This policy of yours returns 2 problem ( putting account number is not one of them)
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam:::role/trailblazer"
},
"Action": "sts:AssumeRole",
"Condition": {}
}
]
}
Ln 4, Col 4 Missing Resource: Add a Resource or NotResource element to the policy statement. Learn more
Ln 6, Col 19 Unsupported Principal: The policy type IDENTITY_POLICY does not support the Principal element. Remove the Principal element. Learn more
==
another question is there going to be 2 separate policies?
This policy of yours returns 2 problem ( putting account number is not one of them) { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam:::role/trailblazer"
},
"Action": "sts:AssumeRole",
"Condition": {}
}
]
}
Ln 4, Col 4 Missing Resource: Add a Resource or NotResource element to the policy statement. Learn more Ln 6, Col 19 Unsupported Principal: The policy type IDENTITY_POLICY does not support the Principal element. Remove the Principal element. Learn more
==
another question is there going to be 2 separate policies?