All notable changes to the AWS IAM MCP Server will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
- Inline Policy Management: Full CRUD operations for user and role inline policies
put_user_policy- Create or update inline policies for IAM usersget_user_policy- Retrieve inline policy documents for usersdelete_user_policy- Delete inline policies from userslist_user_policies- List all inline policies for a userput_role_policy- Create or update inline policies for IAM rolesget_role_policy- Retrieve inline policy documents for rolesdelete_role_policy- Delete inline policies from roleslist_role_policies- List all inline policies for a role
- New data models for inline policy operations:
InlinePolicy- Model for inline policy dataInlinePolicyResponse- Response model for inline policy operationsInlinePolicyListResponse- Response model for listing inline policies
- Comprehensive test coverage for all inline policy operations
- Enhanced documentation with usage examples and best practices
- Demo script showing inline policy management capabilities
- Updated server instructions to include inline policy management guidance
- Added security best practices for inline policy usage
- Enhanced error handling and validation for policy documents
- Updated required IAM permissions documentation
- Initial release of AWS IAM MCP Server
- User management tools:
list_users- List IAM users with filtering optionsget_user- Get detailed user information including policies and access keyscreate_user- Create new IAM users with optional permissions boundarydelete_user- Delete users with optional force cleanup
- Role management tools:
list_roles- List IAM roles with filtering optionscreate_role- Create new IAM roles with trust policies
- Policy management tools:
list_policies- List managed and customer policiesattach_user_policy- Attach managed policies to usersdetach_user_policy- Detach managed policies from users
- Access key management tools:
create_access_key- Create new access keys for usersdelete_access_key- Delete access keys
- Security analysis tools:
simulate_principal_policy- Test policy permissions before applying
- Comprehensive error handling and validation
- Security best practices integration
- Support for permissions boundaries
- AWS credential configuration support
- Detailed documentation and examples
- Implements AWS IAM security best practices
- Provides warnings for sensitive operations
- Supports principle of least privilege
- Includes policy simulation for safe testing
- Validates JSON trust policies
- Secure access key handling with warnings