기계 번역으로 제공되는 번역입니다. 제공된 번역과 원본 영어의 내용이 상충하는 경우에는 영어 버전이 우선합니다.
AmazonLexFullAccess
설명:를 통해 Amazon Lex에 대한 전체 액세스를 제공합니다 AWS Management Console. 또한 Lex 서비스 연결 역할을 생성하고 Lex에 제한된 Lambda 함수 세트를 호출할 수 있는 권한을 부여할 수 있는 액세스를 제공합니다.
AmazonLexFullAccess
은(는) AWS 관리형 정책입니다.
이 정책 사용
사용자, 그룹 및 역할에 AmazonLexFullAccess
를 연결할 수 있습니다.
정책 세부 정보
-
Type: AWS managed 정책
-
생성 시간: 2017년 4월 11일, 23:20 UTC
-
편집된 시간: 2024년 4월 16일, 20:06 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonLexFullAccess
정책 버전
정책 버전: v9(기본값)
정책의 기본 버전은 정책에 대한 권한을 정의하는 버전입니다. 정책이 있는 사용자 또는 역할이 AWS 리소스에 대한 액세스를 요청하면는 정책의 기본 버전을 AWS 확인하여 요청을 허용할지 여부를 결정합니다.
JSON 정책 문서
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "AmazonLexFullAccessStatement1", "Effect" : "Allow", "Action" : [ "cloudwatch:GetMetricStatistics", "cloudwatch:DescribeAlarms", "cloudwatch:DescribeAlarmsForMetric", "kms:DescribeKey", "kms:ListAliases", "lambda:GetPolicy", "lambda:ListFunctions", "lex:*", "polly:DescribeVoices", "polly:SynthesizeSpeech", "kendra:ListIndices", "iam:ListRoles", "s3:ListAllMyBuckets", "logs:DescribeLogGroups", "s3:GetBucketLocation" ], "Resource" : [ "*" ] }, { "Sid" : "AmazonLexFullAccessStatement2", "Effect" : "Allow", "Action" : [ "lambda:AddPermission", "lambda:RemovePermission" ], "Resource" : "arn:aws:lambda:*:*:function:AmazonLex*", "Condition" : { "StringEquals" : { "lambda:Principal" : "lex.amazonaws.com" } } }, { "Sid" : "AmazonLexFullAccessStatement3", "Effect" : "Allow", "Action" : [ "iam:GetRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/lex.amazonaws.com/AWSServiceRoleForLexBots", "arn:aws:iam::*:role/aws-service-role/channels.lex.amazonaws.com/AWSServiceRoleForLexChannels", "arn:aws:iam::*:role/aws-service-role/lexv2.amazonaws.com/AWSServiceRoleForLexV2Bots*", "arn:aws:iam::*:role/aws-service-role/channels.lexv2.amazonaws.com/AWSServiceRoleForLexV2Channels*", "arn:aws:iam::*:role/aws-service-role/replication.lexv2.amazonaws.com/AWSServiceRoleForLexV2Replication*" ] }, { "Sid" : "AmazonLexFullAccessStatement4", "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/lex.amazonaws.com/AWSServiceRoleForLexBots" ], "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "lex.amazonaws.com" } } }, { "Sid" : "AmazonLexFullAccessStatement5", "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/channels.lex.amazonaws.com/AWSServiceRoleForLexChannels" ], "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "channels.lex.amazonaws.com" } } }, { "Sid" : "AmazonLexFullAccessStatement6", "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/lexv2.amazonaws.com/AWSServiceRoleForLexV2Bots*" ], "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "lexv2.amazonaws.com" } } }, { "Sid" : "AmazonLexFullAccessStatement7", "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/channels.lexv2.amazonaws.com/AWSServiceRoleForLexV2Channels*" ], "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "channels.lexv2.amazonaws.com" } } }, { "Sid" : "AmazonLexFullAccessStatement8", "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/replication.lexv2.amazonaws.com/AWSServiceRoleForLexV2Replication*" ], "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "replication.lexv2.amazonaws.com" } } }, { "Sid" : "AmazonLexFullAccessStatement9", "Effect" : "Allow", "Action" : [ "iam:DeleteServiceLinkedRole", "iam:GetServiceLinkedRoleDeletionStatus" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/lex.amazonaws.com/AWSServiceRoleForLexBots", "arn:aws:iam::*:role/aws-service-role/channels.lex.amazonaws.com/AWSServiceRoleForLexChannels", "arn:aws:iam::*:role/aws-service-role/lexv2.amazonaws.com/AWSServiceRoleForLexV2Bots*", "arn:aws:iam::*:role/aws-service-role/channels.lexv2.amazonaws.com/AWSServiceRoleForLexV2Channels*", "arn:aws:iam::*:role/aws-service-role/replication.lexv2.amazonaws.com/AWSServiceRoleForLexV2Replication*" ] }, { "Sid" : "AmazonLexFullAccessStatement10", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/lex.amazonaws.com/AWSServiceRoleForLexBots" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "lex.amazonaws.com" ] } } }, { "Sid" : "AmazonLexFullAccessStatement11", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/lexv2.amazonaws.com/AWSServiceRoleForLexV2Bots*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "lexv2.amazonaws.com" ] } } }, { "Sid" : "AmazonLexFullAccessStatement12", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/channels.lexv2.amazonaws.com/AWSServiceRoleForLexV2Channels*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "channels.lexv2.amazonaws.com" ] } } }, { "Sid" : "AmazonLexFullAccessStatement13", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/replication.lexv2.amazonaws.com/AWSServiceRoleForLexV2Replication*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "lexv2.amazonaws.com" ] } } } ] }