AWS policy
Policies:
iam:ChangePassword
(Policy)
Errors
Cannot attach a Service Role Policy to a Customer Role.
An error occurred (NoSuchBucketPolicy) when calling the GetBucketPolicy operation: The bucket policy does not exist
Type
aws iam policy commands
aws iam create-policy
aws iam list-policies
aws iam list-attached-user-policies --user-name
aws iam list-group-policies
aws iam list-role-policies
aws iam put-group-policy
aws iam put-role-policy
aws iam put-user-policy
aws iam attach-role-policy
aws iam attach-group-policy
Related terms
- Amazon CloudFront
- AWS Role
- AWS managed policy: AmazonS3ReadOnlyAcces
- Terraform resource: aws iam policy
See also
- AWS policies: managed policies, Job functions, AWS trust policy, AWS Service Control Policy (SCP), Resource-based policies, Identity-based policies, permissions boundaries,
"Resource":
, Job function, AWS Policy Generator,s3:, lambda:, cloudwatch:, AWSSecretsManagerReadWriteAccess
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: