Claude Platform on AWS gives you the full Anthropic platform experience, including the Messages API, Agent Skills, code execution, and beta features, accessible through your AWS account. Unlike Amazon Bedrock, where AWS operates the inference stack, Anthropic operates Claude Platform on AWS. AWS provides the authentication layer (SigV4 or API key), IAM-based access control, and billing integration through AWS Marketplace.
The Anthropic SDKs support Claude Platform on AWS. For per-language client availability, see Client SDKs.
Claude models run on Anthropic-managed infrastructure. This is a commercial integration for billing and access through AWS. Anthropic is the data processor for inference inputs and outputs; AWS processes billing and identity metadata under the marketplace model. Customers using Claude through Claude Platform on AWS are subject to Anthropic's data use terms. Anthropic continues to provide its industry-leading safety and data commitments.
Note the following operational characteristics: data may not reside in AWS; inference may route to Anthropic's primary cloud; and subservices may move under the hood without notice. Set the inference_geo parameter per request to pin inference to a specific geography.
Claude Platform on AWS follows the same data retention policy as the first-party Claude API. Zero Data Retention (ZDR) is available on request. Contact your Anthropic account representative to enable it for your organization.
Both offerings let you use Claude through AWS, but they differ significantly in architecture, API surface, and feature availability.
| Aspect | Claude Platform on AWS | Claude in Amazon Bedrock | Amazon Bedrock (legacy) |
|---|---|---|---|
| Who operates the stack | Anthropic | AWS | AWS |
| API surface | Anthropic Messages API (/v1/messages) | Anthropic Messages API at /anthropic/v1/messages | Bedrock Converse / InvokeModel |
| Feature availability | Typically same-day as Claude API (see feature limitations) | Per Amazon Bedrock release schedule | Per Amazon Bedrock release schedule |
| Agent Skills | Available (beta) | Not available (requires code execution) | Not available |
| Beta features | Pass through with anthropic-beta headers (see feature limitations) | anthropic-beta header not supported | anthropic-beta header not supported |
| Authentication | AWS IAM / SigV4 or API key | AWS IAM / SigV4 | AWS IAM / SigV4 or bearer token (C#, Go, and Java SDKs only) |
| Billing | AWS Marketplace | AWS (native service) | AWS (native service) |
| Base URL | aws-external-anthropic.{region}.api.aws | bedrock-mantle.{region}.api.aws | bedrock-runtime.{region}.amazonaws.com |
| SDK client | Platform-specific client class (for example, AnthropicAWS in Python), in beta | AnthropicBedrockMantle | AnthropicBedrock / Bedrock SDK |
| Console | Claude Console (platform.claude.com, access through the AWS Console) | Bedrock Console | Bedrock Console |
| Rate limits and quotas | Managed by Anthropic | Managed by AWS | Managed by AWS |
| Inference data processor | Anthropic | AWS | AWS |
If you need AWS-operated Claude, see Claude in Amazon Bedrock. Claude Platform on AWS uses a separate capacity pool from both the first-party Claude API and Amazon Bedrock. You can run workloads on more than one platform and fail over between them.
AWS PrivateLink is supported for connecting your VPC to the Claude Platform on AWS endpoint.
When to choose Bedrock: Organizations in regulated industries that require FedRAMP High, IL4, IL5, or HIPAA-ready compliance, or that need AWS to be the sole data processor, should use Claude in Amazon Bedrock. Bedrock runs entirely on AWS-controlled infrastructure with AWS as the operating party.
Setting up Claude Platform on AWS happens in four phases: sign up on the AWS Console service page, complete your Anthropic organization setup, note your workspace ID, and sign in to the Claude Console.
Signing up through the AWS Console provisions a new Anthropic organization tied to your AWS account. This organization is separate from any existing organizations your company has with Anthropic, including Claude Enterprise organizations procured through AWS Marketplace. API keys, workspaces, and Claude Console settings from a first-party Anthropic organization don't carry over.
If you have an existing Amazon Bedrock private offer, contact your Anthropic or AWS account representative before signing up so your discount applies from your first request. Discounts cannot be applied retroactively to usage incurred before your private offer is accepted. See Private offers.
Sign up in the AWS Console
The page shows a Sign-up in progress banner. Stay on the page. Sign-up takes a few minutes while AWS handles the AWS Marketplace subscription for you, then redirects you automatically.
If your organization has a private offer from Anthropic, the Console looks it up and prompts you to accept it in AWS Marketplace. See Private offers for details.
If you use Claude Platform on AWS, your content (such as prompts and completions) is processed by Anthropic outside of AWS. See Anthropic's data use policies for details on how content and metadata are processed and stored.
Set up your Anthropic organization
After sign-up completes, you're redirected to platform.claude.com/partner-signup.
Completing setup creates your Anthropic organization and accepts Anthropic's Commercial Terms of Service and Usage Policy. The AWS Console service page now shows a left navigation with Home, API keys, Quickstart, and Workspaces.
Create your workspace and note its ID
After you complete setup, the AWS Console prompts you to create a workspace. See Workspaces for details on region binding, IAM resource scoping, and creating additional workspaces.
Find the workspace ID under Workspaces on the AWS Console Claude Platform on AWS service page or in the Claude Console. Workspace IDs use the format wrkspc_ followed by an alphanumeric identifier.
Sign in to the Claude Console
Access to the Claude Console is federated through AWS IAM:
aws-external-anthropic:AssumeConsole permission. See IAM actions for Claude Platform on AWS.platform.claude.com.When you're signed in through the AWS Console, the Claude Console scopes to your Claude Platform on AWS organization. An Account managed by AWS indicator appears in the bottom-left of the Claude Console sidebar.
Ensure you have:
The Claude Platform on AWS gateway calls sts:GetWebIdentityToken server-side to mint a JWT it forwards to Anthropic. This STS capability is disabled by default on every AWS account. Enable it once per account:
aws iam enable-outbound-web-identity-federationIf the response is [ERROR] (FeatureEnabled) ... already enabled, the setting is already on for your account and you can move on. Verify and retrieve your account's issuer URL:
aws iam get-outbound-web-identity-federation-infoWithout this step, every request returns "Outbound web identity federation is disabled for your account". This is the most common setup error.
You create a workspace from the AWS Console after completing account setup (see Set up your account). Workspaces are bound to a single AWS region. You can find the workspace ID in the Claude Console under Workspaces or in the Workspaces section of the AWS Console service page.
Set the ANTHROPIC_AWS_WORKSPACE_ID and AWS_REGION environment variables so the SDK clients read them automatically:
export ANTHROPIC_AWS_WORKSPACE_ID='wrkspc_01AbCdEf23GhIj'
export AWS_REGION='us-west-2' # Your workspace's AWS regionThe region is required. The SDK client raises an error if no region is set. Pass aws_region/awsRegion to the constructor, or set AWS_REGION (or AWS_DEFAULT_REGION). All AWS commercial regions are supported.
Claude Platform on AWS supports two authentication methods: AWS IAM with SigV4 request signing (primary) and API key authentication. Both use the same base URL and request format.
SigV4 is the enterprise-native path and integrates with your existing AWS IAM policies, roles, and auditing. Configure AWS credentials using any method supported by the AWS default credential provider chain:
AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN)~/.aws/credentials)~/.aws/config) including SSO and credential_processAWS_WEB_IDENTITY_TOKEN_FILE and AWS_ROLE_ARN) for IRSA and GitHub ActionsVerify that your credentials are working:
aws sts get-caller-identityFor simpler integration paths (local development and scripts), you can authenticate with an API key instead of SigV4. Set the ANTHROPIC_AWS_API_KEY environment variable or pass apiKey to the SDK constructor.
Generate API keys in the AWS Console under Claude Platform on AWS → API keys. Choose Generate a key, then copy the key value. Grant the aws-external-anthropic:CallWithBearerToken IAM action to the principals that should be allowed to use API key authentication.
API keys for Claude Platform on AWS are managed in the AWS Console, not the Claude Console. Keys created in the standard Claude Console (for first-party API access) don't work with the Claude Platform on AWS endpoint.
For workloads that need to hand a credential to a separate process (such as an LLM gateway, a serverless function, or a tool that supports bearer-token authentication but not SigV4), generate a short-term API key from your AWS credentials instead of provisioning a long-lived key in the AWS Console.
AWS publishes token-generator libraries for JavaScript, Python, and Java. Each library reads your AWS credentials through the standard provider chain and returns a time-limited token that works with the x-api-key header. Token lifetime defaults to 12 hours and is capped at the lesser of your requested duration, your AWS credentials' expiry, and 12 hours. See the linked repository READMEs for installation and full configuration options.
