Difference between revisions of "AWS managed policy: AdministratorAccess"
Jump to navigation
Jump to search
Line 9: | Line 9: | ||
* <code>[[AmazonEKSClusterPolicy]]</code> | * <code>[[AmazonEKSClusterPolicy]]</code> | ||
* [[AWS managed policies]]: <code>[[ReadOnlyAccess]], [[SecurityAudit]]</code> | * [[AWS managed policies]]: <code>[[ReadOnlyAccess]], [[SecurityAudit]]</code> | ||
− | * [[AWS roles]]: <code>[[AdministratorRole]] | + | * [[AWS roles]]: <code>[[AdministratorRole]], [[OrganizationAccountAccessRole]]</code> |
− | |||
== See also == | == See also == |
Revision as of 05:34, 6 September 2022
Do not provide access to change AWS support plans.
arn:aws:iam::aws:policy/AdministratorAccess
Related terms
root
- Default usernames
aws iam list-attached-user-policies --user-name
- List of AWS policies
AmazonEKSClusterPolicy
- AWS managed policies:
ReadOnlyAccess, SecurityAudit
- AWS roles:
AdministratorRole, OrganizationAccountAccessRole
See also
- AWS managed policies:
ReadOnlyAccess, ViewOnlyAccess, AdministratorAccess, SecurityAudit, ViewBilling, AmazonEKSClusterPolicy
, List of AWS policies - AWS IAM role, AWS service roles, AWS IAM Roles Anywhere: [
list-roles | get-role | create-role | put-role-policy | create-service-linked-role | attach-role-policy | update-role | add-role-to-instance-profile ], aws ec2 describe-iam-instance-profile-associations ]
, IAM roles for EC2 instances,AWSServiceRoleForAutoScaling
Advertising: