

本文属于机器翻译版本。若本译文内容与英语原文存在差异，则一律以英文原文为准。

# AWS 身份和访问管理 (IAM) 的操作、资源和条件密钥
<a name="list_awsidentityandaccessmanagementiam"></a>

AWS Identity and Access Management (IAM)（服务前缀`iam`:）提供以下特定于服务的资源、操作和条件上下文密钥，供在 IAM 权限策略中使用。

参考：
+ 了解如何[配置该服务](https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction.html)。
+ 查看[适用于该服务的 API 操作列表](https://docs.aws.amazon.com/IAM/latest/APIReference/)。
+ 了解如何[使用 IAM](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html) 权限策略保护该服务及其资源。

**Topics**
+ [由 AWS 身份和访问管理 (IAM) Access Management 定义的操作](#awsidentityandaccessmanagementiam-actions-as-permissions)
+ [由 AWS 身份与访问管理 (IAM) Access Management 定义的资源类型](#awsidentityandaccessmanagementiam-resources-for-iam-policies)
+ [AWS 身份和访问管理 (IAM) 的条件密钥 Access Management](#awsidentityandaccessmanagementiam-policy-keys)

## 由 AWS 身份和访问管理 (IAM) Access Management 定义的操作
<a name="awsidentityandaccessmanagementiam-actions-as-permissions"></a>

您可以在 IAM 策略语句的 `Action` 元素中指定以下操作。可以使用策略授予在 AWS中执行操作的权限。您在策略中使用一项操作时，通常使用相同的名称允许或拒绝对 API 操作或 CLI 命令的访问。但在某些情况下，单一动作可控制对多项操作的访问。还有某些操作需要多种不同的动作。

操作表的**访问级别**列描述如何对操作进行分类（列出、读取、权限管理或标记）。此分类可以帮助您了解当您在策略中使用操作时，相应操作授予的访问级别。有关访问级别的更多信息，请参阅[策略摘要中的访问级别](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_understand-policy-summary-access-level-summaries.html)。

操作表的**资源类型**列指示每项操作是否支持资源级权限。如果该列没有任何值，您必须在策略语句的 `Resource` 元素中指定策略应用的所有资源（“\$1”）。通过在 IAM policy 中使用条件来筛选访问权限，以控制是否可以在资源或请求中使用特定标签键。如果操作具有一个或多个必需资源，则调用方必须具有使用这些资源来使用该操作的权限。必需资源在表中以星号 (\$1) 表示。如果您在 IAM policy 中使用 `Resource` 元素限制资源访问权限，则必须为每种必需的资源类型添加 ARN 或模式。某些操作支持多种资源类型。如果资源类型是可选的（未指示为必需），则可以选择使用一种可选资源类型。

操作表的**条件键**列包括可以在策略语句的 `Condition` 元素中指定的键。有关与服务资源关联的条件键的更多信息，请参阅资源类型表的**条件键**列。

操作表的**依赖操作**列显示成功调用操作可能需要的其他权限。除了操作本身的权限以外，可能还需要这些权限。若某个操作指定依赖操作，则这些依赖关系可能适用于为该操作定义的其他资源，而不仅仅是表中列出的第一个资源。

**注意**  
资源条件键在[资源类型](#awsidentityandaccessmanagementiam-resources-for-iam-policies)表中列出。您可以在操作表的**资源类型（\$1 为必需）**列中找到应用于某项操作的资源类型的链接。资源类型表中的资源类型包括**条件密钥**列，这是应用于操作表中操作的资源条件键。

有关下表中各列的详细信息，请参阅[操作表](reference_policies_actions-resources-contextkeys.html#actions_table)。


****  
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/zh_cn/service-authorization/latest/reference/list_awsidentityandaccessmanagementiam.html)

## 由 AWS 身份与访问管理 (IAM) Access Management 定义的资源类型
<a name="awsidentityandaccessmanagementiam-resources-for-iam-policies"></a>

以下资源类型是由该服务定义的，可以在 IAM 权限策略语句的 `Resource` 元素中使用这些资源类型。[操作表](#awsidentityandaccessmanagementiam-actions-as-permissions)中的每个操作指定了可以使用该操作指定的资源类型。您也可以在策略中包含条件键，从而定义资源类型。这些键显示在资源类型表的最后一列。有关下表中各列的详细信息，请参阅[资源类型表](reference_policies_actions-resources-contextkeys.html#resources_table)。


