IAM actions for Claude Platform on AWS
IAM action reference for controlling access to Claude Platform on AWS through AWS policies.
Claude Platform on AWS uses AWS IAM for access control. Every API route maps to an IAM action in the aws-external-anthropic namespace. This page lists all actions, the routes each action authorizes, and the managed policies available for common access patterns. For platform setup and authentication, see What is Claude Platform on AWS?.
Service details
|
IAM service prefix |
|
|
Resource types |
|
|
Workspace ARN |
|
The ARN region is always populated and matches the region the workspace is bound to. The resource segment is the tagged workspace ID (wrkspc_…), the same value you pass in the anthropic-workspace-id header.
Actions
The service defines 58 actions across 14 groups. Actions follow the AWS VerbNoun convention and use verb discipline so that Get* and List* wildcards produce a clean read-only boundary.
Inference
| Action | Routes authorized |
|---|---|
|
|
|
|
|
|
Batch processing
| Action | Routes authorized |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Models
| Action | Routes authorized |
|---|---|
|
|
|
|
|
|
Files
| Action | Routes authorized |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
Note
GetFile authorizes both metadata and content download. A principal with read-only access can download file bytes, not just list files.
Skills
| Action | Routes authorized |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Note
Deleting an individual skill version maps to UpdateSkill, not DeleteSkill. A policy that denies aws-external-anthropic:Delete* still permits version deletion. Deny UpdateSkill and CreateSkill as well if you need to prevent any skill mutation.
User profiles
| Action | Routes authorized |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
Warning
IAM action matching is case-insensitive. The wildcard aws-external-anthropic:*File matches CreateFile, GetFile, and DeleteFile, but does not match ListFiles (which ends in "files", not "file"). It also over-matches CreateUserProfile, GetUserProfile, and UpdateUserProfile because "Profile" ends in "file". If you intend to grant or deny only Files API actions, enumerate them explicitly (CreateFile, GetFile, ListFiles, DeleteFile) rather than using a *File suffix pattern.
Agents
Agent definitions for Claude Managed Agents
| Action | Routes authorized |
|---|---|
|
|
Agent create routes |
|
|
Agent read routes |
|
|
Agent list routes |
|
|
Agent update routes |
|
|
Agent archive routes |
Sessions
Agent sessions and event history.
| Action | Routes authorized |
|---|---|
|
|
Session create routes |
|
|
Session read routes |
|
|
Session list routes |
|
|
Session update routes |
|
|
Session archive routes |
|
|
Session delete routes |
Environments
Cloud container configurations for sessions.
| Action | Routes authorized |
|---|---|
|
|
Environment create routes |
|
|
Environment read routes |
|
|
Environment list routes |
|
|
Environment update routes |
|
|
Environment archive routes |
|
|
Environment delete routes |
Vaults
Credential vaults for session authentication.
| Action | Routes authorized |
|---|---|
|
|
Vault create routes |
|
|
Vault read routes |
|
|
Vault list routes |
|
|
Vault update routes |
|
|
Vault archive routes |
|
|
Vault delete routes |
Note
Vault operations are classified as CloudTrail Management events (rather than Data events) because vaults hold credentials and benefit from default-on audit logging. Other Claude Managed Agents operations (agents, sessions, environments, memory stores) are Data events.
Memory stores
Persistent agent memory.
| Action | Routes authorized |
|---|---|
|
|
Memory store create routes |
|
|
Memory store read routes |
|
|
Memory store list routes |
|
|
Memory store update routes |
|
|
Memory store archive routes |
|
|
Memory store delete routes |
Note
GetMemoryStore reads memory contents. The Get* wildcard in a managed or custom policy therefore grants memory read access. Scope policies explicitly if memory contents must be restricted.
Workspaces
| Action | Routes authorized |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A default workspace is provisioned at sign-up; see Workspaces.
Authentication
| Action | Routes authorized |
|---|---|
|
|
(none) |
CallWithBearerToken is an auth-layer permission that authorizes a principal to authenticate through an API key (bearer token) rather than AWS SigV4. It does not map to a route. Grant it alongside the route-mapped actions you want the API key holder to perform.
Console access
| Action | Routes authorized |
|---|---|
|
|
(none) |
AssumeConsole authorizes a principal to open the Claude Console for a Claude Platform on AWS workspace through the AWS Console federation flow. It does not map to a route. Grant it to principals who should be able to click Open Claude Console on the Claude Platform on AWS service page in the AWS Console. The console capability (developer or admin) is controlled by the aws-external-anthropic:Capability condition key on the AssumeConsole action; see IAM policies for details on the capability model and Using the Claude Console for the sign-in flow.
Warning
aws-external-anthropic:AssumeConsole issues a Claude Console session that lasts up to 12 hours, independent of the caller’s own session duration. A caller whose IAM session is shorter than 12 hours can still obtain a console session that outlives their source credentials. Restrict this permission to principals who require Claude Console access, and revoke it promptly when no longer needed.
Note
Actions performed inside the Claude Console after federation are not recorded in AWS CloudTrail or attributable through IAM. This includes global, workspace-scoped activities such as viewing usage reports. If you need an audit trail for console activity, use the audit logs available in the Claude Console rather than CloudTrail.
Route-to-action mapping
The following table lists every route on Claude Platform on AWS and the IAM action required to call it. The stable route’s IAM action also authorizes requests that use the anthropic-beta header. CloudTrail classifies each action as either a Data event (high-volume, data-plane operations) or a Management event (control-plane operations).
| Method | Route | IAM action | CloudTrail event type |
|---|---|---|---|
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Data |
|
|
|
|
Management |
|
|
|
|
Management |
|
|
|
|
Management |
|
|
|
|
Management |
|
|
|
|
Management |
Claude Managed Agents routes (agents, sessions, environments, vaults, memory stores) follow the same route-to-action pattern; for the complete per-route mapping, see the Anthropic IAM actions reference
Routes not on Claude Platform on AWS are denied at the gateway by default.
See also
-
IAM policies for example policies and managed policies
-
AWS IAM User Guide for IAM policy syntax and evaluation logic
-
AWS CloudTrail User Guide for audit logging configuration