aws-sdk-cognitoidentityprovider 1.102.0 → 1.104.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/client.rb +134 -55
- data/lib/aws-sdk-cognitoidentityprovider/client_api.rb +21 -0
- data/lib/aws-sdk-cognitoidentityprovider/endpoints.rb +103 -412
- data/lib/aws-sdk-cognitoidentityprovider/plugins/endpoints.rb +10 -1
- data/lib/aws-sdk-cognitoidentityprovider/types.rb +228 -59
- data/lib/aws-sdk-cognitoidentityprovider.rb +1 -1
- data/sig/client.rbs +20 -6
- data/sig/types.rbs +23 -6
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4eb555219168274e22fbfd47a085c39cf37594cc3afa33c75043f498dac74d36
|
4
|
+
data.tar.gz: f28676c854a12aa855b6494a7c1912c4b8846b4e65951488fcf72b6ed320d3ca
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cf35748cc211b4166f936623c56e6e0cfc7414665f74e805bc580b5181cc873da0ac1552e6e11c2231292613cc8c7cedfa78aec59691ba5d46f8db91799a6c7b
|
7
|
+
data.tar.gz: bfc0b3a5412d68fd0586534774a8595ed53ae2310d0efafcb0cc3b761cc670b4436892aa8c25b8e3f4a24456290f88eb4283a193cb0a77ae5a7b3f940230519f
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.104.0 (2024-09-12)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Added email MFA option to user pools with advanced security features.
|
8
|
+
|
9
|
+
1.103.0 (2024-09-11)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.102.0 (2024-09-10)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.104.0
|
@@ -676,7 +676,7 @@ module Aws::CognitoIdentityProvider
|
|
676
676
|
# sign in.
|
677
677
|
#
|
678
678
|
# If you have never used SMS text messages with Amazon Cognito or any
|
679
|
-
# other Amazon Web
|
679
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
680
680
|
# might place your account in the SMS sandbox. In <i> <a
|
681
681
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
682
682
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -1474,7 +1474,7 @@ module Aws::CognitoIdentityProvider
|
|
1474
1474
|
# sign in.
|
1475
1475
|
#
|
1476
1476
|
# If you have never used SMS text messages with Amazon Cognito or any
|
1477
|
-
# other Amazon Web
|
1477
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
1478
1478
|
# might place your account in the SMS sandbox. In <i> <a
|
1479
1479
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
1480
1480
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -1685,7 +1685,7 @@ module Aws::CognitoIdentityProvider
|
|
1685
1685
|
#
|
1686
1686
|
# @example Response structure
|
1687
1687
|
#
|
1688
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
1688
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
1689
1689
|
# resp.session #=> String
|
1690
1690
|
# resp.challenge_parameters #=> Hash
|
1691
1691
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -2135,7 +2135,7 @@ module Aws::CognitoIdentityProvider
|
|
2135
2135
|
# sign in.
|
2136
2136
|
#
|
2137
2137
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2138
|
-
# other Amazon Web
|
2138
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2139
2139
|
# might place your account in the SMS sandbox. In <i> <a
|
2140
2140
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2141
2141
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -2266,7 +2266,7 @@ module Aws::CognitoIdentityProvider
|
|
2266
2266
|
# sign in.
|
2267
2267
|
#
|
2268
2268
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2269
|
-
# other Amazon Web
|
2269
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2270
2270
|
# might place your account in the SMS sandbox. In <i> <a
|
2271
2271
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2272
2272
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -2323,11 +2323,21 @@ module Aws::CognitoIdentityProvider
