IAM
Users, roles, policies, groups, instance profiles, OIDC/SAML providers.
fakecloud implements 176 of 176 IAM operations at 100% Smithy conformance.
Supported features
- Users — CRUD, access keys, login profiles, signing certificates, SSH public keys, service-specific credentials, MFA devices
- Roles — CRUD, inline policies, managed policies, trust relationships, instance profile relationships
- Groups — CRUD, user membership, inline and managed policies
- Policies — managed policies, policy versions, attachment, simulation (recorded)
- Instance profiles — CRUD, role attachment
- OIDC providers — CRUD, client IDs, thumbprints
- SAML providers — CRUD, metadata documents
- Account management — aliases, password policy, summary
- Tags — on users, roles, policies, and policy versions
- Service-linked roles — CRUD with service name validation
Protocol
Query protocol. Form-encoded body, Action parameter, XML responses.
Gotchas
- Policies are stored and optionally evaluated. By default fakecloud records IAM policies without evaluating them. Set
FAKECLOUD_IAM=strict(orsoftfor log-only) to turn on Phase 1 identity-policy evaluation — Allow/Deny with Deny precedence, Action/Resource wildcards, user/group/role inline and managed policies.Conditionblocks, resource-based policies, permission boundaries, SCPs, and ABAC are explicitly not evaluated yet. See SigV4 verification and IAM enforcement for the full scope. - SigV4 verification is opt-in. By default fakecloud parses signatures for routing but doesn't verify them. Set
FAKECLOUD_VERIFY_SIGV4=trueto turn on cryptographic verification with the standard ±15-minute clock skew window. The reservedtest/testroot-bypass convention always passes, matching LocalStack.