There are more AWS SDK examples available in the AWS Doc SDK Examples
Use PutRolePermissionsBoundary with a CLI
The following code examples show how to use PutRolePermissionsBoundary.
- CLI
-
- AWS CLI
-
Example 1: To apply a permissions boundary based on a custom policy to an IAM role
The following
put-role-permissions-boundaryexample applies the custom policy namedintern-boundaryas the permissions boundary for the specified IAM role.aws iam put-role-permissions-boundary \ --permissions-boundaryarn:aws:iam::123456789012:policy/intern-boundary\ --role-namelambda-application-roleThis command produces no output.
Example 2: To apply a permissions boundary based on an AWS managed policy to an IAM role
The following
put-role-permissions-boundaryexample applies the AWS managedPowerUserAccesspolicy as the permissions boundary for the specified IAM role.aws iam put-role-permissions-boundary \ --permissions-boundaryarn:aws:iam::aws:policy/PowerUserAccess\ --role-namex-account-adminThis command produces no output.
For more information, see Modifying a role in the AWS IAM User Guide.
-
For API details, see PutRolePermissionsBoundary
in AWS CLI Command Reference.
-
- PowerShell
-
- Tools for PowerShell V4
-
Example 1: This example shows how to set the Permission boundary for a IAM Role. You can set AWS Managed policies or Custom policies as permission boundary.
Set-IAMRolePermissionsBoundary -RoleName MyRoleName -PermissionsBoundary arn:aws:iam::123456789012:policy/intern-boundary-
For API details, see PutRolePermissionsBoundary in AWS Tools for PowerShell Cmdlet Reference (V4).
-
- Tools for PowerShell V5
-
Example 1: This example shows how to set the Permission boundary for a IAM Role. You can set AWS Managed policies or Custom policies as permission boundary.
Set-IAMRolePermissionsBoundary -RoleName MyRoleName -PermissionsBoundary arn:aws:iam::123456789012:policy/intern-boundary-
For API details, see PutRolePermissionsBoundary in AWS Tools for PowerShell Cmdlet Reference (V5).
-