|
|
2323
2323
|
# SMS\_MFA
|
2324
2324
|
#
|
2325
2325
|
# : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
|
2326
|
-
# "[
|
2326
|
+
# "[code]", "USERNAME": "[username]"\}`
|
2327
|
+
#
|
2328
|
+
# EMAIL\_OTP
|
2329
|
+
#
|
2330
|
+
# : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
|
2331
|
+
# \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
|
2327
2332
|
#
|
2328
2333
|
# PASSWORD\_VERIFIER
|
2329
2334
|
#
|
2330
|
-
# :
|
2335
|
+
# : This challenge response is part of the SRP flow. Amazon Cognito
|
2336
|
+
# requires that your application respond to this challenge within a
|
2337
|
+
# few seconds. When the response time exceeds this period, your user
|
2338
|
+
# pool returns a `NotAuthorizedException` error.
|
2339
|
+
#
|
2340
|
+
# `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
|
2331
2341
|
# \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
|
2332
2342
|
# "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
|
2333
2343
|
# [timestamp], "USERNAME": "[username]"\}`
|
@@ -2486,7 +2496,7 @@ module Aws::CognitoIdentityProvider
|
|
2486
2496
|
# resp = client.admin_respond_to_auth_challenge({
|
2487
2497
|
# user_pool_id: "UserPoolIdType", # required
|
2488
2498
|
# client_id: "ClientIdType", # required
|
2489
|
-
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
2499
|
+
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
2490
2500
|
# challenge_responses: {
|
2491
2501
|
# "StringType" => "StringType",
|
2492
2502
|
# },
|
@@ -2513,7 +2523,7 @@ module Aws::CognitoIdentityProvider
|
|
2513
2523
|
#
|
2514
2524
|
# @example Response structure
|
2515
2525
|
#
|
2516
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
2526
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
2517
2527
|
# resp.session #=> String
|
2518
2528
|
# resp.challenge_parameters #=> Hash
|
2519
2529
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -2534,12 +2544,12 @@ module Aws::CognitoIdentityProvider
|
|
2534
2544
|
req.send_request(options)
|
2535
2545
|
end
|
2536
2546
|
|
2537
|
-
#
|
2538
|
-
# which MFA options are activated, and if any are preferred.
|
2539
|
-
# factor can be set as preferred. The preferred MFA factor will
|
2540
|
-
# to authenticate a user if multiple factors are activated. If
|
2541
|
-
# options are activated and no preference is set, a challenge
|
2542
|
-
# an MFA option will be returned during sign-in.
|
2547
|
+
# Sets the user's multi-factor authentication (MFA) preference,
|
2548
|
+
# including which MFA options are activated, and if any are preferred.
|
2549
|
+
# Only one factor can be set as preferred. The preferred MFA factor will
|
2550
|
+
# be used to authenticate a user if multiple factors are activated. If
|
2551
|
+
# multiple options are activated and no preference is set, a challenge
|
2552
|
+
# to choose an MFA option will be returned during sign-in.
|
2543
2553
|
#
|
2544
2554
|
# <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
|
2545
2555
|
# in requests for this API operation. For this operation, you must use
|
@@ -2560,10 +2570,24 @@ module Aws::CognitoIdentityProvider
|
|
2560
2570
|
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
2561
2571
|
#
|
2562
2572
|
# @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
|
2563
|
-
#
|
2573
|
+
# User preferences for SMS message MFA. Activates or deactivates SMS MFA
|
2574
|
+
# and sets it as the preferred MFA method when multiple methods are
|
2575
|
+
# available.
|
2564
2576
|
#
|
2565
2577
|
# @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
|
2566
|
-
#
|
2578
|
+
# User preferences for time-based one-time password (TOTP) MFA.
|
2579
|
+
# Activates or deactivates TOTP MFA and sets it as the preferred MFA
|
2580
|
+
# method when multiple methods are available.
|
2581
|
+
#
|
2582
|
+
# @option params [Types::EmailMfaSettingsType] :email_mfa_settings
|
2583
|
+
# User preferences for email message MFA. Activates or deactivates email
|
2584
|
+
# MFA and sets it as the preferred MFA method when multiple methods are
|
2585
|
+
# available. To activate this setting, [ advanced security features][1]
|
2586
|
+
# must be active in your user pool.
|
2587
|
+
#
|
2588
|
+
#
|
2589
|
+
#
|
2590
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
2567
2591
|
#
|
2568
2592
|
# @option params [required, String] :username
|
2569
2593
|
# The username of the user that you want to query or modify. The value
|
@@ -2573,7 +2597,8 @@ module Aws::CognitoIdentityProvider
|
|
2573
2597
|
# username of a user from a third-party IdP.
|
2574
2598
|
#
|
2575
2599
|
# @option params [required, String] :user_pool_id
|
2576
|
-
# The user pool
|
2600
|
+
# The ID of the user pool where you want to set a user's MFA
|
2601
|
+
# preferences.
|
2577
2602
|
#
|
2578
2603
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
2579
2604
|
#
|
@@ -2588,6 +2613,10 @@ module Aws::CognitoIdentityProvider
|
|
2588
2613
|
# enabled: false,
|
2589
2614
|
# preferred_mfa: false,
|
2590
2615
|
# },
|
2616
|
+
# email_mfa_settings: {
|
2617
|
+
# enabled: false,
|
2618
|
+
# preferred_mfa: false,
|
2619
|
+
# },
|
2591
2620
|
# username: "UsernameType", # required
|
2592
2621
|
# user_pool_id: "UserPoolIdType", # required
|
2593
2622
|
# })
|
@@ -2876,7 +2905,7 @@ module Aws::CognitoIdentityProvider
|
|
2876
2905
|
# sign in.
|
2877
2906
|
#
|
2878
2907
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2879
|
-
# other Amazon Web
|
2908
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2880
2909
|
# might place your account in the SMS sandbox. In <i> <a
|
2881
2910
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2882
2911
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -3970,7 +3999,7 @@ module Aws::CognitoIdentityProvider
|
|
3970
3999
|
# sign in.
|
3971
4000
|
#
|
3972
4001
|
# If you have never used SMS text messages with Amazon Cognito or any
|
3973
|
-
# other Amazon Web
|
4002
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
3974
4003
|
# might place your account in the SMS sandbox. In <i> <a
|
3975
4004
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
3976
4005
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -4960,9 +4989,9 @@ module Aws::CognitoIdentityProvider
|
|
4960
4989
|
# are hours.
|
4961
4990
|
#
|
4962
4991
|
# @option params [Array<String>] :read_attributes
|
4963
|
-
# The list of user attributes that you want your app client to have
|
4964
|
-
#
|
4965
|
-
#
|
4992
|
+
# The list of user attributes that you want your app client to have read
|
4993
|
+
# access to. After your user authenticates in your app, their access
|
4994
|
+
# token authorizes them to read their own attribute value for any
|
4966
4995
|
# attribute in this list. An example of this kind of activity is when
|
4967
4996
|
# your user selects a link to view their profile information. Your app
|
4968
4997
|
# makes a [GetUser][1] API request to retrieve and display your user's
|
@@ -4970,11 +4999,11 @@ module Aws::CognitoIdentityProvider
|
|
4970
4999
|
#
|
4971
5000
|
# When you don't specify the `ReadAttributes` for your app client, your
|
4972
5001
|
# app can read the values of `email_verified`, `phone_number_verified`,
|
4973
|
-
# and the Standard attributes of your user pool. When your user pool
|
4974
|
-
# read access to these default attributes, `ReadAttributes`
|
4975
|
-
# return any information. Amazon Cognito only populates
|
4976
|
-
# in the API response if you have specified your own
|
4977
|
-
# attributes.
|
5002
|
+
# and the Standard attributes of your user pool. When your user pool app
|
5003
|
+
# client has read access to these default attributes, `ReadAttributes`
|
5004
|
+
# doesn't return any information. Amazon Cognito only populates
|
5005
|
+
# `ReadAttributes` in the API response if you have specified your own
|
5006
|
+
# custom set of read attributes.
|
4978
5007
|
#
|
4979
5008
|
#
|
4980
5009
|
#
|
@@ -6282,7 +6311,7 @@ module Aws::CognitoIdentityProvider
|
|
6282
6311
|
# sign in.
|
6283
6312
|
#
|
6284
6313
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6285
|
-
# other Amazon Web
|
6314
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6286
6315
|
# might place your account in the SMS sandbox. In <i> <a
|
6287
6316
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6288
6317
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -6770,7 +6799,7 @@ module Aws::CognitoIdentityProvider
