简体   繁体   English

如何在 cloudformation 中引用 AWS 托管策略 arn?

[英]How to reference AWS managed policy arn in cloudformation?

I am going to create an IAM user with cloudformation and need to attach an AWS managed policy AWSAppSyncInvokeFullAccess .我将使用 cloudformation 创建一个 IAM 用户,并且需要附加一个 AWS 托管策略AWSAppSyncInvokeFullAccess I think I should use the managed policy like below code:我想我应该使用如下代码的托管策略:

Resources:
  publisherUser:
    Type: AWS::IAM::User
    Properties:
      UserName: userName
      ManagedPolicyArns: 
        - !Ref AWSAppSyncInvokeFullAccess
        - !Ref AWSLambdaBasicExecutionRole

but it doesn't work since AWSAppSyncInvokeFullAccess is from AWS not from this template.但它不起作用,因为AWSAppSyncInvokeFullAccess来自 AWS 而不是来自此模板。 What is the correct way to reference the policies?参考政策的正确方法是什么?

These are existing AWS-managed policies.这些是现有的 AWS 托管策略。 So you should use their full ARN , which you can get from IAM console:所以你应该使用他们的完整 ARN ,你可以从 IAM 控制台获得它:

Resources:
  publisherUser:
    Type: AWS::IAM::User
    Properties:
      UserName: userName
      ManagedPolicyArns: 
        - arn:aws:iam::aws:policy/AWSAppSyncInvokeFullAccess
        - arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole

Update更新

Or to make it partition independent:或者使其分区独立:

Resources:
  publisherUser:
    Type: AWS::IAM::User
    Properties:
      UserName: userName
      ManagedPolicyArns: 
        - !Sub "arn:${AWS::Partition}:iam::aws:policy/AWSAppSyncInvokeFullAccess"
        - !Sub "arn:${AWS::Partition}:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"

以防万一有人想知道您可以通过单击策略页面上的策略名称找到所有 IAM 策略的 ARN。

暂无
暂无

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 如何在 cloudformation 策略文档中引用资源 ARN? (山药) - How to reference a resource ARN in a cloudformation policy document ? (yaml) 如何将AWS托管策略附加到云形成和对流层中的角色 - How to attach an AWS managed policy to a role in cloudformation and troposphere 如何在CloudFormation中生成AWS根账户ARN? - How to generate the AWS root account ARN in CloudFormation? 对托管实例应用限制的 AWS IAM 策略 — ARN 无效? - AWS IAM Policy applying restrictions to managed instances — invalid ARN? 如何在应用AWS策略之前验证ARN? - How to validate an ARN before applying an AWS policy? 如何在 cloudformation 中创建托管策略,允许 lambda 访问 aws 环境中的所有 s3 容器 - How to create a managed policy in cloudformation that allows lambda access to all s3 containers in an aws environment 如何从 cloudformation 中的现有表中引用 dynamodb stream arn? - How to reference a dynamodb stream arn from an existing table in cloudformation? AWS CloudFormation - 通过模板将现有托管策略附加到现有角色 - AWS CloudFormation - Attach existing managed policy to existing role through a template 使用 cloudformation 部署时如何获取 AWS Api 网关的 arn - How to get arn of AWS Api gateway when deploying with cloudformation AWS CloudFormation:如何获取 DynamoDB GlobalTable 副本的 stream ARN? - AWS CloudFormation: How to get stream ARN of DynamoDB GlobalTable replica?
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM