

# AWS managed policies for License Manager
<a name="security-iam-awsmanpol"></a>

To add permissions to users, groups, and roles, it is easier to use AWS managed policies than to write policies yourself. It takes time and expertise to [create IAM customer managed policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create-console.html) that provide your team with only the permissions they need. To get started quickly, you can use our AWS managed policies. These policies cover common use cases and are available in your AWS account. For more information about AWS managed policies, see [AWS managed policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#aws-managed-policies) in the *IAM User Guide*.

AWS services maintain and update AWS managed policies. You can't change the permissions in AWS managed policies. Services occasionally add additional permissions to an AWS managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an AWS managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an AWS managed policy, so policy updates won't break your existing permissions.

Additionally, AWS supports managed policies for job functions that span multiple services. For example, the **ReadOnlyAccess** AWS managed policy provides read-only access to all AWS services and resources. When a service launches a new feature, AWS adds read-only permissions for new operations and resources. For a list and descriptions of job function policies, see [AWS managed policies for job functions](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html) in the *IAM User Guide*.

## AWS managed policy: AWSLicenseManagerServiceRolePolicy
<a name="security-iam-AWSLicenseManagerServiceRolePolicy"></a>

This policy is attached to the service-linked role named `AWSServiceRoleForAWSLicenseManagerRole` to allow License Manager to call API actions to manage licenses on your behalf. For more information about the service-linked role, see [Permissions for the core role](license-manager-role-core.md#slr-permissions-core-role).

The role permissions policy allows License Manager to complete the following actions on the specified resources.


| Action | Resource ARN | 
| --- | --- | 
| iam:CreateServiceLinkedRole | arn:aws:iam::\$1:role/aws-service-role/license-management.marketplace.amazonaws.com/AWSServiceRoleForMarketplaceLicenseManagement | 
| iam:CreateServiceLinkedRole | arn:aws:iam::\$1:role/aws-service-role/license-manager.member-account.amazonaws.com/AWSServiceRoleForAWSLicenseManagerMemberAccountRole | 
| s3:GetBucketLocation | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:ListBucket | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:ListAllMyBuckets | \$1 | 
| s3:PutObject | arn:aws:s3:::aws-license-manager-service-\$1 | 
| sns:Publish | arn:aws::sns:\$1:\$1:aws-license-manager-service-\$1 | 
| sns:ListTopics | \$1 | 
| ec2:DescribeInstances | \$1 | 
| ec2:DescribeImages | \$1 | 
| ec2:DescribeHosts | \$1 | 
| ssm:ListInventoryEntries | \$1 | 
| ssm:GetInventory | \$1 | 
| ssm:CreateAssociation | \$1 | 
| ssm:GetCommandInvocation | \$1 | 
| ssm:SendCommand | arn:aws:ec2:\$1:\$1:instance/\$1 | 
| ssm:SendCommand | arn:aws:ssm:\$1:\$1:managed-instance/\$1 | 
| ssm:SendCommand | arn:aws:ssm:\$1::document/AWSLicenseManager-\$1 | 
| organizations:ListAWSServiceAccessForOrganization | \$1 | 
| organizations:DescribeOrganization | \$1 | 
| organizations:ListDelegatedAdministrators | \$1 | 
| license-manager:GetServiceSettings | \$1 | 
| license-manager:GetLicense\$1 | \$1 | 
| license-manager:UpdateLicenseSpecificationsForResource | \$1 | 
| license-manager:List\$1 | \$1 | 

To view the permissions for this policy in the AWS Management Console, see [https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerServiceRolePolicy](https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerServiceRolePolicy).

## AWS managed policy: AWSLicenseManagerMasterAccountRolePolicy
<a name="security-iam-AWSLicenseManagerMasterAccountRolePolicy"></a>

This policy is attached to the service-linked role named `AWSServiceRoleForAWSLicenseManagerMasterAccountRole` to allow License Manager to call API actions that perform license management for a central management account on your behalf. For more information about the service-linked role, see [License Manager – Management account role](management-role.md).

The role permissions policy allows License Manager to complete the following actions on the specified resources.


| Action | Resource ARN | 
| --- | --- | 
| s3:GetBucketLocation | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:ListBucket | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:GetLifecycleConfiguration | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:PutLifecycleConfiguration | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:GetBucketPolicy | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:PutBucketPolicy | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:AbortMultipartUpload | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:PutObject | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:GetObject | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:ListBucketMultipartUploads | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:ListMultipartUploadParts | arn:aws:s3:::aws-license-manager-service-\$1 | 
| s3:DeleteObject | arn:aws:s3:::aws-license-manager-service-\$1/resource-sync/\$1 | 
| athena:GetQueryExecution | \$1 | 
| athena:GetQueryResults | \$1 | 
| athena:StartQueryExecution | \$1 | 
| glue:GetTable | \$1 | 
| glue:GetPartition | \$1 | 
| glue:GetPartitions | \$1 | 
| glue:CreateTable | See footnote ¹ | 
| glue:UpdateTable | See footnote ¹ | 
| glue:DeleteTable | See footnote ¹ | 
| glue:UpdateJob | See footnote ¹ | 
| glue:UpdateCrawler | See footnote ¹ | 
| organizations:DescribeOrganization | \$1 | 
| organizations:ListAccounts | \$1 | 
| organizations:DescribeAccount | \$1 | 
| organizations:ListChildren | \$1 | 
| organizations:ListParents | \$1 | 
| organizations:ListAccountsForParent | \$1 | 
| organizations:ListRoots | \$1 | 
| organizations:ListAWSServiceAccessForOrganization | \$1 | 
| ram:GetResourceShares | \$1 | 
| ram:GetResourceShareAssociations | \$1 | 
| ram:TagResource | \$1 | 
| ram:CreateResourceShare | \$1 | 
| ram:AssociateResourceShare | \$1 | 
| ram:DisassociateResourceShare | \$1 | 
| ram:UpdateResourceShare | \$1 | 
| ram:DeleteResourceShare | \$1 | 
| resource-groups:PutGroupPolicy | \$1 | 
| iam:GetRole | \$1 | 
| iam:PassRole | arn:aws:iam::\$1:role/LicenseManagerServiceResourceDataSyncRole\$1 | 
| cloudformation:UpdateStack | arn:aws:cloudformation:\$1:\$1:stack/LicenseManagerCrossAccountCloudDiscoveryStack/\$1 | 
| cloudformation:CreateStack | arn:aws:cloudformation:\$1:\$1:stack/LicenseManagerCrossAccountCloudDiscoveryStack/\$1 | 
| cloudformation:DeleteStack | arn:aws:cloudformation:\$1:\$1:stack/LicenseManagerCrossAccountCloudDiscoveryStack/\$1 | 
| cloudformation:DescribeStacks | arn:aws:cloudformation:\$1:\$1:stack/LicenseManagerCrossAccountCloudDiscoveryStack/\$1 | 

¹ The following are the resources defined for the AWS Glue actions:
+ `arn:aws:glue:*:*:catalog`
+ `arn:aws:glue:*:*:crawler/LicenseManagerResourceSynDataCrawler`
+ `arn:aws:glue:*:*:job/LicenseManagerResourceSynDataProcessJob`
+ `arn:aws:glue:*:*:table/license_manager_resource_inventory_db/*`
+ `arn:aws:glue:*:*:table/license_manager_resource_sync/*`
+ `arn:aws:glue:*:*:database/license_manager_resource_inventory_db`
+ `arn:aws:glue:*:*:database/license_manager_resource_sync`

To view the permissions for this policy in the AWS Management Console, see [https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerMasterAccountRolePolicy](https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerMasterAccountRolePolicy).

## AWS managed policy: AWSLicenseManagerMemberAccountRolePolicy
<a name="security-iam-AWSLicenseManagerMemberAccountRolePolicy"></a>

This policy is attached to the service-linked role named `AWSServiceRoleForAWSLicenseManagerMemberAccountRole` to allow License Manager to call API actions for license management from a configured management account on your behalf. For more information, see [License Manager – Member account role](member-role.md).

The role permissions policy allows License Manager to complete the following actions on the specified resources.


| Action | Resource ARN | 
| --- | --- | 
| license-manager:UpdateLicenseSpecificationsForResource | \$1 | 
| license-manager:GetLicenseConfiguration | \$1 | 
| ssm:ListInventoryEntries | \$1 | 
| ssm:GetInventory | \$1 | 
| ssm:CreateAssociation | \$1 | 
| ssm:CreateResourceDataSync | \$1 | 
| ssm:DeleteResourceDataSync | \$1 | 
| ssm:ListResourceDataSync | \$1 | 
| ssm:ListAssociations | \$1 | 
| ram:AcceptResourceShareInvitation | \$1 | 
| ram:GetResourceShareInvitations | \$1 | 

To view the permissions for this policy in the AWS Management Console, see [https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerMemberAccountRolePolicy](https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerMemberAccountRolePolicy).

## AWS managed policy: AWSLicenseManagerConsumptionPolicy
<a name="security-iam-AWSLicenseManagerConsumptionPolicy"></a>

You can attach the `AWSLicenseManagerConsumptionPolicy` policy to your IAM identities. This policy grants permissions that allow access to the License Manager API actions required to consume licenses. For more information, see [Seller issued license usage in License Manager](license-usage.md).

