Selecione suas preferências de cookies

Usamos cookies essenciais e ferramentas semelhantes que são necessárias para fornecer nosso site e serviços. Usamos cookies de desempenho para coletar estatísticas anônimas, para que possamos entender como os clientes usam nosso site e fazer as devidas melhorias. Cookies essenciais não podem ser desativados, mas você pode clicar em “Personalizar” ou “Recusar” para recusar cookies de desempenho.

Se você concordar, a AWS e terceiros aprovados também usarão cookies para fornecer recursos úteis do site, lembrar suas preferências e exibir conteúdo relevante, incluindo publicidade relevante. Para aceitar ou recusar todos os cookies não essenciais, clique em “Aceitar” ou “Recusar”. Para fazer escolhas mais detalhadas, clique em “Personalizar”.

Identity-based IAM policies for HealthOmics

Modo de foco
Identity-based IAM policies for HealthOmics - AWS HealthOmics
Esta página não foi traduzida para seu idioma. Solicitar tradução

To grant users in your account access to HealthOmics, you use identity-based policies in AWS Identity and Access Management (IAM). Identity-based policies can apply directly to IAM users, or to IAM groups and roles that are associated with a user. You can also grant users in another account permission to assume a role in your account and access your HealthOmics resources.

To grant permission for users to perform actions on a workflow version, you must add the workflow and the specific workflow version to the resource list.

The following IAM policy allows a user to access all HealthOmics API actions, and to pass service roles to HealthOmics.

Example User policy
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "omics:*" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "iam:PassRole" ], "Resource": "*", "Condition": { "StringEquals": { "iam:PassedToService": "omics.amazonaws.com" } } } ] }

When you use HealthOmics, you also interact with other AWS services. To access these services, use the managed policies provided by each service. To restrict access to a subset of resources, you can use the managed policies as a starting point to create your own more restrictive policies.

The preceding policies don't allow a user to create IAM roles. For a user with these permissions to run a job, an administrator must create the service role that grants HealthOmics permission to access data sources. For more information, see Service roles for AWS HealthOmics.

Define custom IAM permissions for runs

You can include any workflow, run, or run group referenced by the StartRun request in an authorization request. To do so, list the desired combination of workflows, runs, or run groups in the IAM policy. For example, you can limit the use of a workflow to a specific run or run group. You can also specify that a workflow only be used with a run group.

The following is an example IAM policy that allows a single workflow with a single run group.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "omics:StartRun" ], "Resource": [ "arn:aws:omics:us-west-2:123456789012:workflow/1234567", "arn:aws:omics:us-west-2:123456789012:runGroup/2345678" ] }, { # Optionally, allow user to rerun a failed run. "Effect": "Allow", "Action": [ "omics:StartRun" ], "Resource": [ "arn:aws:omics:us-west-2:123456789012:run/*", "arn:aws:omics:us-west-2:123456789012:runGroup/2345678" ] }, { "Effect": "Allow", "Action": [ "omics:GetRun", "omics:ListRunTasks", "omics:GetRunTask", "omics:CancelRun", "omics:DeleteRun" ], "Resource": [ "arn:aws:omics:us-west-2:123456789012:run/*" ] }, ] }

Nesta página

PrivacidadeTermos do sitePreferências de cookies
© 2025, Amazon Web Services, Inc. ou suas afiliadas. Todos os direitos reservados.