aws-sdk-cognitoidentityprovider 1.103.0 → 1.105.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/client.rb +144 -59
- data/lib/aws-sdk-cognitoidentityprovider/client_api.rb +21 -0
- data/lib/aws-sdk-cognitoidentityprovider/plugins/endpoints.rb +8 -5
- data/lib/aws-sdk-cognitoidentityprovider/types.rb +228 -59
- data/lib/aws-sdk-cognitoidentityprovider.rb +1 -1
- data/sig/client.rbs +21 -6
- data/sig/resource.rbs +1 -0
- data/sig/types.rbs +23 -6
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d9fc8575d67e9ff99ce987b2069fae44996e8baa744815adddb645e2a7a3dc96
|
4
|
+
data.tar.gz: 29cc79804ec28dae5efc4e6aaa5e066c12156afe26ba447b8b4666aab4d0be2b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8b982252d13391647f33e4a5e84b9ab4088a1c49c941818caafc4b3114348fb3b6827be4edc5e9b5bd6ea8f615db8e5e0e0ba2461e08a45d4f6ab498cf4b0929
|
7
|
+
data.tar.gz: 30c7b4862c17a264078024e53b291ec66ffbe0aa0ce4a42fda860b8be6de0f7505750ad7909c24f95e990edc28276183083da998ec5782615368832992731f94
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.105.0 (2024-09-20)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.104.0 (2024-09-12)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Added email MFA option to user pools with advanced security features.
|
13
|
+
|
4
14
|
1.103.0 (2024-09-11)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.105.0
|
@@ -130,13 +130,15 @@ module Aws::CognitoIdentityProvider
|
|
130
130
|
# locations will be searched for credentials:
|
131
131
|
#
|
132
132
|
# * `Aws.config[:credentials]`
|
133
|
-
# * The `:access_key_id`, `:secret_access_key`,
|
134
|
-
#
|
133
|
+
# * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
|
134
|
+
# `:account_id` options.
|
135
|
+
# * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'],
|
136
|
+
# ENV['AWS_SESSION_TOKEN'], and ENV['AWS_ACCOUNT_ID']
|
135
137
|
# * `~/.aws/credentials`
|
136
138
|
# * `~/.aws/config`
|
137
139
|
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
138
140
|
# are very aggressive. Construct and pass an instance of
|
139
|
-
# `Aws::
|
141
|
+
# `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
|
140
142
|
# enable retries and extended timeouts. Instance profile credential
|
141
143
|
# fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
|
142
144
|
# to true.
|
@@ -155,6 +157,8 @@ module Aws::CognitoIdentityProvider
|
|
155
157
|
#
|
156
158
|
# @option options [String] :access_key_id
|
157
159
|
#
|
160
|
+
# @option options [String] :account_id
|
161
|
+
#
|
158
162
|
# @option options [Boolean] :active_endpoint_cache (false)
|
159
163
|
# When set to `true`, a thread polling for endpoints will be running in
|
160
164
|
# the background every 60 secs (default). Defaults to `false`.
|
@@ -376,7 +380,9 @@ module Aws::CognitoIdentityProvider
|
|
376
380
|
# sending the request.
|
377
381
|
#
|
378
382
|
# @option options [Aws::CognitoIdentityProvider::EndpointProvider] :endpoint_provider
|
379
|
-
# The endpoint provider used to resolve endpoints. Any object that responds to
|
383
|
+
# The endpoint provider used to resolve endpoints. Any object that responds to
|
384
|
+
# `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
|
385
|
+
# `Aws::CognitoIdentityProvider::EndpointParameters`.
|
380
386
|
#
|
381
387
|
# @option options [Float] :http_continue_timeout (1)
|
382
388
|
# The number of seconds to wait for a 100-continue response before sending the
|
@@ -676,7 +682,7 @@ module Aws::CognitoIdentityProvider
|
|
676
682
|
# sign in.
|
677
683
|
#
|
678
684
|
# If you have never used SMS text messages with Amazon Cognito or any
|
679
|
-
# other Amazon Web
|
685
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
680
686
|
# might place your account in the SMS sandbox. In <i> <a
|
681
687
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
682
688
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -1474,7 +1480,7 @@ module Aws::CognitoIdentityProvider
|
|
1474
1480
|
# sign in.
|
1475
1481
|
#
|
1476
1482
|
# If you have never used SMS text messages with Amazon Cognito or any
|
1477
|
-
# other Amazon Web
|
1483
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
1478
1484
|
# might place your account in the SMS sandbox. In <i> <a
|
1479
1485
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
1480
1486
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -1685,7 +1691,7 @@ module Aws::CognitoIdentityProvider
|
|
1685
1691
|
#
|
1686
1692
|
# @example Response structure
|
1687
1693
|
#
|
1688
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
1694
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
1689
1695
|
# resp.session #=> String
|
1690
1696
|
# resp.challenge_parameters #=> Hash
|
1691
1697
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -2135,7 +2141,7 @@ module Aws::CognitoIdentityProvider
|
|
2135
2141
|
# sign in.
|
2136
2142
|
#
|
2137
2143
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2138
|
-
# other Amazon Web
|
2144
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2139
2145
|
# might place your account in the SMS sandbox. In <i> <a
|
2140
2146
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2141
2147
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -2266,7 +2272,7 @@ module Aws::CognitoIdentityProvider
|
|
2266
2272
|
# sign in.
|
2267
2273
|
#
|
2268
2274
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2269
|
-
# other Amazon Web
|
2275
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2270
2276
|
# might place your account in the SMS sandbox. In <i> <a
|
2271
2277
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2272
2278
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -2323,11 +2329,21 @@ module Aws::CognitoIdentityProvider
|
|
2323
2329
|
# SMS\_MFA
|
2324
2330
|
#
|
2325
2331
|
# : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
|
2326
|
-
# "[
|
2332
|
+
# "[code]", "USERNAME": "[username]"\}`
|
2333
|
+
#
|
2334
|
+
# EMAIL\_OTP
|
2335
|
+
#
|
2336
|
+
# : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
|
2337
|
+
# \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
|
2327
2338
|
#
|
2328
2339
|
# PASSWORD\_VERIFIER
|
2329
2340
|
#
|
2330
|
-
# :
|
2341
|
+
# : This challenge response is part of the SRP flow. Amazon Cognito
|
2342
|
+
# requires that your application respond to this challenge within a
|
2343
|
+
# few seconds. When the response time exceeds this period, your user
|
2344
|
+
# pool returns a `NotAuthorizedException` error.
|
2345
|
+
#
|
2346
|
+
# `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
|
2331
2347
|
# \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
|
2332
2348
|
# "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
|
2333
2349
|
# [timestamp], "USERNAME": "[username]"\}`
|
@@ -2486,7 +2502,7 @@ module Aws::CognitoIdentityProvider
|
|
2486
2502
|
# resp = client.admin_respond_to_auth_challenge({
|
2487
2503
|
# user_pool_id: "UserPoolIdType", # required
|
2488
2504
|
# client_id: "ClientIdType", # required
|
2489
|
-
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
2505
|
+
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
2490
2506
|
# challenge_responses: {
|
2491
2507
|
# "StringType" => "StringType",
|
2492
2508
|
# },
|
@@ -2513,7 +2529,7 @@ module Aws::CognitoIdentityProvider
|
|
2513
2529
|
#
|
2514
2530
|
# @example Response structure
|
2515
2531
|
#
|
2516
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
2532
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
2517
2533
|
# resp.session #=> String
|
2518
2534
|
# resp.challenge_parameters #=> Hash
|
2519
2535
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -2534,12 +2550,12 @@ module Aws::CognitoIdentityProvider
|
|
2534
2550
|
req.send_request(options)
|
2535
2551
|
end
|
2536
2552
|
|
2537
|
-
#
|
2538
|
-
# which MFA options are activated, and if any are preferred.
|
2539
|
-
# factor can be set as preferred. The preferred MFA factor will
|
2540
|
-
# to authenticate a user if multiple factors are activated. If
|
2541
|
-
# options are activated and no preference is set, a challenge
|
2542
|
-
# an MFA option will be returned during sign-in.
|
2553
|
+
# Sets the user's multi-factor authentication (MFA) preference,
|
2554
|
+
# including which MFA options are activated, and if any are preferred.
|
2555
|
+
# Only one factor can be set as preferred. The preferred MFA factor will
|
2556
|
+
# be used to authenticate a user if multiple factors are activated. If
|
2557
|
+
# multiple options are activated and no preference is set, a challenge
|
2558
|
+
# to choose an MFA option will be returned during sign-in.
|
2543
2559
|
#
|
2544
2560
|
# <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
|
2545
2561
|
# in requests for this API operation. For this operation, you must use
|
@@ -2560,10 +2576,24 @@ module Aws::CognitoIdentityProvider
|
|
2560
2576
|
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
2561
2577
|
#
|
2562
2578
|
# @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
|
2563
|
-
#
|
2579
|
+
# User preferences for SMS message MFA. Activates or deactivates SMS MFA
|
2580
|
+
# and sets it as the preferred MFA method when multiple methods are
|
2581
|
+
# available.
|
2564
2582
|
#
|
2565
2583
|
# @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
|
2566
|
-
#
|
2584
|
+
# User preferences for time-based one-time password (TOTP) MFA.
|
2585
|
+
# Activates or deactivates TOTP MFA and sets it as the preferred MFA
|
2586
|
+
# method when multiple methods are available.
|
2587
|
+
#
|
2588
|
+
# @option params [Types::EmailMfaSettingsType] :email_mfa_settings
|
2589
|
+
# User preferences for email message MFA. Activates or deactivates email
|
2590
|
+
# MFA and sets it as the preferred MFA method when multiple methods are
|
2591
|
+
# available. To activate this setting, [ advanced security features][1]
|
2592
|
+
# must be active in your user pool.
|
2593
|
+
#
|
2594
|
+
#
|
2595
|
+
#
|
2596
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
2567
2597
|
#
|
2568
2598
|
# @option params [required, String] :username
|
2569
2599
|
# The username of the user that you want to query or modify. The value
|
@@ -2573,7 +2603,8 @@ module Aws::CognitoIdentityProvider
|
|
2573
2603
|
# username of a user from a third-party IdP.
|
2574
2604
|
#
|
2575
2605
|
# @option params [required, String] :user_pool_id
|
2576
|
-
# The user pool
|
2606
|
+
# The ID of the user pool where you want to set a user's MFA
|
2607
|
+
# preferences.
|
2577
2608
|
#
|
2578
2609
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
2579
2610
|
#
|
@@ -2588,6 +2619,10 @@ module Aws::CognitoIdentityProvider
|
|
2588
2619
|
# enabled: false,
|
2589
2620
|
# preferred_mfa: false,
|
2590
2621
|
# },
|
2622
|
+
# email_mfa_settings: {
|
2623
|
+
# enabled: false,
|
2624
|
+
# preferred_mfa: false,
|
2625
|
+
# },
|
2591
2626
|
# username: "UsernameType", # required
|
2592
2627
|
# user_pool_id: "UserPoolIdType", # required
|
2593
2628
|
# })
|
@@ -2876,7 +2911,7 @@ module Aws::CognitoIdentityProvider
|
|
2876
2911
|
# sign in.
|
2877
2912
|
#
|
2878
2913
|
# If you have never used SMS text messages with Amazon Cognito or any
|
2879
|
-
# other Amazon Web
|
2914
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
2880
2915
|
# might place your account in the SMS sandbox. In <i> <a
|
2881
2916
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
2882
2917
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -3970,7 +4005,7 @@ module Aws::CognitoIdentityProvider
|
|
3970
4005
|
# sign in.
|
3971
4006
|
#
|
3972
4007
|
# If you have never used SMS text messages with Amazon Cognito or any
|
3973
|
-
# other Amazon Web
|
4008
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
3974
4009
|
# might place your account in the SMS sandbox. In <i> <a
|
3975
4010
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
3976
4011
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -4960,9 +4995,9 @@ module Aws::CognitoIdentityProvider
|
|
4960
4995
|
# are hours.
|
4961
4996
|
#
|
4962
4997
|
# @option params [Array<String>] :read_attributes
|
4963
|
-
# The list of user attributes that you want your app client to have
|
4964
|
-
#
|
4965
|
-
#
|
4998
|
+
# The list of user attributes that you want your app client to have read
|
4999
|
+
# access to. After your user authenticates in your app, their access
|
5000
|
+
# token authorizes them to read their own attribute value for any
|
4966
5001
|
# attribute in this list. An example of this kind of activity is when
|
4967
5002
|
# your user selects a link to view their profile information. Your app
|
4968
5003
|
# makes a [GetUser][1] API request to retrieve and display your user's
|
@@ -4970,11 +5005,11 @@ module Aws::CognitoIdentityProvider
|
|
4970
5005
|
#
|
4971
5006
|
# When you don't specify the `ReadAttributes` for your app client, your
|
4972
5007
|
# app can read the values of `email_verified`, `phone_number_verified`,
|
4973
|
-
# and the Standard attributes of your user pool. When your user pool
|
4974
|
-
# read access to these default attributes, `ReadAttributes`
|
4975
|
-
# return any information. Amazon Cognito only populates
|
4976
|
-
# in the API response if you have specified your own
|
4977
|
-
# attributes.
|
5008
|
+
# and the Standard attributes of your user pool. When your user pool app
|
5009
|
+
# client has read access to these default attributes, `ReadAttributes`
|
5010
|
+
# doesn't return any information. Amazon Cognito only populates
|
5011
|
+
# `ReadAttributes` in the API response if you have specified your own
|
5012
|
+
# custom set of read attributes.
|
4978
5013
|
#
|
4979
5014
|
#
|
4980
5015
|
#
|
@@ -6282,7 +6317,7 @@ module Aws::CognitoIdentityProvider
|
|
6282
6317
|
# sign in.
|
6283
6318
|
#
|
6284
6319
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6285
|
-
# other Amazon Web
|
6320
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6286
6321
|
# might place your account in the SMS sandbox. In <i> <a
|
6287
6322
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6288
6323
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -6770,7 +6805,7 @@ module Aws::CognitoIdentityProvider
|
|
6770
6805
|
# sign in.
|
6771
6806
|
#
|
6772
6807
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6773
|
-
# other Amazon Web
|
6808
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6774
6809
|
# might place your account in the SMS sandbox. In <i> <a
|
6775
6810
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6776
6811
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -6870,6 +6905,7 @@ module Aws::CognitoIdentityProvider
|
|
6870
6905
|
#
|
6871
6906
|
# * {Types::GetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
|
6872
6907
|
# * {Types::GetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
|
6908
|
+
# * {Types::GetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
|
6873
6909
|
# * {Types::GetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
|
6874
6910
|
#
|
6875
6911
|
# @example Request syntax with placeholder values
|
@@ -6885,6 +6921,8 @@ module Aws::CognitoIdentityProvider
|
|
6885
6921
|
# resp.sms_mfa_configuration.sms_configuration.external_id #=> String
|
6886
6922
|
# resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
|
6887
6923
|
# resp.software_token_mfa_configuration.enabled #=> Boolean
|
6924
|
+
# resp.email_mfa_configuration.message #=> String
|
6925
|
+
# resp.email_mfa_configuration.subject #=> String
|
6888
6926
|
# resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
|
6889
6927
|
#
|
6890
6928
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetUserPoolMfaConfig AWS API Documentation
