aws-sdk-cognitoidentityprovider 1.102.0 → 1.104.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/client.rb +134 -55
- data/lib/aws-sdk-cognitoidentityprovider/client_api.rb +21 -0
- data/lib/aws-sdk-cognitoidentityprovider/endpoints.rb +103 -412
- data/lib/aws-sdk-cognitoidentityprovider/plugins/endpoints.rb +10 -1
- data/lib/aws-sdk-cognitoidentityprovider/types.rb +228 -59
- data/lib/aws-sdk-cognitoidentityprovider.rb +1 -1
- data/sig/client.rbs +20 -6
- data/sig/types.rbs +23 -6
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4eb555219168274e22fbfd47a085c39cf37594cc3afa33c75043f498dac74d36
|
4
|
+
data.tar.gz: f28676c854a12aa855b6494a7c1912c4b8846b4e65951488fcf72b6ed320d3ca
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cf35748cc211b4166f936623c56e6e0cfc7414665f74e805bc580b5181cc873da0ac1552e6e11c2231292613cc8c7cedfa78aec59691ba5d46f8db91799a6c7b
|
7
|
+
data.tar.gz: bfc0b3a5412d68fd0586534774a8595ed53ae2310d0efafcb0cc3b761cc670b4436892aa8c25b8e3f4a24456290f88eb4283a193cb0a77ae5a7b3f940230519f
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.104.0 (2024-09-12)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Added email MFA option to user pools with advanced security features.
|
8
|
+
|
9
|
+
1.103.0 (2024-09-11)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.102.0 (2024-09-10)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.104.0
|
@@ -676,7 +676,7 @@ module Aws::CognitoIdentityProvider
|
|
676
676
|
# sign in.
|
677
677
|
#
|
678
678
|
# If you have never used SMS text messages with Amazon Cognito or any
|
679
|
-
# other Amazon Web
|
679
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
680
680
|
# might place your account in the SMS sandbox. In <i> <a
|
681
681
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
682
682
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -1474,7 +1474,7 @@ module Aws::CognitoIdentityProvider
|
|
1474
1474
|
# sign in.
|
1475
1475
|
#
|
1476
1476
|
# If you have never used SMS text messages with Amazon Cognito or any
|
1477
|
-
# other Amazon Web
|
1477
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
1478
1478
|
# might place your account in the SMS sandbox. In <i> <a
|
1479
1479
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
1480
1480
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -1685,7 +1685,7 @@ module Aws::CognitoIdentityProvider
|
|
1685
1685
|
#
|
1686
1686
|
# @example Response structure
|
1687
1687
|
#
|
1688
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
1688
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
1689
1689
|
# resp.session #=> String
|
1690
1690
|
# resp.challenge_parameters #=> Hash
|
1691
1691
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -2135,7 +2135,7 @@ module Aws::CognitoIdentityProvider
|
|
2135
2135
|
# sign in.
|
2136
2136
|
#
|
2137
2137
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2138
|
-
# other Amazon Web
|
2138
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2139
2139
|
# might place your account in the SMS sandbox. In <i> <a
|
2140
2140
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2141
2141
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -2266,7 +2266,7 @@ module Aws::CognitoIdentityProvider
|
|
2266
2266
|
# sign in.
|
2267
2267
|
#
|
2268
2268
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2269
|
-
# other Amazon Web
|
2269
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2270
2270
|
# might place your account in the SMS sandbox. In <i> <a
|
2271
2271
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2272
2272
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -2323,11 +2323,21 @@ module Aws::CognitoIdentityProvider
|
|
2323
2323
|
# SMS\_MFA
|
2324
2324
|
#
|
2325
2325
|
# : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
|
2326
|
-
# "[
|
2326
|
+
# "[code]", "USERNAME": "[username]"\}`
|
2327
|
+
#
|
2328
|
+
# EMAIL\_OTP
|
2329
|
+
#
|
2330
|
+
# : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
|
2331
|
+
# \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
|
2327
2332
|
#
|
2328
2333
|
# PASSWORD\_VERIFIER
|
2329
2334
|
#
|
2330
|
-
# :
|
2335
|
+
# : This challenge response is part of the SRP flow. Amazon Cognito
|
2336
|
+
# requires that your application respond to this challenge within a
|
2337
|
+
# few seconds. When the response time exceeds this period, your user
|
2338
|
+
# pool returns a `NotAuthorizedException` error.
|
2339
|
+
#
|
2340
|
+
# `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
|
2331
2341
|
# \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
|
2332
2342
|
# "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
|
2333
2343
|
# [timestamp], "USERNAME": "[username]"\}`
|
@@ -2486,7 +2496,7 @@ module Aws::CognitoIdentityProvider
|
|
2486
2496
|
# resp = client.admin_respond_to_auth_challenge({
|
2487
2497
|
# user_pool_id: "UserPoolIdType", # required
|
2488
2498
|
# client_id: "ClientIdType", # required
|
2489
|
-
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
2499
|
+
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
2490
2500
|
# challenge_responses: {
|
2491
2501
|
# "StringType" => "StringType",
|
2492
2502
|
# },
|
@@ -2513,7 +2523,7 @@ module Aws::CognitoIdentityProvider
|
|
2513
2523
|
#
|
2514
2524
|
# @example Response structure
|
2515
2525
|
#
|
2516
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
2526
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
2517
2527
|
# resp.session #=> String
|
2518
2528
|
# resp.challenge_parameters #=> Hash
|
2519
2529
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -2534,12 +2544,12 @@ module Aws::CognitoIdentityProvider
|
|
2534
2544
|
req.send_request(options)
|
2535
2545
|
end
|
2536
2546
|
|
2537
|
-
#
|
2538
|
-
# which MFA options are activated, and if any are preferred.
|
2539
|
-
# factor can be set as preferred. The preferred MFA factor will
|
2540
|
-
# to authenticate a user if multiple factors are activated. If
|
2541
|
-
# options are activated and no preference is set, a challenge
|
2542
|
-
# an MFA option will be returned during sign-in.
|
2547
|
+
# Sets the user's multi-factor authentication (MFA) preference,
|
2548
|
+
# including which MFA options are activated, and if any are preferred.
|
2549
|
+
# Only one factor can be set as preferred. The preferred MFA factor will
|
2550
|
+
# be used to authenticate a user if multiple factors are activated. If
|
2551
|
+
# multiple options are activated and no preference is set, a challenge
|
2552
|
+
# to choose an MFA option will be returned during sign-in.
|
2543
2553
|
#
|
2544
2554
|
# <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
|
2545
2555
|
# in requests for this API operation. For this operation, you must use
|
@@ -2560,10 +2570,24 @@ module Aws::CognitoIdentityProvider
|
|
2560
2570
|
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
2561
2571
|
#
|
2562
2572
|
# @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
|
2563
|
-
#
|
2573
|
+
# User preferences for SMS message MFA. Activates or deactivates SMS MFA
|
2574
|
+
# and sets it as the preferred MFA method when multiple methods are
|
2575
|
+
# available.
|
2564
2576
|
#
|
2565
2577
|
# @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
|
2566
|
-
#
|
2578
|
+
# User preferences for time-based one-time password (TOTP) MFA.
|
2579
|
+
# Activates or deactivates TOTP MFA and sets it as the preferred MFA
|
2580
|
+
# method when multiple methods are available.
|
2581
|
+
#
|
2582
|
+
# @option params [Types::EmailMfaSettingsType] :email_mfa_settings
|
2583
|
+
# User preferences for email message MFA. Activates or deactivates email
|
2584
|
+
# MFA and sets it as the preferred MFA method when multiple methods are
|
2585
|
+
# available. To activate this setting, [ advanced security features][1]
|
2586
|
+
# must be active in your user pool.
|
2587
|
+
#
|
2588
|
+
#
|
2589
|
+
#
|
2590
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
2567
2591
|
#
|
2568
2592
|
# @option params [required, String] :username
|
2569
2593
|
# The username of the user that you want to query or modify. The value
|
@@ -2573,7 +2597,8 @@ module Aws::CognitoIdentityProvider
|
|
2573
2597
|
# username of a user from a third-party IdP.
|
2574
2598
|
#
|
2575
2599
|
# @option params [required, String] :user_pool_id
|
2576
|
-
# The user pool
|
2600
|
+
# The ID of the user pool where you want to set a user's MFA
|
2601
|
+
# preferences.
|
2577
2602
|
#
|
2578
2603
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
2579
2604
|
#
|
@@ -2588,6 +2613,10 @@ module Aws::CognitoIdentityProvider
|
|
2588
2613
|
# enabled: false,
|
2589
2614
|
# preferred_mfa: false,
|
2590
2615
|
# },
|
2616
|
+
# email_mfa_settings: {
|
2617
|
+
# enabled: false,
|
2618
|
+
# preferred_mfa: false,
|
2619
|
+
# },
|
2591
2620
|
# username: "UsernameType", # required
|
2592
2621
|
# user_pool_id: "UserPoolIdType", # required
|
2593
2622
|
# })
|
@@ -2876,7 +2905,7 @@ module Aws::CognitoIdentityProvider
|
|
2876
2905
|
# sign in.
|
2877
2906
|
#
|
2878
2907
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2879
|
-
# other Amazon Web
|
2908
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2880
2909
|
# might place your account in the SMS sandbox. In <i> <a
|
2881
2910
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2882
2911
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -3970,7 +3999,7 @@ module Aws::CognitoIdentityProvider
|
|
3970
3999
|
# sign in.
|
3971
4000
|
#
|
3972
4001
|
# If you have never used SMS text messages with Amazon Cognito or any
|
3973
|
-
# other Amazon Web
|
4002
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
3974
4003
|
# might place your account in the SMS sandbox. In <i> <a
|
3975
4004
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
3976
4005
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -4960,9 +4989,9 @@ module Aws::CognitoIdentityProvider
|
|
4960
4989
|
# are hours.
|
4961
4990
|
#
|
4962
4991
|
# @option params [Array<String>] :read_attributes
|
4963
|
-
# The list of user attributes that you want your app client to have
|
4964
|
-
#
|
4965
|
-
#
|
4992
|
+
# The list of user attributes that you want your app client to have read
|
4993
|
+
# access to. After your user authenticates in your app, their access
|
4994
|
+
# token authorizes them to read their own attribute value for any
|
4966
4995
|
# attribute in this list. An example of this kind of activity is when
|
4967
4996
|
# your user selects a link to view their profile information. Your app
|
4968
4997
|
# makes a [GetUser][1] API request to retrieve and display your user's
|
@@ -4970,11 +4999,11 @@ module Aws::CognitoIdentityProvider
|
|
4970
4999
|
#
|
4971
5000
|
# When you don't specify the `ReadAttributes` for your app client, your
|
4972
5001
|
# app can read the values of `email_verified`, `phone_number_verified`,
|
4973
|
-
# and the Standard attributes of your user pool. When your user pool
|
4974
|
-
# read access to these default attributes, `ReadAttributes`
|
4975
|
-
# return any information. Amazon Cognito only populates
|
4976
|
-
# in the API response if you have specified your own
|
4977
|
-
# attributes.
|
5002
|
+
# and the Standard attributes of your user pool. When your user pool app
|
5003
|
+
# client has read access to these default attributes, `ReadAttributes`
|
5004
|
+
# doesn't return any information. Amazon Cognito only populates
|
5005
|
+
# `ReadAttributes` in the API response if you have specified your own
|
5006
|
+
# custom set of read attributes.
|
4978
5007
|
#
|
4979
5008
|
#
|
4980
5009
|
#
|
@@ -6282,7 +6311,7 @@ module Aws::CognitoIdentityProvider
|
|
6282
6311
|
# sign in.
|
6283
6312
|
#
|
6284
6313
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6285
|
-
# other Amazon Web
|
6314
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6286
6315
|
# might place your account in the SMS sandbox. In <i> <a
|
6287
6316
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6288
6317
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -6770,7 +6799,7 @@ module Aws::CognitoIdentityProvider
|
|
6770
6799
|
# sign in.
|
6771
6800
|
#
|
6772
6801
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6773
|
-
# other Amazon Web
|
6802
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6774
6803
|
# might place your account in the SMS sandbox. In <i> <a
|
6775
6804
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6776
6805
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -6870,6 +6899,7 @@ module Aws::CognitoIdentityProvider
|
|
6870
6899
|
#
|
6871
6900
|
# * {Types::GetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
|
6872
6901
|
# * {Types::GetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
|
6902
|
+
# * {Types::GetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
|
6873
6903
|
# * {Types::GetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
|
6874
6904
|
#
|
6875
6905
|
# @example Request syntax with placeholder values
|
@@ -6885,6 +6915,8 @@ module Aws::CognitoIdentityProvider
|
|
6885
6915
|
# resp.sms_mfa_configuration.sms_configuration.external_id #=> String
|
6886
6916
|
# resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
|
6887
6917
|
# resp.software_token_mfa_configuration.enabled #=> Boolean
|
6918
|
+
# resp.email_mfa_configuration.message #=> String
|
6919
|
+
# resp.email_mfa_configuration.subject #=> String
|
6888
6920
|
# resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
|
6889
6921
|
#
|
6890
6922
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetUserPoolMfaConfig AWS API Documentation
|
@@ -6983,7 +7015,7 @@ module Aws::CognitoIdentityProvider
|
|
6983
7015
|
# sign in.
|
6984
7016
|
#
|
6985
7017
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6986
|
-
# other Amazon Web
|
7018
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6987
7019
|
# might place your account in the SMS sandbox. In <i> <a
|
6988
7020
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6989
7021
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -7202,7 +7234,7 @@ module Aws::CognitoIdentityProvider
|
|
7202
7234
|
#
|
7203
7235
|
# @example Response structure
|
7204
7236
|
#
|
7205
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
7237
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
7206
7238
|
# resp.session #=> String
|
7207
7239
|
# resp.challenge_parameters #=> Hash
|
7208
7240
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -8073,7 +8105,7 @@ module Aws::CognitoIdentityProvider
|
|
8073
8105
|
# sign in.
|
8074
8106
|
#
|
8075
8107
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8076
|
-
# other Amazon Web
|
8108
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8077
8109
|
# might place your account in the SMS sandbox. In <i> <a
|
8078
8110
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8079
8111
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8219,7 +8251,7 @@ module Aws::CognitoIdentityProvider
|
|
8219
8251
|
# sign in.
|
8220
8252
|
#
|
8221
8253
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8222
|
-
# other Amazon Web
|
8254
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8223
8255
|
# might place your account in the SMS sandbox. In <i> <a
|
8224
8256
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8225
8257
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8268,11 +8300,21 @@ module Aws::CognitoIdentityProvider
