identitystore:DescribeUser
Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.
Policies (any)
17
Allow (Action)
17
Deny (Action)
0
NotAction
0
Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).
Action reference
SAR-style (unofficial)Service: AWS Identity Store
Access level
ReadDescription
Grants permission to retrieve information about user in the specified IdentityStore
Resource types
- Identitystore*
- User*
Dependent actions
- kms:Decrypt
Allow (Action)
- AIOpsConsoleAdminPolicy
- AIOpsOperatorAccess
- AIOpsReadOnlyAccess
- AWSDeadlineCloud-UserAccessFarms
- AWSDeadlineCloud-UserAccessFleets
- AWSDeadlineCloud-UserAccessJobs
- AWSDeadlineCloud-UserAccessQueues
- AWSIdentityCenterExternalManagementPolicy
- AWSSSOServiceRolePolicy
- AWSServiceRoleForUserSubscriptions
- AWSSystemsManagerJustInTimeAccessServicePolicy
- AWSSystemsManagerJustInTimeAccessTokenPolicy
- AWSSystemsManagerJustInTimeAccessTokenSessionPolicy
- AWSSystemsManagerNotificationsServicePolicy
- AmazonNimbleStudio-StudioAdmin
- AmazonNimbleStudio-StudioUser
- ReadOnlyAccess
Deny (Action)
NotAction
Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.
Definitions bundle generated 4/7/2026, 3:29:24 AM