Difference between revisions of "AWS: AccessDeniedException"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
An error occurred (AccessDeniedException) when calling the [[GetCostAndUsage]] operation: User not enabled for [[cost explorer]] access | An error occurred (AccessDeniedException) when calling the [[GetCostAndUsage]] operation: User not enabled for [[cost explorer]] access | ||
− | An error occurred (AccessDeniedException) when calling the [[ListAccounts]] operation: You don't have permissions to access this resource. | + | An error occurred (AccessDeniedException) when calling the [[ListAccounts]] operation: [[You don't have permissions to access this resource.]] |
An error occurred ([[AccessDeniedException]]) when calling the DescribeImageScanFindings operation: User: arn:aws:iam::012345678912:user/your-read-only-user is not authorized to perform: [[inspector2:ListFindings]] on resource: arn:aws:inspector2:eu-central-1:012345678912:/findings/list | An error occurred ([[AccessDeniedException]]) when calling the DescribeImageScanFindings operation: User: arn:aws:iam::012345678912:user/your-read-only-user is not authorized to perform: [[inspector2:ListFindings]] on resource: arn:aws:inspector2:eu-central-1:012345678912:/findings/list |
Revision as of 10:31, 3 September 2023
An error occurred (AccessDeniedException) when calling the GetCostAndUsage operation: User not enabled for cost explorer access
An error occurred (AccessDeniedException) when calling the ListAccounts operation: You don't have permissions to access this resource.
An error occurred (AccessDeniedException) when calling the DescribeImageScanFindings operation: User: arn:aws:iam::012345678912:user/your-read-only-user is not authorized to perform: inspector2:ListFindings on resource: arn:aws:inspector2:eu-central-1:012345678912:/findings/list
Error: unable to describe cluster control plane: AccessDeniedException: User: arn:aws:iam::0987654321:user/YOUR_USER is not authorized to perform: eks:DescribeCluster on resource: arn:aws:eks:xx-east-2:0987654321:cluster/my-eks-cluster-name with an explicit deny
Related
aws iam list-attached-user-policies
aws sts get-caller-identity
AccessDenied
- AWS policies
AWSOrganizationsNotInUseException
- GCP: AccessDeniedException
See also
aws iam
[create-user
,create-group, get-user
,list-users
|list-policies
|list-attached-user-policies
|attach-user-policy
|list-attached-user-policies
|list-roles
|get-account-summary
|put-group-policy | put-role-policy | put-user-policy
|create-login-profile
|aws iam delete-virtual-mfa-device
|aws iam list-virtual-mfa-devices
|aws iam create-saml-provider
|aws iam list-account-aliases
|aws iam create-role | aws iam change-password| enable-mfa-device | list-instance-profiles
- AWS CLI,
aws
[configure
|iam
|ec2
|ecs
|eks
|s3
|rds
|sts
|cloudwatch
|cloudformation
|cloudfront
|eventbridge
|lambda
],aws configure list
,.aws/credentials
,.aws/config
,~/.aws/cli/alias
,--output [ table | json | text | XXX ]
, Aws cli environmental variables:AWS_PROFILE
,AWS_DEFAULT_REGION, AWS_REGION
,AWS_CLI_AUTO_PROMPT
,AWS_SESSION_TOKEN
,aws list all
,auto-prompt
,--version
,whoamiaws, --filters, --help
Advertising: