IAM: Allows read-only access to the IAM console without reporting
This example shows how you might create an identity-based policy that allows IAM users to perform any IAM action that begins with the
string Get
or List
. As users work with the console, the console makes
requests to IAM to list groups, users, roles, and policies, and to generate reports about
those resources.
The asterisk acts as a wildcard. When you use iam:Get*
in a policy, the
resulting permissions include all IAM actions that begin with Get
, such as
GetUser
and GetRole
. Wildcards are useful if new types of entities
are added to IAM in the future. In that case, the permissions granted by the policy
automatically allow the user to list and get the details about those new entities.
This policy cannot be used to generate reports or service last accessed details. For a different policy that allows this, see IAM: Allows read-only access to the IAM console.
{ "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": [ "iam:Get*", "iam:List*" ], "Resource": "*" } }