To view the permissions for this policy, see [https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/AWSLicenseManagerConsumptionPolicy](https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/AWSLicenseManagerConsumptionPolicy) in the AWS Management Console.

## AWS managed policy: AWSLicenseManagerUserSubscriptionsServiceRolePolicy
<a name="security-iam-AWSLicenseManagerUserSubscriptionsServiceRolePolicy"></a>

This policy is attached to the service-linked role named `AWSServiceRoleForAWSLicenseManagerUserSubscriptionsService` policy to allow License Manager to call API actions to manage user-based subscription resources. For more information, see [License Manager – User-based subscription role](user-based-subscription-role.md).

The role permissions policy allows License Manager to complete the following actions on the specified resources.


| Action | Resource ARN | 
| --- | --- | 
| ds:DescribeDirectories | \$1 | 
| ds:GetAuthorizedApplicationDetails | \$1 | 
| ec2:CreateTags | arn:aws:ec2:\$1:\$1:instance/\$1 ¹ | 
| ec2:DescribeInstances | \$1 | 
| ec2:DescribeNetworkInterfaces | \$1 | 
| ec2:DescribeSecurityGroupRules | \$1 | 
| ec2:DescribeSubnets | \$1 | 
| ec2:DescribeVpcPeeringConnections | \$1 | 
| ec2:TerminateInstances | arn:aws:ec2:\$1:\$1:instance/\$1 ¹ | 
| route53:GetHostedZone | \$1 | 
| route53:ListResourceRecordSets | \$1 | 
| secretsmanager:GetSecretValue | arn:aws:secretsmanager:\$1:\$1:secret:license-manager-user-\$1 | 
| ssm:DescribeInstanceInformation | \$1 | 
| ssm:GetCommandInvocation | \$1 | 
| ssm:GetInventory | \$1 | 
| ssm:ListCommandInvocations | \$1 | 
| ssm:SendCommand | arn:aws:ssm:\$1::document/AWS-RunPowerShellScript ²arn:aws:ec2:\$1:\$1:instance/\$1 ² | 

¹ License Manager can only create tags on and terminate instances which have the product codes [bz0vcy31ooqlzk5tsash4r1ik](https://aws.amazon.com/marketplace/pp/prodview-dzstlnjdl3izg), [77yzkpa7kvee1y1tt7wnsdwoc](https://aws.amazon.com/marketplace/pp/prodview-bh46d5p2hapns), or [d44g89hc0gp9jdzm99rznthpw](https://aws.amazon.com/marketplace/pp/prodview-zo3zltrbpgr5i).

² License Manager can only execute an SSM Run Command with the `AWS-RunPowerShellScript` document on instances with the tag name of `AWSLicenseManager` and a value of `UserSubscriptions`.

To view the permissions for this policy in the AWS Management Console, see [https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerUserSubscriptionsServiceRolePolicy](https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerUserSubscriptionsServiceRolePolicy).

## AWS managed policy: AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy
<a name="security-iam-AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy"></a>

This policy is attached to the service-linked role named `AWSServiceRoleForAWSLicenseManagerLinuxSubscriptionsService` policy to allow License Manager to call API actions to manage Linux subscriptions resources. For more information, see [License Manager – Linux subscriptions role](linux-subscriptions-role.md).

The role permissions policy allows License Manager to complete the following actions on the specified resources.


| Action | Conditions | Resource | 
| --- | --- | --- | 
| ec2:DescribeInstances | N/A | \$1 | 
| ec2:DescribeRegions | N/A | \$1 | 
| organizations:DescribeOrganization | N/A | \$1 | 
| organizations:ListAccounts | N/A | \$1 | 
| organizations:DescribeAccount | N/A | \$1 | 
| organizations:ListChildren | N/A | \$1 | 
| organizations:ListParents | N/A | \$1 | 
| organizations:ListAccountsForParent | N/A | \$1 | 
| organizations:ListRoots | N/A | \$1 | 
| organizations:ListAWSServiceAccessForOrganization | N/A | \$1 | 
| organizations:ListDelegatedAdministrators | N/A | \$1 | 
| secretsmanager:GetSecretValue |  StringEquals: *"aws:ResourceTag/LicenseManagerLinuxSubscriptions": "enabled"* *"aws:ResourceAccount": "\$1\$1aws:PrincipalAccount\$1"*  | arn:aws:secretsmanager:\$1:\$1:secret:\$1 | 
| kms:Decrypt |  StringEquals: *"aws:ResourceTag/LicenseManagerLinuxSubscriptions": "enabled",* *"aws:ResourceAccount": "\$1\$1aws:PrincipalAccount\$1"* ** StringLike: *"kms:ViaService": [ "secretsmanager.\$1.amazonaws.com" ]*  | arn:aws:kms:\$1:\$1:key/\$1 | 

To view the permissions for this policy in the AWS Management Console, see [https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy](https://console.aws.amazon.com/iam/home#/policies/arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy).

