Identity and Access Management integration for Image Builder
Audience
How you use Amazon Identity and Access Management (IAM) differs based on your role:
- 
         
Service user - request permissions from your administrator if you cannot access features (see Troubleshoot IAM issues in Image Builder)
 - 
         
Service administrator - determine user access and submit permission requests (see How Image Builder works with IAM policies and roles)
 - 
         
IAM administrator - write policies to manage access (see Image Builder identity-based policies)
 
Authenticating with identities
For detailed information about how to provide authentication for people and processes in your Amazon Web Services account, see Identities in the IAM User Guide.
Image Builder resource-based policies
For information about how to create a component, see Use components to customize your Image Builder image.
Restricting Image Builder component access to specific IP addresses
The following example grants permissions to any user to perform any Image Builder operations on components. However, the request must originate from the range of IP addresses specified in the condition.
The condition in this statement identifies the 54.240.143.* range of allowed Internet Protocol version 4 (IPv4) IP addresses, with one exception: 54.240.143.188.
The Condition block uses the IpAddress and
				NotIpAddress conditions and the aws:SourceIp condition
				key, which is an Amazon-wide condition key. For more information about these
				condition keys, see Specifying
					Conditions in a Policy. Theaws:sourceIp IPv4 values use the
				standard CIDR notation. For more information, see IP Address Condition Operators in the IAM User Guide.