

# Actions, resources, and condition keys for Amazon GroundTruth Labeling
<a name="list_amazongroundtruthlabeling"></a>

Amazon GroundTruth Labeling (service prefix: `groundtruthlabeling`) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.

References:
+ Learn how to [configure this service](https://docs.aws.amazon.com/sagemaker/latest/dg/whatis.html).
+ View a list of the [API operations available for this service](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html).
+ Learn how to secure this service and its resources by [using IAM](https://docs.aws.amazon.com/sagemaker/latest/dg/security-iam.html) permission policies.

**Topics**
+ [Actions defined by Amazon GroundTruth Labeling](#amazongroundtruthlabeling-actions-as-permissions)
+ [Resource types defined by Amazon GroundTruth Labeling](#amazongroundtruthlabeling-resources-for-iam-policies)
+ [Condition keys for Amazon GroundTruth Labeling](#amazongroundtruthlabeling-policy-keys)

## Actions defined by Amazon GroundTruth Labeling
<a name="amazongroundtruthlabeling-actions-as-permissions"></a>

You can specify the following actions in the `Action` element of an IAM policy statement. Use policies to grant permissions to perform an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions.

The **Access level** column of the Actions table describes how the action is classified (List, Read, Permissions management, or Tagging). This classification can help you understand the level of access that an action grants when you use it in a policy. For more information about access levels, see [Access levels in policy summaries](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_understand-policy-summary-access-level-summaries.html).

The **Resource types** column of the Actions table indicates whether each action supports resource-level permissions. If there is no value for this column, you must specify all resources ("\$1") to which the policy applies in the `Resource` element of your policy statement. If the column includes a resource type, then you can specify an ARN of that type in a statement with that action. If the action has one or more required resources, the caller must have permission to use the action with those resources. Required resources are indicated in the table with an asterisk (\$1). If you limit resource access with the `Resource` element in an IAM policy, you must include an ARN or pattern for each required resource type. Some actions support multiple resource types. If the resource type is optional (not indicated as required), then you can choose to use one of the optional resource types.

The **Condition keys** column of the Actions table includes keys that you can specify in a policy statement's `Condition` element. For more information on the condition keys that are associated with resources for the service, see the **Condition keys** column of the Resource types table.

The **Dependent actions** column of the Actions table shows additional permissions that may be required to successfully call an action. These permissions may be needed in addition to the permission for the action itself. When an action specifies dependent actions, those dependencies may apply to additional resources defined for that action, not only the first resource listed in the table.

**Note**  
Resource condition keys are listed in the [Resource types](#amazongroundtruthlabeling-resources-for-iam-policies) table. You can find a link to the resource type that applies to an action in the **Resource types (\$1required)** column of the Actions table. The resource type in the Resource types table includes the **Condition keys** column, which are the resource condition keys that apply to an action in the Actions table.

For details about the columns in the following table, see [Actions table](reference_policies_actions-resources-contextkeys.html#actions_table).


****  

| Actions | Description | Access level | Resource types (\$1required) | Condition keys | Dependent actions | 
| --- | --- | --- | --- | --- | --- | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to associate a patch file with the manifest file to update the manifest file | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to create a GT\$1 Batch | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to create intake form | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to create a GT\$1 Project | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to create a GT\$1 Workflow Definition | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to get status of GroundTruthLabeling Jobs | Read |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to generate LiDAR Preview Task | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to get a GT\$1 Batch | Read |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to get a intake forms | Read |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to list a GT\$1 Batchs | Read |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to list dataset objects in a manifest file | Read |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to list a GT\$1 Projects | Read |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-data-filtering](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-data-filtering) [permission only] | Grants permission to filter records from a manifest file using S3 select. Get sample entries based on random sampling | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to list a S3 prefix and create manifest files from objects in that location | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to generate metrics from objects in manifest | Write |  |  |  | 
|   [https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file](https://docs.aws.amazon.com/sagemaker/latest/dg/sms-data-input.html#sms-console-create-manifest-file) [permission only] | Grants permission to update a GT\$1 Batch | Write |  |  |  | 

## Resource types defined by Amazon GroundTruth Labeling
<a name="amazongroundtruthlabeling-resources-for-iam-policies"></a>

Amazon GroundTruth Labeling does not support specifying a resource ARN in the `Resource` element of an IAM policy statement. To allow access to Amazon GroundTruth Labeling, specify `"Resource": "*"` in your policy.

## Condition keys for Amazon GroundTruth Labeling
<a name="amazongroundtruthlabeling-policy-keys"></a>

GroundTruth Labeling has no service-specific context keys that can be used in the `Condition` element of policy statements. For the list of the global context keys that are available to all services, see [AWS global condition context keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html).