|
|
6770
6799
|
# sign in.
|
6771
6800
|
#
|
6772
6801
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6773
|
-
# other Amazon Web
|
6802
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6774
6803
|
# might place your account in the SMS sandbox. In <i> <a
|
6775
6804
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6776
6805
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -6870,6 +6899,7 @@ module Aws::CognitoIdentityProvider
|
|
6870
6899
|
#
|
6871
6900
|
# * {Types::GetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
|
6872
6901
|
# * {Types::GetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
|
6902
|
+
# * {Types::GetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
|
6873
6903
|
# * {Types::GetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
|
6874
6904
|
#
|
6875
6905
|
# @example Request syntax with placeholder values
|
@@ -6885,6 +6915,8 @@ module Aws::CognitoIdentityProvider
|
|
6885
6915
|
# resp.sms_mfa_configuration.sms_configuration.external_id #=> String
|
6886
6916
|
# resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
|
6887
6917
|
# resp.software_token_mfa_configuration.enabled #=> Boolean
|
6918
|
+
# resp.email_mfa_configuration.message #=> String
|
6919
|
+
# resp.email_mfa_configuration.subject #=> String
|
6888
6920
|
# resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
|
6889
6921
|
#
|
6890
6922
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetUserPoolMfaConfig AWS API Documentation
|
@@ -6983,7 +7015,7 @@ module Aws::CognitoIdentityProvider
|
|
6983
7015
|
# sign in.
|
6984
7016
|
#
|
6985
7017
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6986
|
-
# other Amazon Web
|
7018
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6987
7019
|
# might place your account in the SMS sandbox. In <i> <a
|
6988
7020
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6989
7021
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -7202,7 +7234,7 @@ module Aws::CognitoIdentityProvider
|
|
7202
7234
|
#
|
7203
7235
|
# @example Response structure
|
7204
7236
|
#
|
7205
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
7237
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
7206
7238
|
# resp.session #=> String
|
7207
7239
|
# resp.challenge_parameters #=> Hash
|
7208
7240
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -8073,7 +8105,7 @@ module Aws::CognitoIdentityProvider
|
|
8073
8105
|
# sign in.
|
8074
8106
|
#
|
8075
8107
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8076
|
-
# other Amazon Web
|
8108
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8077
8109
|
# might place your account in the SMS sandbox. In <i> <a
|
8078
8110
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8079
8111
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8219,7 +8251,7 @@ module Aws::CognitoIdentityProvider
|
|
8219
8251
|
# sign in.
|
8220
8252
|
#
|
8221
8253
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8222
|
-
# other Amazon Web
|
8254
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8223
8255
|
# might place your account in the SMS sandbox. In <i> <a
|
8224
8256
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8225
8257
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8268,11 +8300,21 @@ module Aws::CognitoIdentityProvider
