comprehend:TagResource

Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.

Policies (any)

1

Allow (Action)

1

Deny (Action)

0

NotAction

0

Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).

Action reference

SAR-style (unofficial)

Service: Amazon Comprehend

Access level

Tagging

Description

Grants permission to tag a resource with given key value pairs

Resource types

  • document-classification-job
  • document-classifier
  • document-classifier-endpoint
  • dominant-language-detection-job
  • entities-detection-job
  • entity-recognizer
  • entity-recognizer-endpoint
  • events-detection-job
  • flywheel
  • flywheel-dataset
  • key-phrases-detection-job
  • pii-entities-detection-job
  • sentiment-detection-job
  • targeted-sentiment-detection-job
  • topics-detection-job

Deny (Action)

None

NotAction

None

Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.

Definitions bundle generated 4/7/2026, 3:29:24 AM