+ Actions, resources, and condition keys for Amazon Connect Voice ID +
+
+ Amazon Connect Voice ID (service prefix:
+
+ voiceid
+
+ ) provides the following service-specific resources, actions, and condition context
+ keys for use in IAM permission policies.
+
+ References: +
+-
+
-
+
+ Learn how to + + configure this service + + . +
+
+ -
+
+ View a list of the + + API operations available for this service + + . +
+
+ -
+
+ Learn how to secure this service and its resources by + + using IAM + + permission policies. +
+
+
+ + Topics + +
+ ++ Actions defined by Amazon Connect Voice ID +
+
+ You can specify the following actions in the
+
+ Action
+
+ element of an IAM policy statement. Use policies to grant permissions to perform
+ an operation in AWS. When you use an action in a policy, you usually allow or
+ deny access to the API operation or CLI command with the same name. However,
+ in some cases, a single action controls access to more than one operation. Alternatively,
+ some operations require several different actions.
+
+ The
+
+ Resource types
+
+ column indicates whether each action supports resource-level permissions. If
+ there is no value for this column, you must specify all resources ("*") in the
+
+ Resource
+
+ element of your policy statement. If the column includes a resource type, then
+ you can specify an ARN of that type in a statement with that action. Required
+ resources are indicated in the table with an asterisk (*). If you specify a resource-level
+ permission ARN in a statement using this action, then it must be of this type.
+ Some actions support multiple resource types. If the resource type is optional (not
+ indicated as required), then you can choose to use one but not the other.
+
+ For details about the columns in the following table, see + + The actions table + + . +
++ Actions + | ++ Description + | ++ Access level + | ++ Resource types (*required) + | ++ Condition keys + | ++ Dependent actions + | +
---|---|---|---|---|---|
+ + + + CreateDomain + + | ++ Grants permission to create a domain + | ++ Write + | ++ | +
+ + + aws:RequestTag/${TagKey} + + ++ + aws:TagKeys + + + |
+ + | +
+ + + + DeleteDomain + + | ++ Grants permission to delete a domain + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + DeleteFraudster + + | ++ Grants permission to delete a fraudster + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + DeleteSpeaker + + | ++ Grants permission to delete a speaker + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + DescribeComplianceConsent + + [permission only] + | ++ Grants permission to describe compliance consent + | ++ Read + | ++ | ++ | ++ | +
+ + + + DescribeDomain + + | ++ Grants permission to describe a domain + | ++ Read + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + DescribeFraudster + + | ++ Grants permission to describe a fraudster + | ++ Read + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + DescribeFraudsterRegistrationJob + + | ++ Grants permission to describe a fraudster registration job + | ++ Read + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + DescribeSpeaker + + | ++ Grants permission to describe a speaker + | ++ Read + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + DescribeSpeakerEnrollmentJob + + | ++ Grants permission to describe a speaker enrollment job + | ++ Read + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + EvaluateSession + + | ++ Grants permission to evaluate a session + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + ListDomains + + | ++ Grants permission to list domains for an account + | ++ List + | ++ | ++ | ++ | +
+ + + + ListFraudsterRegistrationJobs + + | ++ Grants permission to list fraudster registration jobs for a domain + | ++ List + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + ListSpeakerEnrollmentJobs + + | ++ Grants permission to list speaker enrollment jobs for a domain + | ++ List + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + ListSpeakers + + | ++ Grants permission to list speakers for a domain + | ++ List + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + ListTagsForResource + + | ++ Grants permission to list tags for a Voice ID resource + | ++ Read + | +
+ + + domain + + + |
+ + | ++ | +
+ + + + OptOutSpeaker + + | ++ Grants permission to opt out a speaker + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + RegisterComplianceConsent + + [permission only] + | ++ Grants permission to register compliance consent + | ++ Write + | ++ | ++ | ++ | +
+ + + + StartFraudsterRegistrationJob + + | ++ Grants permission to start a fraudster registration job + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + StartSpeakerEnrollmentJob + + | ++ Grants permission to start a speaker enrollment job + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ + + + TagResource + + | ++ Grants permission to tag a Voice ID resource + | ++ Tagging + | +
+ + + domain + + + |
+ + | ++ | +
+ | +
+ + + aws:RequestTag/${TagKey} + + ++ + aws:TagKeys + + + |
+ + | +|||
+ + + + UntagResource + + | ++ Grants permission to remove a tag from a Voice ID resource + | ++ Tagging + | +
+ + + domain + + + |
+ + | ++ | +
+ | +
+ + + aws:TagKeys + + + |
+ + | +|||
+ + + + UpdateDomain + + | ++ Grants permission to update a domain + | ++ Write + | +
+ + + domain* + + + |
+ + | ++ | +
+ Resource types defined by Amazon Connect Voice ID +
+
+ The following resource types are defined by this service and can be used in the
+
+ Resource
+
+ element of IAM permission policy statements. Each action in the
+
+ Actions table
+
+ identifies the resource types that can be specified with that action. A resource
+ type can also define which condition keys you can include in a policy. These
+ keys are displayed in the last column of the table. For details about the columns
+ in the following table, see
+
+ The resource types table
+
+ .
+
+ Resource types + | ++ ARN + | ++ Condition keys + | +
---|---|---|
+ + + + domain + + | +
+
+ arn:$
+
+ {
+
+ Partition}:voiceid:$
+
+ {
+
+ Region}:$
+
+ {
+
+ Account}:domain/$
+
+ {
+
+ DomainId}
+
+ |
+ + + | +
+ Condition keys for Amazon Connect Voice ID +
+
+ Amazon Connect Voice ID defines the following condition keys that can be used in the
+
+ Condition
+
+ element of an IAM policy. You can use these keys to further refine the conditions
+ under which the policy statement applies. For details about the columns in the
+ following table, see
+
+ The condition keys table
+
+ .
+
+ To view the global condition keys that are available to all services, see + + Available global condition keys + + . +
++ Condition keys + | ++ Description + | ++ Type + | +
---|---|---|
+ + + + aws:RequestTag/${TagKey} + + | ++ Filters access by tags that are passed in the request + | ++ String + | +
+ + + + aws:ResourceTag/${TagKey} + + | ++ Filters access by tags associated with the resource + | ++ String + | +
+ + + + aws:TagKeys + + | ++ Filters access by tag keys that are passed in the request + | ++ String + | +