An error occurred (AccessDenied) when calling the AssumeRole operation: User: arn:aws:iam::012345678901:user/MyUser is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::111111111111:role/aws-service-role/rds.amazonaws.com/AWSServiceRoleForRDS
### You could also use: aws iam update-assume-role-policy# When it worksawsiamcreate-role--role-nameTest-Role--assume-role-policy-documentfile://a.json{"Role":{"Path":"/","RoleName":"Test-Role","RoleId":"AROA5ZDCUJS3DVEIYOB73","Arn":"arn:aws:iam::947247140022:role/Test-Role","CreateDate":"2022-05-03T20:50:04Z","AssumeRolePolicyDocument":{"Version":"2012-10-17","Statement": [{"Effect":"Allow","Principal":{"AWS":"arn:aws:iam::316584767888:role/account-balance"},"Action": ["sts:AssumeRole"]}]}}}# When it doesn't workawsiamcreate-role--role-nameTest-Role2--assume-role-policy-documentfile://a.jsonAn error occurred (MalformedPolicyDocument) when calling the CreateRole operation: Invalid principal in policy: "AWS":"arn:aws:iam::316584767888:role/account-balanceefd23f2"