clients/client-accessanalyzer/README.md
AWS SDK for JavaScript AccessAnalyzer Client for Node.js, Browser and React Native.
<p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external, internal, and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external, internal, or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help you identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Internal access analyzers</b> help you identify which principals within your organization or account have access to selected resources. This analysis supports implementing the principle of least privilege by ensuring that your specified resources can only be accessed by the intended principals within your organization.</p> <p> <b>Unused access analyzers</b> help you identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Using Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>To install this package, use the CLI of your favorite package manager:
npm install @aws-sdk/client-accessanalyzeryarn add @aws-sdk/client-accessanalyzerpnpm add @aws-sdk/client-accessanalyzerThe AWS SDK is modulized by clients and commands.
To send a request, you only need to import the AccessAnalyzerClient and
the commands you need, for example ListAnalyzersCommand:
// ES5 example
const { AccessAnalyzerClient, ListAnalyzersCommand } = require("@aws-sdk/client-accessanalyzer");
// ES6+ example
import { AccessAnalyzerClient, ListAnalyzersCommand } from "@aws-sdk/client-accessanalyzer";
To send a request:
send operation on the client, providing the command object as input.const client = new AccessAnalyzerClient({ region: "REGION" });
const params = { /** input parameters */ };
const command = new ListAnalyzersCommand(params);
We recommend using the await operator to wait for the promise returned by send operation as follows:
// async/await.
try {
const data = await client.send(command);
// process data.
} catch (error) {
// error handling.
} finally {
// finally.
}
You can also use Promise chaining.
client
.send(command)
.then((data) => {
// process data.
})
.catch((error) => {
// error handling.
})
.finally(() => {
// finally.
});
The aggregated client class is exported from the same package, but without the "Client" suffix.
AccessAnalyzer extends AccessAnalyzerClient and additionally supports all operations, waiters, and paginators as methods.
This style may be familiar to you from the AWS SDK for JavaScript v2.
If you are bundling the AWS SDK, we recommend using only the bare-bones client (AccessAnalyzerClient).
More details are in the blog post on
modular packages in AWS SDK for JavaScript.
import { AccessAnalyzer } from "@aws-sdk/client-accessanalyzer";
const client = new AccessAnalyzer({ region: "REGION" });
// async/await.
try {
const data = await client.listAnalyzers(params);
// process data.
} catch (error) {
// error handling.
}
// Promises.
client
.listAnalyzers(params)
.then((data) => {
// process data.
})
.catch((error) => {
// error handling.
});
// callbacks (not recommended).
client.listAnalyzers(params, (err, data) => {
// process err and data.
});
When the service returns an exception, the error will include the exception information, as well as response metadata (e.g. request id).
try {
const data = await client.send(command);
// process data.
} catch (error) {
const { requestId, cfId, extendedRequestId } = error.$metadata;
console.log({ requestId, cfId, extendedRequestId });
/**
* The keys within exceptions are also parsed.
* You can access them by specifying exception names:
* if (error.name === 'SomeServiceException') {
* const value = error.specialKeyInException;
* }
*/
}
See also docs/ERROR_HANDLING.
Please use these community resources for getting help. We use GitHub issues for tracking bugs and feature requests, but have limited bandwidth to address them.
aws-sdk-js
on AWS Developer Blog.aws-sdk-js.To test your universal JavaScript code in Node.js, browser and react-native environments, visit our code samples repo.
This client code is generated automatically. Any modifications will be overwritten the next time the @aws-sdk/client-accessanalyzer package is updated.
To contribute to client you can check our generate clients scripts.
This SDK is distributed under the Apache License, Version 2.0, see LICENSE for more information.
Command API Reference / Input / Output
</details> <details> <summary> CancelPolicyGeneration </summary>Command API Reference / Input / Output
</details> <details> <summary> CheckAccessNotGranted </summary>Command API Reference / Input / Output
</details> <details> <summary> CheckNoNewAccess </summary>Command API Reference / Input / Output
</details> <details> <summary> CheckNoPublicAccess </summary>Command API Reference / Input / Output
</details> <details> <summary> CreateAccessPreview </summary>Command API Reference / Input / Output
</details> <details> <summary> CreateAnalyzer </summary>Command API Reference / Input / Output
</details> <details> <summary> CreateArchiveRule </summary>Command API Reference / Input / Output
</details> <details> <summary> DeleteAnalyzer </summary>Command API Reference / Input / Output
</details> <details> <summary> DeleteArchiveRule </summary>Command API Reference / Input / Output
</details> <details> <summary> GenerateFindingRecommendation </summary>Command API Reference / Input / Output
</details> <details> <summary> GetAccessPreview </summary>Command API Reference / Input / Output
</details> <details> <summary> GetAnalyzedResource </summary>Command API Reference / Input / Output
</details> <details> <summary> GetAnalyzer </summary>Command API Reference / Input / Output
</details> <details> <summary> GetArchiveRule </summary>Command API Reference / Input / Output
</details> <details> <summary> GetFinding </summary>Command API Reference / Input / Output
</details> <details> <summary> GetFindingRecommendation </summary>Command API Reference / Input / Output
</details> <details> <summary> GetFindingsStatistics </summary>Command API Reference / Input / Output
</details> <details> <summary> GetFindingV2 </summary>Command API Reference / Input / Output
</details> <details> <summary> GetGeneratedPolicy </summary>Command API Reference / Input / Output
</details> <details> <summary> ListAccessPreviewFindings </summary>Command API Reference / Input / Output
</details> <details> <summary> ListAccessPreviews </summary>Command API Reference / Input / Output
</details> <details> <summary> ListAnalyzedResources </summary>Command API Reference / Input / Output
</details> <details> <summary> ListAnalyzers </summary>Command API Reference / Input / Output
</details> <details> <summary> ListArchiveRules </summary>Command API Reference / Input / Output
</details> <details> <summary> ListFindings </summary>Command API Reference / Input / Output
</details> <details> <summary> ListFindingsV2 </summary>Command API Reference / Input / Output
</details> <details> <summary> ListPolicyGenerations </summary>Command API Reference / Input / Output
</details> <details> <summary> ListTagsForResource </summary>Command API Reference / Input / Output
</details> <details> <summary> StartPolicyGeneration </summary>Command API Reference / Input / Output
</details> <details> <summary> StartResourceScan </summary>Command API Reference / Input / Output
</details> <details> <summary> TagResource </summary>Command API Reference / Input / Output
</details> <details> <summary> UntagResource </summary>Command API Reference / Input / Output
</details> <details> <summary> UpdateAnalyzer </summary>Command API Reference / Input / Output
</details> <details> <summary> UpdateArchiveRule </summary>Command API Reference / Input / Output
</details> <details> <summary> UpdateFindings </summary> </details> <details> <summary> ValidatePolicy </summary> </details>