AWS::IAM::RolePolicy
Adds or updates an inline policy document that is embedded in the specified IAM role.
When you embed an inline policy in a role, the inline policy is used as part of the
role's access (permissions) policy. The role's trust policy is created at the same time as
the role, using CreateRole
. You can update a role's trust policy using UpdateAssumeRolePolicy
. For information about roles, see
IAM roles in the IAM User Guide.
A role can also have a managed policy attached to it. To attach a managed policy to a
role, use AWS::IAM::Role
. To create a new managed policy, use AWS::IAM::ManagedPolicy
. For information about policies, see Managed policies and inline
policies in the IAM User Guide.
For information about the maximum number of inline policies that you can embed with a role, see IAM and AWS STS quotas in the IAM User Guide.
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "Type" : "AWS::IAM::RolePolicy", "Properties" : { "PolicyDocument" :
Json
, "PolicyName" :String
, "RoleName" :String
} }
YAML
Type: AWS::IAM::RolePolicy Properties: PolicyDocument:
Json
PolicyName:String
RoleName:String
Properties
PolicyDocument
-
The policy document.
You must provide policies in JSON format in IAM. However, for AWS CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation always converts a YAML policy to JSON format before submitting it to IAM.
The regex pattern
used to validate this parameter is a string of characters consisting of the following: -
Any printable ASCII character ranging from the space character (
\u0020
) through the end of the ASCII character range -
The printable characters in the Basic Latin and Latin-1 Supplement character set (through
\u00FF
) -
The special characters tab (
\u0009
), line feed (\u000A
), and carriage return (\u000D
)
Required: No
Type: Json
Pattern:
[\u0009\u000A\u000D\u0020-\u00FF]+
Minimum:
1
Maximum:
131072
Update requires: No interruption
-
PolicyName
-
The name of the policy document.
This parameter allows (through its regex pattern
) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@- Required: Yes
Type: String
Pattern:
[\w+=,.@-]+
Minimum:
1
Maximum:
128
Update requires: Replacement
RoleName
-
The name of the role to associate the policy with.
This parameter allows (through its regex pattern
) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@- Required: Yes
Type: String
Pattern:
[\w+=,.@-]+
Minimum:
1
Maximum:
64
Update requires: Replacement
Return values
Ref
When the logical ID of this resource is provided to the Ref
intrinsic function, Ref
returns the resource name.
For more information about using the Ref
function, see Ref
.
Examples
IAM role embedded inline policy document
This example shows an inline policy document in AWS::IAM::RolePolicy
.
The policy will be embedded in the specified IAM role,
RootRole
.
JSON
{ "Type": "AWS::IAM::RolePolicy", "Properties": { "PolicyName": "root", "PolicyDocument": { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "*", "Resource": "*" } ] }, "RoleName": "RootRole" } }
YAML
Type: 'AWS::IAM::RolePolicy' Properties: PolicyName: root PolicyDocument: Version: "2012-10-17" Statement: - Effect: Allow Action: '*' Resource: '*' RoleName: RootRole
IAM role embedded inline policy document with Ref function
This example shows an inline policy document in AWS::IAM::RolePolicy
.
The example uses the Ref
function in the RoleName
property
to specify the logical ID of a AWS::IAM::Role
resource. For the logical
ID of the AWS::IAM::Role
resource, Ref
returns the role
name.
JSON
{ "Type": "AWS::IAM::RolePolicy", "Properties": { "PolicyName": "root", "PolicyDocument": { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "*", "Resource": "*" } ] }, "RoleName": { "Ref": "RootRole" } } }
YAML
Type: 'AWS::IAM::RolePolicy' Properties: PolicyName: root PolicyDocument: Version: "2012-10-17" Statement: - Effect: Allow Action: '*' Resource: '*' RoleName: !Ref RootRole
See also
-
PutRolePolicy in the AWS Identity and Access Management API Reference