Amazon managed policies for App Mesh
Important
End of support notice: On September 30, 2026, Amazon will discontinue support for Amazon App Mesh. After September 30, 2026, you will no longer be able to access the Amazon App Mesh console or Amazon App Mesh resources. For more information, visit this blog post Migrating from Amazon App Mesh to Amazon ECS Service Connect
An Amazon managed policy is a standalone policy that is created and administered by Amazon. Amazon managed policies are designed to provide permissions for many common use cases so that you can start assigning permissions to users, groups, and roles.
Keep in mind that Amazon managed policies might not grant least-privilege permissions for your specific use cases because they're available for all Amazon customers to use. We recommend that you reduce permissions further by defining customer managed policies that are specific to your use cases.
You cannot change the permissions defined in Amazon managed policies. If Amazon updates the permissions defined in an Amazon managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to. Amazon is most likely to update an Amazon managed policy when a new Amazon Web Services service is launched or new API operations become available for existing services.
For more information, see Amazon managed policies in the IAM User Guide.
Amazon managed policy: AWSAppMeshServiceRolePolicy
You can attach AWSAppMeshServiceRolePolicy
to your IAM entities. Enables access to
Amazon Services and resources used or managed by Amazon App Mesh.
To view the permissions for this policy, see AWSAppMeshServiceRolePolicy in the Amazon Managed Policy Reference.
For information on the permission details for the AWSAppMeshServiceRolePolicy
, see see Service-Linked
Role Permissions for App Mesh.
Amazon managed policy: AWSAppMeshEnvoyAccess
You can attach AWSAppMeshEnvoyAccess
to your IAM entities. App Mesh Envoy policy for
accessing virtual node configuration.
To view the permissions for this policy, see AWSAppMeshEnvoyAccess in the Amazon Managed Policy Reference.
Amazon managed policy: AWSAppMeshFullAccess
You can attach AWSAppMeshFullAccess
to your IAM entities. Provides full access to the
Amazon App Mesh APIs and Amazon Web Services Management Console.
To view the permissions for this policy, see AWSAppMeshFullAccess in the Amazon Managed Policy Reference.
Amazon managed policy: AWSAppMeshPreviewEnvoyAccess
You can attach AWSAppMeshPreviewEnvoyAccess
to your IAM entities. App Mesh Preview Envoy
policy for accessing virtual node configuration.
To view the permissions for this policy, see AWSAppMeshPreviewEnvoyAccess in the Amazon Managed Policy Reference.
Amazon managed policy: AWSAppMeshPreviewServiceRolePolicy
You can attach AWSAppMeshPreviewServiceRolePolicy
to your IAM entities. Enables access
to Amazon Services and resources used or managed by Amazon App Mesh.
To view the permissions for this policy, see AWSAppMeshPreviewServiceRolePolicy in the Amazon Managed Policy Reference.
Amazon managed policy: AWSAppMeshReadOnly
You can attach AWSAppMeshReadOnly
to your IAM entities. Provides read-only access to
the Amazon App Mesh APIs and Amazon Web Services Management Console.
To view the permissions for this policy, see AWSAppMeshReadOnly in the Amazon Managed Policy Reference.
Amazon App Mesh updates to Amazon managed policies
View details about updates to Amazon managed policies for Amazon App Mesh since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Amazon App Mesh Document history page.
Change | Description | Date |
---|---|---|
AWSAppMeshFullAccess – Updated policy. |
Updated |
April 24, 2024 |
AWSAppMeshServiceRolePolicy, AWSServiceRoleForAppMesh – Updated policy. |
Updated |
October 12, 2023 |
To provide access, add permissions to your users, groups, or roles:
-
Users managed in IAM through an identity provider:
Create a role for identity federation. Follow the instructions in Creating a role for a third-party identity provider (federation) in the IAM User Guide.
-
IAM users:
-
Create a role that your user can assume. Follow the instructions in Creating a role for an IAM user in the IAM User Guide.
-
(Not recommended) Attach a policy directly to a user or add a user to a user group. Follow the instructions in Adding permissions to a user (console) in the IAM User Guide.
-