|
|
8268
8300
|
# SMS\_MFA
|
8269
8301
|
#
|
8270
8302
|
# : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
|
8271
|
-
# "[
|
8303
|
+
# "[code]", "USERNAME": "[username]"\}`
|
8304
|
+
#
|
8305
|
+
# EMAIL\_OTP
|
8306
|
+
#
|
8307
|
+
# : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
|
8308
|
+
# \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
|
8272
8309
|
#
|
8273
8310
|
# PASSWORD\_VERIFIER
|
8274
8311
|
#
|
8275
|
-
# :
|
8312
|
+
# : This challenge response is part of the SRP flow. Amazon Cognito
|
8313
|
+
# requires that your application respond to this challenge within a
|
8314
|
+
# few seconds. When the response time exceeds this period, your user
|
8315
|
+
# pool returns a `NotAuthorizedException` error.
|
8316
|
+
#
|
8317
|
+
# `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
|
8276
8318
|
# \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
|
8277
8319
|
# "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
|
8278
8320
|
# [timestamp], "USERNAME": "[username]"\}`
|
@@ -8407,7 +8449,7 @@ module Aws::CognitoIdentityProvider
|
|
8407
8449
|
#
|
8408
8450
|
# resp = client.respond_to_auth_challenge({
|
8409
8451
|
# client_id: "ClientIdType", # required
|
8410
|
-
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
8452
|
+
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
8411
8453
|
# session: "SessionType",
|
8412
8454
|
# challenge_responses: {
|
8413
8455
|
# "StringType" => "StringType",
|
@@ -8426,7 +8468,7 @@ module Aws::CognitoIdentityProvider
|
|
8426
8468
|
#
|
8427
8469
|
# @example Response structure
|
8428
8470
|
#
|
8429
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
8471
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
8430
8472
|
# resp.session #=> String
|
8431
8473
|
# resp.challenge_parameters #=> Hash
|
8432
8474
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -8762,10 +8804,24 @@ module Aws::CognitoIdentityProvider
|
|
8762
8804
|
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
8763
8805
|
#
|
8764
8806
|
# @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
|
8765
|
-
#
|
8807
|
+
# User preferences for SMS message MFA. Activates or deactivates SMS MFA
|
8808
|
+
# and sets it as the preferred MFA method when multiple methods are
|
8809
|
+
# available.
|
8766
8810
|
#
|
8767
8811
|
# @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
|
8768
|
-
#
|
8812
|
+
# User preferences for time-based one-time password (TOTP) MFA.
|
8813
|
+
# Activates or deactivates TOTP MFA and sets it as the preferred MFA
|
8814
|
+
# method when multiple methods are available.
|
8815
|
+
#
|
8816
|
+
# @option params [Types::EmailMfaSettingsType] :email_mfa_settings
|
8817
|
+
# User preferences for email message MFA. Activates or deactivates email
|
8818
|
+
# MFA and sets it as the preferred MFA method when multiple methods are
|
8819
|
+
# available. To activate this setting, [ advanced security features][1]
|
8820
|
+
# must be active in your user pool.
|
8821
|
+
#
|
8822
|
+
#
|
8823
|
+
#
|
8824
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
8769
8825
|
#
|
8770
8826
|
# @option params [required, String] :access_token
|
8771
8827
|
# A valid access token that Amazon Cognito issued to the user whose MFA
|
@@ -8784,6 +8840,10 @@ module Aws::CognitoIdentityProvider
|
|
8784
8840
|
# enabled: false,
|
8785
8841
|
# preferred_mfa: false,
|
8786
8842
|
# },
|
8843
|
+
# email_mfa_settings: {
|
8844
|
+
# enabled: false,
|
8845
|
+
# preferred_mfa: false,
|
8846
|
+
# },
|
8787
8847
|
# access_token: "TokenModelType", # required
|
8788
8848
|
# })
|
8789
8849
|
#
|
@@ -8808,7 +8868,7 @@ module Aws::CognitoIdentityProvider
|
|
8808
8868
|
# sign in.
|
8809
8869
|
#
|
8810
8870
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8811
|
-
# other Amazon Web
|
8871
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8812
8872
|
# might place your account in the SMS sandbox. In <i> <a
|
8813
8873
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8814
8874
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8828,10 +8888,22 @@ module Aws::CognitoIdentityProvider
|
|
8828
8888
|
# The user pool ID.
|
8829
8889
|
#
|
8830
8890
|
# @option params [Types::SmsMfaConfigType] :sms_mfa_configuration
|
8831
|
-
#
|
8891
|
+
# Configures user pool SMS messages for MFA. Sets the message template
|
8892
|
+
# and the SMS message sending configuration for Amazon SNS.
|
8832
8893
|
#
|
8833
8894
|
# @option params [Types::SoftwareTokenMfaConfigType] :software_token_mfa_configuration
|
8834
|
-
#
|
8895
|
+
# Configures a user pool for time-based one-time password (TOTP) MFA.
|
8896
|
+
# Enables or disables TOTP.
|
8897
|
+
#
|
8898
|
+
# @option params [Types::EmailMfaConfigType] :email_mfa_configuration
|
8899
|
+
# Configures user pool email messages for MFA. Sets the subject and body
|
8900
|
+
# of the email message template for MFA messages. To activate this
|
8901
|
+
# setting, [ advanced security features][1] must be active in your user
|
8902
|
+
# pool.
|
8903
|
+
#
|
8904
|
+
#
|
8905
|
+
#
|
8906
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
8835
8907
|
#
|
8836
8908
|
# @option params [String] :mfa_configuration
|
8837
8909
|
# The MFA configuration. If you set the MfaConfiguration value to ‘ON’,
|
@@ -8854,6 +8926,7 @@ module Aws::CognitoIdentityProvider
|
|
8854
8926
|
#
|
8855
8927
|
# * {Types::SetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
|
8856
8928
|
# * {Types::SetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
|
8929
|
+
# * {Types::SetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
|
8857
8930
|
# * {Types::SetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
|
8858
8931
|
#
|
8859
8932
|
# @example Request syntax with placeholder values
|
@@ -8871,6 +8944,10 @@ module Aws::CognitoIdentityProvider
|
|
8871
8944
|
# software_token_mfa_configuration: {
|
8872
8945
|
# enabled: false,
|
8873
8946
|
# },
|
8947
|
+
# email_mfa_configuration: {
|
8948
|
+
# message: "EmailMfaMessageType",
|
8949
|
+
# subject: "EmailMfaSubjectType",
|
8950
|
+
# },
|
8874
8951
|
# mfa_configuration: "OFF", # accepts OFF, ON, OPTIONAL
|
8875
8952
|
# })
|
8876
8953
|
#
|
@@ -8881,6 +8958,8 @@ module Aws::CognitoIdentityProvider
|
|
8881
8958
|
# resp.sms_mfa_configuration.sms_configuration.external_id #=> String
|
8882
8959
|
# resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
|
8883
8960
|
# resp.software_token_mfa_configuration.enabled #=> Boolean
|
8961
|
+
# resp.email_mfa_configuration.message #=> String
|
8962
|
+
# resp.email_mfa_configuration.subject #=> String
|
8884
8963
|
# resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
|
8885
8964
|
#
|
8886
8965
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SetUserPoolMfaConfig AWS API Documentation
|
@@ -8967,7 +9046,7 @@ module Aws::CognitoIdentityProvider
|
|
8967
9046
|
# sign in.
|
8968
9047
|
#
|
8969
9048
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8970
|
-
# other Amazon Web
|
9049
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8971
9050
|
# might place your account in the SMS sandbox. In <i> <a
|
8972
9051
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8973
9052
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -9778,7 +9857,7 @@ module Aws::CognitoIdentityProvider
|
|
9778
9857
|
# sign in.
|
9779
9858
|
#
|
9780
9859
|
# If you have never used SMS text messages with Amazon Cognito or any
|
9781
|
-
# other Amazon Web
|
9860
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
9782
9861
|
# might place your account in the SMS sandbox. In <i> <a
|
9783
9862
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
9784
9863
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -9893,7 +9972,7 @@ module Aws::CognitoIdentityProvider
|
|
9893
9972
|
# sign in.
|
9894
9973
|
#
|
9895
9974
|
# If you have never used SMS text messages with Amazon Cognito or any
|
9896
|
-
# other Amazon Web
|
9975
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
9897
9976
|
# might place your account in the SMS sandbox. In <i> <a
|
9898
9977
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
9899
9978
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -10282,9 +10361,9 @@ module Aws::CognitoIdentityProvider
