You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 5, 2021. It is now read-only.
ERROR: AccessDenied: User: arn:aws:iam::566964866387:user/docker is not authorized to perform: iam:GetUser on resource: arn:aws:iam::566964866387:user/docker
This is a user that doesn't have permissions for any user-related operations ("power user" by the standard IAM policies). Would it be possible to catch errors at that point and prompt the user for identification of the credentials instead?
The text was updated successfully, but these errors were encountered:
Got caught out by this one too!
Feels like having the user supply the identification in this case would be a good way to go. (I'm assuming that's all the extra access is needed for?)
Same here - all my accounts are very restricted to a very specific resource subset. For now, I simply created a group called credulous-users with above policy and subscribed all users to it. However, a manual alternative would be great - especially as this info is only needed for descriptive purposes if I understood correctly.
ERROR: AccessDenied: User: arn:aws:iam::566964866387:user/docker is not authorized to perform: iam:GetUser on resource: arn:aws:iam::566964866387:user/docker
This is a user that doesn't have permissions for any user-related operations ("power user" by the standard IAM policies). Would it be possible to catch errors at that point and prompt the user for identification of the credentials instead?
The text was updated successfully, but these errors were encountered: