[英]AccessDenied when calling the GenerateServiceLastAccessedDetails
The role I am assuming has the arn:aws:iam::aws:policy/SecurityAudit
policy attached which includes the necessary permissions我假设的角色附加了
arn:aws:iam::aws:policy/SecurityAudit
策略,其中包括必要的权限
"iam:GenerateServiceLastAccessedDetails",
"iam:Get*",
"iam:List*"
On Resource *
.在资源
*
上。 And yet I still get An error occurred (AccessDenied) when calling the GenerateServiceLastAccessedDetails operation: User: <assumed_role> is not authorized to perform the operation on <role_arn>
.但是我仍然收到
An error occurred (AccessDenied) when calling the GenerateServiceLastAccessedDetails operation: User: <assumed_role> is not authorized to perform the operation on <role_arn>
。 Is it a bug in AWS?它是 AWS 中的错误吗?
I found that this occurs when the arn in the request is invalid.我发现当请求中的arn无效时会出现这种情况。 The error message is a bug, it is an invalid input, not an access denied issue.
错误消息是一个错误,它是一个无效的输入,而不是访问被拒绝的问题。
声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.