AWS introduces additional policy details to access denied error messages
Share
Services
AWS now includes the [AWS Identity and Access Management (IAM)](https://aws.amazon.com/iam/) and [AWS Organizations](https://docs.aws.amazon.com/organizations/) policy’s Amazon Resource Name (ARN) in access denied error messages in same account and same organization scenarios. This allows you to quickly identify the exact policy responsible for the denied access and take action to troubleshoot the issue.
Before this launch, customers had to identify the root cause of access denied errors based only on the policy type in the error message. This launch expedites troubleshooting when you have multiple policies of the same type, as you can directly see which policy to address for explicit deny cases. The error message now includes the policy ARN for Service Control Policies (SCP), Resource Control Policies (RCP), identity-based policies, session policies, and permission boundaries.
This additional context will gradually become available across AWS services in all AWS regions. To learn more, refer to [IAM documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot%5Faccess-denied.html).
What else is happening at Amazon Web Services?
Amazon Connect launches after contact work timeout configuration for tasks, chats, and emails
about 21 hours ago
Services
Share
Amazon Connect launches auto-accept for tasks, chats, and emails
about 21 hours ago
Services
Share
AWS Elastic Beanstalk now supports GitHub Actions for automated application deployment
about 22 hours ago
Services
Share