ListAttachedRolePolicies
Lists all managed policies that are attached to the specified IAM role.
You can paginate the results using the MaxItems
and Marker
parameters. You can use the PathPrefix
parameter to limit the list of policies to only those matching the specified path prefix. If there are no policies attached to the specified role (or none that match the specified path prefix), the operation returns an empty list.
Permissions
Action | Description | Resource |
---|---|---|
ListAttachedRolePolicies | Grants permission to list all managed policies that are attached to the specified IAM role | role |
Request Parameters
For information about the parameters that are common to all actions, see Common Parameters.
Marker
Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the Marker
element in the response that you received to indicate where the next call should start.
Type: String
Length Constraints: Minimum length of 1.
Pattern: [\u0020-\u00FF]+
Required: No
MaxItems
Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the IsTruncated
response element is true
.
If you do not include this parameter, the number of items defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the IsTruncated
response element returns true
, and Marker
contains a value to include in the subsequent call that tells the service where to continue from.
Type: Integer
Valid Range: Minimum value of 1. Maximum value of 1000.
Required: No
PathPrefix
The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.
This parameter allows (through its regex pattern) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021
) through the DEL character (\u007F
), including most punctuation characters, digits, and upper and lowercased letters.
Type: String
Length Constraints: Minimum length of 1. Maximum length of 512.
Pattern: ((/[A-Za-z0-9\.,\+@=_-]+)*)/
Required: No
RoleName
The name (friendly name, not ARN) of the role to list attached policies for.
This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-
Type: String
Length Constraints: Minimum length of 1. Maximum length of 64.
Pattern: [\w+=,.@-]+
Required: Yes
Response Elements
The following elements are returned by the service.
AttachedPolicies.member.N
A list of the attached policies.
Type: Array of AttachedPolicy objects
IsTruncated
A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the Marker
request parameter to retrieve more items. Note that IAM might return fewer than the MaxItems
number of results even when there are more results available. We recommend that you check IsTruncated
after every call to ensure that you receive all your results.
Type: Boolean
Marker
When IsTruncated
is true
, this element is present and contains the value to use for the Marker
parameter in a subsequent pagination request.
Type: String
Errors
InvalidInput
The request was rejected because an invalid or out-of-range value was supplied for an input parameter.
HTTP Status Code: 400
NoSuchEntity
The request was rejected because it referenced a resource entity that does not exist. The error message describes the resource.
HTTP Status Code: 404
InternalError
The request processing has failed because of an unknown error, exception or failure.
HTTP Status Code: 500
Examples
Example
This example illustrates one usage of ListAttachedRolePolicies.
https://<partition>.iam.astran.io/?Action=ListAttachedRolePolicies
&RoleName=ReadOnlyRole
&Version=2010-05-08
&AUTHPARAMS
<ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<AttachedPolicies>
<member>
<PolicyName>ReadOnlyAccess</PolicyName>
<PolicyArn>arn:aws:iam::aws:policy/ReadOnlyAccess</PolicyArn>
</member>
</AttachedPolicies>
<IsTruncated>false</IsTruncated>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>9a3b490d-3ea5-11e4-9d0d-6f969EXAMPLE</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>
See Also
For more information about using this API in one of the language-specific AWS SDKs, see the following: