Bird
0
0

You execute:

medium📝 Debug Q6 of 15
AWS - Identity and Access Management
You execute:
aws sts assume-role --role-arn arn:aws:iam::123456789012:role/AdminRole --role-session-name AdminSession

and receive "AccessDenied: User is not authorized to perform sts:AssumeRole". What is the most probable reason?
AThe role ARN is invalid or does not exist
BThe user's IAM policy does not permit sts:AssumeRole on the specified role
CThe AWS CLI is outdated and cannot perform assume-role
DThe session name is missing or invalid
Step-by-Step Solution
Solution:
  1. Step 1: Analyze error message

    AccessDenied for sts:AssumeRole indicates permission issues.
  2. Step 2: Check IAM policies

    User must have explicit permission to call sts:AssumeRole on the role.
  3. Final Answer:

    The user's IAM policy does not permit sts:AssumeRole on the specified role -> Option B
  4. Quick Check:

    Permission missing for sts:AssumeRole causes AccessDenied [OK]
Quick Trick: Missing sts:AssumeRole permission causes AccessDenied [OK]
Common Mistakes:
  • Assuming role ARN is invalid without checking permissions
  • Blaming CLI version
  • Thinking session name causes AccessDenied

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More AWS Quizzes