Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
Resources:
CFNAdminRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: !Ref MyRoleName
AssumeRolePolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: "Allow"
Principal:
Service: ["cloudformation.amazonaws.com"]
Action: "sts:AssumeRole"
Path: "/"
ManagedPolicyArns:
- 'arn:aws:iam::aws:policy/AdministratorAccess'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.