IAM policies not enabled for ec2 login


You have insufficient IAM permissions to connect to an instance using EC2 Instance Connect due to an organization policy

Your account is associated with an organization that has Service Control Policies (SCPs) enforcing limited permissions. To connect to an instance via EC2 Instance Connect, both SCPs and your IAM policy must grant the following permissions:

  • ec2-instance-connect:SendSSHPublicKey
  • ec2:DescribeInstances

Please contact your organization administrator to update SCPs in order to provide necessary permissions.

For more information about IAM policy examples, see Grant IAM permissions for EC2 Instance Connect .

  1. Are you using one of our playgrounds?
  2. What are you trying to do?

We don’t give a lot of access to IAM, but then, you can do quite a lot without much access to it. Read the “Quick Start” section on the AWS playground page to make sure you understand what access we do give you, and in what regions of AWS’s network.