Simulate a set of IAM policies attached to an IAM entity (user, group, role) with a list of API operations and resources to determine the policies' effective permissions. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to.
CallerArn | The ARN of the IAM user that you want to specify as the simulated caller of the API operations. |
ActionNames | A list of names of API operations to evaluate in the simulation. |
PolicyInputList | An optional list of additional policy documents to include in the simulation. |
ContextEntries | A list of context keys and corresponding values for the simulation to use. |
PolicySourceArn | ARN of a user, group, or role whose policies you want to include in the simulation. |
Marker | Marker is obtained from paginated response from the previous query. Use this only if the response indicates it is truncated. |
MaxItems | Indicates the maximum number of elements to be returned in the response. |
PermissionsBoundaryPolicyInputList | An optional list of additional PermissionBoundaryPolicy documents to include in the simulation. Only 1 is allowed. |
This call has no restrictions.
No Request Payload
No Response Body
NOTE: Policy must be encoded https://192.168.0.0::4443/iam?Action=SimulatePrincipalPolicy &ActionNames.member.1=s3:GetObject &ResourceArns.member.1="arn:aws:s3:::bucket" &PolicySourceArn=arn:ecs:iam::ns1:user/testuser &PolicyInputList.member.1='{ "Version":"2012-10-17", "Statement":{ "Effect":"Allow", "Action":"s3:*", "Resource":"*" } }' Accept: appliction/json X-SDS-AUTH-TOKEN: <AUTH_TOKEN> x-emc-namespace: <namespace>
HTTP/1.1 200 OK Content-Type: application/json <?xml version="1.0" encoding="UTF-8" standalSimulatePrincipalPolicyone="yes"?> <SimulatePrincipalPolicyResponse> <SimulatePrincipalPolicyResult> <IsTruncated>false</IsTruncated> <EvaluationResults> <member> <MatchedStatements> <member> <SourcePolicyId>policy1</SourcePolicyId> </member> </MatchedStatements> <MissingContextValues/> <EvalResourceName>*</EvalResourceName> <EvalDecision>allowed</EvalDecision> <EvalActionName>s3:GetObject</EvalActionName> </member> </EvaluationResults> </SimulatePrincipalPolicyResult> <ResponseMetadata> <RequestId>0af9f5b8:17178fe9282:1086d:0</RequestId> </ResponseMetadata> </SimulatePrincipalPolicyResponse>