Simulate a set of policies with a list of API operations and resources to determine the policies' effective permissions. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to.
CallerArn | The ARN of the IAM user that you want to specify as the simulated caller of the API operations. |
ActionNames | A list of names of API operations to evaluate in the simulation. |
PolicyInputList | An optional list of additional policy documents to include in the simulation. |
PermissionsBoundaryPolicyInputList | An optional list of additional PermissionBoundaryPolicy documents to include in the simulation. Only 1 is allowed. |
ContextEntries | A list of context keys and corresponding values for the simulation to use. |
Marker | Marker is obtained from paginated response from the previous query. Use this only if the response indicates it is truncated. |
MaxItems | Indicates the maximum number of elements to be returned in the response. |
This call has no restrictions.
No Request Payload
No Response Body
NOTE: Policy must be encoded https://192.168.0.0::4443/iam?Action=SimulateCustomPolicy &ActionNames.member.1=s3:ListBucket &ResourceArns.member.1="arn:aws:s3:::teambucket" &PolicyInputList.member.1='{ "Version":"2012-10-17", "Statement":{ "Effect":"Allow", "Action":"s3:*", "Resource":"*" } }' &CallerArn=urn:ecs:iam::s3:user/test &ResourcePolicy='{ "Version":"2012-10-17", "Statement":{ "Principal":"*", "Effect":"Allow", "Action":"s3:ListBucket", "Resource":"arn:aws:s3:::teambucket" } } Accept: appliction/json X-SDS-AUTH-TOKEN: <AUTH_TOKEN> x-emc-namespace: <namespace>
HTTP/1.1 200 OK Content-Type: application/json <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <SimulateCustomPolicyResponse> <SimulateCustomPolicyResult> <IsTruncated>false</IsTruncated> <EvaluationResults> <member> <MatchedStatements> <member> <SourcePolicyId>p1</SourcePolicyId> </member> <member> <SourcePolicyId>Resource Policy</SourcePolicyId> </member> </MatchedStatements> <MissingContextValues/> <EvalResourceName>arn:aws:s3:::teambucket</EvalResourceName> <EvalDecision>allowed</EvalDecision> <EvalActionName>s3:ListBucket</EvalActionName> <ResourceSpecificResults> <member> <MatchedStatements> <member> <SourcePolicyId>p1</SourcePolicyId> </member> <member> <SourcePolicyId>Resource Policy</SourcePolicyId> </member> </MatchedStatements> <MissingContextValues/> <EvalResourceName>arn:aws:s3:::teambucket</EvalResourceName> <EvalResourceDecision>allowed</EvalResourceDecision> </member> </ResourceSpecificResults> </member> </EvaluationResults> </SimulateCustomPolicyResult> <ResponseMetadata> <RequestId>0af9f5b8:17178fe9282:1086d:0</RequestId> </ResponseMetadata> </SimulateCustomPolicyResponse>