sts:AssumeRole

Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.

Policies (any)

22

Allow (Action)

22

Deny (Action)

0

NotAction

1

Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).

Action reference

SAR-style (unofficial)

Service: AWS Security Token Service

Access level

Write

Description

Grants permission to obtain a set of temporary security credentials that you can use to access AWS resources that you might not normally have access to

Resource types

  • role*

Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.

Definitions bundle generated 4/7/2026, 3:29:24 AM