View a markdown version of this page

Using service-linked roles for HealthImaging - AWS HealthImaging

Using service-linked roles for HealthImaging

AWS HealthImaging uses AWS Identity and Access Management (IAM) service-linked roles that are predefined by the service and include all the permissions that the service requires to call other AWS services on your behalf. For more information, see Service-linked role permissions in the IAM User Guide.

Service-linked role permissions for HealthImaging

HealthImaging uses the service-linked role named AWSServiceRoleForHealthImaging to perform operations in your AWS account. You need to create this service-linked role if you want HealthImaging to publish metrics about your data stores to CloudWatch.

The role permissions policy named AWSHealthImagingServiceRolePolicy grants permissions for HealthImaging to manage service operations and publish service metrics.

For managed policy updates, see HealthImaging managed policies.

Creating a service-linked role for HealthImaging

Create a service-linked role with the IAM Console

You can create a service-linked role using the IAM Console by Selecting AWS Service as the Trusted entity type, and then HealthImaging in the Use case drop down menu.

Create a service-linked role with the AWS CLI

In the AWS CLI, run aws iam create-service-linked-role —aws-service-name medical-imaging.amazonaws.com

Deleting a service-linked role for HealthImaging

You can delete a service-linked role at any time, but doing so will block HealthImaging from performing actions in your AWS account, such as publishing data store metrics to CloudWatch.

To manually delete the service-linked role using IAM

You can use the IAM console, the AWS CLI, or the AWS API to delete the AWSServiceRoleForHealthImaging service-linked role. For more information, see Deleting a service-linked role in the IAM User Guide. If you deleted a service-linked role, you can use the role creation process to create a new one.