Examples of using Inline policy in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
You cannot import an inline policy.
To edit an inline policy for a group console.
Choose the Permissions tab, and then expand Inline Policy.
To edit an inline policy, choose Edit Policy. .
Scroll to the bottom of the page and choose Add inline policy.
To edit an inline policy for a user or role console.
Because we want this policy to be appliedonly to the user Alice we will use an inline policy.
You can create an inline policy in the AWS Management Console.
On the user details page,select the Permissions tab and then click Add inline policy.
You can edit an inline policy from the AWS Management Console.
To provide access to the secrets that you create,manually add the following permissions as an inline policy to the task execution role.
If no inline policy exists yet, then the button does not appear.
If you are configuring a group that already has an inline policy, choose Create Group Policy. .
To delete an inline policy for a group, user, or role console.
If you do not want to attach an existing policy but instead want to createyour own custom policy, on the Permissions tab, choose Add inline policy.
To embed a new inline policy, choose Add inline policy.
When you need to set the permissions for an identity in IAM, you must decide whether to use an AWS managed policy, a customer managed policy, or an inline policy.
If you prefer to maintain the inline policy yourself, you can do so as follows.
An inline policy is one that you create and embed directly to an IAM group, user, or role.
To learn how to edit an inline policy, see Editing IAM Policies. .
Create an inline policy for the user Dave by using the following policy. .
For example, if a group and a role both contain the same inline policy, you must individually edit both principal entities in order to change that policy. .
When you use an inline policy, the permissions in the policy cannot be inadvertently attached to the wrong principal entity.
After you create an inline policy, it is automatically embedded in your user or role.
To create an inline policy for a principal entity(group, user or role) AWS CLI.
To create your own inline policy for any CUSTOM_ROLE role that has access to AWS Data Pipeline.
In contrast, to change an inline policy you must individually edit each principal entity that contains the policy. .
The combination of this trust relationship and the inline policy makes it possible for the Lambda function to invoke a console. log() function to log events to CloudWatch Logs.
The following example shows an inline policy for an IAM role( CrossAccount_Role) created by AccountB that allows access to AWS CodeDeploy actions required by the pipeline in AccountA.
The following example shows an inline policy for an IAM role( CrossAccount_Role) created by AccountB that allows access to the Amazon S3 bucket in order to download input artifacts and upload output artifacts.