IAM policies for Amazon Connect
If you want AWS End User Messaging SMS to use an existing IAM role or if you create a new role, attach the following policies to that role so that AWS End User Messaging SMS can assume it. For information about how to modify an existing trust relationship of a role, see Modifying a Role in the IAM user guide.
To create new IAM polices, do the following:
-
Create a new permission policy by following the directions in Creating policies using the JSON editor in the IAM User Guide.
-
In step 4 use the permission policy defined below.
-
-
Create a new trust policy by following the directions in Creating a role using custom trust policies in the IAM User Guide.
-
In step 4 use the trust policy defined below.
-
In step 11 add the permission policy that you created in the previous step.
-
The following is the permission policy for the IAM role to allow for publishing to Amazon Connect.
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "connect:SendChatIntegrationEvent" ], "Resource": [ "*" ] } ] }
The following is the trust policy for the IAM role, make the following changes:
-
Replace
accountId
with the unique ID for your AWS account.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "SMSVoice", "Effect": "Allow", "Principal": { "Service": "sms-voice.amazonaws.com" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "aws:SourceAccount": "
accountId
" } } } ] }