|
|
8268
8300
|
# SMS\_MFA
|
8269
8301
|
#
|
8270
8302
|
# : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
|
8271
|
-
# "[
|
8303
|
+
# "[code]", "USERNAME": "[username]"\}`
|
8304
|
+
#
|
8305
|
+
# EMAIL\_OTP
|
8306
|
+
#
|
8307
|
+
# : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
|
8308
|
+
# \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
|
8272
8309
|
#
|
8273
8310
|
# PASSWORD\_VERIFIER
|
8274
8311
|
#
|
8275
|
-
# :
|
8312
|
+
# : This challenge response is part of the SRP flow. Amazon Cognito
|
8313
|
+
# requires that your application respond to this challenge within a
|
8314
|
+
# few seconds. When the response time exceeds this period, your user
|
8315
|
+
# pool returns a `NotAuthorizedException` error.
|
8316
|
+
#
|
8317
|
+
# `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
|
8276
8318
|
# \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
|
8277
8319
|
# "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
|
8278
8320
|
# [timestamp], "USERNAME": "[username]"\}`
|
@@ -8407,7 +8449,7 @@ module Aws::CognitoIdentityProvider
|
|
8407
8449
|
#
|
8408
8450
|
# resp = client.respond_to_auth_challenge({
|
8409
8451
|
# client_id: "ClientIdType", # required
|
8410
|
-
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
8452
|
+
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
8411
8453
|
# session: "SessionType",
|
8412
8454
|
# challenge_responses: {
|
8413
8455
|
# "StringType" => "StringType",
|
@@ -8426,7 +8468,7 @@ module Aws::CognitoIdentityProvider
|
|
8426
8468
|
#
|
8427
8469
|
# @example Response structure
|
8428
8470
|
#
|
8429
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
8471
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
8430
8472
|
# resp.session #=> String
|
8431
8473
|
# resp.challenge_parameters #=> Hash
|
8432
8474
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -8762,10 +8804,24 @@ module Aws::CognitoIdentityProvider
|
|
8762
8804
|
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
8763
8805
|
#
|
8764
8806
|
# @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
|
8765
|
-
#
|
8807
|
+
# User preferences for SMS message MFA. Activates or deactivates SMS MFA
|
8808
|
+
# and sets it as the preferred MFA method when multiple methods are
|
8809
|
+
# available.
|
8766
8810
|
#
|
8767
8811
|
# @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
|
8768
|
-
#
|
8812
|
+
# User preferences for time-based one-time password (TOTP) MFA.
|
8813
|
+
# Activates or deactivates TOTP MFA and sets it as the preferred MFA
|
8814
|
+
# method when multiple methods are available.
|
8815
|
+
#
|
8816
|
+
# @option params [Types::EmailMfaSettingsType] :email_mfa_settings
|
8817
|
+
# User preferences for email message MFA. Activates or deactivates email
|
8818
|
+
# MFA and sets it as the preferred MFA method when multiple methods are
|
8819
|
+
# available. To activate this setting, [ advanced security features][1]
|
8820
|
+
# must be active in your user pool.
|
8821
|
+
#
|
8822
|
+
#
|
8823
|
+
#
|
8824
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
8769
8825
|
#
|
8770
8826
|
# @option params [required, String] :access_token
|
8771
8827
|
# A valid access token that Amazon Cognito issued to the user whose MFA
|
@@ -8784,6 +8840,10 @@ module Aws::CognitoIdentityProvider
|
|
8784
8840
|
# enabled: false,
|
8785
8841
|
# preferred_mfa: false,
|
8786
8842
|
# },
|
8843
|
+
# email_mfa_settings: {
|
8844
|
+
# enabled: false,
|
8845
|
+
# preferred_mfa: false,
|
8846
|
+
# },
|
8787
8847
|
# access_token: "TokenModelType", # required
|
8788
8848
|
# })
|
8789
8849
|
#
|
@@ -8808,7 +8868,7 @@ module Aws::CognitoIdentityProvider
|
|
8808
8868
|
# sign in.
|
8809
8869
|
#
|
8810
8870
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8811
|
-
# other Amazon Web
|
8871
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8812
8872
|
# might place your account in the SMS sandbox. In <i> <a
|
8813
8873
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8814
8874
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8828,10 +8888,22 @@ module Aws::CognitoIdentityProvider
|
|
8828
8888
|
# The user pool ID.
|
8829
8889
|
#
|
8830
8890
|
# @option params [Types::SmsMfaConfigType] :sms_mfa_configuration
|
8831
|
-
#
|
8891
|
+
# Configures user pool SMS messages for MFA. Sets the message template
|
8892
|
+
# and the SMS message sending configuration for Amazon SNS.
|
8832
8893
|
#
|
8833
8894
|
# @option params [Types::SoftwareTokenMfaConfigType] :software_token_mfa_configuration
|
8834
|
-
#
|
8895
|
+
# Configures a user pool for time-based one-time password (TOTP) MFA.
|
8896
|
+
# Enables or disables TOTP.
|
8897
|
+
#
|
8898
|
+
# @option params [Types::EmailMfaConfigType] :email_mfa_configuration
|
8899
|
+
# Configures user pool email messages for MFA. Sets the subject and body
|
8900
|
+
# of the email message template for MFA messages. To activate this
|
8901
|
+
# setting, [ advanced security features][1] must be active in your user
|
8902
|
+
# pool.
|
8903
|
+
#
|
8904
|
+
#
|
8905
|
+
#
|
8906
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
8835
8907
|
#
|
8836
8908
|
# @option params [String] :mfa_configuration
|
8837
8909
|
# The MFA configuration. If you set the MfaConfiguration value to ‘ON’,
|
@@ -8854,6 +8926,7 @@ module Aws::CognitoIdentityProvider
|
|
8854
8926
|
#
|
8855
8927
|
# * {Types::SetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
|
8856
8928
|
# * {Types::SetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
|
8929
|
+
# * {Types::SetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
|
8857
8930
|
# * {Types::SetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
|
8858
8931
|
#
|
8859
8932
|
# @example Request syntax with placeholder values
|
@@ -8871,6 +8944,10 @@ module Aws::CognitoIdentityProvider
|
|
8871
8944
|
# software_token_mfa_configuration: {
|
8872
8945
|
# enabled: false,
|
8873
8946
|
# },
|
8947
|
+
# email_mfa_configuration: {
|
8948
|
+
# message: "EmailMfaMessageType",
|
8949
|
+
# subject: "EmailMfaSubjectType",
|
8950
|
+
# },
|
8874
8951
|
# mfa_configuration: "OFF", # accepts OFF, ON, OPTIONAL
|
8875
8952
|
# })
|
8876
8953
|
#
|
@@ -8881,6 +8958,8 @@ module Aws::CognitoIdentityProvider
|
|
8881
8958
|
# resp.sms_mfa_configuration.sms_configuration.external_id #=> String
|
8882
8959
|
# resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
|
8883
8960
|
# resp.software_token_mfa_configuration.enabled #=> Boolean
|
8961
|
+
# resp.email_mfa_configuration.message #=> String
|
8962
|
+
# resp.email_mfa_configuration.subject #=> String
|
8884
8963
|
# resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
|
8885
8964
|
#
|
8886
8965
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SetUserPoolMfaConfig AWS API Documentation
|
@@ -8967,7 +9046,7 @@ module Aws::CognitoIdentityProvider
|
|
8967
9046
|
# sign in.
|
8968
9047
|
#
|
8969
9048
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8970
|
-
# other Amazon Web
|
9049
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8971
9050
|
# might place your account in the SMS sandbox. In <i> <a
|
8972
9051
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8973
9052
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -9778,7 +9857,7 @@ module Aws::CognitoIdentityProvider
|
|
9778
9857
|
# sign in.
|
9779
9858
|
#
|
9780
9859
|
# If you have never used SMS text messages with Amazon Cognito or any
|
9781
|
-
# other Amazon Web
|
9860
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
9782
9861
|
# might place your account in the SMS sandbox. In <i> <a
|
9783
9862
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
9784
9863
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -9893,7 +9972,7 @@ module Aws::CognitoIdentityProvider
|
|
9893
9972
|
# sign in.
|
9894
9973
|
#
|
9895
9974
|
# If you have never used SMS text messages with Amazon Cognito or any
|
9896
|
-
# other Amazon Web
|
9975
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
9897
9976
|
# might place your account in the SMS sandbox. In <i> <a
|
9898
9977
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
9899
9978
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -10282,9 +10361,9 @@ module Aws::CognitoIdentityProvider
|
|
10282
10361
|
# default for ID and access tokens is hours.
|
10283
10362
|
#
|
10284
10363
|
# @option params [Array<String>] :read_attributes
|
10285
|
-
# The list of user attributes that you want your app client to have
|
10286
|
-
#
|
10287
|
-
#
|
10364
|
+
# The list of user attributes that you want your app client to have read
|
10365
|
+
# access to. After your user authenticates in your app, their access
|
10366
|
+
# token authorizes them to read their own attribute value for any
|
10288
10367
|
# attribute in this list. An example of this kind of activity is when
|
10289
10368
|
# your user selects a link to view their profile information. Your app
|
10290
10369
|
# makes a [GetUser][1] API request to retrieve and display your user's
|
@@ -10292,11 +10371,11 @@ module Aws::CognitoIdentityProvider
|
|
10292
10371
|
#
|
10293
10372
|
# When you don't specify the `ReadAttributes` for your app client, your
|
10294
10373
|
# app can read the values of `email_verified`, `phone_number_verified`,
|
10295
|
-
# and the Standard attributes of your user pool. When your user pool
|
10296
|
-
# read access to these default attributes, `ReadAttributes`
|
10297
|
-
# return any information. Amazon Cognito only populates
|
10298
|
-
# in the API response if you have specified your own
|
10299
|
-
# attributes.
|
10374
|
+
# and the Standard attributes of your user pool. When your user pool app
|
10375
|
+
# client has read access to these default attributes, `ReadAttributes`
|
10376
|
+
# doesn't return any information. Amazon Cognito only populates
|
10377
|
+
# `ReadAttributes` in the API response if you have specified your own
|
10378
|
+
# custom set of read attributes.
|
10300
10379
|
#
|
10301
10380
|
#
|
10302
10381
|
#
|
@@ -10854,7 +10933,7 @@ module Aws::CognitoIdentityProvider
|
|
10854
10933
|
tracer: tracer
|
10855
10934
|
)
|
10856
10935
|
context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
|
10857
|
-
context[:gem_version] = '1.
|
10936
|
+
context[:gem_version] = '1.104.0'
|
10858
10937
|
Seahorse::Client::Request.new(handlers, context)
|
10859
10938
|
end
|
10860
10939
|
|
@@ -202,6 +202,10 @@ module Aws::CognitoIdentityProvider
|
|
202
202
|
DuplicateProviderException = Shapes::StructureShape.new(name: 'DuplicateProviderException')
|
203
203
|
EmailAddressType = Shapes::StringShape.new(name: 'EmailAddressType')
|
204
204
|
EmailConfigurationType = Shapes::StructureShape.new(name: 'EmailConfigurationType')
|
205
|
+
EmailMfaConfigType = Shapes::StructureShape.new(name: 'EmailMfaConfigType')
|
206
|
+
EmailMfaMessageType = Shapes::StringShape.new(name: 'EmailMfaMessageType')
|
207
|
+
EmailMfaSettingsType = Shapes::StructureShape.new(name: 'EmailMfaSettingsType')
|
208
|
+
EmailMfaSubjectType = Shapes::StringShape.new(name: 'EmailMfaSubjectType')
|
205
209
|
EmailNotificationBodyType = Shapes::StringShape.new(name: 'EmailNotificationBodyType')
|
206
210
|
EmailNotificationSubjectType = Shapes::StringShape.new(name: 'EmailNotificationSubjectType')
|
207
211
|
EmailSendingAccountType = Shapes::StringShape.new(name: 'EmailSendingAccountType')
|
@@ -691,6 +695,7 @@ module Aws::CognitoIdentityProvider
|
|
691
695
|
|
692
696
|
AdminSetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
|
693
697
|
AdminSetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
|
698
|
+
AdminSetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
|
694
699
|
AdminSetUserMFAPreferenceRequest.add_member(:username, Shapes::ShapeRef.new(shape: UsernameType, required: true, location_name: "Username"))
|
695
700
|
AdminSetUserMFAPreferenceRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
696
701
|
AdminSetUserMFAPreferenceRequest.struct_class = Types::AdminSetUserMFAPreferenceRequest
|
@@ -1132,6 +1137,14 @@ module Aws::CognitoIdentityProvider
|
|
1132
1137
|
EmailConfigurationType.add_member(:configuration_set, Shapes::ShapeRef.new(shape: SESConfigurationSet, location_name: "ConfigurationSet"))
|
1133
1138
|
EmailConfigurationType.struct_class = Types::EmailConfigurationType
|
1134
1139
|
|
1140
|
+
EmailMfaConfigType.add_member(:message, Shapes::ShapeRef.new(shape: EmailMfaMessageType, location_name: "Message"))
|
1141
|
+
EmailMfaConfigType.add_member(:subject, Shapes::ShapeRef.new(shape: EmailMfaSubjectType, location_name: "Subject"))
|
1142
|
+
EmailMfaConfigType.struct_class = Types::EmailMfaConfigType
|
1143
|
+
|
1144
|
+
EmailMfaSettingsType.add_member(:enabled, Shapes::ShapeRef.new(shape: BooleanType, location_name: "Enabled"))
|
1145
|
+
EmailMfaSettingsType.add_member(:preferred_mfa, Shapes::ShapeRef.new(shape: BooleanType, location_name: "PreferredMfa"))
|
1146
|
+
EmailMfaSettingsType.struct_class = Types::EmailMfaSettingsType
|
1147
|
+
|
1135
1148
|
EnableSoftwareTokenMFAException.add_member(:message, Shapes::ShapeRef.new(shape: MessageType, location_name: "message"))
|
1136
1149
|
EnableSoftwareTokenMFAException.struct_class = Types::EnableSoftwareTokenMFAException
|
1137
1150
|
|
@@ -1240,6 +1253,7 @@ module Aws::CognitoIdentityProvider
|
|
1240
1253
|
|
1241
1254
|
GetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1242
1255
|
GetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1256
|
+
GetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1243
1257
|
GetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1244
1258
|
GetUserPoolMfaConfigResponse.struct_class = Types::GetUserPoolMfaConfigResponse
|
1245
1259
|
|
@@ -1655,6 +1669,7 @@ module Aws::CognitoIdentityProvider
|
|
1655
1669
|
|
1656
1670
|
SetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
|
1657
1671
|
SetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
|
1672
|
+
SetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
|
1658
1673
|
SetUserMFAPreferenceRequest.add_member(:access_token, Shapes::ShapeRef.new(shape: TokenModelType, required: true, location_name: "AccessToken"))
|
1659
1674
|
SetUserMFAPreferenceRequest.struct_class = Types::SetUserMFAPreferenceRequest
|
1660
1675
|
|
@@ -1663,11 +1678,13 @@ module Aws::CognitoIdentityProvider
|
|
1663
1678
|
SetUserPoolMfaConfigRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
1664
1679
|
SetUserPoolMfaConfigRequest.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1665
1680
|
SetUserPoolMfaConfigRequest.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1681
|
+
SetUserPoolMfaConfigRequest.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1666
1682
|
SetUserPoolMfaConfigRequest.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1667
1683
|
SetUserPoolMfaConfigRequest.struct_class = Types::SetUserPoolMfaConfigRequest
|
1668
1684
|
|
1669
1685
|
SetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1670
1686
|
SetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1687
|
+
SetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1671
1688
|
SetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1672
1689
|
SetUserPoolMfaConfigResponse.struct_class = Types::SetUserPoolMfaConfigResponse
|
1673
1690
|
|
@@ -2298,6 +2315,7 @@ module Aws::CognitoIdentityProvider
|
|
2298
2315
|
o.errors << Shapes::ShapeRef.new(shape: InvalidLambdaResponseException)
|
2299
2316
|
o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
|
2300
2317
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
2318
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
2301
2319
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
2302
2320
|
o.errors << Shapes::ShapeRef.new(shape: PasswordResetRequiredException)
|
2303
2321
|
o.errors << Shapes::ShapeRef.new(shape: UserNotFoundException)
|
@@ -2430,6 +2448,7 @@ module Aws::CognitoIdentityProvider
|
|
2430
2448
|
o.errors << Shapes::ShapeRef.new(shape: InvalidUserPoolConfigurationException)
|
2431
2449
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
2432
2450
|
o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
|
2451
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
2433
2452
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
2434
2453
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
2435
2454
|
o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
|
@@ -3217,6 +3236,7 @@ module Aws::CognitoIdentityProvider
|
|
3217
3236
|
o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
|
3218
3237
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
3219
3238
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
3239
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
3220
3240
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
3221
3241
|
o.errors << Shapes::ShapeRef.new(shape: ForbiddenException)
|
3222
3242
|
end)
|
@@ -3450,6 +3470,7 @@ module Aws::CognitoIdentityProvider
|
|
3450
3470
|
o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
|
3451
3471
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
3452
3472
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
3473
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
3453
3474
|
o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
|
3454
3475
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
3455
3476
|
o.errors << Shapes::ShapeRef.new(shape: SoftwareTokenMFANotFoundException)
|