Closed four-codes closed 1 year ago
managed policy
"IAM"
resource."role"
option."create role"
option. then we have to select the identity type & use case for API Gateway."Next"
button, We have to enter the "Role Name"
in the name of role-apigateway-ashli-001-dev-accessAllAwsResources format."create role"
button.Permissions
for "AdministratorAccess".@fourtimes Show me the API GATEWAY POLICY JSON.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"apigateway:*"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "*",
"Resource": "*"
}
]
}
Do not use visual editor @fourtimes @rio-ke
@fourtimes The JSON above represents a trusted relationship.
@januo-io Not sure how to find it.
Select the role and you may find in the JSON tab.
All resources, like admin privileges, are significant
In this case, we don't know how many resources are available today and tomorrow. We can provide the admin privileges; it should be fine.
Custom Policy
IAM
resource.IAM
resource, click on the "Roles"
option.API gateway
use case & without selecting any policies & the name of role should be role-apigateway-ashli-001-dev-accessAllAwsResources
.Permissions
Option & click on the Add Permission
& click on the Attach Policies
create policy
option.JSON
option.create the custom policy for Administrator Access
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "*",
"Resource": "*"
}
]
}
Next
button & enter the policy name in the name of policy-ashli-001-apigateway-adminaccess
& create the policy using the create policy
button.Roles
menurole-apigateway-ashli-001-dev-accessAllAwsResources
Permissions
Option & click on the Add Permission
& click on the Attach Policies
policy-ashli-001-apigateway-adminaccess
policy & click on Add Permission
Why did you add the apiGateway Policy @fourtimes ?
@januo-io i don't read question properly? that's why i made a mistake.
ApiGateway is a component of a source resource. Within a resource, it can be accessed to interact with anything, such as localhost.
Awesome
your apigateway role name should resemble "role-apigateway-januo-001-env-purpose."