Build IAM trust (assume-role) policies with a guided form.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": ""
},
"Action": "sts:AssumeRole"
}
]
}Trust policies (AssumeRolePolicyDocument) define which principals — AWS accounts, services, SAML providers, or OIDC federations — can assume an IAM role. Unlike permission policies, trust policies are attached directly to the role and control the authentication side of access. Getting trust policies wrong either locks out legitimate access or, worse, allows unauthorized principals to assume privileged roles. This builder provides a guided form for specifying principals, actions (sts:AssumeRole, sts:AssumeRoleWithSAML, sts:AssumeRoleWithWebIdentity), and conditions like ExternalId or token audience restrictions.
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.