You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 24, 2018. It is now read-only.
Hi,
I am using cognito federated identity ID unauthorized version to set AWS credentials.
I already granted all the permissions for Cognito_myPoolNameUnauth_Role.
And it seems like other services like putting object in s3 bucket or creating dynamoDB table have
no problem. Everything works well except for creating lambda function code.
I get the same error again and again even after role is set properly for lambda.
Is this cognito identity credentials problem or iam problem?
I don't understand why iam role will have authorization error of iam:passrole
with all the permissions given.
Please help me find solution.
Thank you!
error : AccessDeniedException: User: arn:aws:sts:::assumed-role/Cognito_myPoolNameUnauth_Role/CognitoIdentityCredentials is not authorized to perform: iam:PassRole on resource: arn:aws:iam::*****:role/lambda_basic_execution
The text was updated successfully, but these errors were encountered:
Hi,
I am using cognito federated identity ID unauthorized version to set AWS credentials.
I already granted all the permissions for Cognito_myPoolNameUnauth_Role.
And it seems like other services like putting object in s3 bucket or creating dynamoDB table have
no problem. Everything works well except for creating lambda function code.
I get the same error again and again even after role is set properly for lambda.
Is this cognito identity credentials problem or iam problem?
I don't understand why iam role will have authorization error of iam:passrole
with all the permissions given.
Please help me find solution.
Thank you!
error : AccessDeniedException: User: arn:aws:sts:::assumed-role/Cognito_myPoolNameUnauth_Role/CognitoIdentityCredentials is not authorized to perform: iam:PassRole on resource: arn:aws:iam::*****:role/lambda_basic_execution
The text was updated successfully, but these errors were encountered: