Difference between revisions of "IAM policy: AmazonS3FullAccess"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
[[arn:aws:iam]]::aws:[[policy]]/AmazonS3FullAccess | [[arn:aws:iam]]::aws:[[policy]]/AmazonS3FullAccess | ||
− | aws iam attach-role-policy --role-name eksctl-YOUR_CLUSTER-NAME-nodegroup-standar-NodeInstanceRole-KOHNsadE2Zx --policy-arn 'arn:aws:iam::aws:policy/AmazonS3FullAccess' | + | [[aws iam attach-role-policy]] --role-name eksctl-YOUR_CLUSTER-NAME-nodegroup-standar-NodeInstanceRole-KOHNsadE2Zx --policy-arn 'arn:aws:iam::aws:policy/AmazonS3FullAccess' |
(no output) | (no output) | ||
Revision as of 11:35, 28 June 2022
arn:aws:iam::aws:policy/AmazonS3FullAccess
aws iam attach-role-policy --role-name eksctl-YOUR_CLUSTER-NAME-nodegroup-standar-NodeInstanceRole-KOHNsadE2Zx --policy-arn 'arn:aws:iam::aws:policy/AmazonS3FullAccess' (no output)
See also
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: