Service actions

Comment

Author: Admin | 2025-04-28

Phrase because no type policy allows the action action in the access denied error message. NoteSome AWS services do not support this access denied error message format. The content of access denied error messages can vary depending on the service making the authorization request. The following examples show the format for different types of access denied error messages. Access denied due to a service control policy – implicit denial Check for a missing Allow statement for the action in your service control policies (SCPs). For the following example, the action is codecommit:ListRepositories. Update your SCP by adding the Allow statement. For more information, see Updating an SCP in the AWS Organizations User Guide. User: arn:aws:iam::777788889999:user/JohnDoe is not authorized to perform:codecommit:ListRepositories because no service control policy allows the codecommit:ListRespositories action Access denied due to a service control policy – explicit denial Check for a Deny statement for the action in your service control policies (SCPs). For the following example, the action is codecommit:ListRepositories. Update your SCP by removing the Deny statement. For more information, see Update a service control policy (SCP) in the AWS Organizations User Guide. User: arn:aws:iam::777788889999:user/JohnDoe is not authorized to perform: codecommit:ListRepositories with an explicit deny in a service control policy Access denied due to a resource control policy – explicit denial Check for a Deny statement for the action in your resource control policies (RCPs). For the following example, the action is secretsmanager:GetSecretValue. Update your RCP by removing the Deny statement. For more information, see Update a resource control policy (RCP) in the AWS Organizations User Guide. User: arn:aws:iam::123456789012:user/JohnDoe is not authorized to perform: secretsmanager:GetSecretValue on resource: arn:aws:secretsmanager:us-east-1:123456789012:secret:* with an explicit deny in a resource control policy Access denied due to a VPC endpoint policy – implicit denial Check for a missing Allow statement for the action in your Virtual Private Cloud (VPC) endpoint policies. For the following example, the action is codecommit:ListRepositories. Update your VPC endpoint policy by adding the Allow statement. For more information, see Update a VPC endpoint policy in the AWS PrivateLink Guide. User: arn:aws:iam::123456789012:user/JohnDoe is not authorized to perform: codecommit:ListRepositories because no

Add Comment