****  

| 资源类型 | ARN | 条件键 | 
| --- | --- | --- | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor-view-data-orgs.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor-view-data-orgs.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:access-report/\$1\$1EntityPath\$1  |  | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_use-resources.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_use-resources.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:assumed-role/\$1\$1RoleName\$1/\$1\$1RoleSessionName\$1  |  | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:federated-user/\$1\$1UserName\$1  |  | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:group/\$1\$1GroupNameWithPath\$1  |  | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:instance-profile/\$1\$1InstanceProfileNameWithPath\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:mfa/\$1\$1MfaTokenIdWithPath\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:oidc-provider/\$1\$1OidcProviderName\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:policy/\$1\$1PolicyNameWithPath\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:role/\$1\$1RoleNameWithPath\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   [#awsidentityandaccessmanagementiam-iam_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-iam_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:saml-provider/\$1\$1SamlProviderName\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:server-certificate/\$1\$1CertificateNameWithPath\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:sms-mfa/\$1\$1MfaTokenIdWithPath\$1  |  | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:user/\$1\$1UserNameWithPath\$1  |   [#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-aws_ResourceTag___TagKey_)   [#awsidentityandaccessmanagementiam-iam_ResourceTag___TagKey_](#awsidentityandaccessmanagementiam-iam_ResourceTag___TagKey_)   | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-temporary-delegation.html](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-temporary-delegation.html)  |  arn:\$1\$1Partition\$1:iam::\$1\$1Account\$1:delegation-request/\$1\$1DelegationRequestId\$1  |   [#awsidentityandaccessmanagementiam-iam_DelegationRequestOwner](#awsidentityandaccessmanagementiam-iam_DelegationRequestOwner)   | 

## AWS 身份和访问管理 (IAM) 的条件密钥 Access Management
<a name="awsidentityandaccessmanagementiam-policy-keys"></a>

AWS 身份和访问管理 (IAM) 定义了以下条件密钥，这些条件密钥可用于 IAM 策略`Condition`的元素。您可以使用这些键进一步细化应用策略语句的条件。有关下表中各列的详细信息，请参阅[条件键表](reference_policies_actions-resources-contextkeys.html#context_keys_table)。

要查看适用于所有服务的全局条件键，请参阅 [AWS 全局条件上下文键](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html)。


****  

| 条件键 | 描述 | 类型 | 
| --- | --- | --- | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-requesttag](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-requesttag)  | 根据在请求中传递的标签筛选访问 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag)  | 根据与资源关联的标签筛选访问 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys)  | 根据在请求中传递的标签键筛选访问 | ArrayOfString | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_AWSServiceName](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_AWSServiceName)  | 筛选该角色所属 AWS 服务的访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_AssociatedResourceArn](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_AssociatedResourceArn)  | 按将代表使用的角色的资源筛选访问权限 | 进行筛选 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_DelegationDuration](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_DelegationDuration)  | 根据请求的委托持续时间筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_DelegationRequestOwner](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_DelegationRequestOwner)  | 根据委托请求所有者筛选访问权限 | 进行筛选 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_FIDO-FIPS-140-2-certification](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_FIDO-FIPS-140-2-certification)  | 按注册 FIDO 安全密钥时的 MFA 设备 FIPS-140-2 验证认证级别筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_FIDO-FIPS-140-3-certification](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_FIDO-FIPS-140-3-certification)  | 按注册 FIDO 安全密钥时的 MFA 设备 FIPS-140-3 验证认证级别筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_FIDO-certification](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_FIDO-certification)  | 按注册 FIDO 安全密钥时的 MFA 设备 FIDO 认证级别筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_NotificationChannel](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_NotificationChannel)  | 根据请求的通知渠道筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_OrganizationsPolicyId](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_OrganizationsPolicyId)  | 按 Organizations 策略的 AWS ID 筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_PassedToService](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_PassedToService)  | 筛选传递此角色的 AWS 服务的访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_PermissionsBoundary](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_PermissionsBoundary)  | 根据指定策略设置是否为 IAM 实体（用户或角色）上的权限边界以筛选访问 | 进行筛选 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_PolicyARN](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_PolicyARN)  | 按 IAM policy 的 ARN 筛选访问 | 进行筛选 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_RegisterSecurityKey](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_RegisterSecurityKey)  | 按当前 MFA 设备启用状态筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_ResourceTag](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_ResourceTag)  | 按附加到 IAM 实体（用户或角色）的标签筛选访问 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_ServiceSpecificCredentialAgeDays](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_ServiceSpecificCredentialAgeDays)  | 按凭证到期前的持续时间筛选访问权限 | 数值 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_ServiceSpecificCredentialServiceName](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_ServiceSpecificCredentialServiceName)  | 按与凭证关联的服务筛选访问权限 | 字符串 | 
|   [https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_TemplateArn](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_TemplateArn)  | 根据请求的模板 ARN 筛选访问权限 | 进行筛选 | 