Bird
0
0

A user cannot assume an IAM role despite having the correct permissions. The trust policy of the role is:

medium📝 Debug Q7 of 15
AWS - Identity and Access Management
A user cannot assume an IAM role despite having the correct permissions. The trust policy of the role is:
{"Effect": "Allow", "Principal": {"AWS": "arn:aws:iam::123456789012:user/Alice"}, "Action": "sts:AssumeRole"}

What is the likely issue?
AThe trust policy is missing the 'Version' element
BThe Principal ARN is incorrect or incomplete
CThe Action should be 'iam:AssumeRole' instead of 'sts:AssumeRole'
DThe user does not have permission to call AssumeRole
Step-by-Step Solution
Solution:
  1. Step 1: Verify trust policy structure

    The trust policy is missing the required 'Version': '2012-10-17' element, making it invalid.
  2. Step 2: Check policy validity

    Without Version, the policy fails and the role cannot be assumed.
  3. Final Answer:

    The trust policy is missing the 'Version' element -> Option A
  4. Quick Check:

    Missing Version in trust policy = A [OK]
Quick Trick: Trust policy Principal must match exact user ARN [OK]
Common Mistakes:
MISTAKES
  • Using wrong action name in trust policy
  • Omitting Version element (required)
  • Ignoring user permissions to call AssumeRole

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More AWS Quizzes