKeys
(p. 801)
aws:RequestTag/
${TagKey}
(p. 801)
registry*
(p. 801)
schema*
(p. 801)
aws:TagKeys
(p. 801)
800
Service Authorization Reference
Service Authorization Reference
AWS Firewall Manager
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
References:
Topics
801
Service Authorization Reference
Service Authorization Reference
AWS Firewall Manager
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
802
Service Authorization Reference
Service Authorization Reference
AWS Firewall Manager
803
Service Authorization Reference
Service Authorization Reference
AWS Firewall Manager
aws:RequestTag/
${TagKey}
(p. 806)
aws:TagKeys
(p. 806)
804
Service Authorization Reference
Service Authorization Reference
AWS Firewall Manager
aws:RequestTag/
${TagKey}
(p. 806)
aws:TagKeys
(p. 806)
aws:RequestTag/
${TagKey}
(p. 806)
aws:TagKeys
(p. 806)
aws:RequestTag/
${TagKey}
(p. 806)
aws:TagKeys
(p. 806)
aws:TagKeys
(p. 806)
805
Service Authorization Reference
Service Authorization Reference
Fleet Hub for AWS IoT Device Management
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
References:
Topics
• Actions defined by Fleet Hub for AWS IoT Device Management (p. 806)
• Resource types defined by Fleet Hub for AWS IoT Device Management (p. 808)
• Condition keys for Fleet Hub for AWS IoT Device Management (p. 808)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
806
Service Authorization Reference
Service Authorization Reference
Fleet Hub for AWS IoT Device Management
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 809)
aws:TagKeys
(p. 809)
dashboard
(p. 808)
dashboard
(p. 808)
aws:TagKeys
(p. 809)
aws:RequestTag/
${TagKey}
(p. 808)
807
Service Authorization Reference
Service Authorization Reference
Fleet Hub for AWS IoT Device Management
dashboard
(p. 808)
aws:TagKeys
(p. 809)
Condition keys for Fleet Hub for AWS IoT Device Management
Fleet Hub for AWS IoT Device Management defines the following condition keys that can be used
in the Condition element of an IAM policy. You can use these keys to further refine the conditions
under which the policy statement applies. For details about the columns in the following table, see The
condition keys table (p. 2).
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by the tag key-value pairs in the request String
${TagKey}
808
Service Authorization Reference
Service Authorization Reference
Amazon Forecast
References:
Topics
• Actions defined by Amazon Forecast (p. 809)
• Resource types defined by Amazon Forecast (p. 813)
• Condition keys for Amazon Forecast (p. 814)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 814)
aws:TagKeys
(p. 814)
809
Service Authorization Reference
Service Authorization Reference
Amazon Forecast
aws:RequestTag/
${TagKey}
(p. 814)
aws:TagKeys
(p. 814)
aws:RequestTag/
${TagKey}
(p. 814)
aws:TagKeys
(p. 814)
aws:RequestTag/
${TagKey}
(p. 814)
aws:TagKeys
(p. 814)
aws:TagKeys
(p. 814)
aws:RequestTag/
${TagKey}
(p. 814)
aws:TagKeys
(p. 814)
810
Service Authorization Reference
Service Authorization Reference
Amazon Forecast
aws:RequestTag/
${TagKey}
(p. 814)
aws:TagKeys
(p. 814)
811
Service Authorization Reference
Service Authorization Reference
Amazon Forecast
datasetImportJob
(p. 814)
forecast
(p. 814)
forecastExport
(p. 814)
predictor
(p. 814)
predictorBacktestExportJob
(p. 814)
datasetGroup
(p. 814)
datasetImportJob
(p. 814)
forecast
(p. 814)
forecastExport
(p. 814)
812
Service Authorization Reference
Service Authorization Reference
Amazon Forecast
predictor
(p. 814)
predictorBacktestExportJob
(p. 814)
aws:RequestTag/
${TagKey}
(p. 814)
aws:TagKeys
(p. 814)
datasetGroup
(p. 814)
datasetImportJob
(p. 814)
forecast
(p. 814)
forecastExport
(p. 814)
predictor
(p. 814)
predictorBacktestExportJob
(p. 814)
aws:TagKeys
(p. 814)
datasetGroup*
(p. 814)
813
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
arn:${Partition}:forecast:${Region}: aws:ResourceTag/
datasetImportJob${Account}:dataset-import-job/${ResourceId} ${TagKey} (p. 814)
algorithm arn:${Partition}:forecast:::algorithm/
${ResourceId}
arn:${Partition}:forecast:${Region}: aws:ResourceTag/
predictorBacktestExportJob
${Account}:predictor-backtest-export-job/ ${TagKey} (p. 814)
${ResourceId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
814
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
References:
Topics
• Actions defined by Amazon Fraud Detector (p. 815)
• Resource types defined by Amazon Fraud Detector (p. 826)
• Condition keys for Amazon Fraud Detector (p. 827)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 827)
aws:TagKeys
(p. 827)
815
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
aws:RequestTag/
${TagKey}
(p. 827)
aws:TagKeys
(p. 827)
aws:TagKeys
(p. 827)
aws:RequestTag/
${TagKey}
(p. 827)
aws:TagKeys
(p. 827)
aws:TagKeys
(p. 827)
816
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
817
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
818
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
819
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
820
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
event-
type
(p. 826)
external-
model
(p. 826)
label
(p. 826)
model
(p. 826)
model-
version
(p. 826)
outcome
(p. 826)
rule
(p. 826)
variable
(p. 826)
821
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
aws:RequestTag/
${TagKey}
(p. 827)
aws:TagKeys
(p. 827)
aws:TagKeys
(p. 827)
822
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
aws:RequestTag/
${TagKey}
(p. 827)
aws:TagKeys
(p. 827)
detector-
version
(p. 826)
entity-
type
(p. 826)
event-
type
(p. 826)
external-
model
(p. 826)
label
(p. 826)
model
(p. 826)
model-
version
(p. 826)
outcome
(p. 826)
rule
(p. 826)
823
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
variable
(p. 826)
aws:TagKeys
(p. 827)
aws:RequestTag/
${TagKey}
(p. 827)
detector-
version
(p. 826)
entity-
type
(p. 826)
event-
type
(p. 826)
external-
model
(p. 826)
label
(p. 826)
model
(p. 826)
model-
version
(p. 826)
outcome
(p. 826)
rule
(p. 826)
variable
(p. 826)
aws:TagKeys
(p. 827)
aws:RequestTag/
${TagKey}
(p. 827)
824
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
825
Service Authorization Reference
Service Authorization Reference
Amazon Fraud Detector
aws:RequestTag/
${TagKey}
(p. 827)
aws:TagKeys
(p. 827)
826
Service Authorization Reference
Service Authorization Reference
Amazon FreeRTOS
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
References:
Topics
• Actions defined by Amazon FreeRTOS (p. 827)
• Resource types defined by Amazon FreeRTOS (p. 828)
• Condition keys for Amazon FreeRTOS (p. 829)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
827
Service Authorization Reference
Service Authorization Reference
Amazon FreeRTOS
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 829)
aws:TagKeys
(p. 829)
828
Service Authorization Reference
Service Authorization Reference
Amazon FSx
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ A tag key that is present in the request that the user makes String
${TagKey} to Amazon FreeRTOS.
aws:TagKeys The list of all the tag key names associated with the resource String
in the request.
References:
Topics
• Actions defined by Amazon FSx (p. 829)
• Resource types defined by Amazon FSx (p. 832)
• Condition keys for Amazon FSx (p. 833)
829
Service Authorization Reference
Service Authorization Reference
Amazon FSx
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
file-
system*
(p. 833)
aws:RequestTag/
${TagKey}
(p. 833)
aws:TagKeys
(p. 833)
task*
(p. 833)
aws:RequestTag/
${TagKey}
(p. 833)
aws:TagKeys
(p. 833)
aws:RequestTag/
${TagKey}
(p. 833)
aws:TagKeys
(p. 833)
830
Service Authorization Reference
Service Authorization Reference
Amazon FSx
file-
system*
(p. 833)
aws:RequestTag/
${TagKey}
(p. 833)
aws:TagKeys
(p. 833)
831
Service Authorization Reference
Service Authorization Reference
Amazon FSx
file-
system
(p. 833)
task
(p. 833)
file-
system
(p. 833)
task
(p. 833)
aws:TagKeys
(p. 833)
aws:RequestTag/
${TagKey}
(p. 833)
file-
system
(p. 833)
task
(p. 833)
aws:TagKeys
(p. 833)
832
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ String
${TagKey}
aws:ResourceTag/ String
${TagKey}
aws:TagKeys String
References:
Topics
• Actions defined by Amazon GameLift (p. 833)
• Resource types defined by Amazon GameLift (p. 841)
• Condition keys for Amazon GameLift (p. 842)
833
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 842)
aws:TagKeys
(p. 842)
aws:TagKeys
(p. 842)
834
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
aws:TagKeys
(p. 842)
aws:TagKeys
(p. 842)
aws:TagKeys
(p. 842)
835
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
836
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
837
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
build
(p. 841)
fleet
(p. 842)
gameServerGroup
(p. 842)
gameSessionQueue
(p. 842)
matchmakingConfiguration
(p. 842)
matchmakingRuleSet
(p. 842)
script
(p. 841)
838
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
build
(p. 841)
fleet
(p. 842)
gameServerGroup
(p. 842)
gameSessionQueue
(p. 842)
839
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
matchmakingConfiguration
(p. 842)
matchmakingRuleSet
(p. 842)
script
(p. 841)
aws:RequestTag/
${TagKey}
(p. 842)
aws:TagKeys
(p. 842)
build
(p. 841)
fleet
(p. 842)
gameServerGroup
(p. 842)
gameSessionQueue
(p. 842)
matchmakingConfiguration
(p. 842)
matchmakingRuleSet
(p. 842)
script
(p. 841)
aws:TagKeys
(p. 842)
840
Service Authorization Reference
Service Authorization Reference
Amazon GameLift
841
Service Authorization Reference
Service Authorization Reference
Amazon Glacier
arn:${Partition}:gamelift:${Region}: aws:ResourceTag/
gameSessionQueue
${Account}:gamesessionqueue/ ${TagKey} (p. 842)
${GameSessionQueueName}
arn:${Partition}:gamelift:${Region}: aws:ResourceTag/
matchmakingConfiguration
${Account}:matchmakingconfiguration/ ${TagKey} (p. 842)
${MatchmakingConfigurationName}
arn:${Partition}:gamelift:${Region}: aws:ResourceTag/
matchmakingRuleSet
${Account}:matchmakingruleset/ ${TagKey} (p. 842)
${MatchmakingRuleSetName}
arn:${Partition}:gamelift:${Region}: aws:ResourceTag/
gameServerGroup${Account}:gameservergroup/ ${TagKey} (p. 842)
${GameServerGroupName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
References:
842
Service Authorization Reference
Service Authorization Reference
Amazon Glacier
Topics
• Actions defined by Amazon Glacier (p. 843)
• Resource types defined by Amazon Glacier (p. 845)
• Condition keys for Amazon Glacier (p. 846)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
glacier:ArchiveAgeInDays
(p. 846)
843
Service Authorization Reference
Service Authorization Reference
Amazon Glacier
glacier:ArchiveAgeInDays
(p. 846)
844
Service Authorization Reference
Service Authorization Reference
Amazon Glacier
vault arn:${Partition}:glacier:${Region}:
${Account}:vaults/${VaultName}
845
Service Authorization Reference
Service Authorization Reference
AWS Global Accelerator
To view the global condition keys that are available to all services, see Available global condition keys.
How long an archive has been stored in the vault, in days. String
glacier:ArchiveAgeInDays
References:
Topics
• Actions defined by AWS Global Accelerator (p. 846)
• Resource types defined by AWS Global Accelerator (p. 850)
• Condition keys for AWS Global Accelerator (p. 851)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
846
Service Authorization Reference
Service Authorization Reference
AWS Global Accelerator
aws:TagKeys
(p. 851)
aws:TagKeys
(p. 851)
847
Service Authorization Reference
Service Authorization Reference
AWS Global Accelerator
848
Service Authorization Reference
Service Authorization Reference
AWS Global Accelerator
849
Service Authorization Reference
Service Authorization Reference
AWS Global Accelerator
aws:RequestTag/
${TagKey}
(p. 851)
aws:TagKeys
(p. 851)
850
Service Authorization Reference
Service Authorization Reference
AWS Glue
arn:${Partition}:globalaccelerator:: aws:ResourceTag/
endpointgroup ${Account}:accelerator/${AcceleratorId}/ ${TagKey} (p. 851)
listener/${ListenerId}/endpoint-group/
${EndpointGroupId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS Glue (p. 852)
• Resource types defined by AWS Glue (p. 865)
• Condition keys for AWS Glue (p. 866)
851
Service Authorization Reference
Service Authorization Reference
AWS Glue
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
database*
(p. 865)
table*
(p. 865)
connection*
(p. 866)
database*
(p. 865)
table*
(p. 865)
database*
(p. 865)
table*
(p. 865)
852
Service Authorization Reference
Service Authorization Reference
AWS Glue
database*
(p. 865)
table*
(p. 865)
tableversion*
(p. 866)
database*
(p. 865)
table*
(p. 865)
connection*
(p. 866)
853
Service Authorization Reference
Service Authorization Reference
AWS Glue
aws:TagKeys
(p. 866)
database*
(p. 865)
aws:TagKeys
(p. 866)
aws:TagKeys
(p. 866)
database*
(p. 865)
table*
(p. 865)
schema*
(p. 866)
854
Service Authorization Reference
Service Authorization Reference
AWS Glue
database*
(p. 865)
table*
(p. 865)
aws:TagKeys
(p. 866)
database*
(p. 865)
userdefinedfunction*
(p. 866)
aws:TagKeys
(p. 866)
connection*
(p. 866)
database*
(p. 865)
855
Service Authorization Reference
Service Authorization Reference
AWS Glue
database*
(p. 865)
table*
(p. 865)
schema*
(p. 866)
schema*
(p. 866)
database*
(p. 865)
table*
(p. 865)
database*
(p. 865)
table*
(p. 865)
tableversion*
(p. 866)
856
Service Authorization Reference
Service Authorization Reference
AWS Glue
database*
(p. 865)
userdefinedfunction*
(p. 866)
connection*
(p. 866)
connection*
(p. 866)
database*
(p. 865)
database*
(p. 865)
857
Service Authorization Reference
Service Authorization Reference
AWS Glue
database*
(p. 865)
table*
(p. 865)
database*
(p. 865)
858
Service Authorization Reference
Service Authorization Reference
AWS Glue
table*
(p. 865)
schema*
(p. 866)
schema
(p. 866)
database*
(p. 865)
table*
(p. 865)
859
Service Authorization Reference
Service Authorization Reference
AWS Glue
database*
(p. 865)
table*
(p. 865)
tableversion*
(p. 866)
database*
(p. 865)
table*
(p. 865)
tableversion*
(p. 866)
database*
(p. 865)
table*
(p. 865)
devendpoint
(p. 866)
job
(p. 866)
trigger
(p. 866)
workflow
(p. 866)
database*
(p. 865)
860
Service Authorization Reference
Service Authorization Reference
AWS Glue
userdefinedfunction*
(p. 866)
database*
(p. 865)
userdefinedfunction*
(p. 866)
schema*
(p. 866)
861
Service Authorization Reference
Service Authorization Reference
AWS Glue
schema
(p. 866)
schema
(p. 866)
schema*
(p. 866)
schema
(p. 866)
database*
(p. 865)
table*
(p. 865)
862
Service Authorization Reference
Service Authorization Reference
AWS Glue
devendpoint
(p. 866)
job
(p. 866)
trigger
(p. 866)
workflow
(p. 866)
aws:TagKeys
(p. 866)
aws:RequestTag/
${TagKey}
(p. 866)
863
Service Authorization Reference
Service Authorization Reference
AWS Glue
devendpoint
(p. 866)
job
(p. 866)
trigger
(p. 866)
workflow
(p. 866)
aws:TagKeys
(p. 866)
connection*
(p. 866)
database*
(p. 865)
database*
(p. 865)
table*
(p. 865)
864
Service Authorization Reference
Service Authorization Reference
AWS Glue
schema*
(p. 866)
database*
(p. 865)
table*
(p. 865)
database*
(p. 865)
userdefinedfunction*
(p. 866)
catalog arn:${Partition}:glue:${Region}:
${Account}:catalog
database arn:${Partition}:glue:${Region}:
${Account}:database/${DatabaseName}
table arn:${Partition}:glue:${Region}:
${Account}:table/${DatabaseName}/
${TableName}
865
Service Authorization Reference
Service Authorization Reference
AWS Glue
tableversion arn:${Partition}:glue:${Region}:
${Account}:tableVersion/${DatabaseName}/
${TableName}/${TableVersionName}
connection arn:${Partition}:glue:${Region}:
${Account}:connection/${ConnectionName}
arn:${Partition}:glue:${Region}:
userdefinedfunction
${Account}:userDefinedFunction/
${DatabaseName}/${UserDefinedFunctionName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
866
Service Authorization Reference
Service Authorization Reference
AWS Glue DataBrew
References:
Topics
• Actions defined by AWS Glue DataBrew (p. 867)
• Resource types defined by AWS Glue DataBrew (p. 871)
• Condition keys for AWS Glue DataBrew (p. 871)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 871)
867
Service Authorization Reference
Service Authorization Reference
AWS Glue DataBrew
aws:TagKeys
(p. 871)
aws:TagKeys
(p. 871)
aws:TagKeys
(p. 871)
aws:TagKeys
(p. 871)
868
Service Authorization Reference
Service Authorization Reference
AWS Glue DataBrew
Job
(p. 871)
Project
(p. 871)
Recipe
(p. 871)
Schedule
(p. 871)
869
Service Authorization Reference
Service Authorization Reference
AWS Glue DataBrew
Job
(p. 871)
Project
(p. 871)
Recipe
(p. 871)
Schedule
(p. 871)
aws:RequestTag/
${TagKey}
(p. 871)
aws:TagKeys
(p. 871)
Job
(p. 871)
Project
(p. 871)
Recipe
(p. 871)
Schedule
(p. 871)
aws:TagKeys
(p. 871)
870
Service Authorization Reference
Service Authorization Reference
AWS Glue DataBrew
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
871
Service Authorization Reference
Service Authorization Reference
AWS Ground Station
References:
Topics
• Actions defined by AWS Ground Station (p. 872)
• Resource types defined by AWS Ground Station (p. 875)
• Condition keys for AWS Ground Station (p. 875)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 876)
872
Service Authorization Reference
Service Authorization Reference
AWS Ground Station
aws:TagKeys
(p. 876)
873
Service Authorization Reference
Service Authorization Reference
AWS Ground Station
Contact
(p. 875)
DataflowEndpointGroup
(p. 875)
MissionProfile
(p. 875)
aws:TagKeys
(p. 876)
Contact
(p. 875)
DataflowEndpointGroup
(p. 875)
MissionProfile
(p. 875)
aws:TagKeys
(p. 876)
aws:RequestTag/
${TagKey}
(p. 875)
Contact
(p. 875)
DataflowEndpointGroup
(p. 875)
MissionProfile
(p. 875)
aws:TagKeys
(p. 876)
874
Service Authorization Reference
Service Authorization Reference
AWS Ground Station
groundstation:configId
(p. 876)
groundstation:configType
(p. 876)
groundstation:contactId
(p. 876)
arn:${Partition}:groundstation:${Region}: aws:ResourceTag/
DataflowEndpointGroup
${Account}:dataflow-endpoint-group/ ${TagKey} (p. 876)
${dataflowEndpointGroupId}
groundstation:dataflowEndpointGroup
(p. 876)
arn:${Partition}:groundstation:${Region}: groundstation:groundStationId
GroundStationResource
${Account}:groundstation:${groundStationId} (p. 876)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by a key that is present in the request the user String
${TagKey} makes to the Ground Station service.
875
Service Authorization Reference
Service Authorization Reference
Amazon GroundTruth Labeling
aws:TagKeys Filters access by the list of all the tag key names present in String
the request the user makes to the Ground Station service.
References:
Topics
• Actions defined by Amazon GroundTruth Labeling (p. 876)
• Resource types defined by Amazon GroundTruth Labeling (p. 877)
• Condition keys for Amazon GroundTruth Labeling (p. 877)
876
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
877
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
Topics
• Actions defined by Amazon GuardDuty (p. 878)
• Resource types defined by Amazon GuardDuty (p. 884)
• Condition keys for Amazon GuardDuty (p. 884)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 884)
aws:TagKeys
(p. 884)
878
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
aws:RequestTag/
${TagKey}
(p. 884)
aws:TagKeys
(p. 884)
aws:TagKeys
(p. 884)
filter*
(p. 884)
ipset*
(p. 884)
879
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
publishingDestination*
(p. 884)
threatintelset*
(p. 884)
filter*
(p. 884)
880
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
ipset*
(p. 884)
threatintelset*
(p. 884)
881
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
ipset
(p. 884)
threatintelset
(p. 884)
filter
(p. 884)
ipset
(p. 884)
threatintelset
(p. 884)
aws:RequestTag/
${TagKey}
(p. 884)
aws:TagKeys
(p. 884)
882
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
filter
(p. 884)
ipset
(p. 884)
threatintelset
(p. 884)
aws:TagKeys
(p. 884)
filter*
(p. 884)
ipset*
(p. 884)
publishingDestination*
(p. 884)
threatintelset*
(p. 884)
883
Service Authorization Reference
Service Authorization Reference
Amazon GuardDuty
arn:${Partition}:guardduty:
publishingDestination
${Region}:${Account}:detector/
${DetectorId}/publishingDestination/
${PublishingDestinationId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
884
Service Authorization Reference
Service Authorization Reference
AWS Health APIs and Notifications
References:
Topics
• Actions defined by AWS Health APIs and Notifications (p. 885)
• Resource types defined by AWS Health APIs and Notifications (p. 886)
• Condition keys for AWS Health APIs and Notifications (p. 887)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
health:service
(p. 887)
885
Service Authorization Reference
Service Authorization Reference
AWS Health APIs and Notifications
health:service
(p. 887)
organizations:ListAccount
886
Service Authorization Reference
Service Authorization Reference
Amazon Honeycode
types that can be specified with that action. A resource type can also define which condition keys you
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
event arn:${Partition}:health:*::event/${Service}/
${EventTypeCode}/*
To view the global condition keys that are available to all services, see Available global condition keys.
References:
Topics
• Actions defined by Amazon Honeycode (p. 887)
• Resource types defined by Amazon Honeycode (p. 889)
• Condition keys for Amazon Honeycode (p. 889)
887
Service Authorization Reference
Service Authorization Reference
Amazon Honeycode
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
888
Service Authorization Reference
Service Authorization Reference
Amazon Honeycode
workbook arn:${Partition}:honeycode:${Region}:
${Account}:workbook:workbook/${WorkbookId}
table arn:${Partition}:honeycode:${Region}:
${Account}:table:workbook/${WorkbookId}/
table/${TableId}
screen arn:${Partition}:honeycode:${Region}:
${Account}:screen:workbook/${WorkbookId}/
app/${AppId}/screen/${ScreenId}
screen- arn:${Partition}:honeycode:${Region}:
automation ${Account}:screen-automation:workbook/
${WorkbookId}/app/${AppId}/screen/
${ScreenId}/automation/${AutomationId}
889
Service Authorization Reference
Service Authorization Reference
IAM Access Analyzer
References:
Topics
• Actions defined by IAM Access Analyzer (p. 890)
• Resource types defined by IAM Access Analyzer (p. 892)
• Condition keys for IAM Access Analyzer (p. 892)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 893)
aws:TagKeys
(p. 893)
890
Service Authorization Reference
Service Authorization Reference
IAM Access Analyzer
aws:RequestTag/
${TagKey}
(p. 893)
aws:TagKeys
(p. 893)
891
Service Authorization Reference
Service Authorization Reference
IAM Access Analyzer
aws:RequestTag/
${TagKey}
(p. 893)
aws:TagKeys
(p. 893)
aws:RequestTag/
${TagKey}
(p. 893)
aws:TagKeys
(p. 893)
ArchiveRule arn:${Partition}:access-analyzer:${Region}:
${Account}:analyzer/${analyzerName}/archive-
rule/${ruleName}
To view the global condition keys that are available to all services, see Available global condition keys.
892
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Identity And Access Management (p. 893)
• Resource types defined by Identity And Access Management (p. 906)
• Condition keys for Identity And Access Management (p. 907)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
893
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
iam:PermissionsBoundary
(p. 907)
iam:PermissionsBoundary
(p. 907)
894
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
iam:PermissionsBoundary
(p. 907)
iam:PermissionsBoundary
(p. 907)
895
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
896
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
sms-mfa
(p. 907)
iam:PermissionsBoundary
(p. 907)
897
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
iam:PermissionsBoundary
(p. 907)
organizations:ListParents
organizations:ListPolicies
organizations:ListRoots
organizations:ListTargetsF
iam:OrganizationsPolicyId
(p. 907)
898
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
899
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
900
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
901
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
902
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
iam:PassedToService
(p. 907)
903
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
904
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
905
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
access-report arn:${Partition}:iam::${Account}:access-
report/${EntityPath}
assumed-role arn:${Partition}:iam::${Account}:assumed-
role/${RoleName}/${RoleSessionName}
federated- arn:${Partition}:iam::${Account}:federated-
user user/${UserName}
group arn:${Partition}:iam::${Account}:group/
${GroupNameWithPath}
instance- arn:${Partition}:iam::${Account}:instance-
profile profile/${InstanceProfileNameWithPath}
mfa arn:${Partition}:iam::${Account}:mfa/
${MfaTokenIdWithPath}
oidc-provider arn:${Partition}:iam::${Account}:oidc-
provider/${OidcProviderName}
906
Service Authorization Reference
Service Authorization Reference
Identity And Access Management
policy arn:${Partition}:iam::${Account}:policy/
${PolicyNameWithPath}
saml-provider arn:${Partition}:iam::${Account}:saml-
provider/${SamlProviderName}
server- arn:${Partition}:iam::${Account}:server-
certificate certificate/${CertificateNameWithPath}
sms-mfa arn:${Partition}:iam::${Account}:sms-mfa/
${MfaTokenIdWithPath}
To view the global condition keys that are available to all services, see Available global condition keys.
Filters by the resource that the role will be used on behalf of ARN
iam:AssociatedResourceArn
Filters access by the AWS service to which this role is passed String
iam:PassedToService
907
Service Authorization Reference
Service Authorization Reference
AWS Identity Store
References:
Topics
• Actions defined by AWS Identity Store (p. 908)
• Resource types defined by AWS Identity Store (p. 909)
• Condition keys for AWS Identity Store (p. 909)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
908
Service Authorization Reference
Service Authorization Reference
AWS Import Export Disk Service
References:
Topics
• Actions defined by AWS Import Export Disk Service (p. 909)
• Resource types defined by AWS Import Export Disk Service (p. 910)
• Condition keys for AWS Import Export Disk Service (p. 910)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
909
Service Authorization Reference
Service Authorization Reference
Amazon Inspector
References:
910
Service Authorization Reference
Service Authorization Reference
Amazon Inspector
Topics
• Actions defined by Amazon Inspector (p. 911)
• Resource types defined by Amazon Inspector (p. 914)
• Condition keys for Amazon Inspector (p. 914)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
911
Service Authorization Reference
Service Authorization Reference
Amazon Inspector
912
Service Authorization Reference
Service Authorization Reference
Amazon Inspector
913
Service Authorization Reference
Service Authorization Reference
Amazon Interactive Video Service
References:
Topics
• Actions defined by Amazon Interactive Video Service (p. 914)
• Resource types defined by Amazon Interactive Video Service (p. 918)
• Condition keys for Amazon Interactive Video Service (p. 918)
914
Service Authorization Reference
Service Authorization Reference
Amazon Interactive Video Service
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 918)
aws:RequestTag/
${TagKey}
(p. 918)
aws:TagKeys
(p. 918)
aws:RequestTag/
${TagKey}
(p. 918)
915
Service Authorization Reference
Service Authorization Reference
Amazon Interactive Video Service
aws:TagKeys
(p. 918)
aws:RequestTag/
${TagKey}
(p. 918)
916
Service Authorization Reference
Service Authorization Reference
Amazon Interactive Video Service
Stream-
Key
(p. 918)
aws:TagKeys
(p. 918)
aws:RequestTag/
${TagKey}
(p. 918)
Stream-
Key
(p. 918)
aws:TagKeys
(p. 918)
aws:RequestTag/
${TagKey}
(p. 918)
Stream-
Key
(p. 918)
917
Service Authorization Reference
Service Authorization Reference
Amazon Interactive Video Service
aws:TagKeys
(p. 918)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags associated with the request String
${TagKey}
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
918
Service Authorization Reference
Service Authorization Reference
AWS IoT
References:
Topics
• Actions defined by AWS IoT (p. 919)
• Resource types defined by AWS IoT (p. 939)
• Condition keys for AWS IoT (p. 941)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
thing*
(p. 940)
thinggroup*
(p. 940)
919
Service Authorization Reference
Service Authorization Reference
AWS IoT
thing*
(p. 940)
thinggroup*
(p. 940)
thinggroup
(p. 940)
thinggroup
(p. 940)
thing*
(p. 940)
iot:Delete
(p. 941)
920
Service Authorization Reference
Service Authorization Reference
AWS IoT
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
iot:DomainName
(p. 941)
921
Service Authorization Reference
Service Authorization Reference
AWS IoT
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
index*
(p. 940)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
thing*
(p. 940)
thinggroup*
(p. 940)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:TagKeys
(p. 941)
922
Service Authorization Reference
Service Authorization Reference
AWS IoT
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
923
Service Authorization Reference
Service Authorization Reference
AWS IoT
dimension
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
billinggroup
(p. 940)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
924
Service Authorization Reference
Service Authorization Reference
AWS IoT
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
thing*
(p. 940)
925
Service Authorization Reference
Service Authorization Reference
AWS IoT
dimension
(p. 941)
926
Service Authorization Reference
Service Authorization Reference
AWS IoT
927
Service Authorization Reference
Service Authorization Reference
AWS IoT
thing
(p. 940)
thinggroup
(p. 940)
928
Service Authorization Reference
Service Authorization Reference
AWS IoT
dimension
(p. 941)
thinggroup
(p. 940)
929
Service Authorization Reference
Service Authorization Reference
AWS IoT
930
Service Authorization Reference
Service Authorization Reference
AWS IoT
931
Service Authorization Reference
Service Authorization Reference
AWS IoT
billinggroup
(p. 940)
cacert
(p. 940)
dimension
(p. 941)
domainconfiguration
(p. 941)
dynamicthinggroup
(p. 940)
fleetmetric
(p. 940)
job
(p. 940)
mitigationaction
(p. 941)
otaupdate
(p. 940)
policy
(p. 940)
provisioningtemplate
(p. 941)
rolealias
(p. 940)
rule
(p. 941)
932
Service Authorization Reference
Service Authorization Reference
AWS IoT
scheduledaudit
(p. 941)
securityprofile
(p. 941)
stream
(p. 940)
thinggroup
(p. 940)
thingtype
(p. 940)
933
Service Authorization Reference
Service Authorization Reference
AWS IoT
aws:TagKeys
(p. 941)
iot:ThingGroupArn
(p. 941)
iot:TunnelDestinationService
(p. 941)
aws:TagKeys
(p. 941)
thing*
(p. 940)
thinggroup*
(p. 940)
934
Service Authorization Reference
Service Authorization Reference
AWS IoT
billinggroup
(p. 940)
cacert
(p. 940)
dimension
(p. 941)
935
Service Authorization Reference
Service Authorization Reference
AWS IoT
domainconfiguration
(p. 941)
dynamicthinggroup
(p. 940)
fleetmetric
(p. 940)
job
(p. 940)
mitigationaction
(p. 941)
otaupdate
(p. 940)
policy
(p. 940)
provisioningtemplate
(p. 941)
rolealias
(p. 940)
rule
(p. 941)
scheduledaudit
(p. 941)
securityprofile
(p. 941)
stream
(p. 940)
thinggroup
(p. 940)
thingtype
(p. 940)
aws:RequestTag/
${TagKey}
(p. 941)
aws:TagKeys
(p. 941)
936
Service Authorization Reference
Service Authorization Reference
AWS IoT
billinggroup
(p. 940)
cacert
(p. 940)
dimension
(p. 941)
domainconfiguration
(p. 941)
dynamicthinggroup
(p. 940)
fleetmetric
(p. 940)
job
(p. 940)
mitigationaction
(p. 941)
otaupdate
(p. 940)
policy
(p. 940)
provisioningtemplate
(p. 941)
rolealias
(p. 940)
rule
(p. 941)
scheduledaudit
(p. 941)
securityprofile
(p. 941)
937
Service Authorization Reference
Service Authorization Reference
AWS IoT
stream
(p. 940)
thinggroup
(p. 940)
thingtype
(p. 940)
aws:TagKeys
(p. 941)
index*
(p. 940)
938
Service Authorization Reference
Service Authorization Reference
AWS IoT
dimension
(p. 941)
thinggroup
(p. 940)
939
Service Authorization Reference
Service Authorization Reference
AWS IoT
client arn:${Partition}:iot:${Region}:
${Account}:client/${ClientId}
index arn:${Partition}:iot:${Region}:
${Account}:index/${IndexName}
thing arn:${Partition}:iot:${Region}:
${Account}:thing/${ThingName}
arn:${Partition}:iot:${Region}: aws:ResourceTag/
dynamicthinggroup
${Account}:thinggroup/${ThingGroupName} ${TagKey} (p. 941)
topic arn:${Partition}:iot:${Region}:
${Account}:topic/${TopicName}
topicfilter arn:${Partition}:iot:${Region}:
${Account}:topicfilter/${TopicFilter}
cert arn:${Partition}:iot:${Region}:
${Account}:cert/${Certificate}
940
Service Authorization Reference
Service Authorization Reference
AWS IoT
arn:${Partition}:iot:${Region}: aws:ResourceTag/
scheduledaudit ${Account}:scheduledaudit/${ScheduleName} ${TagKey} (p. 941)
arn:${Partition}:iot:${Region}: aws:ResourceTag/
mitigationaction ${Account}:mitigationaction/ ${TagKey} (p. 941)
${MitigationActionName}
arn:${Partition}:iot:${Region}: aws:ResourceTag/
securityprofile ${Account}:securityprofile/ ${TagKey} (p. 941)
${SecurityProfileName}
arn:${Partition}:iot:${Region}: aws:ResourceTag/
provisioningtemplate
${Account}:provisioningtemplate/ ${TagKey} (p. 941)
${provisioningTemplate}
arn:${Partition}:iot:${Region}: aws:ResourceTag/
domainconfiguration
${Account}:domainconfiguration/ ${TagKey} (p. 941)
${domainConfigurationName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ A tag key that is present in the request that the user makes String
${TagKey} to IoT.
aws:ResourceTag/ The tag key component of a tag attached to an IoT resource. String
${TagKey}
aws:TagKeys The list of all the tag key names associated with the resource String
in the request.
iot:Delete The flag indicating whether or not to also delete an IoT Bool
Tunnel immediately
The list of all IoT Thing Group ARNs that the destination IoT String
iot:ThingGroupArn Thing belongs to for an IoT Tunnel
941
Service Authorization Reference
Service Authorization Reference
AWS IoT 1-Click
References:
Topics
• Actions defined by AWS IoT 1-Click (p. 942)
• Resource types defined by AWS IoT 1-Click (p. 944)
• Condition keys for AWS IoT 1-Click (p. 945)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 945)
942
Service Authorization Reference
Service Authorization Reference
AWS IoT 1-Click
aws:RequestTag/
${TagKey}
(p. 945)
aws:TagKeys
(p. 945)
943
Service Authorization Reference
Service Authorization Reference
AWS IoT 1-Click
project
(p. 944)
aws:RequestTag/
${TagKey}
(p. 945)
aws:TagKeys
(p. 945)
project
(p. 944)
aws:TagKeys
(p. 945)
944
Service Authorization Reference
Service Authorization Reference
AWS IoT Analytics
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ A tag key that is present in the request that the user makes String
${TagKey} to IoT 1-Click.
The preface string for a tag key and value pair attached to an String
aws:ResourceTag/ IoT 1-Click resource.
${TagKey}
aws:TagKeys The list of all the tag key names associated with the IoT 1- String
Click resource in the request.
References:
Topics
• Actions defined by AWS IoT Analytics (p. 945)
• Resource types defined by AWS IoT Analytics (p. 949)
• Condition keys for AWS IoT Analytics (p. 950)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
945
Service Authorization Reference
Service Authorization Reference
AWS IoT Analytics
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 950)
aws:TagKeys
(p. 950)
aws:RequestTag/
${TagKey}
(p. 950)
aws:TagKeys
(p. 950)
aws:RequestTag/
${TagKey}
(p. 950)
aws:TagKeys
(p. 950)
aws:RequestTag/
${TagKey}
(p. 950)
aws:TagKeys
(p. 950)
946
Service Authorization Reference
Service Authorization Reference
AWS IoT Analytics
datastore
(p. 949)
pipeline
(p. 949)
947
Service Authorization Reference
Service Authorization Reference
AWS IoT Analytics
datastore
(p. 949)
pipeline
(p. 949)
aws:RequestTag/
${TagKey}
(p. 950)
aws:TagKeys
(p. 950)
dataset
(p. 949)
datastore
(p. 949)
pipeline
(p. 949)
aws:RequestTag/
${TagKey}
(p. 950)
aws:TagKeys
(p. 950)
948
Service Authorization Reference
Service Authorization Reference
AWS IoT Analytics
iotanalytics:ResourceTag/
${TagKey} (p. 950)
iotanalytics:ResourceTag/
${TagKey} (p. 950)
iotanalytics:ResourceTag/
${TagKey} (p. 950)
iotanalytics:ResourceTag/
${TagKey} (p. 950)
949
Service Authorization Reference
Service Authorization Reference
AWS IoT Core Device Advisor
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ A tag key that is present in the request that the user makes String
${TagKey} to IoT Analytics.
aws:TagKeys The list of all the tag key names associated with the IoT String
Analytics resource in the request.
The preface string for a tag key and value pair attached to an String
iotanalytics:ResourceTag/
IoT Analytics resource.
${TagKey}
References:
Topics
• Actions defined by AWS IoT Core Device Advisor (p. 950)
• Resource types defined by AWS IoT Core Device Advisor (p. 952)
• Condition keys for AWS IoT Core Device Advisor (p. 952)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
950
Service Authorization Reference
Service Authorization Reference
AWS IoT Core Device Advisor
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 953)
aws:TagKeys
(p. 953)
951
Service Authorization Reference
Service Authorization Reference
AWS IoT Core Device Advisor
aws:RequestTag/
${TagKey}
(p. 952)
aws:TagKeys
(p. 953)
aws:TagKeys
(p. 953)
arn:${Partition}:iotdeviceadvisor: aws:ResourceTag/
suitedefinition ${Region}:${Account}:suitedefinition/ ${TagKey} (p. 953)
${suiteDefinitionId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
952
Service Authorization Reference
Service Authorization Reference
AWS IoT Core for LoRaWAN
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
References:
Topics
• Actions defined by AWS IoT Core for LoRaWAN (p. 953)
• Resource types defined by AWS IoT Core for LoRaWAN (p. 958)
• Condition keys for AWS IoT Core for LoRaWAN (p. 959)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
953
Service Authorization Reference
Service Authorization Reference
AWS IoT Core for LoRaWAN
aws:RequestTag/
${TagKey}
(p. 959)
aws:TagKeys
(p. 959)
aws:RequestTag/
${TagKey}
(p. 959)
aws:TagKeys
(p. 959)
aws:RequestTag/
${TagKey}
(p. 959)
aws:TagKeys
(p. 959)
WirelessDevice*
(p. 958)
954
Service Authorization Reference
Service Authorization Reference
AWS IoT Core for LoRaWAN
aws:RequestTag/
${TagKey}
(p. 959)
aws:TagKeys
(p. 959)
thing*
(p. 959)
thing*
(p. 959)
955
Service Authorization Reference
Service Authorization Reference
AWS IoT Core for LoRaWAN
956
Service Authorization Reference
Service Authorization Reference
AWS IoT Core for LoRaWAN
DeviceProfile
(p. 958)
ServiceProfile
(p. 958)
WirelessGateway
(p. 958)
DeviceProfile
(p. 958)
ServiceProfile
(p. 958)
WirelessGateway
(p. 958)
aws:RequestTag/
${TagKey}
(p. 959)
aws:TagKeys
(p. 959)
957
Service Authorization Reference
Service Authorization Reference
AWS IoT Core for LoRaWAN
DeviceProfile
(p. 958)
ServiceProfile
(p. 958)
WirelessGateway
(p. 958)
aws:TagKeys
(p. 959)
arn:${Partition}:iotwireless:
WirelessDevice ${Region}:${Account}:WirelessDevice/
${WirelessDeviceId}
arn:${Partition}:iotwireless: aws:ResourceTag/
WirelessGateway ${Region}:${Account}:WirelessGateway/ ${TagKey} (p. 959)
${WirelessGatewayId}
958
Service Authorization Reference
Service Authorization Reference
AWS IoT Device Tester
thing arn:${Partition}:iot:${Region}:
${Account}:thing/${ThingName}
cert arn:${Partition}:iot:${Region}:
${Account}:cert/${Certificate}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ A tag key that is present in the request that the user makes String
${TagKey} to IoT Wireless.
aws:ResourceTag/ The tag key component of a tag attached to an IoT Wireless String
${TagKey} resource.
aws:TagKeys The list of all the tag key names associated with the resource String
in the request.
References:
Topics
• Actions defined by AWS IoT Device Tester (p. 959)
• Resource types defined by AWS IoT Device Tester (p. 960)
• Condition keys for AWS IoT Device Tester (p. 960)
959
Service Authorization Reference
Service Authorization Reference
AWS IoT Events
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
960
Service Authorization Reference
Service Authorization Reference
AWS IoT Events
References:
Topics
• Actions defined by AWS IoT Events (p. 961)
• Resource types defined by AWS IoT Events (p. 964)
• Condition keys for AWS IoT Events (p. 965)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
961
Service Authorization Reference
Service Authorization Reference
AWS IoT Events
aws:TagKeys
(p. 965)
aws:TagKeys
(p. 965)
aws:RequestTag/
${TagKey}
(p. 965)
aws:TagKeys
(p. 965)
962
Service Authorization Reference
Service Authorization Reference
AWS IoT Events
963
Service Authorization Reference
Service Authorization Reference
AWS IoT Events
aws:RequestTag/
${TagKey}
(p. 965)
aws:TagKeys
(p. 965)
aws:TagKeys
(p. 965)
arn:${Partition}:iotevents: aws:ResourceTag/
detectorModel ${Region}:${Account}:detectorModel/ ${TagKey} (p. 965)
${DetectorModelName}
964
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by the tag key-value pairs in the request String
${TagKey}
References:
Topics
• Actions defined by AWS IoT Greengrass (p. 965)
• Resource types defined by AWS IoT Greengrass (p. 975)
• Condition keys for AWS IoT Greengrass (p. 977)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
965
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 977)
aws:TagKeys
(p. 977)
aws:TagKeys
(p. 977)
966
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
aws:TagKeys
(p. 977)
aws:TagKeys
(p. 977)
967
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
aws:TagKeys
(p. 977)
968
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
group*
(p. 975)
969
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
970
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
971
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
connectorDefinition
(p. 976)
coreDefinition
(p. 976)
deviceDefinition
(p. 976)
functionDefinition
(p. 976)
group
(p. 975)
loggerDefinition
(p. 976)
resourceDefinition
(p. 976)
972
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
subscriptionDefinition
(p. 976)
aws:RequestTag/
${TagKey}
(p. 977)
aws:TagKeys
(p. 977)
aws:TagKeys
(p. 977)
connectorDefinition
(p. 976)
coreDefinition
(p. 976)
deviceDefinition
(p. 976)
functionDefinition
(p. 976)
group
(p. 975)
loggerDefinition
(p. 976)
resourceDefinition
(p. 976)
subscriptionDefinition
(p. 976)
aws:RequestTag/
${TagKey}
(p. 977)
aws:TagKeys
(p. 977)
973
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
connectorDefinition
(p. 976)
coreDefinition
(p. 976)
deviceDefinition
(p. 976)
functionDefinition
(p. 976)
group
(p. 975)
loggerDefinition
(p. 976)
resourceDefinition
(p. 976)
subscriptionDefinition
(p. 976)
aws:TagKeys
(p. 977)
974
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
arn:${Partition}:greengrass:${Region}:
connectivityInfo ${Account}:/greengrass/things/${ThingName}/
connectivityInfo
artifact arn:${Partition}:greengrass:${Region}:
${Account}:/greengrass/groups/${GroupId}/
deployments/${DeploymentId}/artifacts/
lambda/${ArtifactId}
arn:${Partition}:greengrass:${Region}:
certificateAuthority
${Account}:/greengrass/groups/
${GroupId}/certificateauthorities/
${CertificateAuthorityId}
deployment arn:${Partition}:greengrass:${Region}:
${Account}:/greengrass/groups/${GroupId}/
deployments/${DeploymentId}
arn:${Partition}:greengrass:${Region}: aws:ResourceTag/
bulkDeployment ${Account}:/greengrass/bulk/deployments/ ${TagKey} (p. 977)
${BulkDeploymentId}
groupVersion arn:${Partition}:greengrass:${Region}:
${Account}:/greengrass/groups/${GroupId}/
versions/${VersionId}
975
Service Authorization Reference
Service Authorization Reference
AWS IoT Greengrass
arn:${Partition}:greengrass:${Region}:
coreDefinitionVersion
${Account}:/greengrass/definition/cores/
${CoreDefinitionId}/versions/${VersionId}
arn:${Partition}:greengrass:${Region}: aws:ResourceTag/
deviceDefinition ${Account}:/greengrass/definition/devices/ ${TagKey} (p. 977)
${DeviceDefinitionId}
arn:${Partition}:greengrass:${Region}:
deviceDefinitionVersion
${Account}:/greengrass/definition/devices/
${DeviceDefinitionId}/versions/${VersionId}
arn:${Partition}:greengrass:${Region}: aws:ResourceTag/
functionDefinition${Account}:/greengrass/definition/functions/ ${TagKey} (p. 977)
${FunctionDefinitionId}
arn:${Partition}:greengrass:${Region}:
functionDefinitionVersion
${Account}:/greengrass/definition/
functions/${FunctionDefinitionId}/versions/
${VersionId}
arn:${Partition}:greengrass:${Region}: aws:ResourceTag/
subscriptionDefinition
${Account}:/greengrass/definition/ ${TagKey} (p. 977)
subscriptions/${SubscriptionDefinitionId}
arn:${Partition}:greengrass:${Region}:
subscriptionDefinitionVersion
${Account}:/greengrass/definition/
subscriptions/${SubscriptionDefinitionId}/
versions/${VersionId}
arn:${Partition}:greengrass:${Region}: aws:ResourceTag/
loggerDefinition ${Account}:/greengrass/definition/loggers/ ${TagKey} (p. 977)
${LoggerDefinitionId}
arn:${Partition}:greengrass:${Region}:
loggerDefinitionVersion
${Account}:/greengrass/definition/loggers/
${LoggerDefinitionId}/versions/${VersionId}
arn:${Partition}:greengrass:${Region}: aws:ResourceTag/
resourceDefinition${Account}:/greengrass/definition/resources/ ${TagKey} (p. 977)
${ResourceDefinitionId}
arn:${Partition}:greengrass:${Region}:
resourceDefinitionVersion
${Account}:/greengrass/definition/
resources/${ResourceDefinitionId}/versions/
${VersionId}
arn:${Partition}:greengrass:${Region}: aws:ResourceTag/
connectorDefinition
${Account}:/greengrass/definition/ ${TagKey} (p. 977)
connectors/${ConnectorDefinitionId}
976
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
arn:${Partition}:greengrass:${Region}:
connectorDefinitionVersion
${Account}:/greengrass/definition/
connectors/${ConnectorDefinitionId}/
versions/${VersionId}
thing arn:${Partition}:iot:${Region}:
${Account}:thing/${ThingName}
To view the global condition keys that are available to all services, see Available global condition keys.
Filters access by checking how long ago (in seconds) the Numeric
aws:MultiFactorAuthAge
security credentials validated by multi-factor authentication
(MFA) in the request were issued using MFA.
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the mandatory tags.
Filters actions based on the tag value associated with the String
aws:ResourceTag/ resource.
${TagKey}
977
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
References:
Topics
• Actions defined by AWS IoT SiteWise (p. 978)
• Resource types defined by AWS IoT SiteWise (p. 984)
• Condition keys for AWS IoT SiteWise (p. 984)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
978
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
aws:RequestTag/
${TagKey}
(p. 985)
aws:TagKeys
(p. 985)
aws:RequestTag/
${TagKey}
(p. 985)
aws:TagKeys
(p. 985)
aws:TagKeys
(p. 985)
aws:RequestTag/
${TagKey}
(p. 985)
aws:TagKeys
(p. 985)
aws:TagKeys
(p. 985)
aws:TagKeys
(p. 985)
979
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
aws:RequestTag/
${TagKey}
(p. 985)
aws:TagKeys
(p. 985)
980
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
981
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
asset
(p. 984)
asset-
model
(p. 984)
dashboard
(p. 984)
gateway
(p. 984)
portal
(p. 984)
project
(p. 984)
aws:ResourceTag/
${TagKey}
(p. 985)
asset
(p. 984)
asset-
model
(p. 984)
dashboard
(p. 984)
gateway
(p. 984)
portal
(p. 984)
982
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
project
(p. 984)
aws:TagKeys
(p. 985)
aws:RequestTag/
${TagKey}
(p. 985)
asset
(p. 984)
asset-
model
(p. 984)
dashboard
(p. 984)
gateway
(p. 984)
portal
(p. 984)
project
(p. 984)
aws:TagKeys
(p. 985)
983
Service Authorization Reference
Service Authorization Reference
AWS IoT SiteWise
To view the global condition keys that are available to all services, see Available global condition keys.
984
Service Authorization Reference
Service Authorization Reference
AWS IoT Things Graph
aws:RequestTag/ Filters access by the tag key-value pairs in the request String
${TagKey}
References:
Topics
• Actions defined by AWS IoT Things Graph (p. 985)
• Resource types defined by AWS IoT Things Graph (p. 990)
• Condition keys for AWS IoT Things Graph (p. 990)
985
Service Authorization Reference
Service Authorization Reference
AWS IoT Things Graph
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 991)
986
Service Authorization Reference
Service Authorization Reference
AWS IoT Things Graph
987
Service Authorization Reference
Service Authorization Reference
AWS IoT Things Graph
988
Service Authorization Reference
Service Authorization Reference
AWS IoT Things Graph
aws:RequestTag/
${TagKey}
(p. 990)
aws:TagKeys
(p. 991)
aws:TagKeys
(p. 991)
989
Service Authorization Reference
Service Authorization Reference
AWS IoT Things Graph
Workflow arn:${Partition}:iotthingsgraph:${Region}:
${Account}:Workflow/${NamespacePath}
System arn:${Partition}:iotthingsgraph:${Region}:
${Account}:System/${NamespacePath}
arn:${Partition}:iotthingsgraph:${Region}: aws:ResourceTag/
SystemInstance ${Account}:Deployment/${NamespacePath} ${TagKey} (p. 990)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by a key that is present in the request the user String
${TagKey} makes to the thingsgraph service.
990
Service Authorization Reference
Service Authorization Reference
AWS IQ
aws:TagKeys Filters access by the list of all the tag key names present in String
the request the user makes to the thingsgraph service.
References:
Topics
• Actions defined by AWS IQ (p. 991)
• Resource types defined by AWS IQ (p. 991)
• Condition keys for AWS IQ (p. 992)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
991
Service Authorization Reference
Service Authorization Reference
AWS IQ Permissions
References:
Topics
• Actions defined by AWS IQ Permissions (p. 992)
• Resource types defined by AWS IQ Permissions (p. 993)
• Condition keys for AWS IQ Permissions (p. 993)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
992
Service Authorization Reference
Service Authorization Reference
Amazon Kendra
References:
Topics
• Actions defined by Amazon Kendra (p. 993)
• Resource types defined by Amazon Kendra (p. 997)
• Condition keys for Amazon Kendra (p. 997)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
993
Service Authorization Reference
Service Authorization Reference
Amazon Kendra
aws:RequestTag/
${TagKey}
(p. 998)
aws:TagKeys
(p. 998)
aws:RequestTag/
${TagKey}
(p. 998)
aws:TagKeys
(p. 998)
aws:TagKeys
(p. 998)
aws:RequestTag/
${TagKey}
(p. 998)
aws:TagKeys
(p. 998)
index*
(p. 997)
index*
(p. 997)
994
Service Authorization Reference
Service Authorization Reference
Amazon Kendra
thesaurus*
(p. 997)
index*
(p. 997)
index*
(p. 997)
thesaurus*
(p. 997)
index*
(p. 997)
faq
(p. 997)
index
(p. 997)
thesaurus
(p. 997)
995
Service Authorization Reference
Service Authorization Reference
Amazon Kendra
index*
(p. 997)
index*
(p. 997)
faq
(p. 997)
index
(p. 997)
thesaurus
(p. 997)
aws:RequestTag/
${TagKey}
(p. 998)
aws:TagKeys
(p. 998)
faq
(p. 997)
index
(p. 997)
thesaurus
(p. 997)
996
Service Authorization Reference
Service Authorization Reference
Amazon Kendra
aws:TagKeys
(p. 998)
index*
(p. 997)
thesaurus*
(p. 997)
To view the global condition keys that are available to all services, see Available global condition keys.
997
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the mandatory tags
Filters actions based on the tag value associated with the String
aws:ResourceTag/ resource
${TagKey}
References:
Topics
• Actions defined by AWS Key Management Service (p. 998)
• Resource types defined by AWS Key Management Service (p. 1008)
• Condition keys for AWS Key Management Service (p. 1008)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
998
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:GrantConstraintType
(p. 1009)
kms:GrantIsForAWSResource
(p. 1009)
kms:ViaService
(p. 1010)
kms:CustomerMasterKeyUsage
(p. 1009)
999
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:EncryptionAlgorithm
(p. 1009)
kms:EncryptionContextKeys
(p. 1009)
kms:ViaService
(p. 1010)
kms:CallerAccount
(p. 1009)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
1000
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:EncryptionAlgorithm
(p. 1009)
kms:EncryptionContextKeys
(p. 1009)
kms:ViaService
(p. 1010)
1001
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:EncryptionAlgorithm
(p. 1009)
kms:EncryptionContextKeys
(p. 1009)
kms:ViaService
(p. 1010)
kms:DataKeyPairSpec
(p. 1009)
kms:EncryptionAlgorithm
(p. 1009)
kms:EncryptionContextKeys
(p. 1009)
kms:ViaService
(p. 1010)
kms:EncryptionAlgorithm
(p. 1009)
kms:EncryptionContextKeys
(p. 1009)
kms:ViaService
(p. 1010)
1002
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:EncryptionContextKeys
(p. 1009)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:WrappingAlgorithm
(p. 1010)
kms:WrappingKeySpec
(p. 1010)
1003
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:CallerAccount
(p. 1009)
kms:ViaService
(p. 1010)
kms:ExpirationModel
(p. 1009)
kms:ValidTo
(p. 1010)
kms:ViaService
(p. 1010)
kms:GrantIsForAWSResource
(p. 1009)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
1004
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:ViaService
(p. 1010)
kms:CallerAccount
(p. 1009)
kms:ViaService
(p. 1010)
kms:EncryptionAlgorithm
(p. 1009)
kms:EncryptionContextKeys
(p. 1009)
kms:ReEncryptOnSameKey
(p. 1009)
kms:ViaService
(p. 1010)
1005
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:CallerAccount
(p. 1009)
kms:EncryptionAlgorithm
(p. 1009)
kms:EncryptionContextKeys
(p. 1009)
kms:ReEncryptOnSameKey
(p. 1009)
kms:ViaService
(p. 1010)
kms:GrantIsForAWSResource
(p. 1009)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
1006
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:CallerAccount
(p. 1009)
kms:MessageType
(p. 1009)
kms:SigningAlgorithm
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
kms:ViaService
(p. 1010)
1007
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
kms:MessageType
(p. 1009)
kms:SigningAlgorithm
(p. 1010)
kms:ViaService
(p. 1010)
alias arn:${Partition}:kms:${Region}:
${Account}:alias/${Alias}
key arn:${Partition}:kms:${Region}:
${Account}:key/${KeyId}
To view the global condition keys that are available to all services, see Available global condition keys.
1008
Service Authorization Reference
Service Authorization Reference
AWS Key Management Service
Filters access to the Sign and Verify operations based on the String
kms:MessageType value of the MessageType parameter in the request
1009
Service Authorization Reference
Service Authorization Reference
Amazon Keyspaces (for Apache Cassandra)
Filters access to the Sign and Verify operations based on the String
kms:SigningAlgorithm
signing algorithm in the request
kms:ViaService Filters access when a request made on the principal's behalf String
comes from a specified AWS service
References:
Topics
• Actions defined by Amazon Keyspaces (for Apache Cassandra) (p. 1010)
• Resource types defined by Amazon Keyspaces (for Apache Cassandra) (p. 1012)
• Condition keys for Amazon Keyspaces (for Apache Cassandra) (p. 1013)
1010
Service Authorization Reference
Service Authorization Reference
Amazon Keyspaces (for Apache Cassandra)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
table
(p. 1012)
aws:RequestTag/
${TagKey}
(p. 1013)
aws:TagKeys
(p. 1013)
table
(p. 1012)
aws:RequestTag/
${TagKey}
(p. 1013)
aws:TagKeys
(p. 1013)
table
(p. 1012)
aws:RequestTag/
${TagKey}
(p. 1013)
aws:TagKeys
(p. 1013)
1011
Service Authorization Reference
Service Authorization Reference
Amazon Keyspaces (for Apache Cassandra)
table
(p. 1012)
aws:RequestTag/
${TagKey}
(p. 1013)
aws:TagKeys
(p. 1013)
table
(p. 1012)
aws:RequestTag/
${TagKey}
(p. 1013)
aws:TagKeys
(p. 1013)
1012
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Amazon Kinesis (p. 1013)
• Resource types defined by Amazon Kinesis (p. 1016)
• Condition keys for Amazon Kinesis (p. 1016)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
1013
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
stream*
(p. 1016)
stream*
(p. 1016)
API_EnableEnhancedMonitoring.html
Write
EnableEnhancedMonitoring
1014
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis
stream*
(p. 1016)
1015
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis
stream*
(p. 1016)
stream arn:${Partition}:kinesis:${Region}:
${Account}:stream/${StreamName}
consumer arn:${Partition}:kinesis:
${Region}:${Account}:${StreamType}/
${StreamName}/consumer/${ConsumerName}:
${ConsumerCreationTimpstamp}
kmsKey arn:${Partition}:kms:${Region}:
${Account}:key/${KeyId}
1016
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Analytics
References:
Topics
• Actions defined by Amazon Kinesis Analytics (p. 1017)
• Resource types defined by Amazon Kinesis Analytics (p. 1019)
• Condition keys for Amazon Kinesis Analytics (p. 1019)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 1019)
1017
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Analytics
aws:RequestTag/
${TagKey}
(p. 1019)
aws:TagKeys
(p. 1019)
aws:TagKeys
(p. 1019)
1018
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Analytics V2
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
aws:TagKeys Filters actions based on the presence of mandatory tag keys String
in the request
References:
Topics
• Actions defined by Amazon Kinesis Analytics V2 (p. 1020)
• Resource types defined by Amazon Kinesis Analytics V2 (p. 1022)
• Condition keys for Amazon Kinesis Analytics V2 (p. 1022)
1019
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Analytics V2
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 1022)
1020
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Analytics V2
aws:RequestTag/
${TagKey}
(p. 1022)
aws:TagKeys
(p. 1022)
aws:TagKeys
(p. 1022)
1021
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Firehose
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
aws:TagKeys Filters actions based on the presence of mandatory tag keys String
in the request
References:
1022
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Firehose
Topics
• Actions defined by Amazon Kinesis Firehose (p. 1023)
• Resource types defined by Amazon Kinesis Firehose (p. 1024)
• Condition keys for Amazon Kinesis Firehose (p. 1024)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 1025)
aws:TagKeys
(p. 1025)
1023
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Firehose
aws:RequestTag/
${TagKey}
(p. 1025)
aws:TagKeys
(p. 1025)
aws:TagKeys
(p. 1025)
arn:${Partition}:firehose: aws:ResourceTag/
deliverystream ${Region}:${Account}:deliverystream/ ${TagKey} (p. 1025)
${DeliveryStreamName}
1024
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Video Streams
policy statement applies. For details about the columns in the following table, see The condition keys
table (p. 2).
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters create requests based on the allowed set of values for String
${TagKey} each of the tags
References:
Topics
• Actions defined by Amazon Kinesis Video Streams (p. 1025)
• Resource types defined by Amazon Kinesis Video Streams (p. 1028)
• Condition keys for Amazon Kinesis Video Streams (p. 1029)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1025
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Video Streams
aws:RequestTag/
${TagKey}
(p. 1029)
aws:TagKeys
(p. 1029)
aws:RequestTag/
${TagKey}
(p. 1029)
aws:TagKeys
(p. 1029)
1026
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Video Streams
stream
(p. 1029)
1027
Service Authorization Reference
Service Authorization Reference
Amazon Kinesis Video Streams
aws:RequestTag/
${TagKey}
(p. 1029)
aws:TagKeys
(p. 1029)
aws:TagKeys
(p. 1029)
aws:TagKeys
(p. 1029)
1028
Service Authorization Reference
Service Authorization Reference
AWS Lake Formation
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters requests based on the allowed set of values for each String
${TagKey} of the tags
References:
Topics
• Actions defined by AWS Lake Formation (p. 1030)
• Resource types defined by AWS Lake Formation (p. 1031)
• Condition keys for AWS Lake Formation (p. 1031)
1029
Service Authorization Reference
Service Authorization Reference
AWS Lake Formation
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1030
Service Authorization Reference
Service Authorization Reference
AWS Lambda
References:
Topics
• Actions defined by AWS Lambda (p. 1031)
• Resource types defined by AWS Lambda (p. 1037)
• Condition keys for AWS Lambda (p. 1038)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
1031
Service Authorization Reference
Service Authorization Reference
AWS Lambda
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
lambda:Layer
(p. 1038)
lambda:VpcIds
(p. 1038)
lambda:SubnetIds
(p. 1038)
lambda:SecurityGroupIds
(p. 1038)
1032
Service Authorization Reference
Service Authorization Reference
AWS Lambda
1033
Service Authorization Reference
Service Authorization Reference
AWS Lambda
1034
Service Authorization Reference
Service Authorization Reference
AWS Lambda
1035
Service Authorization Reference
Service Authorization Reference
AWS Lambda
function*
(p. 1038)
1036
Service Authorization Reference
Service Authorization Reference
AWS Lambda
function*
(p. 1038)
lambda:VpcIds
(p. 1038)
lambda:SubnetIds
(p. 1038)
lambda:SecurityGroupIds
(p. 1038)
1037
Service Authorization Reference
Service Authorization Reference
AWS Lambda
arn:${Partition}:lambda:${Region}:
eventSourceMapping
${Account}:event-source-mapping:${UUID}
function arn:${Partition}:lambda:${Region}:
${Account}:function:${FunctionName}
function arn:${Partition}:lambda:${Region}:
version ${Account}:function:${FunctionName}:
${Version}
layer arn:${Partition}:lambda:${Region}:
${Account}:layer:${LayerName}
layerVersion arn:${Partition}:lambda:${Region}:
${Account}:layer:${LayerName}:
${LayerVersion}
To view the global condition keys that are available to all services, see Available global condition keys.
lambda:Principal Filters access by restricting the AWS service or account that String
can invoke a function
lambda:SubnetIds Filters access by the ID of subnets configured for the AWS String
Lambda function
lambda:VpcIds Filters access by the ID of the VPC configured for the AWS String
Lambda function
1038
Service Authorization Reference
Service Authorization Reference
Launch Wizard
References:
Topics
• Actions defined by Launch Wizard (p. 1039)
• Resource types defined by Launch Wizard (p. 1040)
• Condition keys for Launch Wizard (p. 1040)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1039
Service Authorization Reference
Service Authorization Reference
Amazon Lex
References:
Topics
• Actions defined by Amazon Lex (p. 1041)
• Resource types defined by Amazon Lex (p. 1045)
• Condition keys for Amazon Lex (p. 1046)
1040
Service Authorization Reference
Service Authorization Reference
Amazon Lex
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1041
Service Authorization Reference
Service Authorization Reference
Amazon Lex
1042
Service Authorization Reference
Service Authorization Reference
Amazon Lex
1043
Service Authorization Reference
Service Authorization Reference
Amazon Lex
bot alias
(p. 1046)
channel
(p. 1046)
bot
version
(p. 1045)
bot
version
(p. 1045)
aws:TagKeys
(p. 1046)
aws:RequestTag/
${TagKey}
(p. 1046)
aws:TagKeys
(p. 1046)
aws:RequestTag/
${TagKey}
(p. 1046)
1044
Service Authorization Reference
Service Authorization Reference
Amazon Lex
bot alias
(p. 1046)
channel
(p. 1046)
aws:TagKeys
(p. 1046)
aws:RequestTag/
${TagKey}
(p. 1046)
bot alias
(p. 1046)
channel
(p. 1046)
aws:TagKeys
(p. 1046)
aws:RequestTag/
${TagKey}
(p. 1046)
1045
Service Authorization Reference
Service Authorization Reference
AWS License Manager
slottype arn:${Partition}:lex:${Region}:
version ${Account}:slottype:${SlotName}:
${SlotVersion}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:TagKeys Filters access based on the set of tag keys in the request. String
lex:channelType Enables you to control access based on the channel type String
included in the request.
References:
1046
Service Authorization Reference
Service Authorization Reference
AWS License Manager
Topics
• Actions defined by AWS License Manager (p. 1047)
• Resource types defined by AWS License Manager (p. 1050)
• Condition keys for AWS License Manager (p. 1050)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1047
Service Authorization Reference
Service Authorization Reference
AWS License Manager
1048
Service Authorization Reference
Service Authorization Reference
AWS License Manager
aws:RequestTag/
${TagKey}
(p. 1050)
aws:TagKeys
(p. 1050)
1049
Service Authorization Reference
Service Authorization Reference
AWS License Manager
license arn:${Partition}:license-manager::
${Account}:license:${LicenseId}
grant arn:${Partition}:license-manager::
${Account}:grant:${GrantId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters create requests based on allowed set of values for String
${TagKey} each of the mandatory tags
aws:TagKeys Enforce tag keys that are used in the request String
1050
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
References:
Topics
• Actions defined by Amazon Lightsail (p. 1051)
• Resource types defined by Amazon Lightsail (p. 1061)
• Condition keys for Amazon Lightsail (p. 1062)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
Instance*
(p. 1062)
LoadBalancer*
(p. 1062)
1051
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
StaticIp*
(p. 1062)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
1052
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
InstanceSnapshot*
(p. 1062)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
InstanceSnapshot*
(p. 1062)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
1053
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
1054
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
LoadBalancer*
(p. 1062)
StaticIp*
(p. 1062)
1055
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
1056
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
1057
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
Instance
(p. 1062)
InstanceSnapshot
(p. 1062)
KeyPair
(p. 1062)
StaticIp
(p. 1062)
1058
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
1059
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
DiskSnapshot
(p. 1062)
Domain
(p. 1062)
Instance
(p. 1062)
InstanceSnapshot
(p. 1062)
KeyPair
(p. 1062)
LoadBalancer
(p. 1062)
RelationalDatabase
(p. 1062)
RelationalDatabaseSnapshot
(p. 1062)
StaticIp
(p. 1062)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
1060
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
DiskSnapshot
(p. 1062)
Domain
(p. 1062)
Instance
(p. 1062)
InstanceSnapshot
(p. 1062)
KeyPair
(p. 1062)
LoadBalancer
(p. 1062)
RelationalDatabase
(p. 1062)
RelationalDatabaseSnapshot
(p. 1062)
StaticIp
(p. 1062)
aws:RequestTag/
${TagKey}
(p. 1062)
aws:TagKeys
(p. 1063)
1061
Service Authorization Reference
Service Authorization Reference
Amazon Lightsail
arn:${Partition}:lightsail:${Region}: aws:ResourceTag/
InstanceSnapshot${Account}:InstanceSnapshot/${Id} ${TagKey} (p. 1063)
PeeredVpc arn:${Partition}:lightsail:${Region}:
${Account}:PeeredVpc/${Id}
arn:${Partition}:lightsail:${Region}:
LoadBalancerTlsCertificate
${Account}:LoadBalancerTlsCertificate/${Id}
arn:${Partition}:lightsail:${Region}:
ExportSnapshotRecord
${Account}:ExportSnapshotRecord/${Id}
arn:${Partition}:lightsail:${Region}:
CloudFormationStackRecord
${Account}:CloudFormationStackRecord/${Id}
arn:${Partition}:lightsail:${Region}: aws:ResourceTag/
RelationalDatabase
${Account}:RelationalDatabase/${Id} ${TagKey} (p. 1063)
arn:${Partition}:lightsail:${Region}: aws:ResourceTag/
RelationalDatabaseSnapshot
${Account}:RelationalDatabaseSnapshot/${Id} ${TagKey} (p. 1063)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
1062
Service Authorization Reference
Service Authorization Reference
Amazon Location
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Amazon Location (p. 1063)
• Resource types defined by Amazon Location (p. 1066)
• Condition keys for Amazon Location (p. 1066)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1063
Service Authorization Reference
Service Authorization Reference
Amazon Location
1064
Service Authorization Reference
Service Authorization Reference
Amazon Location
1065
Service Authorization Reference
Service Authorization Reference
Amazon Location
geofence- arn:${Partition}:geo:${Region}:
collection ${Account}:geofence-collection/
${GeofenceCollectionName}
map arn:${Partition}:geo:${Region}:
${Account}:map/${MapName}
place-index arn:${Partition}:geo:${Region}:
${Account}:place-index/${IndexName}
tracker arn:${Partition}:geo:${Region}:
${Account}:tracker/${TrackerName}
1066
Service Authorization Reference
Service Authorization Reference
Amazon Lookout for Vision
References:
Topics
• Actions defined by Amazon Lookout for Vision (p. 1067)
• Resource types defined by Amazon Lookout for Vision (p. 1069)
• Condition keys for Amazon Lookout for Vision (p. 1069)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1067
Service Authorization Reference
Service Authorization Reference
Amazon Lookout for Vision
project*
(p. 1069)
project*
(p. 1069)
project*
(p. 1069)
1068
Service Authorization Reference
Service Authorization Reference
Amazon Machine Learning
project*
(p. 1069)
project*
(p. 1069)
model arn:${Partition}:lookoutvision:${Region}:
${Account}:model/${ProjectName}/
${ModelVersion}
project arn:${Partition}:lookoutvision:${Region}:
${Account}:project/${ProjectName}
References:
Topics
1069
Service Authorization Reference
Service Authorization Reference
Amazon Machine Learning
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
evaluation
(p. 1073)
mlmodel
(p. 1073)
datasource*
(p. 1073)
mlmodel*
(p. 1073)
1070
Service Authorization Reference
Service Authorization Reference
Amazon Machine Learning
evaluation*
(p. 1073)
mlmodel*
(p. 1073)
mlmodel*
(p. 1073)
evaluation
(p. 1073)
mlmodel
(p. 1073)
1071
Service Authorization Reference
Service Authorization Reference
Amazon Machine Learning
datasource
(p. 1073)
evaluation
(p. 1073)
mlmodel
(p. 1073)
1072
Service Authorization Reference
Service Authorization Reference
Amazon Macie
arn:${Partition}:machinelearning:
batchprediction ${Region}:${Account}:batchprediction/
${BatchPredictionId}
datasource arn:${Partition}:machinelearning:${Region}:
${Account}:datasource/${DatasourceId}
evaluation arn:${Partition}:machinelearning:${Region}:
${Account}:evaluation/${EvaluationId}
mlmodel arn:${Partition}:machinelearning:${Region}:
${Account}:mlmodel/${MlModelId}
References:
Topics
• Actions defined by Amazon Macie (p. 1073)
• Resource types defined by Amazon Macie (p. 1079)
• Condition keys for Amazon Macie (p. 1079)
1073
Service Authorization Reference
Service Authorization Reference
Amazon Macie
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 1080)
aws:TagKeys
(p. 1080)
aws:TagKeys
(p. 1080)
1074
Service Authorization Reference
Service Authorization Reference
Amazon Macie
aws:TagKeys
(p. 1080)
1075
Service Authorization Reference
Service Authorization Reference
Amazon Macie
1076
Service Authorization Reference
Service Authorization Reference
Amazon Macie
1077
Service Authorization Reference
Service Authorization Reference
Amazon Macie
aws:RequestTag/
${TagKey}
(p. 1079)
aws:TagKeys
(p. 1080)
aws:RequestTag/
${TagKey}
(p. 1079)
aws:TagKeys
(p. 1080)
1078
Service Authorization Reference
Service Authorization Reference
Amazon Macie
arn:${Partition}:macie2:: aws:ResourceTag/
ClassificationJob ${Account}:classification-job/${ResourceId} ${TagKey} (p. 1080)
arn:${Partition}:macie2::${Account}:custom- aws:ResourceTag/
CustomDataIdentifier
data-identifier/${ResourceId} ${TagKey} (p. 1080)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access based on the presence of tag key-value pairs in String
${TagKey} the request
1079
Service Authorization Reference
Service Authorization Reference
Amazon Macie Classic
aws:TagKeys Filters access based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Amazon Macie Classic (p. 1080)
• Resource types defined by Amazon Macie Classic (p. 1081)
• Condition keys for Amazon Macie Classic (p. 1081)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1080
Service Authorization Reference
Service Authorization Reference
Amazon Macie Classic
To view the global condition keys that are available to all services, see Available global condition keys.
aws:SourceArn Allow access to the specified actions only when the request Arn
operates on the specified aws resource
1081
Service Authorization Reference
Service Authorization Reference
Manage Amazon API Gateway
References:
Topics
• Actions defined by Manage Amazon API Gateway (p. 1082)
• Resource types defined by Manage Amazon API Gateway (p. 1083)
• Condition keys for Manage Amazon API Gateway (p. 1084)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 1084)
aws:TagKeys
(p. 1084)
1082
Service Authorization Reference
Service Authorization Reference
Manage Amazon API Gateway
aws:RequestTag/
${TagKey}
(p. 1084)
aws:TagKeys
(p. 1084)
aws:RequestTag/
${TagKey}
(p. 1084)
aws:TagKeys
(p. 1084)
aws:TagKeys
(p. 1084)
1083
Service Authorization Reference
Service Authorization Reference
Amazon Managed Blockchain
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ String
${TagKey}
aws:ResourceTag/ String
${TagKey}
aws:TagKeys String
References:
Topics
• Actions defined by Amazon Managed Blockchain (p. 1084)
• Resource types defined by Amazon Managed Blockchain (p. 1087)
• Condition keys for Amazon Managed Blockchain (p. 1087)
1084
Service Authorization Reference
Service Authorization Reference
Amazon Managed Blockchain
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1085
Service Authorization Reference
Service Authorization Reference
Amazon Managed Blockchain
1086
Service Authorization Reference
Service Authorization Reference
Amazon Managed Service for Prometheus
network arn:${Partition}:managedblockchain:
${Region}::networks/${NetworkId}
member arn:${Partition}:managedblockchain:
${Region}:${Account}:members/${MemberId}
node arn:${Partition}:managedblockchain:
${Region}:${Account}:nodes/${NodeId}
proposal arn:${Partition}:managedblockchain:
${Region}::proposals/${ProposalId}
invitation arn:${Partition}:managedblockchain:
${Region}:${Account}:invitations/
${InvitationId}
References:
1087
Service Authorization Reference
Service Authorization Reference
Amazon Managed Service for Prometheus
Topics
• Actions defined by Amazon Managed Service for Prometheus (p. 1088)
• Resource types defined by Amazon Managed Service for Prometheus (p. 1089)
• Condition keys for Amazon Managed Service for Prometheus (p. 1089)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1088
Service Authorization Reference
Service Authorization Reference
Amazon Managed Streaming for Apache Kafka
workspace arn:${Partition}:aps::${Region}:
${Account}:workspace/${ResourceId}
References:
Topics
• Actions defined by Amazon Managed Streaming for Apache Kafka (p. 1089)
• Resource types defined by Amazon Managed Streaming for Apache Kafka (p. 1092)
• Condition keys for Amazon Managed Streaming for Apache Kafka (p. 1092)
1089
Service Authorization Reference
Service Authorization Reference
Amazon Managed Streaming for Apache Kafka
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys ec2:DescribeVpcs
(p. 1093)
iam:AttachRolePolicy
iam:CreateServiceLinkedR
iam:PutRolePolicy
kms:CreateGrant
kms:DescribeKey
1090
Service Authorization Reference
Service Authorization Reference
Amazon Managed Streaming for Apache Kafka
aws:RequestTag/
${TagKey}
(p. 1092)
aws:TagKeys
(p. 1093)
aws:TagKeys
(p. 1093)
1091
Service Authorization Reference
Service Authorization Reference
Amazon Managed Streaming for Apache Kafka
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access based on the allowed set of values for each of String
${TagKey} the tags
1092
Service Authorization Reference
Service Authorization Reference
Amazon Managed Workflows for Apache Airflow
aws:TagKeys Filters access based on the presence of mandatory tag keys String
in the request
References:
Topics
• Actions defined by Amazon Managed Workflows for Apache Airflow (p. 1093)
• Resource types defined by Amazon Managed Workflows for Apache Airflow (p. 1095)
• Condition keys for Amazon Managed Workflows for Apache Airflow (p. 1096)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1093
Service Authorization Reference
Service Authorization Reference
Amazon Managed Workflows for Apache Airflow
aws:ResourceTag/
${TagKey}
(p. 1096)
aws:RequestTag/
${TagKey}
(p. 1096)
aws:TagKeys
(p. 1096)
aws:ResourceTag/
${TagKey}
(p. 1096)
aws:ResourceTag/
${TagKey}
(p. 1096)
1094
Service Authorization Reference
Service Authorization Reference
Amazon Managed Workflows for Apache Airflow
aws:TagKeys
(p. 1096)
aws:RequestTag/
${TagKey}
(p. 1096)
aws:ResourceTag/
${TagKey}
(p. 1096)
aws:TagKeys
(p. 1096)
aws:ResourceTag/
${TagKey}
(p. 1096)
aws:ResourceTag/
${TagKey}
(p. 1096)
environment arn:${Partition}:airflow:${Region}:
${Account}:environment/${EnvironmentName}
rbac-role arn:${Partition}:airflow:${Region}:
${Account}:role/${EnvironmentName}/
${RoleName}
1095
Service Authorization Reference
Service Authorization Reference
AWS Marketplace
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS Marketplace (p. 1096)
• Resource types defined by AWS Marketplace (p. 1098)
• Condition keys for AWS Marketplace (p. 1098)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
1096
Service Authorization Reference
Service Authorization Reference
AWS Marketplace
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1097
Service Authorization Reference
Service Authorization Reference
AWS Marketplace
To view the global condition keys that are available to all services, see Available global condition keys.
aws- Enables you to control access based on the type of the String
marketplace:AgreementType
agreement.
aws- Enables you to control access based on the party type of the String
marketplace:PartyType
agreement.
1098
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Catalog
References:
Topics
• Actions defined by AWS Marketplace Catalog (p. 1099)
• Resource types defined by AWS Marketplace Catalog (p. 1100)
• Condition keys for AWS Marketplace Catalog (p. 1100)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1099
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Catalog
Entity arn:${Partition}:aws-marketplace:${Region}:
${Account}:${Catalog}/${EntityType}/
${ResourceId}
ChangeSet arn:${Partition}:aws-marketplace:
${Region}:${Account}:${Catalog}/ChangeSet/
${ResourceId}
To view the global condition keys that are available to all services, see Available global condition keys.
1100
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Commerce Analytics Service
References:
Topics
• Actions defined by AWS Marketplace Commerce Analytics Service (p. 1101)
• Resource types defined by AWS Marketplace Commerce Analytics Service (p. 1102)
• Condition keys for AWS Marketplace Commerce Analytics Service (p. 1102)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1101
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Entitlement Service
Topics
• Actions defined by AWS Marketplace Entitlement Service (p. 1102)
• Resource types defined by AWS Marketplace Entitlement Service (p. 1103)
• Condition keys for AWS Marketplace Entitlement Service (p. 1103)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1102
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Image Building Service
References:
Topics
• Actions defined by AWS Marketplace Image Building Service (p. 1103)
• Resource types defined by AWS Marketplace Image Building Service (p. 1104)
• Condition keys for AWS Marketplace Image Building Service (p. 1104)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1103
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Management Portal
References:
Topics
• Actions defined by AWS Marketplace Management Portal (p. 1104)
• Resource types defined by AWS Marketplace Management Portal (p. 1105)
• Condition keys for AWS Marketplace Management Portal (p. 1105)
1104
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Management Portal
allow or deny access to the API operation or CLI command with the same name. However, in some cases,
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1105
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Metering Service
References:
Topics
• Actions defined by AWS Marketplace Metering Service (p. 1106)
• Resource types defined by AWS Marketplace Metering Service (p. 1107)
• Condition keys for AWS Marketplace Metering Service (p. 1107)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1106
Service Authorization Reference
Service Authorization Reference
AWS Marketplace Procurement Systems Integration
References:
Topics
• Actions defined by AWS Marketplace Procurement Systems Integration (p. 1107)
• Resource types defined by AWS Marketplace Procurement Systems Integration (p. 1108)
• Condition keys for AWS Marketplace Procurement Systems Integration (p. 1108)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
1107
Service Authorization Reference
Service Authorization Reference
Amazon Mechanical Turk
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
1108
Service Authorization Reference
Service Authorization Reference
Amazon Mechanical Turk
Topics
• Actions defined by Amazon Mechanical Turk (p. 1109)
• Resource types defined by Amazon Mechanical Turk (p. 1113)
• Condition keys for Amazon Mechanical Turk (p. 1113)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
The Write
AssociateQualificationWithWorker
AssociateQualificationWithWorker
operation gives a Worker a
Qualification
The Write
CreateAdditionalAssignmentsForHIT
CreateAdditionalAssignmentsForHIT
operation increases the
maximum number of
assignments of an existing HIT
1109
Service Authorization Reference
Service Authorization Reference
Amazon Mechanical Turk
The Write
DisassociateQualificationFromWorker
DisassociateQualificationFromWorker
revokes a previously granted
Qualification from a user
1110
Service Authorization Reference
Service Authorization Reference
Amazon Mechanical Turk
The List
ListHITsForQualificationType
ListHITsForQualificationType
operation returns the HITs that
use the given QualififcationType
for a QualificationRequirement
The List
ListReviewPolicyResultsForHIT
ListReviewPolicyResultsForHIT
operation retrieves the
computed results and the
actions taken in the course of
executing your Review Policies
during a CreateHIT operation
1111
Service Authorization Reference
Service Authorization Reference
Amazon Mechanical Turk
The List
ListWorkersWithQualificationType
ListWorkersWithQualificationType
operation returns all of
the Workers with a given
Qualification type
1112
Service Authorization Reference
Service Authorization Reference
Amazon Message Delivery Service
Topics
• Actions defined by Amazon Message Delivery Service (p. 1113)
• Resource types defined by Amazon Message Delivery Service (p. 1114)
• Condition keys for Amazon Message Delivery Service (p. 1114)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
1113
Service Authorization Reference
Service Authorization Reference
AWS Migration Hub
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
1114
Service Authorization Reference
Service Authorization Reference
AWS Migration Hub
Topics
• Actions defined by AWS Migration Hub (p. 1115)
• Resource types defined by AWS Migration Hub (p. 1116)
• Condition keys for AWS Migration Hub (p. 1116)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1115
Service Authorization Reference
Service Authorization Reference
AWS Migration Hub
arn:${Partition}:mgh:${Region}:
progressUpdateStream
${Account}:progressUpdateStream/${Stream}
migrationTask arn:${Partition}:mgh:${Region}:
${Account}:progressUpdateStream/${Stream}/
migrationTask/${Task}
1116
Service Authorization Reference
Service Authorization Reference
Amazon Mobile Analytics
References:
Topics
• Actions defined by Amazon Mobile Analytics (p. 1117)
• Resource types defined by Amazon Mobile Analytics (p. 1118)
• Condition keys for Amazon Mobile Analytics (p. 1118)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1117
Service Authorization Reference
Service Authorization Reference
AWS Mobile Hub
References:
Topics
• Actions defined by AWS Mobile Hub (p. 1118)
• Resource types defined by AWS Mobile Hub (p. 1120)
• Condition keys for AWS Mobile Hub (p. 1120)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1118
Service Authorization Reference
Service Authorization Reference
AWS Mobile Hub
1119
Service Authorization Reference
Service Authorization Reference
Amazon Monitron
project arn:${Partition}:mobilehub:${Region}:
${Account}:project/${ProjectId}
References:
Topics
• Actions defined by Amazon Monitron (p. 1121)
• Resource types defined by Amazon Monitron (p. 1122)
• Condition keys for Amazon Monitron (p. 1123)
1120
Service Authorization Reference
Service Authorization Reference
Amazon Monitron
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
sso:GetManagedApplicati
sso:ListDirectoryAssociati
sso:ListProfiles
aws:TagKeys sso:CreateManagedApplic
(p. 1123)
sso:DeleteManagedApplic
sso:GetManagedApplicati
sso:ListDirectoryAssociati
sso:ListProfiles
1121
Service Authorization Reference
Service Authorization Reference
Amazon Monitron
aws:RequestTag/
${TagKey}
(p. 1123)
aws:RequestTag/
${TagKey}
(p. 1123)
aws:RequestTag/
${TagKey}
(p. 1123)
1122
Service Authorization Reference
Service Authorization Reference
Amazon MQ
types that can be specified with that action. A resource type can also define which condition keys you
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by the tag key-value pairs in the request String
${TagKey}
References:
Topics
• Actions defined by Amazon MQ (p. 1123)
• Resource types defined by Amazon MQ (p. 1126)
• Condition keys for Amazon MQ (p. 1126)
1123
Service Authorization Reference
Service Authorization Reference
Amazon MQ
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys ec2:CreateSecurityGroup
(p. 1127)
ec2:CreateVpcEndpoint
ec2:DescribeInternetGate
ec2:DescribeNetworkInter
ec2:DescribeNetworkInter
ec2:DescribeSecurityGrou
ec2:DescribeSubnets
ec2:DescribeVpcEndpoint
ec2:DescribeVpcs
ec2:ModifyNetworkInterf
iam:CreateServiceLinkedR
route53:AssociateVPCWit
configurations
(p. 1126)
1124
Service Authorization Reference
Service Authorization Reference
Amazon MQ
aws:RequestTag/
${TagKey}
(p. 1127)
aws:TagKeys
(p. 1127)
ec2:DeleteVpcEndpoints
ec2:DetachNetworkInterf
configurations
(p. 1126)
aws:TagKeys
(p. 1127)
1125
Service Authorization Reference
Service Authorization Reference
Amazon MQ
configurations
(p. 1126)
1126
Service Authorization Reference
Service Authorization Reference
Amazon Neptune
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ String
${TagKey}
aws:ResourceTag/ String
${TagKey}
aws:TagKeys String
References:
Topics
• Actions defined by Amazon Neptune (p. 1127)
• Resource types defined by Amazon Neptune (p. 1128)
• Condition keys for Amazon Neptune (p. 1128)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1127
Service Authorization Reference
Service Authorization Reference
AWS Network Firewall
database arn:${Partition}:neptune-db:${Region}:
${Account}:${RelativeId}/database
References:
Topics
• Actions defined by AWS Network Firewall (p. 1128)
• Resource types defined by AWS Network Firewall (p. 1132)
• Condition keys for AWS Network Firewall (p. 1133)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
1128
Service Authorization Reference
Service Authorization Reference
AWS Network Firewall
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
FirewallPolicy*
(p. 1133)
aws:RequestTag/
${TagKey}
(p. 1133)
aws:TagKeys
(p. 1133)
StatelessRuleGroup
(p. 1133)
aws:RequestTag/
${TagKey}
(p. 1133)
aws:TagKeys
(p. 1133)
aws:RequestTag/
${TagKey}
(p. 1133)
aws:TagKeys
(p. 1133)
1129
Service Authorization Reference
Service Authorization Reference
AWS Network Firewall
StatelessRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
1130
Service Authorization Reference
Service Authorization Reference
AWS Network Firewall
FirewallPolicy*
(p. 1133)
StatefulRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
FirewallPolicy*
(p. 1133)
StatefulRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
aws:RequestTag/
${TagKey}
(p. 1133)
aws:TagKeys
(p. 1133)
FirewallPolicy*
(p. 1133)
1131
Service Authorization Reference
Service Authorization Reference
AWS Network Firewall
StatefulRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
aws:TagKeys
(p. 1133)
StatefulRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
StatelessRuleGroup
(p. 1133)
1132
Service Authorization Reference
Service Authorization Reference
Network Manager
arn:${Partition}:network-firewall:${Region}: aws:ResourceTag/
StatefulRuleGroup${Account}:stateful-rulegroup/${Name} ${TagKey} (p. 1133)
arn:${Partition}:network-firewall:${Region}: aws:ResourceTag/
StatelessRuleGroup
${Account}:stateless-rulegroup/${Name} ${TagKey} (p. 1133)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
Filters actions based on the tag value associated with the String
aws:ResourceTag/ resource
${TagKey}
References:
Topics
• Actions defined by Network Manager (p. 1134)
• Resource types defined by Network Manager (p. 1140)
• Condition keys for Network Manager (p. 1140)
1133
Service Authorization Reference
Service Authorization Reference
Network Manager
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
global-
network*
(p. 1140)
link
(p. 1140)
networkmanager:cgwArn
(p. 1141)
global-
network*
(p. 1140)
link*
(p. 1140)
link
(p. 1140)
networkmanager:tgwConnectPeerArn
(p. 1141)
1134
Service Authorization Reference
Service Authorization Reference
Network Manager
aws:RequestTag/
${TagKey}
(p. 1140)
aws:TagKeys
(p. 1141)
aws:RequestTag/
${TagKey}
(p. 1140)
aws:TagKeys
(p. 1141)
aws:TagKeys
(p. 1141)
site
(p. 1140)
aws:RequestTag/
${TagKey}
(p. 1140)
aws:TagKeys
(p. 1141)
aws:RequestTag/
${TagKey}
(p. 1140)
aws:TagKeys
(p. 1141)
1135
Service Authorization Reference
Service Authorization Reference
Network Manager
global-
network*
(p. 1140)
global-
network*
(p. 1140)
link*
(p. 1140)
site*
(p. 1140)
networkmanager:tgwArn
(p. 1141)
networkmanager:cgwArn
(p. 1141)
global-
network*
(p. 1140)
1136
Service Authorization Reference
Service Authorization Reference
Network Manager
link*
(p. 1140)
networkmanager:tgwConnectPeerArn
(p. 1141)
connection
(p. 1140)
device
(p. 1140)
device
(p. 1140)
link
(p. 1140)
link
(p. 1140)
site
(p. 1140)
1137
Service Authorization Reference
Service Authorization Reference
Network Manager
device
(p. 1140)
global-
network
(p. 1140)
link
(p. 1140)
site
(p. 1140)
aws:ResourceTag/
${TagKey}
(p. 1141)
networkmanager:tgwArn
(p. 1141)
device
(p. 1140)
global-
network
(p. 1140)
link
(p. 1140)
site
(p. 1140)
1138
Service Authorization Reference
Service Authorization Reference
Network Manager
aws:TagKeys
(p. 1141)
aws:RequestTag/
${TagKey}
(p. 1140)
aws:ResourceTag/
${TagKey}
(p. 1141)
device
(p. 1140)
global-
network
(p. 1140)
link
(p. 1140)
site
(p. 1140)
aws:TagKeys
(p. 1141)
global-
network*
(p. 1140)
global-
network*
(p. 1140)
link*
(p. 1140)
1139
Service Authorization Reference
Service Authorization Reference
Network Manager
site*
(p. 1140)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
1140
Service Authorization Reference
Service Authorization Reference
AWS OpsWorks
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
References:
Topics
• Actions defined by AWS OpsWorks (p. 1141)
• Resource types defined by AWS OpsWorks (p. 1146)
• Condition keys for AWS OpsWorks (p. 1146)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1141
Service Authorization Reference
Service Authorization Reference
AWS OpsWorks
1142
Service Authorization Reference
Service Authorization Reference
AWS OpsWorks
1143
Service Authorization Reference
Service Authorization Reference
AWS OpsWorks
1144
Service Authorization Reference
Service Authorization Reference
AWS OpsWorks
1145
Service Authorization Reference
Service Authorization Reference
AWS OpsWorks Configuration Management
stack arn:${Partition}:opsworks:${Region}:
${Account}:stack/${StackId}/
References:
Topics
• Actions defined by AWS OpsWorks Configuration Management (p. 1147)
• Resource types defined by AWS OpsWorks Configuration Management (p. 1148)
• Condition keys for AWS OpsWorks Configuration Management (p. 1148)
1146
Service Authorization Reference
Service Authorization Reference
AWS OpsWorks Configuration Management
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1147
Service Authorization Reference
Service Authorization Reference
AWS Organizations
References:
Topics
• Actions defined by AWS Organizations (p. 1149)
• Resource types defined by AWS Organizations (p. 1155)
1148
Service Authorization Reference
Service Authorization Reference
AWS Organizations
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
organizationalunit
(p. 1156)
root
(p. 1156)
organizations:PolicyType
(p. 1156)
1149
Service Authorization Reference
Service Authorization Reference
AWS Organizations
aws:RequestTag/
${TagKey}
(p. 1156)
aws:TagKeys
(p. 1156)
aws:TagKeys
(p. 1156)
organizations:PolicyType
(p. 1156)
1150
Service Authorization Reference
Service Authorization Reference
AWS Organizations
organizations:PolicyType
(p. 1156)
organizations:PolicyType
(p. 1156)
organizationalunit
(p. 1156)
root
(p. 1156)
organizations:PolicyType
(p. 1156)
1151
Service Authorization Reference
Service Authorization Reference
AWS Organizations
organizations:PolicyType
(p. 1156)
aws:TagKeys
(p. 1156)
1152
Service Authorization Reference
Service Authorization Reference
AWS Organizations
1153
Service Authorization Reference
Service Authorization Reference
AWS Organizations
root
(p. 1156)
organizations:PolicyType
(p. 1156)
organizationalunit
(p. 1156)
policy
(p. 1156)
root
(p. 1156)
root
(p. 1156)
1154
Service Authorization Reference
Service Authorization Reference
AWS Organizations
organizationalunit
(p. 1156)
policy
(p. 1156)
root
(p. 1156)
aws:TagKeys
(p. 1156)
aws:RequestTag/
${TagKey}
(p. 1156)
policy
(p. 1156)
root
(p. 1156)
aws:TagKeys
(p. 1156)
1155
Service Authorization Reference
Service Authorization Reference
AWS Organizations
handshake arn:${Partition}:organizations::
${MasterAccountId}:handshake/o-
${OrganizationId}/${HandshakeType}/h-
${HandshakeId}
organization arn:${Partition}:organizations::
${MasterAccountId}:organization/o-
${OrganizationId}
arn:${Partition}:organizations:: aws:ResourceTag/
organizationalunit${MasterAccountId}:ou/o-${OrganizationId}/ ${TagKey} (p. 1156)
ou-${OrganizationalUnitId}
awspolicy arn:${Partition}:organizations::aws:policy/
${PolicyType}/p-${PolicyId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
Enables you to filter the request to only the specified policy String
organizations:PolicyType
type names.
Enables you to filter the request to only the specified service String
organizations:ServicePrincipal
principal names.
