aws iam list-attached-user-policies
aws iam list-attached-user-policies --user-name YOUR_USERNAME
To obtain username:
aws sts get-caller-identity | grep user
Official AWS example output
{ "AttachedPolicies": [ { "PolicyName": "AdministratorAccess", "PolicyArn": "arn:aws:iam::aws:policy/AdministratorAccess" }, { "PolicyName": "SecurityAudit", "PolicyArn": "arn:aws:iam::aws:policy/SecurityAudit" } ], "IsTruncated": false }
Related
aws iam list
aws sts get-caller-identity
aws iam list-attached-role-policies
- AWS Policy
AccessDeniedException
An error occurred (AccessDenied) when calling the ListAttachedUserPolicies operation:
An error occurred (AccessDenied) when calling the ListAttachedUserPolicies operation: User: arn:aws:sts::0987654321:assumed-role/YYYY/XXXXX is not authorized to perform: iam:ListAttachedUserPolicies on resource: user YOUR_USERNAME because no identity-based policy allows the iam:ListAttachedUserPolicies action
See also
aws iam [ list-policies | list-attached-user-policies | list-group-policies | list-role-policies | put-group-policy | put-role-policy | put-user-policy | create-policy | attach-role-policy ]
aws iam
[create-user
,create-group, get-user
,list-users
|list-policies
|list-attached-user-policies
|attach-user-policy
|list-attached-user-policies
|list-roles
|get-account-summary
|put-group-policy | put-role-policy | put-user-policy
|create-login-profile
|aws iam delete-virtual-mfa-device
|aws iam list-virtual-mfa-devices
|aws iam create-saml-provider
|aws iam list-account-aliases
|aws iam create-role | aws iam change-password| enable-mfa-device | list-instance-profiles
Advertising: