Using Console
Using CLI
<username>
with the actual username of the inactive user.<username>
with the actual username of the inactive user.<username>
with the actual username of the inactive user.<access-key-id>
with the actual access key ID and <username>
with the actual username of the inactive user.<username>
with the actual username of the inactive user.<username>
with the actual username of the inactive user and <serial-number>
with the actual serial number of the MFA device.Using Python
boto3
and datetime
:
check_inactive_users
function, passing the number of days of inactivity as an argument. This will return a list of inactive IAM users:
Status
to Inactive
using the update_login_profile
method:
delete_user
method instead.
.py
extension and run it using Python. It will identify the inactive IAM users and disable their access.