Pass the generated token to the SDK the same way you'd pass an AWS Console-generated API key:
from token_generator_for_aws_external_anthropic import TokenGenerator
from anthropic import AnthropicAWS
token = TokenGenerator(region="us-west-2").get_token()
client = AnthropicAWS(api_key=token, aws_region="us-west-2")If you can generate the token locally, your process already has SigV4 credentials, and SigV4 authentication is usually the simpler choice. Use short-term keys when the process making API calls is separate from the process that holds AWS credentials.
The SDK does not refresh short-term keys automatically. When a token expires, generate a new one and construct a new client. The principal that uses the token still needs the aws-external-anthropic:CallWithBearerToken IAM action.
The platform-specific client resolves authentication in the following order. Argument names vary by language convention (TypeScript and PHP use camelCase as shown; Python and Ruby use snake_case; Go uses PascalCase with capitalized acronyms; C# and Java use the language's property or builder idioms).
apiKey constructor argument → x-api-key headerawsAccessKey + awsSecretAccessKey constructor arguments → AWS SigV4awsProfile constructor argument → AWS SigV4 with named profileANTHROPIC_AWS_API_KEY environment variable → x-api-key headerThe client reads AWS_REGION from the environment if aws_region/awsRegion is not passed to the constructor, falling back to AWS_DEFAULT_REGION for compatibility with the standard AWS SDKs. Region is required; there is no fallback default. Unlike AnthropicBedrock, which falls back to us-east-1, the AnthropicAWS/AnthropicAws client raises an error if neither the constructor argument nor the environment variable is set.
Anthropic's client SDKs support Claude Platform on AWS. Each SDK provides a platform-specific client class that handles SigV4 signing, region-based base URL construction, and the anthropic-workspace-id header.
SDK clients for Claude Platform on AWS are in beta.
The following models are available on Claude Platform on AWS:
| Model | Model ID |
|---|---|
| Claude Opus 4.7 | claude-opus-4-7 |
| Claude Opus 4.6 | claude-opus-4-6 |
| Claude Sonnet 4.6 | claude-sonnet-4-6 |
| Claude Opus 4.5 | claude-opus-4-5 |
| Claude Sonnet 4.5 | claude-sonnet-4-5 |
| Claude Haiku 4.5 | claude-haiku-4-5 |
Model IDs are identical to the first-party Claude API. There are no Bedrock-style ARNs or anthropic. prefixes.
New models launch on Claude Platform on AWS simultaneously with the first-party Claude API.
Claude Platform on AWS uses the Anthropic Messages API (/v1/messages), the same API surface as the first-party Claude API. The differences are the base URL, the authentication method, and a required anthropic-workspace-id header that identifies which workspace the request targets.
from anthropic import AnthropicAWS
client = AnthropicAWS()
message = client.messages.create(
model="claude-sonnet-4-6",
max_tokens=1024,
messages=[{"role": "user", "content": "Hello!"}],
)
print(message)The client reads AWS_REGION (or AWS_DEFAULT_REGION) and ANTHROPIC_AWS_WORKSPACE_ID from the environment. You can override either by passing aws_region / awsRegion or workspace_id / workspaceId to the constructor. Both region and workspace ID are required. The constructor raises an error if the workspace ID cannot be resolved; a missing region likewise raises an error.
The x-amz-security-token header (cURL) is only required for temporary credentials such as IAM roles, SSO, or STS. Omit it when using long-term IAM user credentials. The SDK clients handle this automatically based on the credential source.
The --aws-sigv4 value follows the format aws:amz:<region>:<service>. The SigV4 service name is aws-external-anthropic, and the region must match the region in your endpoint URL. A mismatch in either produces a generic signature-rejection error rather than a specific diagnostic.
Context-window sizes on Claude Platform on AWS are identical to the first-party Claude API. See Context windows for per-model limits.
Claude Platform on AWS uses the Anthropic Messages API directly, which means you get full Messages API feature parity with the first-party Claude API (except where noted in the feature limitations):
anthropic-beta header to access beta features, just as you would with the Claude API.container.skills parameter and beta headers as the Claude API. All pre-built Skills (PowerPoint, Excel, Word, PDF) work out of the box.See the comparison table for feature-availability differences from Amazon Bedrock.
