AWS Identity and Access Management (IAM) Resources

Documentation

IAM user guide

This guide introduces you to IAM by explaining IAM features that help you apply fine-grained permissions in AWS. The guide shows you how to grant access by defining and applying IAM policies to roles and resources. Additionally, this guide explains how IAM works and how you can use IAM to control access for your users and workloads. 

HTML | PDF | Kindle

AWS STS API Reference

This AWS Security Token Service (AWS STS) documentation describes the API operations for you to programmatically assume roles in AWS. The documentation also provides sample requests, responses, and errors for the supported web service protocols.


This IAM section of the AWS CLI Command Reference describes the AWS CLI commands you can use to administer IAM. The section also provides syntax, options, and usage examples for each command.

This AWS STS section of the AWS CLI Command Reference documentation describes the AWS CLI commands that you can use to generate temporary security credentials. The section also provides syntax, options, and usage examples for each command.

The IAM API Reference describes in detail all the API operations for IAM. This documentation also provides sample requests, responses, and errors for the supported web services protocols.

Other resources

Sample code and libraries: IAM-related sample code

Developer tools: Command line and GUI-based tools for use with IAM APIs

IAM discussion forum: Discussion forum for IAM-related topics

Videos

AWS re:Invent 2022 - Harness IAM policies & rein in permissions with IAM Access Analyzer (SEC313)
AWS re:Invent 2022 - A day in the life of a billion requests (SEC404)
AWS re:Inforce 2022 - Security best practices with AWS IAM (IAM201)
Screenshot from Amazon Verified Permissions video
 
Videos about security-related topics from AWS re:Invent 2022.

Screenshot from Brandon Wu's IAM Access Analyzer video
 
Videos about IAM Access Analyzer, which uses automated reasoning to determine all possible access paths allowed by a resource-based policy.

AWS re:Invent 2022 - Running services without access to data (SEC327)
AWS re:Invent 2022 - How AWS uses math to prove security (SEC310)
AWS re:Inforce 2022 - How to achieve least privilege (IAM303)
Screenshot from Brandon Wu's IAM Access Analyzer video
 
AWS re:Inforce 2022 videos that cover identity and access management.

Blog posts

Date
  • Date

We could not find any IAM blog posts at this time. See the AWS Blog for additional content.

1

Learn more about IAM

Read the FAQs
Ready to build?
Get started with IAM
Have more questions?
Contact us