|
|
10282
10361
|
# default for ID and access tokens is hours.
|
10283
10362
|
#
|
10284
10363
|
# @option params [Array<String>] :read_attributes
|
10285
|
-
# The list of user attributes that you want your app client to have
|
10286
|
-
#
|
10287
|
-
#
|
10364
|
+
# The list of user attributes that you want your app client to have read
|
10365
|
+
# access to. After your user authenticates in your app, their access
|
10366
|
+
# token authorizes them to read their own attribute value for any
|
10288
10367
|
# attribute in this list. An example of this kind of activity is when
|
10289
10368
|
# your user selects a link to view their profile information. Your app
|
10290
10369
|
# makes a [GetUser][1] API request to retrieve and display your user's
|
@@ -10292,11 +10371,11 @@ module Aws::CognitoIdentityProvider
|
|
10292
10371
|
#
|
10293
10372
|
# When you don't specify the `ReadAttributes` for your app client, your
|
10294
10373
|
# app can read the values of `email_verified`, `phone_number_verified`,
|
10295
|
-
# and the Standard attributes of your user pool. When your user pool
|
10296
|
-
# read access to these default attributes, `ReadAttributes`
|
10297
|
-
# return any information. Amazon Cognito only populates
|
10298
|
-
# in the API response if you have specified your own
|
10299
|
-
# attributes.
|
10374
|
+
# and the Standard attributes of your user pool. When your user pool app
|
10375
|
+
# client has read access to these default attributes, `ReadAttributes`
|
10376
|
+
# doesn't return any information. Amazon Cognito only populates
|
10377
|
+
# `ReadAttributes` in the API response if you have specified your own
|
10378
|
+
# custom set of read attributes.
|
10300
10379
|
#
|
10301
10380
|
#
|
10302
10381
|
#
|
@@ -10854,7 +10933,7 @@ module Aws::CognitoIdentityProvider
|
|
10854
10933
|
tracer: tracer
|
10855
10934
|
)
|
10856
10935
|
context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
|
10857
|
-
context[:gem_version] = '1.
|
10936
|
+
context[:gem_version] = '1.104.0'
|
10858
10937
|
Seahorse::Client::Request.new(handlers, context)
|
10859
10938
|
end
|
10860
10939
|
|
@@ -202,6 +202,10 @@ module Aws::CognitoIdentityProvider
|
|
202
202
|
DuplicateProviderException = Shapes::StructureShape.new(name: 'DuplicateProviderException')
|
203
203
|
EmailAddressType = Shapes::StringShape.new(name: 'EmailAddressType')
|
204
204
|
EmailConfigurationType = Shapes::StructureShape.new(name: 'EmailConfigurationType')
|
205
|
+
EmailMfaConfigType = Shapes::StructureShape.new(name: 'EmailMfaConfigType')
|
206
|
+
EmailMfaMessageType = Shapes::StringShape.new(name: 'EmailMfaMessageType')
|
207
|
+
EmailMfaSettingsType = Shapes::StructureShape.new(name: 'EmailMfaSettingsType')
|
208
|
+
EmailMfaSubjectType = Shapes::StringShape.new(name: 'EmailMfaSubjectType')
|
205
209
|
EmailNotificationBodyType = Shapes::StringShape.new(name: 'EmailNotificationBodyType')
|
206
210
|
EmailNotificationSubjectType = Shapes::StringShape.new(name: 'EmailNotificationSubjectType')
|
207
211
|
EmailSendingAccountType = Shapes::StringShape.new(name: 'EmailSendingAccountType')
|
@@ -691,6 +695,7 @@ module Aws::CognitoIdentityProvider
|
|
691
695
|
|
692
696
|
AdminSetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
|
693
697
|
AdminSetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
|
698
|
+
AdminSetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
|
694
699
|
AdminSetUserMFAPreferenceRequest.add_member(:username, Shapes::ShapeRef.new(shape: UsernameType, required: true, location_name: "Username"))
|
695
700
|
AdminSetUserMFAPreferenceRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
696
701
|
AdminSetUserMFAPreferenceRequest.struct_class = Types::AdminSetUserMFAPreferenceRequest
|
@@ -1132,6 +1137,14 @@ module Aws::CognitoIdentityProvider
|
|
1132
1137
|
EmailConfigurationType.add_member(:configuration_set, Shapes::ShapeRef.new(shape: SESConfigurationSet, location_name: "ConfigurationSet"))
|
1133
1138
|
EmailConfigurationType.struct_class = Types::EmailConfigurationType
|
1134
1139
|
|
1140
|
+
EmailMfaConfigType.add_member(:message, Shapes::ShapeRef.new(shape: EmailMfaMessageType, location_name: "Message"))
|
1141
|
+
EmailMfaConfigType.add_member(:subject, Shapes::ShapeRef.new(shape: EmailMfaSubjectType, location_name: "Subject"))
|
1142
|
+
EmailMfaConfigType.struct_class = Types::EmailMfaConfigType
|
1143
|
+
|
1144
|
+
EmailMfaSettingsType.add_member(:enabled, Shapes::ShapeRef.new(shape: BooleanType, location_name: "Enabled"))
|
1145
|
+
EmailMfaSettingsType.add_member(:preferred_mfa, Shapes::ShapeRef.new(shape: BooleanType, location_name: "PreferredMfa"))
|
1146
|
+
EmailMfaSettingsType.struct_class = Types::EmailMfaSettingsType
|
1147
|
+
|
1135
1148
|
EnableSoftwareTokenMFAException.add_member(:message, Shapes::ShapeRef.new(shape: MessageType, location_name: "message"))
|
1136
1149
|
EnableSoftwareTokenMFAException.struct_class = Types::EnableSoftwareTokenMFAException
|
1137
1150
|
|
@@ -1240,6 +1253,7 @@ module Aws::CognitoIdentityProvider
|
|
1240
1253
|
|
1241
1254
|
GetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1242
1255
|
GetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1256
|
+
GetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1243
1257
|
GetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1244
1258
|
GetUserPoolMfaConfigResponse.struct_class = Types::GetUserPoolMfaConfigResponse
|
1245
1259
|
|
@@ -1655,6 +1669,7 @@ module Aws::CognitoIdentityProvider
|
|
1655
1669
|
|
1656
1670
|
SetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
|
1657
1671
|
SetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
|
1672
|
+
SetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
|
1658
1673
|
SetUserMFAPreferenceRequest.add_member(:access_token, Shapes::ShapeRef.new(shape: TokenModelType, required: true, location_name: "AccessToken"))
|
1659
1674
|
SetUserMFAPreferenceRequest.struct_class = Types::SetUserMFAPreferenceRequest
|
1660
1675
|
|
@@ -1663,11 +1678,13 @@ module Aws::CognitoIdentityProvider
|
|
1663
1678
|
SetUserPoolMfaConfigRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
1664
1679
|
SetUserPoolMfaConfigRequest.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1665
1680
|
SetUserPoolMfaConfigRequest.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1681
|
+
SetUserPoolMfaConfigRequest.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1666
1682
|
SetUserPoolMfaConfigRequest.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1667
1683
|
SetUserPoolMfaConfigRequest.struct_class = Types::SetUserPoolMfaConfigRequest
|
1668
1684
|
|
1669
1685
|
SetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1670
1686
|
SetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1687
|
+
SetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1671
1688
|
SetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1672
1689
|
SetUserPoolMfaConfigResponse.struct_class = Types::SetUserPoolMfaConfigResponse
|
1673
1690
|
|
@@ -2298,6 +2315,7 @@ module Aws::CognitoIdentityProvider
|
|
2298
2315
|
o.errors << Shapes::ShapeRef.new(shape: InvalidLambdaResponseException)
|
2299
2316
|
o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
|
2300
2317
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
2318
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
2301
2319
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
2302
2320
|
o.errors << Shapes::ShapeRef.new(shape: PasswordResetRequiredException)
|
2303
2321
|
o.errors << Shapes::ShapeRef.new(shape: UserNotFoundException)
|
@@ -2430,6 +2448,7 @@ module Aws::CognitoIdentityProvider
|
|
2430
2448
|
o.errors << Shapes::ShapeRef.new(shape: InvalidUserPoolConfigurationException)
|
2431
2449
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
2432
2450
|
o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
|
2451
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
2433
2452
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
2434
2453
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
2435
2454
|
o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
|
@@ -3217,6 +3236,7 @@ module Aws::CognitoIdentityProvider
|
|
3217
3236
|
o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
|
3218
3237
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
3219
3238
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
3239
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
3220
3240
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
3221
3241
|
o.errors << Shapes::ShapeRef.new(shape: ForbiddenException)
|
3222
3242
|
end)
|
@@ -3450,6 +3470,7 @@ module Aws::CognitoIdentityProvider
|
|
3450
3470
|
o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
|
3451
3471
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
3452
3472
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
3473
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
3453
3474
|
o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
|
3454
3475
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
3455
3476
|
o.errors << Shapes::ShapeRef.new(shape: SoftwareTokenMFANotFoundException)
|