1156
Service Authorization Reference
Service Authorization Reference
AWS Outposts
References:
Topics
• Actions defined by AWS Outposts (p. 1157)
• Resource types defined by AWS Outposts (p. 1158)
• Condition keys for AWS Outposts (p. 1158)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1157
Service Authorization Reference
Service Authorization Reference
AWS Panorama
References:
Topics
• Actions defined by AWS Panorama (p. 1158)
• Resource types defined by AWS Panorama (p. 1163)
• Condition keys for AWS Panorama (p. 1164)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
1158
Service Authorization Reference
Service Authorization Reference
AWS Panorama
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 1164)
1159
Service Authorization Reference
Service Authorization Reference
AWS Panorama
1160
Service Authorization Reference
Service Authorization Reference
AWS Panorama
1161
Service Authorization Reference
Service Authorization Reference
AWS Panorama
device
(p. 1163)
model
(p. 1163)
device
(p. 1163)
model
(p. 1163)
aws:TagKeys
(p. 1164)
aws:RequestTag/
${TagKey}
(p. 1164)
1162
Service Authorization Reference
Service Authorization Reference
AWS Panorama
device
(p. 1163)
model
(p. 1163)
aws:TagKeys
(p. 1164)
1163
Service Authorization Reference
Service Authorization Reference
AWS Performance Insights
appVersion arn:${Partition}:panorama:${Region}:
${Account}:app/${AppName}:{AppVersion}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
Topics
• Actions defined by AWS Performance Insights (p. 1164)
• Resource types defined by AWS Performance Insights (p. 1165)
• Condition keys for AWS Performance Insights (p. 1165)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
1164
Service Authorization Reference
Service Authorization Reference
Amazon Personalize
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
metric- arn:${Partition}:pi:${Region}:
resource ${Account}:metrics/${ServiceType}/
${Identifier}
References:
Topics
• Actions defined by Amazon Personalize (p. 1166)
1165
Service Authorization Reference
Service Authorization Reference
Amazon Personalize
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1166
Service Authorization Reference
Service Authorization Reference
Amazon Personalize
1167
Service Authorization Reference
Service Authorization Reference
Amazon Personalize
1168
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
schema arn:${Partition}:personalize:${Region}:
${Account}:schema/${ResourceId}
arn:${Partition}:personalize:${Region}:
featureTransformation
${Account}:feature-transformation/
${ResourceId}
dataset arn:${Partition}:personalize:${Region}:
${Account}:dataset/${ResourceId}
datasetGroup arn:${Partition}:personalize:${Region}:
${Account}:dataset-group/${ResourceId}
arn:${Partition}:personalize:${Region}:
datasetImportJob${Account}:dataset-import-job/${ResourceId}
solution arn:${Partition}:personalize:${Region}:
${Account}:solution/${ResourceId}
campaign arn:${Partition}:personalize:${Region}:
${Account}:campaign/${ResourceId}
eventTracker arn:${Partition}:personalize:${Region}:
${Account}:event-tracker/${ResourceId}
recipe arn:${Partition}:personalize:${Region}:
${Account}:recipe/${ResourceId}
algorithm arn:${Partition}:personalize:${Region}:
${Account}:algorithm/${ResourceId}
arn:${Partition}:personalize:${Region}:
batchInferenceJob${Account}:batch-inference-job/${ResourceId}
filter arn:${Partition}:personalize:${Region}:
${Account}:filter/${ResourceId}
References:
1169
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
Topics
• Actions defined by Amazon Pinpoint (p. 1170)
• Resource types defined by Amazon Pinpoint (p. 1180)
• Condition keys for Amazon Pinpoint (p. 1181)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 1181)
aws:ResourceTag/
${TagKey}
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
aws:ResourceTag/
${TagKey}
(p. 1181)
1170
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
aws:TagKeys
(p. 1181)
aws:ResourceTag/
${TagKey}
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
aws:ResourceTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
aws:ResourceTag/
${TagKey}
(p. 1181)
1171
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
aws:ResourceTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
aws:ResourceTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
aws:ResourceTag/
${TagKey}
(p. 1181)
1172
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
campaigns*
(p. 1181)
journeys*
(p. 1181)
segments*
(p. 1181)
1173
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
campaigns*
(p. 1181)
campaigns*
(p. 1181)
1174
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
campaigns*
(p. 1181)
journeys*
(p. 1181)
1175
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
segments*
(p. 1181)
segments*
(p. 1181)
1176
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
campaigns
(p. 1181)
segments
(p. 1181)
campaigns
(p. 1181)
segments
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
campaigns
(p. 1181)
1177
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
segments
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
campaigns*
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
1178
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
journeys*
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
journeys*
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
aws:TagKeys
(p. 1181)
1179
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint
segments*
(p. 1181)
aws:RequestTag/
${TagKey}
(p. 1181)
aws:TagKeys
(p. 1181)
aws:TagKeys
(p. 1181)
aws:TagKeys
(p. 1181)
1180
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint Email Service
arn:${Partition}:mobiletargeting:${Region}:
recommenders ${Account}:recommenders/${RecommenderId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by a key that is present in the request the user String
${TagKey} makes to the pinpoint service.
aws:TagKeys Filters access by the list of all the tag key names present in String
the request the user makes to the pinpoint service.
References:
1181
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint Email Service
Topics
• Actions defined by Amazon Pinpoint Email Service (p. 1182)
• Resource types defined by Amazon Pinpoint Email Service (p. 1187)
• Condition keys for Amazon Pinpoint Email Service (p. 1187)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 1187)
aws:TagKeys
(p. 1187)
aws:RequestTag/
${TagKey}
(p. 1187)
1182
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint Email Service
aws:TagKeys
(p. 1187)
aws:RequestTag/
${TagKey}
(p. 1187)
aws:TagKeys
(p. 1187)
aws:RequestTag/
${TagKey}
(p. 1187)
1183
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint Email Service
dedicated-
ip-pool
(p. 1187)
deliverability-
test-report
(p. 1187)
identity
(p. 1187)
1184
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint Email Service
1185
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint Email Service
ses:FeedbackAddress
(p. 1187)
ses:FromAddress
(p. 1187)
ses:FromDisplayName
(p. 1188)
ses:Recipients
(p. 1188)
dedicated-
ip-pool
(p. 1187)
deliverability-
test-report
(p. 1187)
identity
(p. 1187)
aws:TagKeys
(p. 1187)
aws:RequestTag/
${TagKey}
(p. 1187)
dedicated-
ip-pool
(p. 1187)
deliverability-
test-report
(p. 1187)
identity
(p. 1187)
aws:TagKeys
(p. 1187)
1186
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint Email Service
event- arn:${Partition}:ses:${Region}:
destination ${Account}:configuration-set/
${ConfigurationSetName}:event-destination/
${EventDestinationName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
1187
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint SMS and Voice Service
ses:Recipients The recipient addresses of a message, which include the "To", String
"CC", and "BCC" addresses.
References:
Topics
• Actions defined by Amazon Pinpoint SMS and Voice Service (p. 1188)
• Resource types defined by Amazon Pinpoint SMS and Voice Service (p. 1189)
• Condition keys for Amazon Pinpoint SMS and Voice Service (p. 1189)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1188
Service Authorization Reference
Service Authorization Reference
Amazon Pinpoint SMS and Voice Service
1189
Service Authorization Reference
Service Authorization Reference
Amazon Polly
References:
Topics
• Actions defined by Amazon Polly (p. 1190)
• Resource types defined by Amazon Polly (p. 1191)
• Condition keys for Amazon Polly (p. 1191)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1190
Service Authorization Reference
Service Authorization Reference
AWS Price List
lexicon arn:${Partition}:polly:${Region}:
${Account}:lexicon/${LexiconName}
References:
1191
Service Authorization Reference
Service Authorization Reference
AWS Price List
Topics
• Actions defined by AWS Price List (p. 1192)
• Resource types defined by AWS Price List (p. 1192)
• Condition keys for AWS Price List (p. 1192)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1192
Service Authorization Reference
Service Authorization Reference
AWS Private Marketplace
References:
Topics
• Actions defined by AWS Private Marketplace (p. 1193)
• Resource types defined by AWS Private Marketplace (p. 1197)
• Condition keys for AWS Private Marketplace (p. 1197)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1193
Service Authorization Reference
Service Authorization Reference
AWS Private Marketplace
1194
Service Authorization Reference
Service Authorization Reference
AWS Private Marketplace
1195
Service Authorization Reference
Service Authorization Reference
AWS Private Marketplace
1196
Service Authorization Reference
Service Authorization Reference
AWS Proton
References:
Topics
1197
Service Authorization Reference
Service Authorization Reference
AWS Proton
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1198
Service Authorization Reference
Service Authorization Reference
AWS Proton
1199
Service Authorization Reference
Service Authorization Reference
AWS Proton
1200
Service Authorization Reference
Service Authorization Reference
AWS Proton
environment- arn:${Partition}:proton:${Region}:
template ${Account}:environment-template/
${TemplateName}
environment- arn:${Partition}:proton:${Region}:
template- ${Account}:environment-template/
major-version ${TemplateName}:${MajorVersionId}
environment- arn:${Partition}:proton:${Region}:
template- ${Account}:environment-template/
minor-version ${TemplateName}:${MajorVersionId}.
${MinorVersionId}
1201
Service Authorization Reference
Service Authorization Reference
AWS Purchase Orders Console
service- arn:${Partition}:proton:${Region}:
template ${Account}:service-template/${TemplateName}
service- arn:${Partition}:proton:${Region}:
template- ${Account}:service-template/${TemplateName}:
major-version ${MajorVersionId}
service- arn:${Partition}:proton:${Region}:
template- ${Account}:service-template/${TemplateName}:
minor-version ${MajorVersionId}.${MinorVersionId}
environment arn:${Partition}:proton:${Region}:
${Account}:environment/${EnvironmentName}
service arn:${Partition}:proton:${Region}:
${Account}:service/${ServiceName}
service- arn:${Partition}:proton:${Region}:
instance ${Account}:service/${ServiceName}/service-
instance/${ServiceInstanceName}
References:
Topics
• Actions defined by AWS Purchase Orders Console (p. 1202)
• Resource types defined by AWS Purchase Orders Console (p. 1203)
• Condition keys for AWS Purchase Orders Console (p. 1203)
1202
Service Authorization Reference
Service Authorization Reference
Amazon QLDB
a single action controls access to more than one operation. Alternatively, some operations require several
different actions.
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
References:
Topics
• Actions defined by Amazon QLDB (p. 1204)
• Resource types defined by Amazon QLDB (p. 1206)
1203
Service Authorization Reference
Service Authorization Reference
Amazon QLDB
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 1206)
aws:TagKeys
(p. 1206)
1204
Service Authorization Reference
Service Authorization Reference
Amazon QLDB
aws:RequestTag/
${TagKey}
(p. 1206)
aws:TagKeys
(p. 1206)
1205
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:TagKeys
(p. 1206)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
1206
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
References:
Topics
• Actions defined by Amazon QuickSight (p. 1207)
• Resource types defined by Amazon QuickSight (p. 1218)
• Condition keys for Amazon QuickSight (p. 1219)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
1207
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:TagKeys
(p. 1219)
1208
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
1209
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
1210
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
1211
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
1212
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:TagKeys
(p. 1219)
aws:TagKeys
(p. 1219)
1213
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:TagKeys
(p. 1219)
dashboard
(p. 1219)
template
(p. 1219)
theme
(p. 1219)
1214
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:TagKeys
(p. 1219)
aws:TagKeys
(p. 1219)
1215
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
dashboard
(p. 1219)
template
(p. 1219)
theme
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
dashboard
(p. 1219)
template
(p. 1219)
theme
(p. 1219)
aws:TagKeys
(p. 1219)
1216
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
datasource
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
1217
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
aws:RequestTag/
${TagKey}
(p. 1219)
aws:TagKeys
(p. 1219)
user arn:${Partition}:quicksight:${Region}:
${Account}:user/${ResourceId}
group arn:${Partition}:quicksight:${Region}:
${Account}:group/${ResourceId}
1218
Service Authorization Reference
Service Authorization Reference
Amazon QuickSight
assignment arn:${Partition}:quicksight::
${Account}:assignment/${ResourceId}
namespace arn:${Partition}:quicksight::
${Account}:namespace/${ResourceId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
1219
Service Authorization Reference
Service Authorization Reference
Amazon RDS
References:
Topics
• Actions defined by Amazon RDS (p. 1220)
• Resource types defined by Amazon RDS (p. 1239)
• Condition keys for Amazon RDS (p. 1241)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1220
Service Authorization Reference
Service Authorization Reference
Amazon RDS
og
(p. 1240)
pg
(p. 1240)
proxy
(p. 1240)
ri
(p. 1240)
secgrp
(p. 1240)
snapshot
(p. 1240)
subgrp
(p. 1241)
target-
group
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1221
Service Authorization Reference
Service Authorization Reference
Amazon RDS
db
(p. 1239)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
1222
Service Authorization Reference
Service Authorization Reference
Amazon RDS
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
cluster-
pg*
(p. 1239)
og*
(p. 1240)
subgrp*
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
rds:DatabaseEngine
(p. 1241)
rds:DatabaseName
(p. 1241)
rds:StorageEncrypted
(p. 1242)
1223
Service Authorization Reference
Service Authorization Reference
Amazon RDS
cluster-
endpoint*
(p. 1239)
rds:EndpointType
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
cluster-
snapshot*
(p. 1239)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
og*
(p. 1240)
1224
Service Authorization Reference
Service Authorization Reference
Amazon RDS
pg*
(p. 1240)
secgrp*
(p. 1240)
subgrp*
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
subgrp*
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1225
Service Authorization Reference
Service Authorization Reference
Amazon RDS
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
aws:TagKeys
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
snapshot*
(p. 1240)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1226
Service Authorization Reference
Service Authorization Reference
Amazon RDS
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1227
Service Authorization Reference
Service Authorization Reference
Amazon RDS
1228
Service Authorization Reference
Service Authorization Reference
Amazon RDS
proxy*
(p. 1240)
target-
group*
(p. 1241)
cluster
(p. 1239)
1229
Service Authorization Reference
Service Authorization Reference
Amazon RDS
db*
(p. 1239)
proxy*
(p. 1240)
target-
group*
(p. 1241)
db
(p. 1239)
1230
Service Authorization Reference
Service Authorization Reference
Amazon RDS
1231
Service Authorization Reference
Service Authorization Reference
Amazon RDS
es
(p. 1240)
og
(p. 1240)
pg
(p. 1240)
proxy
(p. 1240)
ri
(p. 1240)
secgrp
(p. 1240)
snapshot
(p. 1240)
subgrp
(p. 1241)
target-
group
(p. 1241)
1232
Service Authorization Reference
Service Authorization Reference
Amazon RDS
og*
(p. 1240)
og*
(p. 1240)
pg*
(p. 1240)
secgrp*
(p. 1240)
1233
Service Authorization Reference
Service Authorization Reference
Amazon RDS
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
1234
Service Authorization Reference
Service Authorization Reference
Amazon RDS
og
(p. 1240)
pg
(p. 1240)
proxy
(p. 1240)
ri
(p. 1240)
secgrp
(p. 1240)
snapshot
(p. 1240)
subgrp
(p. 1241)
target-
group
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1235
Service Authorization Reference
Service Authorization Reference
Amazon RDS
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
rds:DatabaseEngine
(p. 1241)
rds:DatabaseName
(p. 1241)
rds:StorageEncrypted
(p. 1242)
og*
(p. 1240)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1236
Service Authorization Reference
Service Authorization Reference
Amazon RDS
og*
(p. 1240)
subgrp*
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
snapshot*
(p. 1240)
subgrp*
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1237
Service Authorization Reference
Service Authorization Reference
Amazon RDS
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
subgrp*
(p. 1241)
aws:RequestTag/
${TagKey}
(p. 1241)
aws:TagKeys
(p. 1241)
rds:req-
tag/
${TagKey}
(p. 1242)
1238
Service Authorization Reference
Service Authorization Reference
Amazon RDS
rds:cluster-tag/
${TagKey} (p. 1242)
db arn:${Partition}:rds:${Region}: aws:ResourceTag/
${Account}:db:${DbInstanceName} ${TagKey} (p. 1241)
rds:DatabaseClass
(p. 1241)
rds:DatabaseEngine
(p. 1241)
rds:DatabaseName
(p. 1241)
1239
Service Authorization Reference
Service Authorization Reference
Amazon RDS
rds:StorageSize
(p. 1242)
rds:db-tag/${TagKey}
(p. 1242)
es arn:${Partition}:rds:${Region}: aws:ResourceTag/
${Account}:es:${SubscriptionName} ${TagKey} (p. 1241)
rds:es-tag/${TagKey}
(p. 1242)
global-cluster arn:${Partition}:rds::${Account}:global-
cluster:${GlobalCluster}
og arn:${Partition}:rds:${Region}: aws:ResourceTag/
${Account}:og:${OptionGroupName} ${TagKey} (p. 1241)
rds:og-tag/${TagKey}
(p. 1242)
pg arn:${Partition}:rds:${Region}: aws:ResourceTag/
${Account}:pg:${ParameterGroupName} ${TagKey} (p. 1241)
rds:pg-tag/${TagKey}
(p. 1242)
ri arn:${Partition}:rds:${Region}: aws:ResourceTag/
${Account}:ri:${ReservedDbInstanceName} ${TagKey} (p. 1241)
rds:ri-tag/${TagKey}
(p. 1242)
rds:secgrp-tag/
${TagKey} (p. 1242)
rds:snapshot-tag/
${TagKey} (p. 1242)
1240
Service Authorization Reference
Service Authorization Reference
Amazon RDS
rds:subgrp-tag/
${TagKey} (p. 1242)
target arn:${Partition}:rds:${Region}:
${Account}:target:${TargetId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access based on the presence of tag key-value pairs in String
${TagKey} the request
aws:TagKeys Filters access based on the presence of tag keys in the String
request
rds:EndpointType Filters access by the type of the endpoint. One of: READER, String
WRITER, CUSTOM
rds:MultiAz Filters access by the value that specifies whether the DB Boolean
instance runs in multiple Availability Zones. To indicate that
the DB instance is using Multi-AZ, specify true
rds:Piops Filters access by the value that contains the number of Numeric
Provisioned IOPS (PIOPS) that the instance supports. To
indicate a DB instance that does not have PIOPS enabled,
specify 0
1241
Service Authorization Reference
Service Authorization Reference
Amazon RDS Data API
rds:StorageSize Filters access by the storage volume size (in GB) Numeric
rds:Vpc Filters access by the value that specifies whether the DB Boolean
instance runs in an Amazon Virtual Private Cloud (Amazon
VPC). To indicate that the DB instance runs in an Amazon
VPC, specify true
rds:req-tag/ Filters access by the set of tag keys and values that can be String
${TagKey} used to tag a resource
References:
1242
Service Authorization Reference
Service Authorization Reference
Amazon RDS Data API
Topics
• Actions defined by Amazon RDS Data API (p. 1243)
• Resource types defined by Amazon RDS Data API (p. 1244)
• Condition keys for Amazon RDS Data API (p. 1244)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1243
Service Authorization Reference
Service Authorization Reference
Amazon RDS IAM Authentication
To view the global condition keys that are available to all services, see Available global condition keys.
