Adding the SageMaker geospatial service principal to an existing SageMaker execution role - Amazon SageMaker

Adding the SageMaker geospatial service principal to an existing SageMaker execution role

To use the SageMaker geospatial specific API operations your SageMaker execution role must include the SageMaker geospatial service principal, sagemaker-geospatial.amazonaws.com in the execution role's trust policy. This allows the SageMaker execution role to perform actions in your AWS account on your behalf.

Actions like passing a role between services are common within SageMaker. For more details,

To add the SageMaker geospatial service principal to an existing SageMaker execution role update the existing policy to include the SageMaker geospatial service principal as shown in the following trust policy. By attaching the service principal to the trust policy a SageMaker execution role can now run the SageMaker geospatial specific APIs on your behalf.

To learn more about SageMaker geospatial specific IAM actions, resources, and conditions, see Actions, Resources, and Condition Keys for SageMaker in the IAM User Guide.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": [ "sagemaker-geospatial.amazonaws.com", "sagemaker.amazonaws.com" ] }, "Action": "sts:AssumeRole" } ] }