Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

ECS 3.6.2 Data Access Guide

PDF

Same account access with AssumeRole

You can access the same account using AssumeRole by attaching a policy to the user (identical to the previous user in a different account) or by adding the user as a principal directly in the role trust policy.

Method Example
Attaching a policy to the user
  1. Trust policy for Role assumeRoleSameAccount in ns1:
    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Principal": {
            "AWS": "urn:ecs:iam::ns1:root"
          },
          "Action": "sts:AssumeRole"
        }
      ]
    }
    
  2. Policy is attached to the user1 in ns1 to AssumeRole:
    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Action": [
            "sts:AssumeRole"
          ],
          "Resource": "urn:ecs:iam::ns1:role/assumeRoleSameAccount",
          "Effect": "Allow",
          "Sid": "VisualEditor0"
        }
      ]
    }
    
Adding the user to the role trust policy
Trust policy for Role in ns1 with an ECS IAM user:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "urn:ecs:iam::ns1:user/user1"
      },
      "Action": "sts:AssumeRole"
    }
  ]
}

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\