gptkbp:instance_of
|
gptkb:Identity_and_Access_Management
|
gptkbp:allows
|
temporary security credentials
|
gptkbp:can
|
trust relationships
policies attached
|
gptkbp:can_be_assumed_by
|
gptkb:users
EC2 instances
Lambda functions
applications
|
gptkbp:can_be_audited_using
|
AWS IAM Access Analyzer
|
gptkbp:can_be_deleted_using
|
gptkb:AWS_SDKs
gptkb:AWS_Management_Console
gptkb:AWS_CLI
|
gptkbp:can_be_managed_using
|
gptkb:AWS_API
gptkb:AWS_SDKs
gptkb:AWS_CLI
AWS IAM console
|
gptkbp:can_be_tagged_with
|
gptkb:metadata
|
gptkbp:can_be_used_for
|
gptkb:AWS_Single_Sign-On_(SSO)
gptkb:AWS_Organizations
temporary access to AWS services
federated authentication
AWS resource access
role chaining
|
gptkbp:can_be_used_in
|
gptkb:AWS_Step_Functions
gptkb:Amazon_RDS
gptkb:Amazon_ECS
gptkb:Amazon_Redshift
gptkb:AWS_Cloud9
gptkb:AWS_Glue
gptkb:AWS_Batch
gptkb:Amazon_EKS
gptkb:AWS_Data_Pipeline
gptkb:Amazon_EMR
gptkb:AWS_App_Runner
gptkb:Sage
gptkb:AWS_Code_Build
gptkb:AWS_Code_Deploy
gptkb:AWS_Code_Pipeline
gptkb:AWS_Io_T
|
gptkbp:can_be_used_to
|
control permissions for AWS services
delegate access to AWS resources
manage permissions for Lambda functions
manage permissions for applications
manage permissions for other AWS services
manage permissions for users
manage permissions for EC2 instances
|
gptkbp:can_create
|
gptkb:AWS_Cloud_Formation
gptkb:AWS_SDKs
gptkb:AWS_CDK
specific permissions
specific trust policies
AWS CLI commands
|
https://www.w3.org/2000/01/rdf-schema#label
|
AWS IAM roles
|
gptkbp:is_defined_by
|
gptkb:AWS_SDKs
gptkb:AWS_Management_Console
gptkb:AWS_CLI
|
gptkbp:is_monitored_by
|
gptkb:AWS_Cloud_Watch
gptkb:AWS_Cloud_Trail
|
gptkbp:provides
|
permissions to access AWS resources
|
gptkbp:supports
|
cross-account access
service-linked roles
|
gptkbp:used_by
|
AWS services
|
gptkbp:bfsParent
|
gptkb:AWS_Code_Pipeline
|
gptkbp:bfsLayer
|
5
|