:doc:`IAM <../../iam>` / Client / update_assume_role_policy

*************************
update_assume_role_policy
*************************



.. py:method:: IAM.Client.update_assume_role_policy(**kwargs)

  

  Updates the policy that grants an IAM entity permission to assume a role. This is typically referred to as the "role trust policy". For more information about roles, see `Using roles to delegate permissions and federate identities <https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html>`__.

  

  See also: `AWS API Documentation <https://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UpdateAssumeRolePolicy>`_  


  **Request Syntax**
  ::

    response = client.update_assume_role_policy(
        RoleName='string',
        PolicyDocument='string'
    )
    
  :type RoleName: string
  :param RoleName: **[REQUIRED]** 

    The name of the role to update with the new policy.

     

    This parameter allows (through its `regex pattern <http://wikipedia.org/wiki/regex>`__) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-

    

  
  :type PolicyDocument: string
  :param PolicyDocument: **[REQUIRED]** 

    The policy that grants an entity permission to assume the role.

     

    You must provide policies in JSON format in IAM. However, for CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format. CloudFormation always converts a YAML policy to JSON format before submitting it to IAM.

     

    The `regex pattern <http://wikipedia.org/wiki/regex>`__ used to validate this parameter is a string of characters consisting of the following:

     

    
    * Any printable ASCII character ranging from the space character ( ``\u0020``) through the end of the ASCII character range
     
    * The printable characters in the Basic Latin and Latin-1 Supplement character set (through ``\u00FF``)
     
    * The special characters tab ( ``\u0009``), line feed ( ``\u000A``), and carriage return ( ``\u000D``)
    

    

  
  
  :returns: None
  **Exceptions**
  
  *   :py:class:`IAM.Client.exceptions.NoSuchEntityException`

  
  *   :py:class:`IAM.Client.exceptions.MalformedPolicyDocumentException`

  
  *   :py:class:`IAM.Client.exceptions.LimitExceededException`

  
  *   :py:class:`IAM.Client.exceptions.UnmodifiableEntityException`

  
  *   :py:class:`IAM.Client.exceptions.ServiceFailureException`

  

  **Examples**

  The following command updates the role trust policy for the role named Test-Role:
  ::

    response = client.update_assume_role_policy(
        PolicyDocument='{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"Service":["ec2.amazonaws.com"]},"Action":["sts:AssumeRole"]}]}',
        RoleName='S3AccessForEC2Instances',
    )
    
    print(response)

  
  Expected Output:
  ::

    {
        'ResponseMetadata': {
            '...': '...',
        },
    }

  