Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Minor inconvenience when checking for user roles #8

Open
CharlesShen opened this issue Apr 20, 2020 · 2 comments
Open

Minor inconvenience when checking for user roles #8

CharlesShen opened this issue Apr 20, 2020 · 2 comments

Comments

@CharlesShen
Copy link

CharlesShen commented Apr 20, 2020

I have a user that currently has the role "AdministratorAccess" attached, but despite this I still get the error message that states the user needs the "AWSElasticBeanstalkFullAccess" role when the script is run. Perhaps the individual required permissions can be queried? Thanks

@hamad-yousif
Copy link

hamad-yousif commented Feb 2, 2021

It's been a while, but it's worth mentioning though. I had a similar issue but I realized that the FullAcess permission was granted to the group of the user rather than the user itself. However, when I checked the PowerShell script, I noticed that it used Get-IAMAttachedUserPolicyList method for checking the policy rather than Get-IAMAttachedGroupPolicyList, hence failing. The resolution is to attached the FullAccess policy to the user directly.

@carldi
Copy link

carldi commented Aug 13, 2021

I have the same problem here. Any fixes?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants