AWS IAM Release Notes Document history for the AWS IAM User Guide.
- IAM Access Analyzer added internal access analyzerson June 16, 2025 at 7:00 pm
IAM Access Analyzer helps you identify which principals within your organization or account have access to selected business-critical resources. Internal access analyzers support implementing the principle of least privilege by ensuring that your specified resources can only be accessed by the intended principals within your AWS organization or account.
- Identity provider controls for shared OIDC providerson June 6, 2025 at 7:00 pm
IAM now requires explicit evaluation of specific claims in JSON Web Tokens (JWTs) for recognized shared OIDC identity providers. This security control ensures that only authorized identities from the intended organization can assume roles and access AWS resources.
- IAMUserChangePassword – Added permissionson May 28, 2025 at 7:00 pm
IAM added permissions to IAMUserChangePassword to allow users specified within a path.
- AccessAnalyzerServiceRolePolicy – Added permissionson May 12, 2025 at 7:00 pm
IAM Access Analyzer added iam:GetAccountAuthorizationDetails to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- AccessAnalyzerServiceRolePolicy – Added permissionson March 31, 2025 at 7:00 pm
IAM Access Analyzer added Amazon S3 directory bucket access points to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- IAM dual-stack endpoint supporton March 20, 2025 at 7:00 pm
IAM now provides improved dual-stack endpoint support that enables clients to communicate with IAM using either IPv4 or IPv6 addresses.
- Updates to policy evaluation logicon January 30, 2025 at 7:00 pm
Enhanced documentation for policy evaluation logic, including improved flow charts and clearer explanations of how AWS evaluates policies to determine whether to allow or deny a request.
- IAMDeleteRootUserCredentials – Removed permissionson January 7, 2025 at 7:00 pm
IAM removed the iam:DeleteVirtualMFADevice permission from the managed policy.
- AccessAnalyzerServiceRolePolicy – Added permissionson December 10, 2024 at 7:00 pm
IAM Access Analyzer added support for permission to retrieve information about Amazon ECR account settings and registry policies to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- Centrally manage root access for member accountson November 14, 2024 at 7:00 pm
You can now manage privileged root user credentials across member accounts in AWS Organizations with centralized root access. Centrally secure the root user credentials of your AWS accounts managed using AWS Organizations to remove and prevent root user credential recovery and access at scale.
- IAM Access Analyzer added access configurationon November 14, 2024 at 7:00 pm
IAM Access Analyzer added support to configure analyzers to change the scope of which AWS accounts, IAM users, and roles generate findings.
- AWS managed policy update – New policieson November 14, 2024 at 7:00 pm
IAM added two new policies to scope permissions for privileged root user sessions that you can initiate after you centralize root user access for member accounts in your organization.
- Support for AWS Organizations resource control policies (RCPs)on November 13, 2024 at 7:00 pm
Use an AWS Organizations resource control policy (RCP) to define the maximum permissions for resources within accounts in your organization or organizational unit (OU). RCPs limit permissions that identity-based and resource-based policies can grant to resources in accounts within your organization.
- AccessAnalyzerServiceRolePolicy – Added permissionson October 29, 2024 at 7:00 pm
IAM Access Analyzer added support for permission to retrieve information about IAM user and role tags to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- SAML encryption support enhancementson June 5, 2024 at 7:00 pm
Enhanced documentation for SAML encryption support in IAM SAML providers, including improved troubleshooting guidance and clarification on service compatibility.
- AccessAnalyzerServiceRolePolicy – Added permissionson May 30, 2024 at 7:00 pm
IAM Access Analyzer added support for permission to retrieve information about IAM user and role policies to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- Encryption support for SAML identity providerson February 4, 2024 at 7:00 pm
IAM SAML providers now support encrypted assertions in the SAML response from your external IdP. To understand how encryption works with IAM SAML federation, see Using SAML-based federation for API access.
- AccessAnalyzerServiceRolePolicy – Added permissionson January 23, 2024 at 7:00 pm
IAM Access Analyzer added support for permission to retrieve the current state of the block public access for Amazon EC2 snapshots to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- AccessAnalyzerServiceRolePolicy – Added permissionson January 11, 2024 at 7:00 pm
IAM Access Analyzer added DynamoDB streams and tables to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- AccessAnalyzerServiceRolePolicy – Added permissionson December 1, 2023 at 7:00 pm
IAM Access Analyzer added Amazon S3 directory buckets to the service-level permissions of AccessAnalyzerServiceRolePolicy.
- IAM Access Analyzer added custom policy checkson November 26, 2023 at 7:00 pm
IAM Access Analyzer now provides custom policy checks to validate that IAM policies adhere to your security standards ahead of deployments.
- AccessAnalyzerServiceRolePolicy – Added permissionson November 26, 2023 at 7:00 pm
IAM Access Analyzer added IAM actions to the service-level permissions of AccessAnalyzerServiceRolePolicy to support the following actions:
- IAMAccessAnalyzerReadOnlyAccess – Added permissionson November 26, 2023 at 7:00 pm
IAM Access Analyzer added permissions to IAMAccessAnalyzerReadOnlyAccess to allow you to check whether updates to your policies grant additional access.
- IAM Access Analyzer added unused access analyzerson November 26, 2023 at 7:00 pm
IAM Access Analyzer simplifies inspecting unused access to guide you toward least privilege. IAM Access Analyzer continuously analyzes your accounts to identify unused access and creates a centralized dashboard with findings.
- Action last accessed information and policy generation support for over 60
additional services and actionson November 1, 2023 at 7:00 pm
IAM now supports action last accessed information and generates policies with action-level information for over 60 additional services, along with a list of the actions for which action last accessed information is available.
- Action last accessed information support for over 140 serviceson September 14, 2023 at 7:00 pm
IAM now provides action last accessed information for more than 140 services, along with a list of the actions for which action last accessed information is available.
- Support for multiple multi-factor authentication (MFA) devices for root users and
IAM userson November 16, 2022 at 7:00 pm
Now you can to add up to eight MFA devices per user, including FIDO security keys, software time-based one-time password (TOTP) with virtual authenticator applications, or hardware TOTP tokens.
- IAM Access Analyzer support for new resource typeson October 25, 2022 at 7:00 pm
IAM Access Analyzer added support for the following resource types:
- U2F deprecation and WebAuthn/FIDO updateon May 31, 2022 at 7:00 pm
Removed mentions of U2F as an MFA option and added information about WebAuthn, FIDO2, and FIDO security keys.
- Updates to resilience in IAMon May 16, 2022 at 7:00 pm
Added information about maintaining access to IAM credentials when an event disrupts communication between AWS Regions.
- New global condition keys for resourceson April 27, 2022 at 7:00 pm
You can now control access to resources based on the account, Organizational Unit (OU), or organization in AWS Organizations that contains your resources. You can use the aws:ResourceAccount, aws:ResourceOrgID, and aws:ResourceOrgPaths global condition keys in an IAM policy.