Simulate a set of policies with a list of API operations and resources to determine the policies' effective permissions. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to.
| CallerArn | The ARN of the IAM user that you want to specify as the simulated caller of the API operations. |
| ActionNames | A list of names of API operations to evaluate in the simulation. |
| PolicyInputList | An optional list of additional policy documents to include in the simulation. |
| PermissionsBoundaryPolicyInputList | An optional list of additional PermissionBoundaryPolicy documents to include in the simulation. Only 1 is allowed. |
| ContextEntries | A list of context keys and corresponding values for the simulation to use. |
| Marker | Marker is obtained from paginated response from the previous query. Use this only if the response indicates it is truncated. |
| MaxItems | Indicates the maximum number of elements to be returned in the response. |
This call has no restrictions.
No Request Payload
No Response Body
NOTE: Policy must be encoded
https://192.168.0.0::4443/iam?Action=SimulateCustomPolicy
&ActionNames.member.1=s3:ListBucket
&ResourceArns.member.1="arn:aws:s3:::teambucket"
&PolicyInputList.member.1='{
"Version":"2012-10-17",
"Statement":{
"Effect":"Allow",
"Action":"s3:*",
"Resource":"*"
}
}'
&CallerArn=urn:ecs:iam::s3:user/test
&ResourcePolicy='{
"Version":"2012-10-17",
"Statement":{
"Principal":"*",
"Effect":"Allow",
"Action":"s3:ListBucket",
"Resource":"arn:aws:s3:::teambucket"
}
}
Accept: appliction/json
X-SDS-AUTH-TOKEN: <AUTH_TOKEN>
x-emc-namespace: <namespace>
HTTP/1.1 200 OK
Content-Type: application/json
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<SimulateCustomPolicyResponse>
<SimulateCustomPolicyResult>
<IsTruncated>false</IsTruncated>
<EvaluationResults>
<member>
<MatchedStatements>
<member>
<SourcePolicyId>p1</SourcePolicyId>
</member>
<member>
<SourcePolicyId>Resource Policy</SourcePolicyId>
</member>
</MatchedStatements>
<MissingContextValues/>
<EvalResourceName>arn:aws:s3:::teambucket</EvalResourceName>
<EvalDecision>allowed</EvalDecision>
<EvalActionName>s3:ListBucket</EvalActionName>
<ResourceSpecificResults>
<member>
<MatchedStatements>
<member>
<SourcePolicyId>p1</SourcePolicyId>
</member>
<member>
<SourcePolicyId>Resource Policy</SourcePolicyId>
</member>
</MatchedStatements>
<MissingContextValues/>
<EvalResourceName>arn:aws:s3:::teambucket</EvalResourceName>
<EvalResourceDecision>allowed</EvalResourceDecision>
</member>
</ResourceSpecificResults>
</member>
</EvaluationResults>
</SimulateCustomPolicyResult>
<ResponseMetadata>
<RequestId>0af9f5b8:17178fe9282:1086d:0</RequestId>
</ResponseMetadata>
</SimulateCustomPolicyResponse>