Amazon AWS IAM
17 min
aws identity and access management(iam) connector this connector allows turbine to connect with aws identity and access management(iam) prerequisites this integration authenticates with aws iam using the following input values requirements aws access key id a long term aws access key id with access to iam aws secret key id a long term secret access key associated with the above accesskey id role arn an arn of an aws iam role to assume capabilities this connector provides the following capabilities create access key disable access key update policy notes for more information on aws identity and access management(iam) https //docs aws amazon com/iam/latest/apireference/welcome html https //docs aws amazon com/iam/latest/apireference/api operations html configurations aws iam asset authenticates using aws credentials configuration parameters parameter description type required access key a specific long term aws access key id string required secret key a specific long term aws secret access key string required region name the aws region where you want to create new connections string optional role arn role arn string required session token use if a session token is provided when switching roles string optional actions create access key creates a new aws secret access key and corresponding aws access key id for the specified user the default status for new keys is active input argument name type required description iam user name string required the name of the iam user that the new key will belong to input example {"iam user name" "axyzusername"} output parameter type description status code number http status code of the response reason string response reason phrase accesskey object output field accesskey accesskey accesskeyid string unique identifier accesskey createdate string date value accesskey secretaccesskey string output field accesskey secretaccesskey accesskey status string status value accesskey username string name of the resource output example {"status code" 200,"response headers" {},"reason" "ok","json body" {"accesskey" {"accesskeyid" "akiaiosfodnn7example","createdate" "datetime(2015, 3, 9, 18, 39, 23, 0, 68, 0)","secretaccesskey" "wjalrxutnfemi/k7mdeng/bpxrficyzexamplekey","status" "active","username" "bob"}}} disable access key disable a specific aws iam user's access key input argument name type required description iam user name string required the name of the user whose key should be updated access key id string required the access key id of the secret access key that needs to be updated input example {"iam user name" "bob","access key id" "akidpms9ro4h3fexample"} output parameter type description status code number http status code of the response reason string response reason phrase output example {"status code" 200,"response headers" {},"reason" "ok","json body" {}} update policy add new version of aws iam policy (policies can have a maximum of 5 versions) input argument name type required description policy arn string required the amazon resource name (arn) of the iam policy to which you want to add a new version policy document string required the json policy document that you want to use as the content for this new version of the policy set as default boolean optional specifies whether to set this version as the policy's default version when this parameter is true, the new policy version becomes the operative version that is, it becomes the version that is in effect for the iam users, groups, and roles that the policy is attached to input example {"policy arn" "abcxyz","policy document" "{'version' '2012 10 17','statement' \[{'effect' 'allow','principal' {'service' \['ec2 amazonaws com']},'action' \['sts\ assumerole']}]}","set as default"\ true} output parameter type description status code number http status code of the response reason string response reason phrase policyversion object output field policyversion policyversion document string output field policyversion document policyversion versionid string unique identifier policyversion isdefaultversion boolean output field policyversion isdefaultversion policyversion createdate string date value output example {"status code" 200,"response headers" {},"reason" "ok","json body" {"policyversion" {"document" "xyz","versionid" "version","isdefaultversion"\ true,"createdate" "datetime(2015, 1, 1)"}}} response headers header description example content type the media type of the resource application/json date the date and time at which the message was originated thu, 01 jan 2024 00 00 00 gmt