

# Access for the Benefits API
<a name="benefits-access-control"></a>

Access control and permissions are managed by AWS Identity and Access Management (IAM). This section provides guidance for configuring the necessary permissions to interact with the Benefits API.

## Prerequisites
<a name="benefits-prerequisites"></a>

Before configuring permissions, ensure that your AWS account is linked to and that you created the necessary IAM roles and users. For more information, see [Setup and Authentication](https://docs.aws.amazon.com/partner-central/latest/APIReference/setup-authentication.html).

## Using AWS managed policies
<a name="benefits-using-aws-managed-policies"></a>

AWS provides managed policies that grant the required permissions to interact with the Benefits API. To provide the necessary access to manage benefits resources, attach the `AWSPartnerCentralFullAccess` policy to your IAM identities. For more information, see [AWS managed policies for users](https://docs.aws.amazon.com/partner-central/latest/getting-started/managed-policies.html).

## Assigning policies to IAM roles and users
<a name="benefits-assigning-policies"></a>

Follow these steps to assign policies to IAM roles and users:

1. Sign in to the AWS Management Console.

1. Navigate to the IAM service.

1. Select roles or users, and choose the IAM role or user to which you want to attach a policy.

1. Attach the `AWSPartnerCentralFullAccess` policy to the selected IAM role or user.

For more information, see [Adding and removing IAM identity permissions](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-attach-detach.html).

## Managing permissions using condition keys
<a name="benefits-managing-permissions-with-condition-keys"></a>

Condition keys in IAM policies provide resource-level permissions for when to enforce statement policies. You can use condition keys to specify conditions that dictate when certain permissions are allowed or denied.

For more information, see [IAM JSON policy elements: Condition operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html).


**Condition keys overview**  

| Condition key | Description | Applicable actions | Valid values | 
| --- | --- | --- | --- | 
| partnercentral:Catalog | filters access by the type of the associated catalog entity | all actions | AWS, sandbox | 

## Summary of required permissions
<a name="benefits-summary-of-required-permissions"></a>


**Summary of required permissions**  

| Action | Description | 
| --- | --- | 
| partnercentral:AmendBenefitApplication | allows amending benefit applications | 
| partnercentral:AssociateBenefitApplicationResource | allows associating resources with benefit applications | 
| partnercentral:CancelBenefitApplication | allows canceling benefit applications | 
| partnercentral:CreateBenefitApplication | allows creating benefit applications | 
| partnercentral:DisassociateBenefitApplicationResource | allows disassociating resources from benefit applications | 
| partnercentral:GetBenefit | allows retrieving benefit details | 
| partnercentral:GetBenefitAllocation | allows retrieving benefit allocation details | 
| partnercentral:GetBenefitApplication | allows retrieving benefit application details | 
| partnercentral:ListBenefitAllocations | allows listing benefit allocations | 
| partnercentral:ListBenefitApplications | allows listing benefit applications | 
| partnercentral:ListBenefits | allows listing benefits | 
| partnercentral:RecallBenefitApplication | allows recalling benefit applications | 
| partnercentral:SubmitBenefitApplication | allows submitting benefit applications | 
| partnercentral:UpdateBenefitApplication | allows updating benefit applications | 