Difference between revisions of "An error occurred (AccessDenied)"
Jump to navigation
Jump to search
(4 intermediate revisions by the same user not shown) | |||
Line 23: | Line 23: | ||
(combined from similar events): failed to provision volume with [[StorageClass]] "[[gp2]]": rpc error: code = Internal desc = Could not create volume "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": could not create volume in EC2: WebIdentityErr: failed to retrieve credentials caused by: [[AccessDenied]]: Not authorized to perform [[sts:AssumeRoleWithWebIdentity]] status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890 | (combined from similar events): failed to provision volume with [[StorageClass]] "[[gp2]]": rpc error: code = Internal desc = Could not create volume "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": could not create volume in EC2: WebIdentityErr: failed to retrieve credentials caused by: [[AccessDenied]]: Not authorized to perform [[sts:AssumeRoleWithWebIdentity]] status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890 | ||
+ | |||
+ | │ [[Error: reading inline policies for IAM]] role mycluster-eks-node-group-2023100555912474437000009, error: AccessDenied: | ||
== Terraform == | == Terraform == | ||
[[Error: Error putting S3 policy: AccessDenied: Access Denied]] | [[Error: Error putting S3 policy: AccessDenied: Access Denied]] | ||
+ | [[Error: creating Amazon S3 (Simple Storage) Bucket]] (my-tf-test-bucket): [[AccessDenied: Access Denied]] | ||
== Related == | == Related == | ||
Line 32: | Line 35: | ||
* <code>[[aws iam list-virtual-mfa-devices --output text]]</code> | * <code>[[aws iam list-virtual-mfa-devices --output text]]</code> | ||
* <code>[[AccessDeniedException]]</code> | * <code>[[AccessDeniedException]]</code> | ||
+ | * <code>[[InvalidAccessKeyId]]</code> | ||
+ | * <code>[[AuthorizationHeaderMalformed]]</code> | ||
+ | * <code>[[iam:DeleteRole]]</code> | ||
== See also == | == See also == |
Latest revision as of 10:51, 8 March 2024
An error occurred (AccessDenied) when calling the ListBuckets operation: Access Denied
An error occurred (AccessDenied) when calling the ListUsers operation: User: arn:aws:iam::146910341356:user/MY_USERNAME is not authorized to perform: iam:ListUsers on resource: arn:aws:iam::146910241356:user/
An error occurred (AccessDenied) when calling the DescribeDBInstances operation: User: arn:aws:iam::924058868456:user/MyUSERNAME is not authorized to perform: rds:DescribeDBInstances on resource: arn:aws:rds:ap-south-1:924058868456:db:* with an explicit deny in an identity-based policy
An error occurred (AccessDenied) when calling the ListUsers operation: User: arn:aws:iam::924058868456:user/MyUSERNAME is not authorized to perform: iam:ListUsers on resource: arn:aws:rds:ap-south-1:924058868456:db:* with an explicit deny
An error occurred (AccessDenied) when calling the ChangePassword operation: User: arn:aws:iam::146910341356:user/MY_USERNAME is not authorized to perform: iam:ChangePassword on resource: user MY_USERNAME with an explicit deny
Error: error creating IAM Role (education-eks-Z0u0TjYd20220217012453602100000003): AccessDenied: User: arn:aws:iam::123456789:user/YOUR_USER is not authorized to perform: iam:CreateRole
[ERROR] An error occurred (AccessDenied) when calling the RestoreDBInstanceToPointInTime operation: User: arn:aws:iam::0123456789:user/YOUR_USER is not authorized to perform: rds:RestoreDBInstanceToPointInTime on resource: arn:aws:rds:us-east-1:0123456789:db:XXXXXX because no identity-based policy allows the rds:RestoreDBInstanceToPointInTime action
An error occurred (AccessDenied) when calling the ListAccountAliases operation: User: arn:aws:iam::0123456789:user/YOUR_USER is not authorized to perform: iam:ListAccountAliases on resource: *
An error occurred (AccessDenied) when calling the ListAttachedUserPolicies operation:
An error occurred (AccessDenied) when calling the GetUser operation: User: arn:aws:sts::0123456789:assumed- role/ROLE_NAME/YOURusername is not authorized to perform: iam:GetUser on resource: user YOURusername
An error occurred (AccessDenied) when calling the AssumeRole operation: User: XXXX is not authorized to perform sts:AssumeRole on resource: arn:aws:sts::1234567890:assumed-role/AWSReservedSSO_AdministratorAccess_123214324235/your-user
(combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = Could not create volume "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": could not create volume in EC2: WebIdentityErr: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform sts:AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890
│ Error: reading inline policies for IAM role mycluster-eks-node-group-2023100555912474437000009, error: AccessDenied:
Terraform[edit]
Error: Error putting S3 policy: AccessDenied: Access Denied
Error: creating Amazon S3 (Simple Storage) Bucket (my-tf-test-bucket): AccessDenied: Access Denied
Related[edit]
aws sts get-session-token --serial-number <mfa_device> --token-code <token>
aws iam list-virtual-mfa-devices --output text
AccessDeniedException
InvalidAccessKeyId
AuthorizationHeaderMalformed
iam:DeleteRole
See also[edit]
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: