Connect to this Region’s endpoint. Returns an connection object pointing to the endpoint associated with this region. You may pass any of the arguments accepted by the connection class’s constructor as keyword arguments and they will be passed along to the connection object.
Return type: | Connection object |
---|---|
Returns: | The connection to this regions endpoint |
Given a valid region name, return a boto.iam.connection.IAMConnection.
Type: | str |
---|---|
Parameters: | region_name – The name of the region to connect to. |
Return type: | boto.iam.connection.IAMConnection or None |
Returns: | A connection to the given region, or None if an invalid region name is given |
Get all available regions for the IAM service.
Return type: | list |
---|---|
Returns: | A list of boto.regioninfo.RegionInfo instances |
Adds the specified role to the specified instance profile.
Parameters: |
---|
Add a user to a group
Parameters: |
---|
Create a new AWS Secret Access Key and corresponding AWS Access Key ID for the specified user. The default status for new keys is Active
If the user_name is not specified, the user_name is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: | user_name (string) – The username of the user |
---|
Creates a new alias for the AWS account.
For more information on account id aliases, please see http://goo.gl/ToB7G
Parameters: | alias (string) – The alias to attach to the account. |
---|
Create a group.
Parameters: |
---|
Creates a new instance profile.
Parameters: |
---|
Creates a login profile for the specified user, give the user the ability to access AWS services and the AWS Management Console.
Parameters: |
---|
Creates a new role for your AWS account.
The policy grants permission to an EC2 instance to assume the role. The policy is URL-encoded according to RFC 3986. Currently, only EC2 instances can assume roles.
Parameters: |
---|
Creates an IAM entity to describe an identity provider (IdP) that supports SAML 2.0.
The SAML provider that you create with this operation can be used as a principal in a role’s trust policy to establish a trust relationship between AWS and a SAML identity provider. You can create an IAM role that supports Web-based single sign-on (SSO) to the AWS Management Console or one that supports API access to AWS.
When you create the SAML provider, you upload an a SAML metadata document that you get from your IdP and that includes the issuer’s name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization’s IdP. This operation requires `Signature Version 4`_. For more information, see `Giving Console Access Using SAML`_ and `Creating Temporary Security Credentials for SAML Federation`_ in the Using Temporary Credentials guide.
Parameters: | saml_metadata_document (string) – An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer’s name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization’s IdP. |
---|
Parameters: | name (string) – The name of the provider to create. |
---|
Create a user.
Parameters: |
---|
Deactivates the specified MFA device and removes it from association with the user.
Parameters: |
---|
Delete an access key associated with a user.
If the user_name is not specified, it is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: |
---|
Deletes an alias for the AWS account.
For more information on account id aliases, please see http://goo.gl/ToB7G
Parameters: | alias (string) – The alias to remove from the account. |
---|
Delete a group. The group must not contain any Users or have any attached policies
Parameters: | group_name (string) – The name of the group to delete. |
---|
Deletes the specified policy document for the specified group.
Parameters: |
---|
Deletes the specified instance profile. The instance profile must not have an associated role.
Parameters: | instance_profile_name (string) – Name of the instance profile to delete. |
---|
Deletes the login profile associated with the specified user.
Parameters: | user_name (string) – The name of the user to delete. |
---|
Deletes the specified role. The role must not have any policies attached.
Parameters: | role_name (string) – Name of the role to delete. |
---|
Deletes the specified policy associated with the specified role.
Parameters: |
---|
Deletes a SAML provider.
Deleting the provider does not update any roles that reference the SAML provider as a principal in their trust policies. Any attempt to assume a role that references a SAML provider that has been deleted will fail. This operation requires `Signature Version 4`_.
Parameters: | saml_provider_arn (string) – The Amazon Resource Name (ARN) of the SAML provider to delete. |
---|
Delete the specified server certificate.
Parameters: | cert_name (string) – The name of the server certificate you want to delete. |
---|
Delete a signing certificate associated with a user.
If the user_name is not specified, it is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: |
---|
Delete a user including the user’s path, GUID and ARN.
If the user_name is not specified, the user_name is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: | user_name (string) – The name of the user to delete. |
---|
Deletes the specified policy document for the specified user.
Parameters: |
---|
Enables the specified MFA device and associates it with the specified user.
Parameters: |
---|
Generates a credential report for an account
A new credential report can only be generated every 4 hours. If one hasn’t been generated in the last 4 hours then get_credential_report will error when called
Get the alias for the current account.
This is referred to in the docs as list_account_aliases, but it seems you can only have one account alias currently.
For more information on account id aliases, please see http://goo.gl/ToB7G
Get the alias for the current account.
This is referred to in the docs as list_account_aliases, but it seems you can only have one account alias currently.
For more information on account id aliases, please see http://goo.gl/ToB7G
Get all access keys associated with an account.
Parameters: |
|
---|
List the names of the policies associated with the specified group.
Parameters: |
|
---|
List the groups that have the specified path prefix.
Parameters: |
|
---|
Get all MFA devices associated with an account.
Parameters: |
|
---|
Lists the server certificates that have the specified path prefix. If none exist, the action returns an empty list.
Parameters: |
|
---|
Get all signing certificates associated with an account.
If the user_name is not specified, it is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: |
|
---|
List the names of the policies associated with the specified user.
Parameters: |
|
---|
List the users that have the specified path prefix.
Parameters: |
|
---|
Retrieves a credential report for an account
A report must have been generated in the last 4 hours to succeed. The report is returned as a base64 encoded blob within the response.
Return a list of users that are in the specified group.
Parameters: |
|
---|
Retrieves the specified policy document for the specified group.
Parameters: |
---|
List the groups that a specified user belongs to.
Parameters: |
|
---|
Retrieves information about the specified instance profile, including the instance profile’s path, GUID, ARN, and role.
Parameters: | instance_profile_name (string) – Name of the instance profile to get information about. |
---|
Retrieves the login profile for the specified user.
Parameters: | user_name (string) – The username of the user |
---|
Utility method to handle calls to IAM and parsing of responses.
Retrieves information about the specified role, including the role’s path, GUID, ARN, and the policy granting permission to EC2 to assume the role.
Parameters: | role_name (string) – Name of the role associated with the policy. |
---|
Retrieves the specified policy document for the specified role.
Parameters: |
---|
Returns the SAML provider metadocument that was uploaded when the provider was created or updated. This operation requires `Signature Version 4`_.
Parameters: | saml_provider_arn (string) – The Amazon Resource Name (ARN) of the SAML provider to get information about. |
---|
Retrieves information about the specified server certificate.
Parameters: | cert_name (string) – The name of the server certificate you want to retrieve information about. |
---|
Get the URL where IAM users can use their login profile to sign in to this account’s console.
Parameters: | service (string) – Default service to go to in the console. |
---|
Retrieve information about the specified user.
If the user_name is not specified, the user_name is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: | user_name (string) – The name of the user to retrieve. If not specified, defaults to user making request. |
---|
Retrieves the specified policy document for the specified user.
Parameters: |
---|
Lists the instance profiles that have the specified path prefix. If there are none, the action returns an empty list.
Parameters: |
|
---|
Lists the instance profiles that have the specified associated role. If there are none, the action returns an empty list.
Parameters: |
|
---|
Lists the names of the policies associated with the specified role. If there are none, the action returns an empty list.
Parameters: |
|
---|
Lists the roles that have the specified path prefix. If there are none, the action returns an empty list.
Parameters: |
|
---|
Lists the SAML providers in the account. This operation requires `Signature Version 4`_.
Lists the server certificates that have the specified path prefix. If none exist, the action returns an empty list.
Parameters: |
|
---|
Adds or updates the specified policy document for the specified group.
Parameters: |
---|
Adds (or updates) a policy document associated with the specified role.
Parameters: |
---|
Adds or updates the specified policy document for the specified user.
Parameters: |
---|
Removes the specified role from the specified instance profile.
Parameters: |
---|
Remove a user from a group.
Parameters: |
---|
Syncronizes the specified MFA device with the AWS servers.
Parameters: |
---|
Changes the status of the specified access key from Active to Inactive or vice versa. This action can be used to disable a user’s key as part of a key rotation workflow.
If the user_name is not specified, the user_name is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: |
---|
Updates the policy that grants an entity permission to assume a role. Currently, only an Amazon EC2 instance can assume a role.
Parameters: |
---|
Updates name and/or path of the specified group.
Parameters: |
---|
Resets the password associated with the user’s login profile.
Parameters: |
---|
Updates the metadata document for an existing SAML provider. This operation requires `Signature Version 4`_.
Parameters: |
|
---|
Updates the name and/or the path of the specified server certificate.
Parameters: |
|
---|
Change the status of the specified signing certificate from Active to Inactive or vice versa.
If the user_name is not specified, it is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: |
---|
Updates name and/or path of the specified user.
Parameters: |
---|
Uploads a server certificate entity for the AWS Account. The server certificate entity includes a public key certificate, a private key, and an optional certificate chain, which should all be PEM-encoded.
Parameters: |
|
---|
Uploads an X.509 signing certificate and associates it with the specified user.
If the user_name is not specified, it is determined implicitly based on the AWS Access Key ID used to sign the request.
Parameters: |
---|