File tree Expand file tree Collapse file tree
205-iam-service-linked-roles Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ # Iam Access Analyzer
2+
3+ An AWS CLI tutorial that demonstrates Accessanalyzer operations.
4+
5+ ## Running
6+
7+ ``` bash
8+ bash iam-access-analyzer.sh
9+ ```
10+
11+ To auto-run with cleanup:
12+
13+ ``` bash
14+ echo ' y' | bash iam-access-analyzer.sh
15+ ```
16+
17+ ## What it does
18+
19+ 1 . Creating analyzer: $ANALYZER
20+ 2 . Listing findings
21+ 3 . Getting analyzer details
22+ 4 . Listing analyzers
23+
24+ ## Resources created
25+
26+ - Analyzer
27+
28+ The script prompts you to clean up resources when it finishes.
29+
30+ ## Cost
31+
32+ Free tier eligible for most operations. Clean up resources after use to avoid charges.
33+
34+ ## Related docs
35+
36+ - [ AWS CLI accessanalyzer reference] ( https://docs.aws.amazon.com/cli/latest/reference/accessanalyzer/index.html )
37+
Original file line number Diff line number Diff line change 1+ # Iam Access Analyzer
2+
3+ ## Prerequisites
4+
5+ 1 . AWS CLI installed and configured (` aws configure ` )
6+ 2 . Appropriate IAM permissions for the AWS services used
7+
8+ ## Step 1: Creating analyzer: $ANALYZER
9+
10+ The script handles this step automatically. See ` iam-access-analyzer.sh ` for the exact CLI commands.
11+
12+ ## Step 2: Listing findings
13+
14+ The script handles this step automatically. See ` iam-access-analyzer.sh ` for the exact CLI commands.
15+
16+ ## Step 3: Getting analyzer details
17+
18+ The script handles this step automatically. See ` iam-access-analyzer.sh ` for the exact CLI commands.
19+
20+ ## Step 4: Listing analyzers
21+
22+ The script handles this step automatically. See ` iam-access-analyzer.sh ` for the exact CLI commands.
23+
24+ ## Cleanup
25+
26+ The script prompts you to clean up all created resources. If you need to clean up manually, check the script log for the resource names that were created.
27+
Original file line number Diff line number Diff line change 1+ # Iam Mfa
2+
3+ A read-only script that queries Iam resources and displays information.
4+
5+ ## Running
6+
7+ ``` bash
8+ bash iam-mfa.sh
9+ ```
10+
11+ ## What it does
12+
13+ 1 . Listing MFA devices
14+ 2 . Listing virtual MFA devices
15+ 3 . Getting account summary (MFA status)
16+ 4 . Getting credential report
17+
18+ ## Resources created
19+
20+ None — this script is read-only.
21+
22+ ## Cost
23+
24+ No cost. This script only reads existing resources.
25+
26+ ## Related docs
27+
28+ - [ AWS CLI iam reference] ( https://docs.aws.amazon.com/cli/latest/reference/iam/index.html )
29+
Original file line number Diff line number Diff line change 1+ # Iam Mfa
2+
3+ ## Prerequisites
4+
5+ 1 . AWS CLI installed and configured (` aws configure ` )
6+ 2 . Appropriate IAM permissions for the AWS services used
7+
8+ ## Step 1: Listing MFA devices
9+
10+ The script handles this step automatically. See ` iam-mfa.sh ` for the exact CLI commands.
11+
12+ ## Step 2: Listing virtual MFA devices
13+
14+ The script handles this step automatically. See ` iam-mfa.sh ` for the exact CLI commands.
15+
16+ ## Step 3: Getting account summary (MFA status)
17+
18+ The script handles this step automatically. See ` iam-mfa.sh ` for the exact CLI commands.
19+
20+ ## Step 4: Getting credential report
21+
22+ The script handles this step automatically. See ` iam-mfa.sh ` for the exact CLI commands.
23+
Original file line number Diff line number Diff line change 1+ # Iam Password Policy
2+
3+ A read-only script that queries Iam resources and displays information.
4+
5+ ## Running
6+
7+ ``` bash
8+ bash iam-password-policy.sh
9+ ```
10+
11+ ## What it does
12+
13+ 1 . Getting current password policy
14+ 2 . Getting account authorization details summary
15+ 3 . Listing access keys
16+
17+ ## Resources created
18+
19+ None — this script is read-only.
20+
21+ ## Cost
22+
23+ No cost. This script only reads existing resources.