aws:TagKeys Filters actions based on the tag keys associated with the String
resource
References:
Topics
• Actions defined by Amazon RDS IAM Authentication (p. 1244)
• Resource types defined by Amazon RDS IAM Authentication (p. 1245)
• Condition keys for Amazon RDS IAM Authentication (p. 1245)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
1244
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
db-user arn:${Partition}:rds-db:${Region}:
${Account}:dbuser:${DbiResourceId}/
${DbUserName}
References:
Topics
• Actions defined by Amazon Redshift (p. 1246)
• Resource types defined by Amazon Redshift (p. 1258)
• Condition keys for Amazon Redshift (p. 1259)
1245
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1246
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
aws:RequestTag/
${TagKey}
(p. 1259)
aws:TagKeys
(p. 1260)
aws:TagKeys
(p. 1260)
aws:RequestTag/
${TagKey}
(p. 1259)
aws:TagKeys
(p. 1260)
aws:TagKeys
(p. 1260)
aws:RequestTag/
${TagKey}
(p. 1259)
aws:TagKeys
(p. 1260)
1247
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
aws:TagKeys
(p. 1260)
aws:TagKeys
(p. 1260)
aws:TagKeys
(p. 1260)
aws:TagKeys
(p. 1260)
1248
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
aws:RequestTag/
${TagKey}
(p. 1259)
aws:TagKeys
(p. 1260)
dbgroup
(p. 1258)
dbname
(p. 1258)
dbuser
(p. 1258)
eventsubscription
(p. 1258)
hsmclientcertificate
(p. 1259)
hsmconfiguration
(p. 1259)
parametergroup
(p. 1259)
securitygroup
(p. 1259)
securitygroupingress-
cidr
(p. 1259)
securitygroupingress-
ec2securitygroup
(p. 1259)
snapshot
(p. 1259)
snapshotcopygrant
(p. 1259)
snapshotschedule
(p. 1259)
subnetgroup
(p. 1259)
1249
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
aws:RequestTag/
${TagKey}
(p. 1259)
aws:TagKeys
(p. 1260)
dbgroup
(p. 1258)
1250
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
dbname
(p. 1258)
dbuser
(p. 1258)
eventsubscription
(p. 1258)
hsmclientcertificate
(p. 1259)
hsmconfiguration
(p. 1259)
parametergroup
(p. 1259)
securitygroup
(p. 1259)
securitygroupingress-
cidr
(p. 1259)
securitygroupingress-
ec2securitygroup
(p. 1259)
snapshot
(p. 1259)
snapshotcopygrant
(p. 1259)
snapshotschedule
(p. 1259)
subnetgroup
(p. 1259)
aws:TagKeys
(p. 1260)
1251
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
1252
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
1253
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
dbgroup
(p. 1258)
dbname
(p. 1258)
dbuser
(p. 1258)
eventsubscription
(p. 1258)
hsmclientcertificate
(p. 1259)
hsmconfiguration
(p. 1259)
parametergroup
(p. 1259)
securitygroup
(p. 1259)
securitygroupingress-
cidr
(p. 1259)
securitygroupingress-
ec2securitygroup
(p. 1259)
snapshot
(p. 1259)
snapshotcopygrant
(p. 1259)
1254
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
snapshotschedule
(p. 1259)
subnetgroup
(p. 1259)
dbname
(p. 1258)
redshift:DbName
(p. 1260)
redshift:DbUser
(p. 1260)
redshift:DurationSeconds
(p. 1260)
1255
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
1256
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
snapshot*
(p. 1259)
1257
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
arn:${Partition}:redshift:${Region}: aws:ResourceTag/
eventsubscription${Account}:eventsubscription: ${TagKey} (p. 1260)
${EventSubscriptionName}
1258
Service Authorization Reference
Service Authorization Reference
Amazon Redshift
arn:${Partition}:redshift:${Region}: aws:ResourceTag/
hsmclientcertificate
${Account}:hsmclientcertificate: ${TagKey} (p. 1260)
${HSMClientCertificateId}
arn:${Partition}:redshift:${Region}: aws:ResourceTag/
hsmconfiguration${Account}:hsmconfiguration: ${TagKey} (p. 1260)
${HSMConfigurationId}
arn:${Partition}:redshift: aws:ResourceTag/
parametergroup ${Region}:${Account}:parametergroup: ${TagKey} (p. 1260)
${ParameterGroupName}
arn:${Partition}:redshift:${Region}: aws:ResourceTag/
securitygroupingress-
${Account}:securitygroupingress: ${TagKey} (p. 1260)
cidr ${SecurityGroupName}/cidrip/${IpRange}
arn:${Partition}:redshift:${Region}: aws:ResourceTag/
securitygroupingress-
${Account}:securitygroupingress: ${TagKey} (p. 1260)
ec2securitygroup ${SecurityGroupName}/ec2securitygroup/
${Owner}/${Ece2SecuritygroupId}
arn:${Partition}:redshift:${Region}: aws:ResourceTag/
snapshotcopygrant
${Account}:snapshotcopygrant: ${TagKey} (p. 1260)
${SnapshotCopyGrantName}
arn:${Partition}:redshift:${Region}: aws:ResourceTag/
snapshotschedule${Account}:snapshotschedule: ${TagKey} (p. 1260)
${ParameterGroupName}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
1259
Service Authorization Reference
Service Authorization Reference
Amazon Redshift Data API
References:
Topics
• Actions defined by Amazon Redshift Data API (p. 1260)
• Resource types defined by Amazon Redshift Data API (p. 1261)
• Condition keys for Amazon Redshift Data API (p. 1261)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1260
Service Authorization Reference
Service Authorization Reference
Amazon Rekognition
References:
1261
Service Authorization Reference
Service Authorization Reference
Amazon Rekognition
Topics
• Actions defined by Amazon Rekognition (p. 1262)
• Resource types defined by Amazon Rekognition (p. 1265)
• Condition keys for Amazon Rekognition (p. 1266)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
projectversion*
(p. 1266)
1262
Service Authorization Reference
Service Authorization Reference
Amazon Rekognition
1263
Service Authorization Reference
Service Authorization Reference
Amazon Rekognition
1264
Service Authorization Reference
Service Authorization Reference
Amazon Rekognition
1265
Service Authorization Reference
Service Authorization Reference
AWS Resource Access Manager
collection arn:${Partition}:rekognition:${Region}:
${Account}:collection/${CollectionId}
arn:${Partition}:rekognition:
streamprocessor ${Region}:${Account}:streamprocessor/
${StreamprocessorId}
project arn:${Partition}:rekognition:${Region}:
${Account}:project/${ProjectName}/
${CreationTimestamp}
projectversion arn:${Partition}:rekognition:${Region}:
${Account}:project/${ProjectName}/version/
${VersionName}/${CreationTimestamp}
References:
Topics
• Actions defined by AWS Resource Access Manager (p. 1266)
• Resource types defined by AWS Resource Access Manager (p. 1272)
• Condition keys for AWS Resource Access Manager (p. 1272)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
1266
Service Authorization Reference
Service Authorization Reference
AWS Resource Access Manager
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
ram:ShareOwnerAccountId
(p. 1273)
aws:ResourceTag/
${TagKey}
(p. 1273)
ram:ResourceShareName
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
ram:Principal
(p. 1273)
ram:RequestedResourceType
(p. 1273)
ram:ResourceArn
(p. 1273)
resource-
share*
(p. 1272)
aws:ResourceTag/
${TagKey}
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
ram:ResourceShareName
(p. 1273)
1267
Service Authorization Reference
Service Authorization Reference
AWS Resource Access Manager
aws:TagKeys
(p. 1273)
ram:RequestedResourceType
(p. 1273)
ram:ResourceArn
(p. 1273)
ram:RequestedAllowsExternalPrincipal
(p. 1273)
ram:Principal
(p. 1273)
aws:ResourceTag/
${TagKey}
(p. 1273)
ram:ResourceShareName
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
1268
Service Authorization Reference
Service Authorization Reference
AWS Resource Access Manager
aws:ResourceTag/
${TagKey}
(p. 1273)
ram:ResourceShareName
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
ram:Principal
(p. 1273)
ram:RequestedResourceType
(p. 1273)
ram:ResourceArn
(p. 1273)
resource-
share*
(p. 1272)
aws:ResourceTag/
${TagKey}
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
ram:ResourceShareName
(p. 1273)
ram:PermissionArn
(p. 1273)
ram:PermissionArn
(p. 1273)
1269
Service Authorization Reference
Service Authorization Reference
AWS Resource Access Manager
aws:ResourceTag/
${TagKey}
(p. 1273)
ram:ResourceShareName
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
1270
Service Authorization Reference
Service Authorization Reference
AWS Resource Access Manager
ram:ResourceShareName
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
ram:ShareOwnerAccountId
(p. 1273)
aws:RequestTag/
${TagKey}
(p. 1273)
aws:TagKeys
(p. 1273)
aws:RequestTag/
${TagKey}
(p. 1273)
aws:TagKeys
(p. 1273)
1271
Service Authorization Reference
Service Authorization Reference
AWS Resource Access Manager
aws:ResourceTag/
${TagKey}
(p. 1273)
ram:ResourceShareName
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
ram:RequestedAllowsExternalPrincipal
(p. 1273)
ram:AllowsExternalPrincipals
(p. 1273)
ram:ResourceShareName
(p. 1273)
resource- arn:${Partition}:ram:${Region}:
share- ${Account}:resource-share-invitation/
invitation ${ResourcePath}
To view the global condition keys that are available to all services, see Available global condition keys.
1272
Service Authorization Reference
Service Authorization Reference
Amazon Resource Group Tagging API
aws:RequestTag/ Specifies a tag key and value pair that must be used when String
${TagKey} creating or tagging a resource share. If users don't pass these
specific tags, or if they don't specify tags at all, the request
fails.
aws:TagKeys Specifies the tag keys that can be used when creating or String
tagging a resource share
References:
1273
Service Authorization Reference
Service Authorization Reference
Amazon Resource Group Tagging API
• Learn how to secure this service and its resources by using IAM permission policies.
Topics
• Actions defined by Amazon Resource Group Tagging API (p. 1274)
• Resource types defined by Amazon Resource Group Tagging API (p. 1275)
• Condition keys for Amazon Resource Group Tagging API (p. 1275)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1274
Service Authorization Reference
Service Authorization Reference
AWS Resource Groups
References:
Topics
• Actions defined by AWS Resource Groups (p. 1275)
• Resource types defined by AWS Resource Groups (p. 1277)
• Condition keys for AWS Resource Groups (p. 1277)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1275
Service Authorization Reference
Service Authorization Reference
AWS Resource Groups
tag:GetResources
tag:GetResources
1276
Service Authorization Reference
Service Authorization Reference
AWS Resource Groups
aws:RequestTag/
${TagKey}
(p. 1277)
aws:TagKeys
(p. 1278)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
1277
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by AWS RoboMaker (p. 1278)
• Resource types defined by AWS RoboMaker (p. 1284)
• Condition keys for AWS RoboMaker (p. 1285)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1278
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
aws:RequestTag/
${TagKey}
(p. 1285)
aws:RequestTag/
${TagKey}
(p. 1285)
aws:RequestTag/
${TagKey}
(p. 1285)
aws:RequestTag/
${TagKey}
(p. 1285)
1279
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
aws:RequestTag/
${TagKey}
(p. 1285)
robot*
(p. 1285)
1280
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
deploymentJob
(p. 1285)
robot
(p. 1285)
robotApplication
(p. 1284)
1281
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
simulationApplication
(p. 1284)
simulationJob
(p. 1284)
simulationJobBatch
(p. 1285)
world
(p. 1285)
worldExportJob
(p. 1285)
worldGenerationJob
(p. 1285)
worldTemplate
(p. 1285)
robot*
(p. 1285)
aws:RequestTag/
${TagKey}
(p. 1285)
1282
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
deploymentJob
(p. 1285)
robot
(p. 1285)
robotApplication
(p. 1284)
simulationApplication
(p. 1284)
simulationJob
(p. 1284)
simulationJobBatch
(p. 1285)
world
(p. 1285)
worldExportJob
(p. 1285)
worldGenerationJob
(p. 1285)
worldTemplate
(p. 1285)
aws:TagKeys
(p. 1285)
aws:RequestTag/
${TagKey}
(p. 1285)
deploymentJob
(p. 1285)
robot
(p. 1285)
robotApplication
(p. 1284)
simulationApplication
(p. 1284)
simulationJob
(p. 1284)
1283
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
simulationJobBatch
(p. 1285)
world
(p. 1285)
worldExportJob
(p. 1285)
worldGenerationJob
(p. 1285)
worldTemplate
(p. 1285)
aws:TagKeys
(p. 1285)
arn:${Partition}:robomaker:${Region}: aws:ResourceTag/
robotApplication ${Account}:robot-application/ ${TagKey} (p. 1285)
${ApplicationName}/${CreatedOnEpoch}
arn:${Partition}:robomaker:${Region}: aws:ResourceTag/
simulationApplication
${Account}:simulation-application/ ${TagKey} (p. 1285)
${ApplicationName}/${CreatedOnEpoch}
1284
Service Authorization Reference
Service Authorization Reference
AWS RoboMaker
arn:${Partition}:robomaker:${Region}: aws:ResourceTag/
simulationJobBatch
${Account}:simulation-job-batch/ ${TagKey} (p. 1285)
${SimulationJobBatchId}
arn:${Partition}:robomaker:${Region}: aws:ResourceTag/
deploymentJob ${Account}:deployment-job/${DeploymentJobId} ${TagKey} (p. 1285)
arn:${Partition}:robomaker:${Region}: aws:ResourceTag/
deploymentFleet ${Account}:deployment-fleet/${FleetName}/ ${TagKey} (p. 1285)
${CreatedOnEpoch}
arn:${Partition}:robomaker:${Region}: aws:ResourceTag/
worldGenerationJob
${Account}:world-generation-job/ ${TagKey} (p. 1285)
${WorldGenerationJobId}
arn:${Partition}:robomaker:${Region}: aws:ResourceTag/
worldExportJob ${Account}:world-export-job/ ${TagKey} (p. 1285)
${WorldExportJobId}
arn:${Partition}:robomaker: aws:ResourceTag/
worldTemplate ${Region}:${Account}:world-template/ ${TagKey} (p. 1285)
${WorldTemplateJobId}
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ String
${TagKey}
aws:ResourceTag/ String
${TagKey}
aws:TagKeys String
1285
Service Authorization Reference
Service Authorization Reference
Amazon Route 53
References:
Topics
• Actions defined by Amazon Route 53 (p. 1286)
• Resource types defined by Amazon Route 53 (p. 1292)
• Condition keys for Amazon Route 53 (p. 1293)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1286
Service Authorization Reference
Service Authorization Reference
Amazon Route 53
hostedzone*
(p. 1292)
1287
Service Authorization Reference
Service Authorization Reference
Amazon Route 53
1288
Service Authorization Reference
Service Authorization Reference
Amazon Route 53
1289
Service Authorization Reference
Service Authorization Reference
Amazon Route 53
1290
Service Authorization Reference
Service Authorization Reference
Amazon Route 53
hostedzone
(p. 1292)
1291
Service Authorization Reference
Service Authorization Reference
Amazon Route 53
change arn:${Partition}:route53:::change/${Id}
delegationset arn:${Partition}:route53:::delegationset/
${Id}
healthcheck arn:${Partition}:route53:::healthcheck/${Id}
hostedzone arn:${Partition}:route53:::hostedzone/${Id}
trafficpolicy arn:${Partition}:route53:::trafficpolicy/
${Id}
arn:
trafficpolicyinstance
${Partition}:route53:::trafficpolicyinstance/
${Id}
arn:
queryloggingconfig
${Partition}:route53:::queryloggingconfig/
${Id}
vpc arn:${Partition}:ec2:${Region}:
${Account}:vpc/${VpcId}
1292
Service Authorization Reference
Service Authorization Reference
Amazon Route 53 Resolver
References:
Topics
• Actions defined by Amazon Route 53 Resolver (p. 1293)
• Resource types defined by Amazon Route 53 Resolver (p. 1297)
• Condition keys for Amazon Route 53 Resolver (p. 1298)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1293
Service Authorization Reference
Service Authorization Reference
Amazon Route 53 Resolver
1294
Service Authorization Reference
Service Authorization Reference
Amazon Route 53 Resolver
1295
Service Authorization Reference
Service Authorization Reference
Amazon Route 53 Resolver
resolver-
rule
(p. 1298)
1296
Service Authorization Reference
Service Authorization Reference
Amazon Route 53 Resolver
resolver-
rule
(p. 1298)
resolver-
rule
(p. 1298)
1297
Service Authorization Reference
Service Authorization Reference
Amazon Route53 Domains
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the presence of tag key-value pairs String
${TagKey} in the request
aws:TagKeys Filters actions based on the presence of tag keys in the String
request
References:
Topics
• Actions defined by Amazon Route53 Domains (p. 1299)
• Resource types defined by Amazon Route53 Domains (p. 1301)
• Condition keys for Amazon Route53 Domains (p. 1301)
1298
Service Authorization Reference
Service Authorization Reference
Amazon Route53 Domains
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
1299
Service Authorization Reference
Service Authorization Reference
Amazon Route53 Domains
1300
Service Authorization Reference
Service Authorization Reference
Amazon S3
References:
Topics
• Actions defined by Amazon S3 (p. 1302)
• Resource types defined by Amazon S3 (p. 1356)
• Condition keys for Amazon S3 (p. 1357)
1301
Service Authorization Reference
Service Authorization Reference
Amazon S3
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
s3:DataAccessPointArn
(p. 1357)
s3:DataAccessPointAccount
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
1302
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:RequestObjectTagKeys
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-
amz-acl
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:x-amz-
copy-
source
(p. 1358)
s3:x-amz-
grant-full-
control
(p. 1358)
s3:x-amz-
grant-read
(p. 1358)
s3:x-amz-
grant-
read-acp
(p. 1358)
s3:x-amz-
grant-
write
(p. 1358)
s3:x-amz-
grant-
write-acp
(p. 1358)
1303
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:x-amz-
server-
side-
encryption
(p. 1359)
s3:x-amz-
server-
side-
encryption-
aws-kms-
key-id
(p. 1359)
s3:x-amz-
storage-
class
(p. 1359)
s3:x-amz-
website-
redirect-
location
(p. 1359)
s3:object-
lock-mode
(p. 1358)
s3:object-
lock-
retain-
until-date
(p. 1358)
s3:object-
lock-
remaining-
retention-
days
(p. 1358)
s3:object-
lock-
legal-hold
(p. 1358)
1304
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:locationconstraint
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-
amz-acl
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1305
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:locationconstraint
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-
amz-acl
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:x-amz-
grant-full-
control
(p. 1358)
s3:x-amz-
grant-read
(p. 1358)
s3:x-amz-
grant-
read-acp
(p. 1358)
s3:x-amz-
grant-
write
(p. 1358)
s3:x-amz-
grant-
write-acp
(p. 1358)
1306
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:RequestJobPriority
(p. 1357)
s3:RequestJobOperation
(p. 1357)
aws:TagKeys
(p. 1357)
aws:RequestTag/
${TagKey}
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:DataAccessPointAccount
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1307
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointArn
(p. 1357)
s3:DataAccessPointAccount
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1308
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1309
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:ExistingJobPriority
(p. 1357)
s3:ExistingJobOperation
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1310
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1311
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1312
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1313
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1314
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1315
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1316
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1317
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1318
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1319
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1320
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1321
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1322
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1323
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1324
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1325
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1326
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1327
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1328
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1329
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:delimiter
(p. 1358)
s3:max-
keys
(p. 1358)
s3:prefix
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1330
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1331
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:delimiter
(p. 1358)
s3:max-
keys
(p. 1358)
s3:prefix
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1332
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1333
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1334
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1335
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-
amz-acl
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:x-amz-
grant-full-
control
(p. 1358)
s3:x-amz-
grant-read
(p. 1358)
s3:x-amz-
grant-
read-acp
(p. 1358)
s3:x-amz-
grant-
write
(p. 1358)
s3:x-amz-
grant-
write-acp
(p. 1358)
1336
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1337
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1338
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1339
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1340
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:ExistingJobPriority
(p. 1357)
s3:ExistingJobOperation
(p. 1357)
aws:TagKeys
(p. 1357)
aws:RequestTag/
${TagKey}
(p. 1357)
1341
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1342
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:RequestObjectTag/
<key>
(p. 1357)
s3:RequestObjectTagKeys
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-
amz-acl
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:x-amz-
copy-
source
(p. 1358)
s3:x-amz-
grant-full-
control
(p. 1358)
s3:x-amz-
grant-read
(p. 1358)
s3:x-amz-
grant-
read-acp
(p. 1358)
s3:x-amz-
grant-
1343
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:x-amz-
grant-
write-acp
(p. 1358)
s3:x-amz-
metadata-
directive
(p. 1359)
s3:x-amz-
server-
side-
encryption
(p. 1359)
s3:x-amz-
server-
side-
encryption-
aws-kms-
key-id
(p. 1359)
s3:x-amz-
storage-
class
(p. 1359)
s3:x-amz-
website-
redirect-
location
(p. 1359)
s3:object-
lock-mode
(p. 1358)
s3:object-
lock-
retain-
until-date
(p. 1358)
s3:object-
lock-
remaining-
retention-
days
(p. 1358)
1344
Service Authorization Reference
Service Authorization Reference
Amazon S3
1345
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-
amz-acl
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:x-amz-
grant-full-
control
(p. 1358)
s3:x-amz-
grant-read
(p. 1358)
s3:x-amz-
grant-
read-acp
(p. 1358)
s3:x-amz-
grant-
write
(p. 1358)
s3:x-amz-
grant-
write-acp
(p. 1358)
1346
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:object-
lock-
legal-hold
(p. 1358)
1347
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:object-
lock-mode
(p. 1358)
s3:object-
lock-
retain-
until-date
(p. 1358)
s3:object-
lock-
remaining-
retention-
days
(p. 1358)
1348
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:RequestObjectTag/
<key>
(p. 1357)
s3:RequestObjectTagKeys
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1349
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-
amz-acl
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:x-amz-
grant-full-
control
(p. 1358)
s3:x-amz-
grant-read
(p. 1358)
s3:x-amz-
grant-
read-acp
(p. 1358)
s3:x-amz-
grant-
write
(p. 1358)
1350
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:x-amz-
storage-
class
(p. 1359)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:ExistingObjectTag/
<key>
(p. 1357)
s3:RequestObjectTag/
<key>
(p. 1357)
s3:RequestObjectTagKeys
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:versionid
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1351
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
aws:TagKeys
(p. 1357)
aws:RequestTag/
${TagKey}
(p. 1357)
1352
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
aws:TagKeys
(p. 1357)
aws:RequestTag/
${TagKey}
(p. 1357)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1353
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:x-amz-
server-
side-
encryption
(p. 1359)
s3:x-amz-
server-
side-
encryption-
aws-kms-
key-id
(p. 1359)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
1354
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:DataAccessPointAccount
(p. 1357)
s3:DataAccessPointArn
(p. 1357)
s3:AccessPointNetworkOrigin
(p. 1357)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:RequestJobPriority
(p. 1357)
s3:ExistingJobPriority
(p. 1357)
s3:ExistingJobOperation
(p. 1357)
1355
Service Authorization Reference
Service Authorization Reference
Amazon S3
s3:authType
(p. 1358)
s3:signatureAge
(p. 1358)
s3:signatureversion
(p. 1358)
s3:x-amz-
content-
sha256
(p. 1358)
s3:ExistingJobPriority
(p. 1357)
s3:ExistingJobOperation
(p. 1357)
s3:JobSuspendedCause
(p. 1357)
accesspoint arn:${Partition}:s3:${Region}:
${Account}:accesspoint/${AccessPointName}
bucket arn:${Partition}:s3:::${BucketName}
object arn:${Partition}:s3:::${BucketName}/
${ObjectName}
job arn:${Partition}:s3:${Region}:
${Account}:job/${JobId}
arn:${Partition}:s3:${Region}: aws:ResourceTag/
storagelensconfiguration
${Account}:storage-lens/${ConfigId} ${TagKey} (p. 1357)
1356
Service Authorization Reference
Service Authorization Reference
Amazon S3
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the tags that are passed in the String
${TagKey} request
aws:TagKeys Filters actions based on the tag keys that are passed in the String
request
Filters access by the AWS Account ID that owns the access String
s3:DataAccessPointAccount
point
1357
Service Authorization Reference
Service Authorization Reference
Amazon S3
1358
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3:x-amz-server- Filters access by AWS KMS customer managed CMK for String
side-encryption- server-side encryption
aws-kms-key-id
References:
Topics
• Actions defined by Amazon S3 on Outposts (p. 1359)
• Resource types defined by Amazon S3 on Outposts (p. 1380)
• Condition keys for Amazon S3 on Outposts (p. 1381)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
1359
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
For details about the columns in the following table, see The actions table (p. 1).
