detach_policy

Organizations.Client.detach_policy(**kwargs)

Detaches a policy from a target root, organizational unit (OU), or account.

Warning

If the policy being detached is a service control policy (SCP), the changes to permissions for Identity and Access Management (IAM) users and roles in affected accounts are immediate.

Every root, OU, and account must have at least one SCP attached. If you want to replace the default FullAWSAccess policy with an SCP that limits the permissions that can be delegated, you must attach the replacement SCP before you can remove the default SCP. This is the authorization strategy of an " allow list ". If you instead attach a second SCP and leave the FullAWSAccess SCP still attached, and specify "Effect": "Deny" in the second SCP to override the "Effect": "Allow" in the FullAWSAccess policy (or any other attached SCP), you're using the authorization strategy of a " deny list ".

This operation can be called only from the organization's management account.

See also: AWS API Documentation

Request Syntax

response = client.detach_policy(
    PolicyId='string',
    TargetId='string'
)
Parameters
  • PolicyId (string) --

    [REQUIRED]

    The unique identifier (ID) of the policy you want to detach. You can get the ID from the ListPolicies or ListPoliciesForTarget operations.

    The regex pattern for a policy ID string requires "p-" followed by from 8 to 128 lowercase or uppercase letters, digits, or the underscore character (_).

  • TargetId (string) --

    [REQUIRED]

    The unique identifier (ID) of the root, OU, or account that you want to detach the policy from. You can get the ID from the ListRoots, ListOrganizationalUnitsForParent, or ListAccounts operations.

    The regex pattern for a target ID string requires one of the following:

    • Root - A string that begins with "r-" followed by from 4 to 32 lowercase letters or digits.
    • Account - A string that consists of exactly 12 digits.
    • Organizational unit (OU) - A string that begins with "ou-" followed by from 4 to 32 lowercase letters or digits (the ID of the root that the OU is in). This string is followed by a second "-" dash and from 8 to 32 additional lowercase letters or digits.
Returns

None

Exceptions

  • Organizations.Client.exceptions.AccessDeniedException
  • Organizations.Client.exceptions.AWSOrganizationsNotInUseException
  • Organizations.Client.exceptions.ConcurrentModificationException
  • Organizations.Client.exceptions.ConstraintViolationException
  • Organizations.Client.exceptions.InvalidInputException
  • Organizations.Client.exceptions.PolicyNotAttachedException
  • Organizations.Client.exceptions.PolicyNotFoundException
  • Organizations.Client.exceptions.ServiceException
  • Organizations.Client.exceptions.TargetNotFoundException
  • Organizations.Client.exceptions.TooManyRequestsException
  • Organizations.Client.exceptions.UnsupportedAPIEndpointException
  • Organizations.Client.exceptions.PolicyChangesInProgressException

Examples

The following example shows how to detach a policy from an OU:/n/n

response = client.detach_policy(
    PolicyId='p-examplepolicyid111',
    TargetId='ou-examplerootid111-exampleouid111',
)

print(response)

Expected Output:

{
    'ResponseMetadata': {
        '...': '...',
    },
}