Claude Managed Agents is available on Claude Platform on AWS, including agents, environments, sessions, credential vaults, and memory stores. The Claude Agent SDK is also supported.
Session behavior on Claude Platform on AWS differs from first-party Claude Managed Agents in one way:
The following capabilities are not currently available on Claude Platform on AWS:
/v1/organizations/workspaces) are available. Other Admin API endpoints (organization members, workspace members, invites, API keys, usage reports, cost reports, and rate limit reports) are not currently available. View usage and cost data in the Claude Console instead. AWS IAM manages organization membership.allowed_inference_geos and default_inference_geo are not available. Set inference_geo on each request instead.Claude Platform on AWS supports the following inference geographies:
The AWS region your workspace is bound to controls which gateway endpoint you call and where AWS-side resources (IAM, CloudTrail, billing) are scoped. It does not pin where model inference runs. To pin inference to a specific geography, set inference_geo on each request.
Set the inference geography per request with the inference_geo parameter:
The inference_geo parameter is supported on Claude Opus 4.6, Claude Sonnet 4.6, and later models. Requests with inference_geo on Claude Opus 4.5, Claude Sonnet 4.5, or Claude Haiku 4.5 return a 400 error. See Data residency for model availability details.
from anthropic import AnthropicAWS
client = AnthropicAWS()
message = client.messages.create(
model="claude-sonnet-4-6",
max_tokens=1024,
inference_geo="us",
messages=[{"role": "user", "content": "Hello!"}],
)
print(message)If you omit inference_geo, the request defaults to global.
Workspace-level inference geography controls (allowed_inference_geos and default_inference_geo) are not available on Claude Platform on AWS. Set inference_geo on each request instead.
Inference and resource requests on Claude Platform on AWS target a workspace. You pass the workspace's ID in the anthropic-workspace-id header on these API calls. Workspace IDs use the tagged format wrkspc_ followed by an alphanumeric identifier (for example, wrkspc_01AbCdEf23GhIj). See Obtain your workspace ID if you don't have it yet.
Workspaces are bound to a single AWS region. A workspace created in us-west-2 can only be accessed through the us-west-2 endpoint. Usage, quotas, cost, files, batches, and Skills all roll up per workspace, giving you per-region breakdowns in the Claude Console.
Workspaces also serve as the primary IAM resource for Claude Platform on AWS. You grant or deny access to specific workspaces through AWS IAM policies using the workspace ARN. The ARN's resource segment is the same wrkspc_-prefixed ID you pass in the anthropic-workspace-id header:
arn:aws:aws-external-anthropic:{region}:{account-id}:workspace/{workspace-id}For example:
arn:aws:aws-external-anthropic:us-west-2:123456789012:workspace/wrkspc_01AbCdEf23GhIjSee IAM policies for policy examples.
Create additional workspaces, rename a workspace, or archive a workspace from the AWS Console Workspaces page or with the Admin API workspace endpoints. A new workspace is bound to the AWS region of the endpoint you call to create it (see Workspace scoping). The Claude Console Workspaces page is read-only.
Claude Platform on AWS uses the standard Claude Console at platform.claude.com. When you sign in from the AWS Console, an Account managed by AWS indicator appears in the bottom-left of the Claude Console sidebar and the Console scopes to your Claude Platform on AWS organization. It provides usage analytics, cost breakdowns, rate limit visibility, workspace visibility, and pages for managing files, Agent Skills, batch jobs, and Claude Managed Agents resources (agents, sessions, environments, credential vaults, and memory stores).
Access to the Claude Console is federated through AWS IAM. See Set up your account for the full first-time sign-in flow. In short:
aws-external-anthropic:AssumeConsole permission. See IAM actions for Claude Platform on AWS.platform.claude.com.Two Claude Console roles are available: Admin and Developer. The Admin role grants access to all Claude Console pages and settings available for Claude Platform on AWS. The Developer role grants read access to usage, cost, rate limit, and workspace information. Contact your Anthropic account representative to assign the Admin or Developer role to a principal.
The Through AWS gateway column indicates whether the page reads and writes data through the AWS gateway (and is therefore governed by IAM actions). Pages marked No read organization-level metadata directly through Anthropic APIs and bypass IAM action checks.
| Page | Available | Through AWS gateway | Notes |
|---|---|---|---|
| Usage | Yes | No | View token usage by model, workspace, and dimension. Data can take a few minutes to appear after a request. |
| Cost | Yes | No | View cost breakdowns by model and workspace. AWS Cost Explorer shows the aggregated Claude Consumption Unit (CCU) line item. |
| Limits | Yes | No | View rate limits (read-only). |
| Workspaces | Yes | No | View per-region workspaces (read-only). |
| Files | Yes | Yes | View and manage uploaded files. |
| Skills | Yes | Yes | View and manage Agent Skills. |
| Batches | Yes | Yes | View and manage batch processing jobs. |
| Agents | Yes | Yes | View and manage agent definitions. |
| Sessions | Yes | Yes | View agent sessions and event history. |
| Environments | Yes | Yes | View and manage cloud container configurations for sessions. |
| Credential vaults | Yes | Yes | View and manage credential vaults for session authentication. |
| Memory stores | Yes | Yes | View and manage persistent agent memory. |
| API keys | No | N/A | Manage API keys in the AWS Console (Claude Platform on AWS → API keys). See API key authentication. |
| Members | No | N/A | Not applicable. AWS IAM manages access. |
| Billing | No | N/A | Not applicable. AWS Marketplace manages billing and invoicing. View cost breakdowns on the Cost page. |
| Claude Code | No | N/A | View Claude Code usage on the Usage page. |
The Claude Console does not support organization switching for Claude Platform on AWS. To access a different organization, sign out and reauthenticate through the AWS Console using the IAM role for that organization's AWS account.
Claude Platform on AWS assigns Tier 1 rate limits on sign-up. Anthropic manages rate limits directly, not through AWS quota systems.
Unlike the first-party Claude API, automatic tier advancement does not apply. If you need higher limits, contact your Anthropic account representative. For tier details and per-model limits, see Rate limits.
Claude Platform on AWS bills through AWS Marketplace. Usage is denominated in Claude Consumption Units (CCUs), metered hourly, and invoiced monthly in arrears on your AWS bill. CCUs are not prepaid credits; there is no CCU balance or commitment.
For the CCU price, conversion mechanics, discount application, and per-model token rates, see Claude Platform on AWS pricing.
AWS CloudTrail can capture all requests to Claude Platform on AWS. Workspace and vault operations are logged as Management events by default. Inference, batch, file, skill, model, user profile, and Claude Managed Agents operations (other than vaults) are classified as Data events and require explicit data event logging configuration, which incurs additional CloudTrail charges. See the IAM actions reference for the full event type classification and the AWS CloudTrail documentation for configuration details.
Each response includes two request IDs in the response headers:
x-amzn-requestid): The primary ID, indexed in CloudTrail. Use this when investigating requests through AWS tooling or when contacting AWS support.request-id): The secondary ID. Use this when contacting Anthropic support.from anthropic import AnthropicAWS
client = AnthropicAWS()
response = client.messages.with_raw_response.create(
model="claude-sonnet-4-6",
max_tokens=1024,
messages=[{"role": "user", "content": "Hello!"}],
)
print(response.headers.get("x-amzn-requestid")) # AWS request ID
print(response.headers.get("request-id")) # Anthropic request ID
message = response.parse()
print(message.content)Anthropic recommends logging your activity on at least a 30-day rolling basis to understand usage patterns and investigate any potential issues.
AWS CloudTrail is configured within your AWS account. Enabling logging does not provide AWS or Anthropic access to your content beyond what is necessary for billing and service operation.
If you currently use Claude on Bedrock, migrating to Claude Platform on AWS requires changes throughout your integration. SigV4 signing remains supported, but the signing context, base URL, API format, model IDs, SDK client and package, streaming format, request headers, and region availability all change. The following table summarizes the differences.