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
1360
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1361
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1362
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1363
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1364
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:ExistingObjectTag/
<key>
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1365
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1366
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1367
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1368
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1369
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:ExistingObjectTag/
<key>
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1370
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:ExistingObjectTag/
<key>
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1371
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:delimiter
(p. 1381)
s3-
outposts:max-
keys
(p. 1382)
s3-
outposts:prefix
(p. 1382)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
bucket*
(p. 1381)
1372
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1373
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1374
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1375
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1376
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:RequestObjectTag/
<key>
(p. 1381)
s3-
outposts:RequestObjectTagKeys
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-acl
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:x-
amz-copy-
source
(p. 1382)
s3-
outposts:x-
amz-
metadata-
1377
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:x-
amz-
server-
side-
encryption
(p. 1382)
s3-
outposts:x-
amz-
storage-
class
(p. 1382)
1378
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:ExistingObjectTag/
<key>
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-acl
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
s3-
outposts:x-
amz-
storage-
class
(p. 1382)
1379
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
s3-
outposts:DataAccessPointAccount
(p. 1381)
s3-
outposts:DataAccessPointArn
(p. 1381)
s3-
outposts:AccessPointNetworkOrigin
(p. 1381)
s3-
outposts:ExistingObjectTag/
<key>
(p. 1381)
s3-
outposts:RequestObjectTag/
<key>
(p. 1381)
s3-
outposts:RequestObjectTagKeys
(p. 1381)
s3-
outposts:authType
(p. 1381)
s3-
outposts:signatureAge
(p. 1382)
s3-
outposts:signatureversion
(p. 1382)
s3-
outposts:x-
amz-
content-
sha256
(p. 1382)
1380
Service Authorization Reference
Service Authorization Reference
Amazon S3 on Outposts
accesspoint arn:${Partition}:s3-outposts:${Region}:
${Account}:outpost/${OutpostId}/accesspoint/
${AccessPointName}
bucket arn:${Partition}:s3-outposts:${Region}:
${Account}:outpost/${OutpostId}/bucket/
${BucketName}
endpoint arn:${Partition}:s3-outposts:${Region}:
${Account}:outpost/${OutpostId}/endpoint/
${EndpointId}
object arn:${Partition}:s3-outposts:${Region}:
${Account}:outpost/${OutpostId}/bucket/
${BucketName}/object/${ObjectName}
To view the global condition keys that are available to all services, see Available global condition keys.
s3- Filters access by the AWS Account ID that owns the access String
outposts:DataAccessPointAccount
point
s3- Filters access by requiring that an existing object tag has a String
outposts:ExistingObjectTag/
specific tag key and value
<key>
s3- Filters access by restricting the tag keys and values allowed String
outposts:RequestObjectTag/
on objects
<key>
s3- Filters access by restricting the tag keys allowed on objects String
outposts:RequestObjectTagKeys
1381
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
References:
Topics
• Actions defined by Amazon SageMaker (p. 1383)
• Resource types defined by Amazon SageMaker (p. 1425)
• Condition keys for Amazon SageMaker (p. 1430)
1382
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
context*
(p. 1430)
experiment*
(p. 1429)
experiment-
trial-
component*
(p. 1430)
app
(p. 1427)
app-
image-
config
(p. 1427)
artifact
(p. 1430)
automl-
job
(p. 1429)
1383
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
code-
repository
(p. 1427)
context
(p. 1430)
data-
quality-
job-
definition
(p. 1429)
device
(p. 1426)
device-
fleet
(p. 1426)
domain
(p. 1426)
edge-
packaging-
job
(p. 1426)
endpoint
(p. 1428)
endpoint-
config
(p. 1428)
experiment
(p. 1429)
experiment-
trial
(p. 1429)
experiment-
trial-
component
(p. 1430)
feature-
group
(p. 1430)
flow-
definition
(p. 1426)
1384
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
human-
task-ui
(p. 1426)
hyper-
parameter-
tuning-job
(p. 1428)
image
(p. 1427)
labeling-
job
(p. 1426)
model
(p. 1428)
model-
bias-job-
definition
(p. 1429)
model-
explainability-
job-
definition
(p. 1429)
model-
package
(p. 1428)
model-
package-
group
(p. 1428)
model-
quality-
job-
definition
(p. 1429)
monitoring-
schedule
(p. 1429)
notebook-
instance
(p. 1427)
pipeline
(p. 1430)
1385
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
processing-
job
(p. 1428)
project
(p. 1428)
training-
job
(p. 1428)
transform-
job
(p. 1429)
user-
profile
(p. 1427)
workteam
(p. 1426)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
experiment-
trial-
component*
(p. 1430)
1386
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:ImageArns
(p. 1431)
sagemaker:ImageVersionArns
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1387
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1388
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1389
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:AppNetworkAccessType
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
sagemaker:DomainSharingOutputKms
(p. 1431)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:ImageArns
(p. 1431)
sagemaker:ImageVersionArns
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:TagKeys
(p. 1431)
1390
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:TagKeys
(p. 1431)
sagemaker:AcceleratorTypes
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:ModelArn
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:FeatureGroupOnlineStoreK
(p. 1431)
sagemaker:FeatureGroupOfflineStoreK
(p. 1431)
sagemaker:FeatureGroupOfflineStoreS
(p. 1431)
1391
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
sagemaker:WorkteamArn
(p. 1432)
sagemaker:WorkteamType
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1392
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:FileSystemAccessMode
(p. 1431)
sagemaker:FileSystemDirectoryPath
(p. 1431)
sagemaker:FileSystemId
(p. 1431)
sagemaker:FileSystemType
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1393
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
sagemaker:WorkteamType
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:TagKeys
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
1394
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
1395
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
model-
package-
group
(p. 1428)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1396
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
1397
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
1398
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:AcceleratorTypes
(p. 1431)
sagemaker:DirectInternetAccess
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:RootAccess
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1399
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1400
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:TagKeys
(p. 1431)
sagemaker:FileSystemAccessMode
(p. 1431)
sagemaker:FileSystemDirectoryPath
(p. 1431)
sagemaker:FileSystemId
(p. 1431)
sagemaker:FileSystemType
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
1401
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:ModelArn
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1402
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:DomainSharingOutputKms
(p. 1431)
sagemaker:ImageArns
(p. 1431)
sagemaker:ImageVersionArns
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1403
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
context*
(p. 1430)
experiment*
(p. 1429)
experiment-
trial-
component*
(p. 1430)
1404
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
1405
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
app
(p. 1427)
app-
image-
config
(p. 1427)
1406
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
artifact
(p. 1430)
automl-
job
(p. 1429)
code-
repository
(p. 1427)
compilation-
job
(p. 1429)
context
(p. 1430)
data-
quality-
job-
definition
(p. 1429)
device
(p. 1426)
device-
fleet
(p. 1426)
domain
(p. 1426)
edge-
packaging-
job
(p. 1426)
endpoint
(p. 1428)
endpoint-
config
(p. 1428)
experiment
(p. 1429)
experiment-
trial
(p. 1429)
1407
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
experiment-
trial-
component
(p. 1430)
feature-
group
(p. 1430)
flow-
definition
(p. 1426)
human-
task-ui
(p. 1426)
hyper-
parameter-
tuning-job
(p. 1428)
image
(p. 1427)
labeling-
job
(p. 1426)
model
(p. 1428)
model-
bias-job-
definition
(p. 1429)
model-
explainability-
job-
definition
(p. 1429)
model-
package
(p. 1428)
model-
package-
group
(p. 1428)
1408
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
model-
quality-
job-
definition
(p. 1429)
monitoring-
schedule
(p. 1429)
notebook-
instance
(p. 1427)
pipeline
(p. 1430)
processing-
job
(p. 1428)
project
(p. 1428)
training-
job
(p. 1428)
transform-
job
(p. 1429)
user-
profile
(p. 1427)
workteam
(p. 1426)
aws:TagKeys
(p. 1431)
1409
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1410
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1411
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1412
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
experiment-
trial-
component*
(p. 1430)
processing-
job*
(p. 1428)
1413
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1414
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1415
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1416
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
algorithm
(p. 1427)
app
(p. 1427)
app-
image-
config
(p. 1427)
artifact
(p. 1430)
automl-
job
(p. 1429)
code-
repository
(p. 1427)
context
(p. 1430)
data-
quality-
job-
definition
(p. 1429)
device
(p. 1426)
device-
fleet
(p. 1426)
1417
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
domain
(p. 1426)
edge-
packaging-
job
(p. 1426)
endpoint
(p. 1428)
endpoint-
config
(p. 1428)
experiment
(p. 1429)
experiment-
trial
(p. 1429)
experiment-
trial-
component
(p. 1430)
feature-
group
(p. 1430)
flow-
definition
(p. 1426)
human-
task-ui
(p. 1426)
hyper-
parameter-
tuning-job
(p. 1428)
image
(p. 1427)
labeling-
job
(p. 1426)
model
(p. 1428)
1418
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
model-
bias-job-
definition
(p. 1429)
model-
explainability-
job-
definition
(p. 1429)
model-
package
(p. 1428)
model-
package-
group
(p. 1428)
model-
quality-
job-
definition
(p. 1429)
monitoring-
schedule
(p. 1429)
notebook-
instance
(p. 1427)
pipeline
(p. 1430)
project
(p. 1428)
training-
job
(p. 1428)
transform-
job
(p. 1429)
user-
profile
(p. 1427)
workteam
(p. 1426)
1419
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
1420
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1421
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
1422
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:DomainSharingOutputKms
(p. 1431)
sagemaker:ImageArns
(p. 1431)
sagemaker:ImageVersionArns
(p. 1431)
1423
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:RequestTag/
${TagKey}
(p. 1430)
aws:TagKeys
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:MaxRuntimeInSeconds
(p. 1431)
sagemaker:NetworkIsolation
(p. 1432)
sagemaker:OutputKmsKey
(p. 1432)
sagemaker:VolumeKmsKey
(p. 1432)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:VpcSubnets
(p. 1432)
sagemaker:InterContainerTrafficEncryp
(p. 1431)
sagemaker:RootAccess
(p. 1432)
1424
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
sagemaker:InstanceTypes
(p. 1431)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:VpcSecurityGroupIds
(p. 1432)
sagemaker:InstanceTypes
(p. 1431)
sagemaker:DomainSharingOutputKms
(p. 1431)
sagemaker:ImageArns
(p. 1431)
sagemaker:ImageVersionArns
(p. 1431)
1425
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
can include in a policy. These keys are displayed in the last column of the table. For details about the
columns in the following table, see The resource types table (p. 2).
sagemaker:ResourceTag/
${TagKey} (p. 1432)
human-loop arn:${Partition}:sagemaker:${Region}:
${Account}:human-loop/${HumanLoopName}
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
1426
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
notebook- arn:${Partition}:sagemaker:
instance- ${Region}:${Account}:notebook-
lifecycle-config instance-lifecycle-config/
${NotebookInstanceLifecycleConfigName}
sagemaker:ResourceTag/
${TagKey} (p. 1432)
image-version arn:${Partition}:sagemaker:${Region}:
${Account}:image-version/${ImageName}/
${Version}
sagemaker:ResourceTag/
${TagKey} (p. 1432)
1427
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
1428
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
sagemaker:ResourceTag/
${TagKey} (p. 1432)
compilation- arn:${Partition}:sagemaker:
job ${Region}:${Account}:compilation-job/
${CompilationJobName}
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
1429
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
pipeline- arn:${Partition}:sagemaker:${Region}:
execution ${Account}:pipeline/${PipelineName}/
execution/${RandomString}
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
sagemaker:ResourceTag/
${TagKey} (p. 1432)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ A key that is present in the request the user makes to the String
${TagKey} SageMaker service.
1430
Service Authorization Reference
Service Authorization Reference
Amazon SageMaker
aws:TagKeys The list of all the tag key names associated with the resource String
in the request.
The list of all accelerator types associated with the resource ArrayOfString
sagemaker:AcceleratorTypes
in the request.
App network access type associated with the resource in the String
sagemaker:AppNetworkAccessType
request.
The direct internet access associated with the resource in the String
sagemaker:DirectInternetAccess
request.
The Domain sharing output KMS key associated with the ARN
sagemaker:DomainSharingOutputKmsKey
resource in the request.
The offline store kms key associated with the feature group ARN
sagemaker:FeatureGroupOfflineStoreKmsKey
resource in the request.
The offline store s3 uri associated with the feature group String
sagemaker:FeatureGroupOfflineStoreS3Uri
resource in the request.
The online store kms key associated with the feature group ARN
sagemaker:FeatureGroupOnlineStoreKmsKey
resource in the request.
File system access mode associated with the resource in the String
sagemaker:FileSystemAccessMode
request.
File system type associated with the resource in the request. String
sagemaker:FileSystemType
Filters access by the list of all image arns associated with the ArrayOfString
sagemaker:ImageArnsresource in the request.
Filters access by the list of all image version arns associated ArrayOfString
sagemaker:ImageVersionArns
with the resource in the request.
The list of all instance types associated with the resource in ArrayOfString
sagemaker:InstanceTypes
the request.
1431
Service Authorization Reference
Service Authorization Reference
AWS Savings Plans
The model arn associated with the resource in the request. ARN
sagemaker:ModelArn
The output kms key associated with the resource in the ARN
sagemaker:OutputKmsKey
request.
The preface string for a tag key and value pair attached to a String
sagemaker:ResourceTag/
resource.
The root access associated with the resource in the request. String
sagemaker:RootAccess
The volume kms key associated with the resource in the ARN
sagemaker:VolumeKmsKey
request.
The list of all vpc security group ids associated with the ArrayOfString
sagemaker:VpcSecurityGroupIds
resource in the request.
The list of all vpc subnets associated with the resource in the ArrayOfString
sagemaker:VpcSubnets
request.
References:
Topics
• Actions defined by AWS Savings Plans (p. 1433)
• Resource types defined by AWS Savings Plans (p. 1434)
• Condition keys for AWS Savings Plans (p. 1434)
1432
Service Authorization Reference
Service Authorization Reference
AWS Savings Plans
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
aws:TagKeys
(p. 1435)
1433
Service Authorization Reference
Service Authorization Reference
AWS Savings Plans
aws:TagKeys
(p. 1435)
aws:RequestTag/
${TagKey}
(p. 1434)
aws:TagKeys
(p. 1435)
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters actions based on the allowed set of values for each of String
${TagKey} the tags
1434
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
References:
Topics
• Actions defined by AWS Secrets Manager (p. 1435)
• Resource types defined by AWS Secrets Manager (p. 1441)
• Condition keys for AWS Secrets Manager (p. 1442)
The Resource types column indicates whether each action supports resource-level permissions. If
there is no value for this column, you must specify all resources ("*") in the Resource element of your
policy statement. If the column includes a resource type, then you can specify an ARN of that type in
a statement with that action. Required resources are indicated in the table with an asterisk (*). If you
specify a resource-level permission ARN in a statement using this action, then it must be of this type.
Some actions support multiple resource types. If the resource type is optional (not indicated as required),
then you can choose to use one but not the other.
For details about the columns in the following table, see The actions table (p. 1).
secretsmanager:SecretId
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
1435
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
secretsmanager:Description
(p. 1442)
secretsmanager:KmsKeyId
(p. 1442)
aws:RequestTag/
tag-key
(p. 1442)
aws:TagKeys
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
1436
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
secretsmanager:SecretId
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:RecoveryWindowInDay
(p. 1442)
secretsmanager:ForceDeleteWithoutRe
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
1437
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
secretsmanager:SecretId
(p. 1442)
secretsmanager:VersionId
(p. 1442)
secretsmanager:VersionStage
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:SecretId
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:SecretId
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:BlockPublicPolicy
(p. 1442)
1438
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
secretsmanager:SecretId
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:SecretId
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:SecretId
(p. 1442)
secretsmanager:RotationLambdaARN
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
1439
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
secretsmanager:SecretId
(p. 1442)
aws:RequestTag/
tag-key
(p. 1442)
aws:TagKeys
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:SecretId
(p. 1442)
aws:TagKeys
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:Description
(p. 1442)
secretsmanager:KmsKeyId
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
1440
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
secretsmanager:SecretId
(p. 1442)
secretsmanager:VersionStage
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
secretsmanager:ResourceTag/
tag-key
(p. 1442)
secretsmanager:ResourceTag/
tag-key (p. 1442)
secretsmanager:resource/
AllowRotationLambdaArn
(p. 1442)
1441
Service Authorization Reference
Service Authorization Reference
AWS Secrets Manager
To view the global condition keys that are available to all services, see Available global condition keys.
aws:RequestTag/ Filters access by a key that is present in the request the user String
tag-key makes to the Secrets Manager service.
aws:TagKeys Filters access by the list of all the tag key namespresent in String
the request the user makes to the Secrets Manager service.
Filters access by the ARN of the KMS key in the request. String
secretsmanager:KmsKeyId
1442