About 1,990 results
Open links in new tab
  1. Defining Lambda function permissions with an execution role

    This page provides information on how to create, view, and manage a Lambda function's execution role. Lambda automatically assumes your execution role when you invoke your function. You should avoid …

  2. How to make a role assumable by given lambda function?

    Aug 22, 2017 · Currently, AWS Lambda doesn't support permissions for this particular action at the resource-level. Therefore, the policy specifies a wildcard character (*) as the Resource value.

  3. Serverless Framework - IAM Permissions For Functions

    AWS Lambda functions need permissions to interact with other AWS services and resources in your account. These permissions are set via an AWS IAM Role, which the Serverless Framework …

  4. AWS Lambda Function Permissions - DEV Community

    Dec 26, 2023 · This policy explicitly states that the AWS Lambda service (identified by the service principal "lambda.amazonaws.com") is allowed to assume the role by calling the sts:AssumeRole …

  5. Grant a Lambda execution role access to an Amazon S3 bucket

    To give your Lambda function access to an Amazon S3 bucket in the same AWS account, complete the following steps: Create an AWS Identity and Access Management (IAM) role for the Lambda function …

  6. AWS CDK: How to create an IAM role that can be assumed by multiple ...

    Jul 9, 2021 · I generally created IAM role with ServicePrincipal which will invoked by some resources automatically and then create PolicyStatement statement for each service that this role will use.

  7. How to add permissions to Lambda Functions in AWS CDK

    Jan 27, 2024 · Let's take a look at a complete example where we: Create a Lambda function. Create an IAM Policy statement. Attach an inline policy to the function's role, passing it the policy statement we …

  8. Set up IAM permissions and roles for Lambda@Edge

    You must configure permissions to allow an IAM entity (such as a user, group, or role) to delete the Lambda@Edge service-linked roles. For more information, see Service-linked role permissions in the …

  9. aws_lambda_permission | Resources - Terraform Registry

    In Terraform v1.5.0 and later, use an import block to import Lambda permission statements using function_name/statement_id with an optional qualifier. For example:

  10. The role defined for the function cannot be assumed by Lambda

    Apr 5, 2016 · For everyone else with similar problem, check your "Principal.Service", in my case, I misconfigured it as "ec2.amazonws.com" and obviously it won't work for a lambda.