Cloud Enterprise Object Storage REST API

Search (SHIFT+S)




Modified since last release

Simulate Custom Policy

POST SimulateCustomPolicy

Simulate a set of policies with a list of API operations and resources to determine the policies' effective permissions. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to.


Query Parameters

CallerArnThe ARN of the IAM user that you want to specify as the simulated caller of the API operations.
ActionNamesA list of names of API operations to evaluate in the simulation.
PolicyInputListAn optional list of additional policy documents to include in the simulation.
PermissionsBoundaryPolicyInputListAn optional list of additional PermissionBoundaryPolicy documents to include in the simulation. Only 1 is allowed.
ContextEntriesA list of context keys and corresponding values for the simulation to use.
MarkerMarker is obtained from paginated response from the previous query. Use this only if the response indicates it is truncated.
MaxItemsIndicates the maximum number of elements to be returned in the response.

Required Roles

This call has no restrictions.


Request Payload

No Request Payload


Response Body

No Response Body


Examples

Request
NOTE:  Policy must be encoded
https://192.168.0.0::4443/iam?Action=SimulateCustomPolicy
&ActionNames.member.1=s3:ListBucket
&ResourceArns.member.1="arn:aws:s3:::teambucket"
&PolicyInputList.member.1='{
  "Version":"2012-10-17",
  "Statement":{
    "Effect":"Allow",
    "Action":"s3:*",
    "Resource":"*"
  }
}'
&CallerArn=urn:ecs:iam::s3:user/test
&ResourcePolicy='{
    "Version":"2012-10-17",
    "Statement":{
        "Principal":"*",
        "Effect":"Allow",
        "Action":"s3:ListBucket",
        "Resource":"arn:aws:s3:::teambucket"
    }
}
Accept: appliction/json
X-SDS-AUTH-TOKEN: <AUTH_TOKEN>
x-emc-namespace: <namespace>
Response
HTTP/1.1 200 OK
Content-Type: application/json

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<SimulateCustomPolicyResponse>
    <SimulateCustomPolicyResult>
        <IsTruncated>false</IsTruncated>
        <EvaluationResults>
            <member>
                <MatchedStatements>
                    <member>
                        <SourcePolicyId>p1</SourcePolicyId>
                    </member>
                    <member>
                        <SourcePolicyId>Resource Policy</SourcePolicyId>
                    </member>
                </MatchedStatements>
                <MissingContextValues/>
                <EvalResourceName>arn:aws:s3:::teambucket</EvalResourceName>
                <EvalDecision>allowed</EvalDecision>
                <EvalActionName>s3:ListBucket</EvalActionName>
                <ResourceSpecificResults>
                    <member>
                        <MatchedStatements>
                            <member>
                                <SourcePolicyId>p1</SourcePolicyId>
                            </member>
                            <member>
                                <SourcePolicyId>Resource Policy</SourcePolicyId>
                            </member>
                        </MatchedStatements>
                        <MissingContextValues/>
                        <EvalResourceName>arn:aws:s3:::teambucket</EvalResourceName>
                        <EvalResourceDecision>allowed</EvalResourceDecision>
                    </member>
                </ResourceSpecificResults>
            </member>
        </EvaluationResults>
    </SimulateCustomPolicyResult>
    <ResponseMetadata>
        <RequestId>0af9f5b8:17178fe9282:1086d:0</RequestId>
    </ResponseMetadata>
</SimulateCustomPolicyResponse>