Actions, resources, and condition keys for AWS Batch - Service Authorization Reference

Actions, resources, and condition keys for AWS Batch

AWS Batch (service prefix: batch) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.

References:

Actions defined by AWS Batch

You can specify the following actions in the Action element of an IAM policy statement. Use policies to grant permissions to perform an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions.

The Resource types column of the Actions table indicates whether each action supports resource-level permissions. If there is no value for this column, you must specify all resources ("*") to which the policy applies in the Resource element of your policy statement. If the column includes a resource type, then you can specify an ARN of that type in a statement with that action. If the action has one or more required resources, the caller must have permission to use the action with those resources. Required resources are indicated in the table with an asterisk (*). If you limit resource access with the Resource element in an IAM policy, you must include an ARN or pattern for each required resource type. Some actions support multiple resource types. If the resource type is optional (not indicated as required), then you can choose to use one of the optional resource types.

The Condition keys column of the Actions table includes keys that you can specify in a policy statement's Condition element. For more information on the condition keys that are associated with resources for the service, see the Condition keys column of the Resource types table.

Note

Resource condition keys are listed in the Resource types table. You can find a link to the resource type that applies to an action in the Resource types (*required) column of the Actions table. The resource type in the Resource types table includes the Condition keys column, which are the resource condition keys that apply to an action in the Actions table.

For details about the columns in the following table, see Actions table.

Actions Description Access level Resource types (*required) Condition keys Dependent actions
CancelJob Grants permission to cancel a job in an AWS Batch job queue in your account Write

job*

CreateComputeEnvironment Grants permission to create an AWS Batch compute environment in your account Write

compute-environment*

aws:RequestTag/${TagKey}

aws:TagKeys

CreateJobQueue Grants permission to create an AWS Batch job queue in your account Write

compute-environment*

job-queue*

aws:RequestTag/${TagKey}

aws:TagKeys

scheduling-policy

CreateSchedulingPolicy Grants permission to create an AWS Batch scheduling policy in your account Write

scheduling-policy*

aws:RequestTag/${TagKey}

aws:TagKeys

DeleteComputeEnvironment Grants permission to delete an AWS Batch compute environment in your account Write

compute-environment*

DeleteJobQueue Grants permission to delete an AWS Batch job queue in your account Write

job-queue*

DeleteSchedulingPolicy Grants permission to delete an AWS Batch scheduling policy in your account Write

scheduling-policy*

DeregisterJobDefinition Grants permission to deregister an AWS Batch job definition in your account Write

job-definition-revision*

DescribeComputeEnvironments Grants permission to describe one or more AWS Batch compute environments in your account Read
DescribeJobDefinitions Grants permission to describe one or more AWS Batch job definitions in your account Read
DescribeJobQueues Grants permission to describe one or more AWS Batch job queues in your account Read
DescribeJobs Grants permission to describe a list of AWS Batch jobs in your account Read
DescribeSchedulingPolicies Grants permission to describe one or more AWS Batch scheduling policies in your account Read
GetJobQueueSnapshot Grants permission to get a snapshot of an AWS Batch job queue in your account Read

job-queue*

ListJobs Grants permission to list jobs for a specified AWS Batch job queue in your account List
ListSchedulingPolicies Grants permission to list AWS Batch scheduling policies in your account Read
ListTagsForResource Grants permission to list tags for an AWS Batch resource in your account Read

compute-environment

job

job-definition-revision

job-queue

scheduling-policy

RegisterJobDefinition Grants permission to register an AWS Batch job definition in your account Write

job-definition*

batch:User

batch:Privileged

batch:Image

batch:LogDriver

batch:AWSLogsGroup

batch:AWSLogsRegion

batch:AWSLogsStreamPrefix

batch:AWSLogsCreateGroup

batch:EKSServiceAccountName

batch:EKSImage

batch:EKSRunAsUser

batch:EKSRunAsGroup

batch:EKSPrivileged

batch:EKSNamespace

aws:RequestTag/${TagKey}

aws:TagKeys

SubmitJob Grants permission to submit an AWS Batch job from a job definition in your account Write

job*

batch:ShareIdentifier

batch:EKSImage

batch:EKSNamespace

aws:RequestTag/${TagKey}

aws:TagKeys

job-definition*

job-queue*

TagResource Grants permission to tag an AWS Batch resource in your account Tagging

compute-environment

job

job-definition-revision

job-queue

scheduling-policy

aws:RequestTag/${TagKey}

aws:TagKeys

TerminateJob Grants permission to terminate a job in an AWS Batch job queue in your account Write

job*

UntagResource Grants permission to untag an AWS Batch resource in your account Tagging

compute-environment

job

job-definition-revision

job-queue

scheduling-policy

aws:TagKeys

UpdateComputeEnvironment Grants permission to update an AWS Batch compute environment in your account Write

compute-environment*

UpdateJobQueue Grants permission to update an AWS Batch job queue in your account Write

job-queue*

compute-environment

scheduling-policy

UpdateSchedulingPolicy Grants permission to update an AWS Batch scheduling policy in your account Write

scheduling-policy*

Resource types defined by AWS Batch

The following resource types are defined by this service and can be used in the Resource element of IAM permission policy statements. Each action in the Actions table identifies the resource types that can be specified with that action. A resource type can also define which condition keys you can include in a policy. These keys are displayed in the last column of the Resource types table. For details about the columns in the following table, see Resource types table.

Resource types ARN Condition keys
compute-environment arn:${Partition}:batch:${Region}:${Account}:compute-environment/${ComputeEnvironmentName}

aws:ResourceTag/${TagKey}

job-queue arn:${Partition}:batch:${Region}:${Account}:job-queue/${JobQueueName}

aws:ResourceTag/${TagKey}

job-definition arn:${Partition}:batch:${Region}:${Account}:job-definition/${JobDefinitionName}
job-definition-revision arn:${Partition}:batch:${Region}:${Account}:job-definition/${JobDefinitionName}:${Revision}

aws:ResourceTag/${TagKey}

job arn:${Partition}:batch:${Region}:${Account}:job/${JobId}

aws:ResourceTag/${TagKey}

scheduling-policy arn:${Partition}:batch:${Region}:${Account}:scheduling-policy/${SchedulingPolicyName}

aws:ResourceTag/${TagKey}

Condition keys for AWS Batch

AWS Batch defines the following condition keys that can be used in the Condition element of an IAM policy. You can use these keys to further refine the conditions under which the policy statement applies. For details about the columns in the following table, see Condition keys table.

To view the global condition keys that are available to all services, see Available global condition keys.

Condition keys Description Type
aws:RequestTag/${TagKey} Filters access by the tags that are passed in the request String
aws:ResourceTag/${TagKey} Filters access by the tags associated with the resource String
aws:TagKeys Filters access by the tag keys that are passed in the request ArrayOfString
batch:AWSLogsCreateGroup Filters access by the specified logging driver to determine whether awslogs group will be created for the logs Bool
batch:AWSLogsGroup Filters access by the awslogs group where the logs are located String
batch:AWSLogsRegion Filters access by the region where the logs are sent to String
batch:AWSLogsStreamPrefix Filters access by the awslogs log stream prefix String
batch:EKSImage Filters access by the image used to start a container for an Amazon EKS job String
batch:EKSNamespace Filters access by the namespace of a cluster used to run the pod for an Amazon EKS job String
batch:EKSPrivileged Filters access by the specified privileged parameter value that determines whether the container is given elevated privileges on the host container instance (similar to the root user) for an Amazon EKS job Bool
batch:EKSRunAsGroup Filters access by the specified group numeric ID (gid) used to start a container in an Amazon EKS job Numeric
batch:EKSRunAsUser Filters access by the specified user numeric ID (uid) used to start a a container in an Amazon EKS job Numeric
batch:EKSServiceAccountName Filters access by the name of the service account used to run the pod for an Amazon EKS job String
batch:Image Filters access by the image used to start a container String
batch:LogDriver Filters access by the log driver used for the container String
batch:Privileged Filters access by the specified privileged parameter value that determines whether the container is given elevated privileges on the host container instance (similar to the root user) Bool
batch:ShareIdentifier Filters access by the shareIdentifier used inside submit job String
batch:User Filters access by user name or numeric uid used inside the container String