Learn R Programming

paws.security.identity (version 0.1.0)

iam_create_service_linked_role: Creates an IAM role that is linked to a specific AWS service

Description

Creates an IAM role that is linked to a specific AWS service. The service controls the attached policies and when the role can be deleted. This helps ensure that the service is not broken by an unexpectedly changed or deleted role, which could put your AWS resources into an unknown state. Allowing the service to control the role helps improve service stability and proper cleanup when a service and its role are no longer needed. For more information, see Using Service-Linked Roles in the IAM User Guide.

Usage

iam_create_service_linked_role(AWSServiceName, Description,
  CustomSuffix)

Arguments

AWSServiceName

[required] The service principal for the AWS service to which this role is attached. You use a string similar to a URL but without the http:// in front. For example: elasticbeanstalk.amazonaws.com.

Service principals are unique and case-sensitive. To find the exact service principal for your service-linked role, see AWS Services That Work with IAM in the IAM User Guide and look for the services that have Yes in the Service-Linked Role column. Choose the Yes link to view the service-linked role documentation for that service.

Description

The description of the role.

CustomSuffix

A string that you provide, which is combined with the service-provided prefix to form the complete role name. If you make multiple requests for the same service, then you must supply a different CustomSuffix for each request. Otherwise the request fails with a duplicate role name error. For example, you could add -1 or -debug to the suffix.

Some services do not support the CustomSuffix parameter. If you provide an optional suffix and the operation fails, try the operation again without the suffix.

Request syntax

svc$create_service_linked_role(
  AWSServiceName = "string",
  Description = "string",
  CustomSuffix = "string"
)

Details

To attach a policy to this service-linked role, you must make the request using the AWS service that depends on this role.