24+
25+ ## Related docs
26+
27+ - [ AWS CLI iam reference] ( https://docs.aws.amazon.com/cli/latest/reference/iam/index.html )
28+
Original file line number Diff line number Diff line change 1+ # Iam Password Policy
2+
3+ ## Prerequisites
4+
5+ 1 . AWS CLI installed and configured (` aws configure ` )
6+ 2 . Appropriate IAM permissions for the AWS services used
7+
8+ ## Step 1: Getting current password policy
9+
10+ The script handles this step automatically. See ` iam-password-policy.sh ` for the exact CLI commands.
11+
12+ ## Step 2: Getting account authorization details summary
13+
14+ The script handles this step automatically. See ` iam-password-policy.sh ` for the exact CLI commands.
15+
16+ ## Step 3: Listing access keys
17+
18+ The script handles this step automatically. See ` iam-password-policy.sh ` for the exact CLI commands.
19+
Original file line number Diff line number Diff line change 1+ # Iam Groups
2+
3+ An AWS CLI tutorial that demonstrates Iam operations.
4+
5+ ## Running
6+
7+ ``` bash
8+ bash iam-groups.sh
9+ ```
10+
11+ To auto-run with cleanup:
12+
13+ ``` bash
14+ echo ' y' | bash iam-groups.sh
15+ ```
16+
17+ ## What it does
18+
19+ 1 . Creating group: $G"; aws iam create-group --group-name "$G
20+ 2 . Attaching policy"; aws iam attach-group-policy --group-name "$G
21+ 3 . Describing group"; aws iam get-group --group-name "$G
22+ 4 . Listing attached policies"; aws iam list-attached-group-policies --group-name "$G
23+
24+ ## Resources created
25+
26+ - Group
27+
28+ The script prompts you to clean up resources when it finishes.
29+
30+ ## Cost
31+
32+ Free tier eligible for most operations. Clean up resources after use to avoid charges.
33+
34+ ## Related docs
35+
36+ - [ AWS CLI iam reference] ( https://docs.aws.amazon.com/cli/latest/reference/iam/index.html )
37+
Original file line number Diff line number Diff line change 1+ # Iam Groups
2+
3+ ## Prerequisites
4+
5+ 1 . AWS CLI installed and configured (` aws configure ` )
6+ 2 . Appropriate IAM permissions for the AWS services used
7+
8+ ## Step 1: Creating group: $G"; aws iam create-group --group-name "$G
9+
10+ The script handles this step automatically. See ` iam-groups.sh ` for the exact CLI commands.
11+
12+ ## Step 2: Attaching policy"; aws iam attach-group-policy --group-name "$G
13+
14+ The script handles this step automatically. See ` iam-groups.sh ` for the exact CLI commands.
15+
16+ ## Step 3: Describing group"; aws iam get-group --group-name "$G
17+
18+ The script handles this step automatically. See ` iam-groups.sh ` for the exact CLI commands.
19+
20+ ## Step 4: Listing attached policies"; aws iam list-attached-group-policies --group-name "$G
21+
22+ The script handles this step automatically. See ` iam-groups.sh ` for the exact CLI commands.
23+
24+ ## Cleanup
25+
26+ The script prompts you to clean up all created resources. If you need to clean up manually, check the script log for the resource names that were created.
27+
Original file line number Diff line number Diff line change 1+ # Iam Service Linked Roles
2+
3+ A read-only script that queries Iam resources and displays information.
4+
5+ ## Running
6+
7+ ``` bash
8+ bash iam-service-linked-roles.sh
9+ ```
10+
11+ ## What it does
12+
13+ 1 . Listing service-linked roles
14+ 2 . Counting roles by type"; echo " Service-linked: $(aws iam list-roles --query 'Roles[ ?starts_with(Path, ` /aws-service-role/ ` )] | length(@)' --output text)
15+
16+ ## Resources created
17+
18+ None — this script is read-only.
19+
20+ ## Cost
21+
22+ No cost. This script only reads existing resources.
23+
24+ ## Related docs
25+
26+ - [ AWS CLI iam reference] ( https://docs.aws.amazon.com/cli/latest/reference/iam/index.html )
27+
Original file line number Diff line number Diff line change 1+ # Iam Service Linked Roles
2+
3+ ## Prerequisites
4+
5+ 1 . AWS CLI installed and configured (` aws configure ` )
6+ 2 . Appropriate IAM permissions for the AWS services used
7+
8+ ## Step 1: Listing service-linked roles
9+
10+ The script handles this step automatically. See ` iam-service-linked-roles.sh ` for the exact CLI commands.
11+
12+ ## Step 2: Counting roles by type"; echo " Service-linked: $(aws iam list-roles --query 'Roles[ ?starts_with(Path, ` /aws-service-role/ ` )] | length(@)' --output text)
13+
14+ The script handles this step automatically. See ` iam-service-linked-roles.sh ` for the exact CLI commands.
15+
You can’t perform that action at this time.
0 commit comments