Stay organized with collections
Save and categorize content based on your preferences.
Changing an Identity and Access Management (IAM) allow policy can be disruptive,
especially if you're revoking access for an active user or service account.
Because of this risk, you might want to test allow policy changes before making
them to confirm that they won't disrupt anyone's work.
You can use Policy Simulator to see how a change to an allow policy might impact
a principal's access before you commit to making the change. Testing these
changes helps ensure that the changes you're making won't cause a principal to
lose access that they need.
To learn more about Policy Simulator, see the Policy Simulator
overview in the Policy Intelligence documentation.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-02-03 UTC."],[],[]]