Skip to content

Commit cb868af

Browse files
committed
revamp iam
1 parent 912d749 commit cb868af

File tree

1 file changed

+24
-20
lines changed
  • src/content/docs/aws/services

1 file changed

+24
-20
lines changed

src/content/docs/aws/services/iam.md

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: "Identity and Access Management (IAM)"
3-
linkTitle: "Identity and Access Management (IAM)"
43
description: Get started with AWS Identity and Access Management (IAM) on LocalStack
54
persistence: supported
65
tags: ["Free"]
@@ -13,8 +12,8 @@ IAM allows organizations to create and manage AWS users, groups, and roles, defi
1312
By centralizing access control, administrators can enforce the principle of least privilege, ensuring users have only the necessary permissions for their tasks.
1413

1514
LocalStack allows you to use the IAM APIs in your local environment to create and manage users, groups, and roles, granting permissions that adhere to the principle of least privilege.
16-
The supported APIs are available on our [API coverage page]({{< ref "references/coverage/coverage_iam" >}}), which provides information on the extent of IAM's integration with LocalStack.
17-
The policy coverage is documented in the [IAM coverage documentation]({{< ref "iam-coverage" >}}).
15+
The supported APIs are available on our [API coverage page](), which provides information on the extent of IAM's integration with LocalStack.
16+
The policy coverage is documented in the [IAM coverage documentation]().
1817

1918
## Getting started
2019

@@ -26,9 +25,9 @@ We will demonstrate how you can create a new user named `test`, create an access
2625
By default, in the absence of custom credentials configuration, all requests to LocalStack run under the administrative root user.
2726
Run the following command to use the [`GetCallerIdentity`](https://docs.aws.amazon.com/cli/latest/reference/sts/get-caller-identity.html) API to confirm that the request is running under the root user:
2827

29-
{{< command >}}
30-
$ awslocal sts get-caller-identity
31-
{{< / command >}}
28+
```bash
29+
awslocal sts get-caller-identity
30+
```
3231

3332
You can see an output similar to the following:
3433

@@ -43,16 +42,16 @@ You can see an output similar to the following:
4342
You can now create a new user named `test` using the [`CreateUser`](https://docs.aws.amazon.com/cli/latest/reference/iam/create-user.html) API.
4443
Run the following command:
4544

46-
{{< command >}}
47-
$ awslocal iam create-user --user-name test
48-
{{< / command >}}
45+
```bash
46+
awslocal iam create-user --user-name test
47+
```
4948

5049
You can now create an access key pair for the user using the [`CreateAccessKey`](https://docs.aws.amazon.com/cli/latest/reference/iam/create-access-key.html) API.
5150
Run the following command:
5251

53-
{{< command >}}
54-
$ awslocal iam create-access-key --user-name test
55-
{{< / command >}}
52+
```bash
53+
awslocal iam create-access-key --user-name test
54+
```
5655

5756
You can see an output similar to the following:
5857

@@ -72,15 +71,20 @@ You can see an output similar to the following:
7271
You can save the `AccessKeyId` and `SecretAccessKey` values, and export them in the environment to run commands under the `test` user.
7372
Run the following command:
7473

75-
{{< command >}}
76-
$ export AWS_ACCESS_KEY_ID=LKIAQAAAAAAAGFWKCM5F AWS_SECRET_ACCESS_KEY=DUulXk2N2yD6rgoBBR9A/5iXa6dBcLyDknr925Q5
77-
$ awslocal sts get-caller-identity
74+
```bash
75+
export AWS_ACCESS_KEY_ID=LKIAQAAAAAAAGFWKCM5F AWS_SECRET_ACCESS_KEY=DUulXk2N2yD6rgoBBR9A/5iXa6dBcLyDknr925Q5
76+
awslocal sts get-caller-identity
77+
```
78+
79+
You can see an output similar to the following:
80+
81+
```bash
7882
{
7983
"UserId": "b2yxf5g824zklfx5ry8o",
8084
"Account": "000000000000",
8185
"Arn": "arn:aws:iam::000000000000:user/test"
8286
}
83-
{{< / command >}}
87+
```
8488

8589
You can see that the request is now running under the `test` user.
8690

@@ -89,7 +93,7 @@ You can see that the request is now running under the `test` user.
8993
The LocalStack Web Application provides a Resource Browser for managing IAM users, groups, and roles.
9094
You can access the Resource Browser by opening the LocalStack Web Application in your browser, navigating to the **Resources** section, and then clicking on **IAM** under the **Security Identity Compliance** section.
9195

92-
<img src="iam-resource-browser.png" alt="IAM Resource Browser" title="IAM Resource Browser" width="900" />
96+
![IAM Resource Browser](/images/aws/iam-resource-browser.png)
9397

9498
The Resource Browser allows you to perform the following actions:
9599

@@ -103,11 +107,11 @@ The Resource Browser allows you to perform the following actions:
103107
LocalStack provides various tools to help you generate, test, and enforce IAM policies more efficiently.
104108

105109
- **IAM Policy Stream**: IAM Policy Stream provides a real-time view of API calls and the corresponding IAM policies they generate, simplifying permission management and ensuring correct permissions are assigned.
106-
Learn more in the [IAM Policy Stream documentation]({{< ref "user-guide/security-testing/iam-policy-stream" >}}).
110+
Learn more in the [IAM Policy Stream documentation](/aws/capabilities/security-testing/iam-policy-stream).
107111
- **IAM Policy Enforcement**: This configuration enforces IAM policies when interacting with local cloud APIs, simulating a real AWS environment.
108-
For additional information, refer to the [IAM Policy Enforcement documentation]({{< ref "iam-enforcement" >}}).
112+
For additional information, refer to the [IAM Policy Enforcement documentation](/aws/capabilities/security-testing/iam-policy-enforcement).
109113
- **Explainable IAM**: Explainable IAM logs outputs related to failed policy evaluations directly to LocalStack logs, aiding in the identification of necessary policies for successful requests.
110-
More details are available in the [Explainable IAM documentation]({{< ref "explainable-iam" >}}).
114+
More details are available in the [Explainable IAM documentation](/aws/capabilities/security-testing/explainable-iam).
111115

112116
## Examples
113117

0 commit comments

Comments
 (0)