标签:des style http color os strong io for
{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowUsersToCreateDeleteTheirOwnVirtualMFADevices", "Effect": "Allow", "Action": ["iam:*VirtualMFADevice"], "Resource": ["arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:mfa/${aws:username}"] }, { "Sid": "AllowUsersToEnableSyncDisableTheirOwnMFADevices", "Effect": "Allow", "Action": [ "iam:DeactivateMFADevice", "iam:EnableMFADevice", "iam:ListMFADevices", "iam:ResyncMFADevice" ], "Resource": ["arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:user/${aws:username}"] }, { "Sid": "AllowUsersToListVirtualMFADevices", "Effect": "Allow", "Action": ["iam:ListVirtualMFADevices"], "Resource": ["arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:mfa/*"] }, { "Sid": "AllowUsersToListUsersInConsole", "Effect": "Allow", "Action": ["iam:ListUsers"], "Resource": ["arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:user/*"] } ] }Note:
David" to replace ${aws:username}
,
then this policy is attached to user David.
As with the policies for accessing user-specific Amazon object, you‘d have to create
a separate policy for each user that includes the user‘s name, and then attach each policy to the individual users.${aws:username}
variable and
evaluates the policy.Enable MFA for a user,布布扣,bubuko.com
标签:des style http color os strong io for
原文地址:http://blog.csdn.net/chuwachen/article/details/38271613