generate_service_last_accessed_details
(**kwargs)¶Generates a report that includes details about when an IAM resource (user, group, role, or policy) was last used in an attempt to access Amazon Web Services services. Recent activity usually appears within four hours. IAM reports activity for at least the last 400 days, or less if your Region began supporting this feature within the last year. For more information, see Regions where data is tracked.
Warning
The service last accessed data includes all attempts to access an Amazon Web Services API, not just the successful ones. This includes all attempts that were made using the Amazon Web Services Management Console, the Amazon Web Services API through any of the SDKs, or any of the command line tools. An unexpected entry in the service last accessed data does not mean that your account has been compromised, because the request might have been denied. Refer to your CloudTrail logs as the authoritative source for information about all API calls and whether they were successful or denied access. For more information, see Logging IAM events with CloudTrail in the IAM User Guide .
The GenerateServiceLastAccessedDetails
operation returns a JobId
. Use this parameter in the following operations to retrieve the following details from your report:
JobId
returned by GenerateServiceLastAccessedDetail
must be used by the same role within a session, or by the same user when used to call GetServiceLastAccessedDetail
.To check the status of the GenerateServiceLastAccessedDetails
request, use the JobId
parameter in the same operations and test the JobStatus
response parameter.
For additional information about the permissions policies that allow an identity (user, group, or role) to access specific services, use the ListPoliciesGrantingServiceAccess operation.
Note
Service last accessed data does not use other policy types when determining whether a resource could access a service. These other policy types include resource-based policies, access control lists, Organizations policies, IAM permissions boundaries, and STS assume role policies. It only applies permissions policy logic. For more about the evaluation of policy types, see Evaluating policies in the IAM User Guide .
For more information about service and action last accessed data, see Reducing permissions using service last accessed data in the IAM User Guide .
See also: AWS API Documentation
Request Syntax
response = client.generate_service_last_accessed_details(
Arn='string',
Granularity='SERVICE_LEVEL'|'ACTION_LEVEL'
)
[REQUIRED]
The ARN of the IAM resource (user, group, role, or managed policy) used to generate information about when the resource was last used in an attempt to access an Amazon Web Services service.
dict
Response Syntax
{
'JobId': 'string'
}
Response Structure
(dict) --
JobId (string) --
The JobId
that you can use in the GetServiceLastAccessedDetails or GetServiceLastAccessedDetailsWithEntities operations. The JobId
returned by GenerateServiceLastAccessedDetail
must be used by the same role within a session, or by the same user when used to call GetServiceLastAccessedDetail
.
Exceptions
IAM.Client.exceptions.NoSuchEntityException
IAM.Client.exceptions.InvalidInputException
Examples
The following operation generates a report for the policy: ExamplePolicy1
response = client.generate_service_last_accessed_details(
Arn='arn:aws:iam::123456789012:policy/ExamplePolicy1',
)
print(response)
Expected Output:
{
'JobId': 'examplef-1305-c245-eba4-71fe298bcda7',
'ResponseMetadata': {
'...': '...',
},
}