You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are probably lots of other keys that this applies to, but this key in particular is probably very common in Permissions Boundaries, and unlike lots of other keys, we always know what value it will be set to.
To reproduce:
Create a, ECS Task Role that allows the 4 required ssmmessages: permissions
Create a Permissions Boundary Policy (attached to that ECS Task Role) that includes something like the block below (i.e. requiring the aws:RequestedRegion key to match a given region, and allow anything else, or at least the above 4 permissions)
It will say that it the permissions failed due to "implicitDeny".
You can validate this using the CLI's simulate-principal-policy directly:
# This will fail
aws iam simulate-principal-policy --policy-source-arn <policy-arn> --action-names "ssmmessages:CreateControlChannel"
{
"EvaluationResults": [
...
"EvalDecision": "implicitDeny",
...
"PermissionsBoundaryDecisionDetail": {
"AllowedByPermissionsBoundary": false
}
]
}
# This will succeed:
aws iam simulate-principal-policy --policy-source-arn <policy-arn> --action-names "ssmmessages:CreateControlChannel" --context-entries ContextKeyName=aws:RequestedRegion,ContextKeyValues=us-east-1,ContextKeyType=string
Could you set other context keys and/or allow a user-specified way of specifying other context keys? Sure. But this one is "easy" and common enough, that I think this script should always set it.
The text was updated successfully, but these errors were encountered:
There are probably lots of other keys that this applies to, but this key in particular is probably very common in Permissions Boundaries, and unlike lots of other keys, we always know what value it will be set to.
To reproduce:
ssmmessages:
permissionsIt will say that it the permissions failed due to "implicitDeny".
You can validate this using the CLI's
simulate-principal-policy
directly:Could you set other context keys and/or allow a user-specified way of specifying other context keys? Sure. But this one is "easy" and common enough, that I think this script should always set it.
The text was updated successfully, but these errors were encountered: