Simulate the access of IAM users and roles performing various IAM actions against any ARN. Get a list of which users and roles have access.