Create and manage IAM roles on Vultr. Configure assignable and assumable roles with attached policies to control user and group access to cloud resources.
Create a role trust in Vultr IAM to define who can assume a specific role. Configure trust relationships for users, groups, organizations, or OIDC issuers.
Delete a role trust from a Vultr IAM role. Remove the trust relationship to prevent specified users, groups, or issuers from assuming the role going forward.
List all trust relationships configured for a specific IAM role on Vultr. View which users, groups, organizations, or OIDC issuers can assume the role.
List all IAM roles that a specific user can assume on Vultr. View available assumable roles based on configured trust relationships through the IAM API.
Restore a previously deleted role trust in Vultr IAM. Recover the trust relationship to re-enable role assumption for specified users, groups, or issuers.
Update an existing role trust in Vultr IAM. Modify trust relationship parameters such as conditions, IP restrictions, or the trusted principal configuration.
Assume an IAM role on Vultr to gain temporary elevated permissions. Create a time-bound session with the role's policies applied to your API access credentials.
Assume a Vultr IAM role using the AWS STS-compatible endpoint. Use existing AWS tooling and SDKs to obtain temporary credentials for Vultr cloud resources.
List all active assumed role sessions for a specific user in Vultr IAM. View session details including role, expiry time, and status through the IAM API.
Retrieve details of a specific assumed role session in Vultr IAM. View the session status, associated role, expiry time, and credentials through the IAM API.
Terminate an active assumed role session in Vultr IAM. Revoke temporary elevated permissions and end the session before its scheduled expiration timestamp.