本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AIOpsConsoleAdminPolicy
描述:透過 AWS 主控台授予 Amazon AI Operations 服務及其必要許可的完整存取權。它也包含使用感知身分主控台工作階段的許可。
AIOpsConsoleAdminPolicy
是AWS 受管政策。
使用此政策
您可以AIOpsConsoleAdminPolicy
連接到您的使用者、群組和角色。
政策詳細資訊
-
類型: AWS 受管政策
-
建立時間:2024 年 12 月 2 日 23:51 UTC
-
編輯時間:2024 年 12 月 2 日 23:51 UTC
-
ARN:
arn:aws:iam::aws:policy/AIOpsConsoleAdminPolicy
政策版本
政策版本:v1 (預設值)
政策的預設版本是定義政策許可的版本。當具有 政策的使用者或角色提出存取 AWS 資源的請求時, 會 AWS 檢查政策的預設版本,以決定是否允許請求。
JSON 政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "AIOpsAdmin",
"Effect" : "Allow",
"Action" : [
"aiops:*"
],
"Resource" : "*"
},
{
"Sid" : "OrganizationsAccess",
"Effect" : "Allow",
"Action" : [
"organizations:ListAWSServiceAccessForOrganization",
"organizations:DescribeOrganization"
],
"Resource" : "*"
},
{
"Sid" : "SSOApplicationManagement",
"Effect" : "Allow",
"Action" : [
"sso:PutApplicationAccessScope",
"sso:PutApplicationAssignmentConfiguration",
"sso:PutApplicationGrant",
"sso:PutApplicationAuthenticationMethod",
"sso:DeleteApplication"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:CalledViaLast" : "aiops.amazonaws.com",
"aws:ResourceTag/ManagedByAmazonAIOperations" : "true"
}
}
},
{
"Sid" : "SSOApplicationTagManagement",
"Effect" : "Allow",
"Action" : [
"sso:CreateApplication",
"sso:TagResource"
],
"Resource" : [
"arn:aws:sso:::instance/*",
"arn:aws:sso::aws:applicationProvider/aiops"
],
"Condition" : {
"StringEquals" : {
"aws:CalledViaLast" : "aiops.amazonaws.com",
"aws:RequestTag/ManagedByAmazonAIOperations" : "true"
},
"ForAllValues:StringEquals" : {
"aws:TagKeys" : [
"ManagedByAmazonAIOperations"
]
}
}
},
{
"Sid" : "SSOTagManagement",
"Effect" : "Allow",
"Action" : [
"sso:TagResource"
],
"Resource" : "arn:aws:sso::*:application/*",
"Condition" : {
"StringEquals" : {
"aws:CalledViaLast" : "aiops.amazonaws.com",
"aws:ResourceTag/ManagedByAmazonAIOperations" : "true"
},
"ForAllValues:StringEquals" : {
"aws:TagKeys" : [
"ManagedByAmazonAIOperations"
]
}
}
},
{
"Sid" : "SSOManagementAccess",
"Effect" : "Allow",
"Action" : [
"identitystore:DescribeUser",
"sso:ListApplications",
"sso:ListInstances",
"sso:DescribeRegisteredRegions",
"sso:GetSharedSsoConfiguration",
"sso:DescribeInstance",
"sso:GetSSOStatus",
"sso-directory:DescribeUsers"
],
"Resource" : "*"
},
{
"Sid" : "AllowSTSContextSetting",
"Effect" : "Allow",
"Action" : [
"sts:SetContext"
],
"Resource" : "arn:aws:sts::*:self"
},
{
"Sid" : "IdentityPropagationAccess",
"Effect" : "Allow",
"Action" : [
"signin:ListTrustedIdentityPropagationApplicationsForConsole"
],
"Resource" : "*"
},
{
"Sid" : "CloudtrailAccess",
"Effect" : "Allow",
"Action" : [
"cloudtrail:ListTrails",
"cloudtrail:DescribeTrails",
"cloudtrail:ListEventDataStores"
],
"Resource" : "*"
},
{
"Sid" : "KMSAccess",
"Effect" : "Allow",
"Action" : [
"kms:ListAliases"
],
"Resource" : "*"
},
{
"Sid" : "SSMIntegrationSecretsManagerAccess",
"Effect" : "Allow",
"Action" : [
"secretsmanager:CreateSecret",
"secretsmanager:PutResourcePolicy",
"secretsmanager:UpdateSecret",
"secretsmanager:DeleteSecret"
],
"Resource" : "arn:aws:secretsmanager:*:*:secret:aws/ssm/3p/*"
},
{
"Sid" : "SSMIntegrationAccess",
"Effect" : "Allow",
"Action" : [
"ssm:GetServiceSetting",
"ssm:UpdateServiceSetting"
],
"Resource" : "arn:aws:ssm:*:*:servicesetting/integrations/*"
},
{
"Sid" : "SSMIntegrationCreatePolicy",
"Effect" : "Allow",
"Action" : [
"iam:CreatePolicy"
],
"Resource" : "arn:aws:iam::*:policy/service-role/AWSServiceRoleSSMIntegrationsPolicy*"
},
{
"Sid" : "ChatbotConfigurations",
"Effect" : "Allow",
"Action" : [
"chatbot:DescribeChimeWebhookConfigurations",
"chatbot:DescribeSlackWorkspaces",
"chatbot:DescribeSlackChannelConfigurations",
"chatbot:ListMicrosoftTeamsChannelConfigurations",
"chatbot:ListMicrosoftTeamsConfiguredTeams"
],
"Resource" : "*"
},
{
"Sid" : "IAMPassRoleToAIOps",
"Effect" : "Allow",
"Action" : [
"iam:PassRole"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "aiops.amazonaws.com"
}
}
},
{
"Sid" : "IAMListRoles",
"Effect" : "Allow",
"Action" : [
"iam:ListRoles"
],
"Resource" : "*"
},
{
"Sid" : "TagBoundaryPermission",
"Effect" : "Allow",
"Action" : [
"tag:GetTagKeys"
],
"Resource" : "*"
},
{
"Sid" : "IAMPassRoleToSSMIntegration",
"Effect" : "Allow",
"Action" : [
"iam:PassRole"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "ssm.integrations.amazonaws.com"
},
"ArnEquals" : {
"iam:AssociatedResourceArn" : "arn:aws:aiops:*:*:investigation-group/*"
}
}
},
{
"Sid" : "SSMOpsItemAccess",
"Effect" : "Allow",
"Action" : [
"ssm:CreateOpsItem",
"ssm:AddTagsToResource"
],
"Resource" : "arn:*:ssm:*:*:opsitem/*",
"Condition" : {
"StringEquals" : {
"aws:RequestTag/Integration" : "CloudWatch",
"aws:ResourceTag/Integration" : "CloudWatch"
},
"ForAllValues:StringEquals" : {
"aws:TagKeys" : [
"Integration"
]
}
}
}
]
}