Interface IRoleProps
Properties for defining an IAM Role.
public interface IRoleProps
Examples
var lambdaRole = new Role(this, "Role", new RoleProps {
AssumedBy = new ServicePrincipal("lambda.amazonaws.com"),
Description = "Example role..."
});
var stream = new Stream(this, "MyEncryptedStream", new StreamProps {
Encryption = StreamEncryption.KMS
});
// give lambda permissions to read stream
stream.GrantRead(lambdaRole);
Remarks
ExampleMetadata: infused
Properties
AssumedBy
The IAM principal (i.e. new ServicePrincipal('sns.amazonaws.com')
) which can assume this role.
IPrincipal AssumedBy { get; }
Property Value
Remarks
You can later modify the assume role policy document by accessing it via
the assumeRolePolicy
property.
Description
A description of the role.
string? Description { get; }
Property Value
Remarks
It can be up to 1000 characters long.
Default: - No description.
ExternalId
(deprecated) ID that the role assumer needs to provide when assuming this role.
[Obsolete("see {@link externalIds}")]
string? ExternalId { get; }
Property Value
Remarks
If the configured and provided external IDs do not match, the AssumeRole operation will fail.
Default: No external ID required
Stability: Deprecated
ExternalIds
List of IDs that the role assumer needs to provide one of when assuming this role.
string[]? ExternalIds { get; }
Property Value
- string[]
Remarks
If the configured and provided external IDs do not match, the AssumeRole operation will fail.
Default: No external ID required
InlinePolicies
A list of named policies to inline into this role.
IDictionary<string, PolicyDocument>? InlinePolicies { get; }
Property Value
Remarks
These policies will be
created with the role, whereas those added by addToPolicy
are added
using a separate CloudFormation resource (allowing a way around circular
dependencies that could otherwise be introduced).
Default: - No policy is inlined in the Role resource.
ManagedPolicies
A list of managed policies associated with this role.
IManagedPolicy[]? ManagedPolicies { get; }
Property Value
Remarks
You can add managed policies later using
addManagedPolicy(ManagedPolicy.fromAwsManagedPolicyName(policyName))
.
Default: - No managed policies.
MaxSessionDuration
The maximum session duration that you want to set for the specified role.
Duration? MaxSessionDuration { get; }
Property Value
- Duration
Remarks
This setting can have a value from 1 hour (3600sec) to 12 (43200sec) hours.
Anyone who assumes the role from the AWS CLI or API can use the DurationSeconds API parameter or the duration-seconds CLI parameter to request a longer session. The MaxSessionDuration setting determines the maximum duration that can be requested using the DurationSeconds parameter.
If users don't specify a value for the DurationSeconds parameter, their security credentials are valid for one hour by default. This applies when you use the AssumeRole* API operations or the assume-role* CLI operations but does not apply when you use those operations to create a console URL.
Default: Duration.hours(1)
Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
Path
The path associated with this role.
string? Path { get; }
Property Value
Remarks
For information about IAM paths, see Friendly Names and Paths in IAM User Guide.
Default: /
PermissionsBoundary
AWS supports permissions boundaries for IAM entities (users or roles).
IManagedPolicy? PermissionsBoundary { get; }
Property Value
Remarks
A permissions boundary is an advanced feature for using a managed policy to set the maximum permissions that an identity-based policy can grant to an IAM entity. An entity's permissions boundary allows it to perform only the actions that are allowed by both its identity-based policies and its permissions boundaries.
Default: - No permissions boundary.
Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
RoleName
A name for the IAM role.
string? RoleName { get; }
Property Value
Remarks
For valid values, see the RoleName parameter for the CreateRole action in the IAM API Reference.
IMPORTANT: If you specify a name, you cannot perform updates that require replacement of this resource. You can perform updates that require no or some interruption. If you must replace the resource, specify a new name.
If you specify a name, you must specify the CAPABILITY_NAMED_IAM value to acknowledge your template's capabilities. For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates.
Default: - AWS CloudFormation generates a unique physical ID and uses that ID for the role name.