The migration delta depends on which Bedrock integration you're coming from. The following table shows both the current Bedrock integration (Messages API at bedrock-mantle.{region}.api.aws) and the legacy InvokeModel integration.
| Aspect | From Claude in Amazon Bedrock | From Amazon Bedrock (legacy) | To Claude Platform on AWS |
|---|---|---|---|
| Base URL | bedrock-mantle.{region}.api.aws | bedrock-runtime.{region}.amazonaws.com | aws-external-anthropic.{region}.api.aws |
| API format | Anthropic Messages API at /anthropic/v1/messages | Bedrock Converse / InvokeModel | Anthropic Messages API (/v1/messages) |
| Model IDs | anthropic.claude-opus-4-6 | anthropic.claude-opus-4-6-v1 (with optional us./global. prefix) | claude-opus-4-6 |
| SDK client | AnthropicBedrockMantle | AnthropicBedrock / Bedrock SDK | Platform-specific client (see Install an SDK), in beta |
| SDK package | anthropic[bedrock], @anthropic-ai/bedrock-sdk, and others | anthropic[bedrock], @anthropic-ai/bedrock-sdk, or AWS SDK | anthropic[aws], @anthropic-ai/aws-sdk, and others (see Install an SDK) |
| SigV4 service name | bedrock-mantle | bedrock | aws-external-anthropic |
| Streaming format | SSE | AWS EventStream | SSE (same as Claude API) |
| Workspace header | Not applicable | Not applicable | anthropic-workspace-id required |
| Region availability | See Amazon Bedrock regions | See Amazon Bedrock regions | All AWS commercial regions |
If you're on the current Bedrock integration, the request body format is already the Anthropic Messages API; the changes are the base URL, SigV4 service name, model IDs, and adding the anthropic-workspace-id header. If you're on the legacy InvokeModel or Converse API, you'll also rewrite the request and response shapes to the Messages API format. See Claude on Amazon Bedrock (legacy) for the request-shape mapping.
anthropic-beta header (see feature limitations)Enable outbound web identity federation first. If your AWS account has not previously used Claude Platform on AWS, you must enable outbound web identity federation once per account before making requests. Without this step, all requests fail with a federation error (see Enable outbound web identity federation for the exact error and remediation). This step is not required for Bedrock.
Zero Data Retention (ZDR) is opt-in on Claude Platform on AWS. On Bedrock, AWS is the data processor and Anthropic does not retain inference inputs or outputs; Anthropic's ZDR program does not apply there. On Claude Platform on AWS, Anthropic processes inference data as an independent data processor, and ZDR follows the first-party Claude API model: it is available on request through your Anthropic account representative. Confirm ZDR enrollment before migrating production workloads that depend on data-retention guarantees.
Claude Platform on AWS integrates with AWS IAM for access control. You grant or deny access to specific API actions on specific workspaces using standard IAM policy syntax.
The SigV4 service name and IAM action namespace is aws-external-anthropic. Actions follow the pattern aws-external-anthropic:<Action> (for example, aws-external-anthropic:CreateInference).
The following policy allows real-time inference while blocking batch processing:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"aws-external-anthropic:CreateInference",
"aws-external-anthropic:CountTokens",
"aws-external-anthropic:GetModel",
"aws-external-anthropic:ListModels",
"aws-external-anthropic:GetWorkspace"
],
"Resource": "arn:aws:aws-external-anthropic:*:*:workspace/*"
},
{
"Effect": "Allow",
"Action": "aws-external-anthropic:ListWorkspaces",
"Resource": "*"
},
{
"Effect": "Deny",
"Action": [
"aws-external-anthropic:CreateBatchInference",
"aws-external-anthropic:GetBatchInference",
"aws-external-anthropic:ListBatchInferences"
],
"Resource": "*"
}
]
}The GetBatchInference action authorizes both the batch metadata route and the batch results route. Denying it blocks both reads. For a Deny-only policy suitable for ZDR-sensitive workloads, see Feature lockdown for a ZDR-sensitive workspace.
ListWorkspaces is account-scoped, so it appears in a separate Allow statement with "Resource": "*". Specifying a workspace ARN on an account-scoped action has no effect (see Provisioning automation).
This policy assumes AWS SigV4 authentication. If the principal authenticates with an API key, also add aws-external-anthropic:CallWithBearerToken to the "Resource": "*" Allow statement. CallWithBearerToken is a route-less authentication-layer action that does not bind to a workspace ARN. See Per-customer workspace isolation for the two-statement pattern.
AWS provides four managed policies (AnthropicFullAccess, AnthropicReadOnlyAccess, AnthropicInferenceAccess, and AnthropicLimitedAccess) for common access patterns. For the actions each policy grants, the complete list of IAM actions, the route-to-action mapping, and additional policy examples, see IAM actions for Claude Platform on AWS.
Was this page helpful?