You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/aws/services/iam.md
+24-20Lines changed: 24 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,5 @@
1
1
---
2
2
title: "Identity and Access Management (IAM)"
3
-
linkTitle: "Identity and Access Management (IAM)"
4
3
description: Get started with AWS Identity and Access Management (IAM) on LocalStack
5
4
persistence: supported
6
5
tags: ["Free"]
@@ -13,8 +12,8 @@ IAM allows organizations to create and manage AWS users, groups, and roles, defi
13
12
By centralizing access control, administrators can enforce the principle of least privilege, ensuring users have only the necessary permissions for their tasks.
14
13
15
14
LocalStack allows you to use the IAM APIs in your local environment to create and manage users, groups, and roles, granting permissions that adhere to the principle of least privilege.
16
-
The supported APIs are available on our [API coverage page]({{< ref "references/coverage/coverage_iam" >}}), which provides information on the extent of IAM's integration with LocalStack.
17
-
The policy coverage is documented in the [IAM coverage documentation]({{< ref "iam-coverage" >}}).
15
+
The supported APIs are available on our [API coverage page](), which provides information on the extent of IAM's integration with LocalStack.
16
+
The policy coverage is documented in the [IAM coverage documentation]().
18
17
19
18
## Getting started
20
19
@@ -26,9 +25,9 @@ We will demonstrate how you can create a new user named `test`, create an access
26
25
By default, in the absence of custom credentials configuration, all requests to LocalStack run under the administrative root user.
27
26
Run the following command to use the [`GetCallerIdentity`](https://docs.aws.amazon.com/cli/latest/reference/sts/get-caller-identity.html) API to confirm that the request is running under the root user:
28
27
29
-
{{< command >}}
30
-
$ awslocal sts get-caller-identity
31
-
{{< / command >}}
28
+
```bash
29
+
awslocal sts get-caller-identity
30
+
```
32
31
33
32
You can see an output similar to the following:
34
33
@@ -43,16 +42,16 @@ You can see an output similar to the following:
43
42
You can now create a new user named `test` using the [`CreateUser`](https://docs.aws.amazon.com/cli/latest/reference/iam/create-user.html) API.
44
43
Run the following command:
45
44
46
-
{{< command >}}
47
-
$ awslocal iam create-user --user-name test
48
-
{{< / command >}}
45
+
```bash
46
+
awslocal iam create-user --user-name test
47
+
```
49
48
50
49
You can now create an access key pair for the user using the [`CreateAccessKey`](https://docs.aws.amazon.com/cli/latest/reference/iam/create-access-key.html) API.
51
50
Run the following command:
52
51
53
-
{{< command >}}
54
-
$ awslocal iam create-access-key --user-name test
55
-
{{< / command >}}
52
+
```bash
53
+
awslocal iam create-access-key --user-name test
54
+
```
56
55
57
56
You can see an output similar to the following:
58
57
@@ -72,15 +71,20 @@ You can see an output similar to the following:
72
71
You can save the `AccessKeyId` and `SecretAccessKey` values, and export them in the environment to run commands under the `test` user.
You can see that the request is now running under the `test` user.
86
90
@@ -89,7 +93,7 @@ You can see that the request is now running under the `test` user.
89
93
The LocalStack Web Application provides a Resource Browser for managing IAM users, groups, and roles.
90
94
You can access the Resource Browser by opening the LocalStack Web Application in your browser, navigating to the **Resources** section, and then clicking on **IAM** under the **Security Identity Compliance** section.
The Resource Browser allows you to perform the following actions:
95
99
@@ -103,11 +107,11 @@ The Resource Browser allows you to perform the following actions:
103
107
LocalStack provides various tools to help you generate, test, and enforce IAM policies more efficiently.
104
108
105
109
-**IAM Policy Stream**: IAM Policy Stream provides a real-time view of API calls and the corresponding IAM policies they generate, simplifying permission management and ensuring correct permissions are assigned.
106
-
Learn more in the [IAM Policy Stream documentation]({{< ref "user-guide/security-testing/iam-policy-stream" >}}).
110
+
Learn more in the [IAM Policy Stream documentation](/aws/capabilities/security-testing/iam-policy-stream).
107
111
-**IAM Policy Enforcement**: This configuration enforces IAM policies when interacting with local cloud APIs, simulating a real AWS environment.
108
-
For additional information, refer to the [IAM Policy Enforcement documentation]({{< ref "iam-enforcement" >}}).
112
+
For additional information, refer to the [IAM Policy Enforcement documentation](/aws/capabilities/security-testing/iam-policy-enforcement).
109
113
-**Explainable IAM**: Explainable IAM logs outputs related to failed policy evaluations directly to LocalStack logs, aiding in the identification of necessary policies for successful requests.
110
-
More details are available in the [Explainable IAM documentation]({{< ref "explainable-iam" >}}).
114
+
More details are available in the [Explainable IAM documentation](/aws/capabilities/security-testing/explainable-iam).
0 commit comments