Learn R Programming

paws.security.identity (version 0.1.12)

iam_attach_role_policy: Attaches the specified managed policy to the specified IAM role

Description

Attaches the specified managed policy to the specified IAM role. When you attach a managed policy to a role, the managed policy becomes part of the role's permission (access) policy.

You cannot use a managed policy as the role's trust policy. The role's trust policy is created at the same time as the role, using create_role. You can update a role's trust policy using update_assume_role_policy.

Use this API to attach a managed policy to a role. To embed an inline policy in a role, use put_role_policy. For more information about policies, see Managed Policies and Inline Policies in the IAM User Guide.

Usage

iam_attach_role_policy(RoleName, PolicyArn)

Value

An empty list.

Arguments

RoleName

[required] The name (friendly name, not ARN) of the role to attach the policy to.

This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-

PolicyArn

[required] The Amazon Resource Name (ARN) of the IAM policy you want to attach.

For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces in the AWS General Reference.

Request syntax

svc$attach_role_policy(
  RoleName = "string",
  PolicyArn = "string"
)

Examples

Run this code
if (FALSE) {
# The following command attaches the AWS managed policy named
# ReadOnlyAccess to the IAM role named ReadOnlyRole.
svc$attach_role_policy(
  PolicyArn = "arn:aws:iam::aws:policy/ReadOnlyAccess",
  RoleName = "ReadOnlyRole"
)
}

Run the code above in your browser using DataLab