Skip to content
This repository was archived by the owner on Jan 14, 2025. It is now read-only.

Commit cd98aad

Browse files
committed
Added instructions in 9_Cleanup to instruct users to manually detach IAM Policy from Auth Role
1 parent 71f8136 commit cd98aad

File tree

3 files changed

+10
-0
lines changed

3 files changed

+10
-0
lines changed

Auth/9_CleanUp/README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,16 @@
4848
aws cognito-idp list-user-pools --max-results 10
4949
```
5050

51+
#### Detach CognitoIdentityPoolAuthStandardPolicy IAM Policy
52+
53+
1. Before you delete the backend stack, you will need to remove the IAM Policy that you manually attached to the **Auth** role.
54+
55+
Navigate to the Identity and Access Management (IAM) Console and search for the **Auth** role and click into it.
56+
57+
![Find Auth Role](../images/iam-cleanup-findAuthRole.png)
58+
59+
2. On the Role Summary page, find the policy named **WildRydesAPI-StandardUserPolicy** in the Permissions tab. Once you locate the policy, click the **X** to remove this policy from the IAM Role. A popup window will ask you to confirm that you want to remove it - click the red **Detach** button.
60+
5161
#### Remove WildRydes Backend
5262

5363
1. Next, you will need to remove the *CloudFormation stack* for the API. This stack should be named **WildRydesBackend**. Once again, from the your terminal window, run:
219 KB
Loading
151 KB
Loading

0 commit comments

Comments
 (0)