## License Manager updates to AWS managed policies
<a name="security-iam-awsmanpol-updates"></a>

View details about updates to AWS managed policies for License Manager since this service began tracking these changes.


| Change | Description | Date | 
| --- | --- | --- | 
| [AWSLicenseManagerServiceRolePolicy](#security-iam-AWSLicenseManagerServiceRolePolicy) – Update to an existing policy | License Manager added permissions to discover license assets on instances by running AWS-Managed SSM documents. | November 19, 2025 | 
| [AWSLicenseManagerUserSubscriptionsServiceRolePolicy](#security-iam-AWSLicenseManagerUserSubscriptionsServiceRolePolicy) – Update to an existing policy | License Manager added the following permissions to manage licensing and Active Directory data: get route information from Route 53, get networking information and security group rules from Amazon EC2, and get secrets from Secrets Manager. | November 7, 2024 | 
| [AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy](#security-iam-AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy) – Update to an existing policy | License Manager added permissions to store and retrieve secrets from AWS Secrets Manager, and to use AWS KMS keys to decrypt access token secrets for Bring Your Own License (BYOL) subscriptions. | May 22, 2024 | 
| [AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy](#security-iam-AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy) – New policy | License Manager added a permission to create the service-linked role named AWSServiceRoleForAWSLicenseManagerLinuxSubscriptionsService. This role provides License Manager permission to list AWS Organizations and Amazon EC2 resources. | December 21, 2022 | 
| [AWSLicenseManagerUserSubscriptionsServiceRolePolicy](#security-iam-AWSLicenseManagerUserSubscriptionsServiceRolePolicy) – Update to an existing policy | License Manager added the ec2:DescribeVpcPeeringConnections permission. | November 28, 2022 | 
| [AWSLicenseManagerUserSubscriptionsServiceRolePolicy](#security-iam-AWSLicenseManagerMasterAccountRolePolicy) – New policy | License Manager added a permission to create the service-linked role named AWSLicenseManagerUserSubscriptionsServiceRolePolicy. This role provides License Manager permission to list AWS Directory Service resources, utilize Systems Manager features, and manage Amazon EC2 resources created for user-based subscriptions. | July 18, 2022 | 
| [AWSLicenseManagerMasterAccountRolePolicy](#security-iam-AWSLicenseManagerMasterAccountRolePolicy) – Update to an existing policy | License Manager added the resource-groups:PutGroupPolicy permission for resource groups managed by AWS Resource Access Manager. | June 27, 2022 | 
| [AWSLicenseManagerMasterAccountRolePolicy](#security-iam-AWSLicenseManagerMasterAccountRolePolicy) – Update to an existing policy | License Manager changed the AWS managed policy AWSLicenseManagerMasterAccountRolePolicy [condition key for AWS Resource Access Manager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsresourceaccessmanager.html) from using ram:ResourceTag to aws:ResourceTag. | November 16, 2021 | 
| [AWSLicenseManagerConsumptionPolicy](#security-iam-AWSLicenseManagerConsumptionPolicy) – New policy | License Manager added a new policy that grants permissions to consume licenses. | August 11, 2021 | 
| [AWSLicenseManagerServiceRolePolicy](#security-iam-AWSLicenseManagerServiceRolePolicy) – Update to an existing policy | License Manager added a permission to list delegated administrators and a permission to create the service-linked role named AWSServiceRoleForAWSLicenseManagerMemberAccountRole. | June 16, 2021 | 
| [AWSLicenseManagerServiceRolePolicy](#security-iam-AWSLicenseManagerServiceRolePolicy) – Update to an existing policy | License Manager added a permission to list all License Manager resources, such as license configurations, licenses, and grants. | June 15, 2021 | 
| [AWSLicenseManagerServiceRolePolicy](#security-iam-AWSLicenseManagerServiceRolePolicy) – Update to an existing policy | License Manager added a permission to create the service-linked role named AWSServiceRoleForMarketplaceLicenseManagement. This role provides AWS Marketplace with permissions to create and manage licenses in License Manager. For more information, see [Service-linked roles for AWS Marketplace](https://docs.aws.amazon.com/marketplace/latest/buyerguide/buyer-using-service-linked-roles.html) in the AWS Marketplace Buyer Guide. | March 9, 2021 | 
| License Manager started tracking changes | License Manager started tracking changes to its AWS managed policies. | March 9, 2021 | 