2 Answers
- Newest
- Most votes
- Most comments
1
In short: Please don't!
Instances (systems) usually have a usage pattern that is totally different from humans. Mixing up their rights is a bound to conflict with the principle of "least privilege".
If somehow you have a use-case that requires this (please double-check!):
- Write the policy into a managed policy
- Attach it to the instance profile
- Attach it to the user (or better, their group)
answered 3 years ago
1
Update the Trust Policy of the role to something like this:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "ec2.amazonaws.com",
"AWS": "arn:aws:iam::0123456789012:user/johnsmith"
},
"Action": "sts:AssumeRole"
}
]
}
Thanks for your help!
Relevant content
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated a year ago
Thanks for your help!