pub enum PrincipalType {
Everyone,
AWS,
Federated,
Service,
CanonicalUser,
}
Expand description
This describes the way in which the condition ARNs should be understood.
Variants§
Everyone
Anyone, everyone, or anonymous users.
AWS
When you use an AWS account identifier as the principal in a policy, you delegate
authority to the account. Within that account, the permissions in the policy statement
can be granted to all identities. This includes IAM users and roles in that account.
When you specify an AWS account, you can use the account ARN
(arn:aws:iam::AWS-account-ID:root
), or a shortened form that consists of the AWS:
prefix followed by the account ID.
Federated
Federated users either using web identity federation or using a SAML identity provider.
Service
IAM roles that can be assumed by an AWS service are called service roles. Service roles must include a trust policy. Trust policies are resource-based policies that are attached to a role that define which principals can assume the role. Some service roles have predefined trust policies. However, in some cases, you must specify the service principal in the trust policy. A service principal is an identifier that is used to grant permissions to a service.
CanonicalUser
The canonical user ID is an identifier for your account. Because this identifier is used by Amazon S3, only this service provides IAM users with access to the canonical user ID. You can also view the canonical user ID for your account from the AWS Management Console while signed in as the AWS account root user.
Trait Implementations§
Source§impl Clone for PrincipalType
impl Clone for PrincipalType
Source§fn clone(&self) -> PrincipalType
fn clone(&self) -> PrincipalType
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more