|
@@ -6983,7 +7021,7 @@ module Aws::CognitoIdentityProvider
|
|
6983
7021
|
# sign in.
|
6984
7022
|
#
|
6985
7023
|
# If you have never used SMS text messages with Amazon Cognito or any
|
6986
|
-
# other Amazon Web
|
7024
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
6987
7025
|
# might place your account in the SMS sandbox. In <i> <a
|
6988
7026
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
6989
7027
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -7202,7 +7240,7 @@ module Aws::CognitoIdentityProvider
|
|
7202
7240
|
#
|
7203
7241
|
# @example Response structure
|
7204
7242
|
#
|
7205
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
7243
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
7206
7244
|
# resp.session #=> String
|
7207
7245
|
# resp.challenge_parameters #=> Hash
|
7208
7246
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -8073,7 +8111,7 @@ module Aws::CognitoIdentityProvider
|
|
8073
8111
|
# sign in.
|
8074
8112
|
#
|
8075
8113
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8076
|
-
# other Amazon Web
|
8114
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8077
8115
|
# might place your account in the SMS sandbox. In <i> <a
|
8078
8116
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8079
8117
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8219,7 +8257,7 @@ module Aws::CognitoIdentityProvider
|
|
8219
8257
|
# sign in.
|
8220
8258
|
#
|
8221
8259
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8222
|
-
# other Amazon Web
|
8260
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8223
8261
|
# might place your account in the SMS sandbox. In <i> <a
|
8224
8262
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8225
8263
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8268,11 +8306,21 @@ module Aws::CognitoIdentityProvider
|
|
8268
8306
|
# SMS\_MFA
|
8269
8307
|
#
|
8270
8308
|
# : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
|
8271
|
-
# "[
|
8309
|
+
# "[code]", "USERNAME": "[username]"\}`
|
8310
|
+
#
|
8311
|
+
# EMAIL\_OTP
|
8312
|
+
#
|
8313
|
+
# : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
|
8314
|
+
# \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
|
8272
8315
|
#
|
8273
8316
|
# PASSWORD\_VERIFIER
|
8274
8317
|
#
|
8275
|
-
# :
|
8318
|
+
# : This challenge response is part of the SRP flow. Amazon Cognito
|
8319
|
+
# requires that your application respond to this challenge within a
|
8320
|
+
# few seconds. When the response time exceeds this period, your user
|
8321
|
+
# pool returns a `NotAuthorizedException` error.
|
8322
|
+
#
|
8323
|
+
# `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
|
8276
8324
|
# \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
|
8277
8325
|
# "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
|
8278
8326
|
# [timestamp], "USERNAME": "[username]"\}`
|
@@ -8407,7 +8455,7 @@ module Aws::CognitoIdentityProvider
|
|
8407
8455
|
#
|
8408
8456
|
# resp = client.respond_to_auth_challenge({
|
8409
8457
|
# client_id: "ClientIdType", # required
|
8410
|
-
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
8458
|
+
# challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
|
8411
8459
|
# session: "SessionType",
|
8412
8460
|
# challenge_responses: {
|
8413
8461
|
# "StringType" => "StringType",
|
@@ -8426,7 +8474,7 @@ module Aws::CognitoIdentityProvider
|
|
8426
8474
|
#
|
8427
8475
|
# @example Response structure
|
8428
8476
|
#
|
8429
|
-
# resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
8477
|
+
# resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
|
8430
8478
|
# resp.session #=> String
|
8431
8479
|
# resp.challenge_parameters #=> Hash
|
8432
8480
|
# resp.challenge_parameters["StringType"] #=> String
|
@@ -8762,10 +8810,24 @@ module Aws::CognitoIdentityProvider
|
|
8762
8810
|
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
8763
8811
|
#
|
8764
8812
|
# @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
|
8765
|
-
#
|
8813
|
+
# User preferences for SMS message MFA. Activates or deactivates SMS MFA
|
8814
|
+
# and sets it as the preferred MFA method when multiple methods are
|
8815
|
+
# available.
|
8766
8816
|
#
|
8767
8817
|
# @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
|
8768
|
-
#
|
8818
|
+
# User preferences for time-based one-time password (TOTP) MFA.
|
8819
|
+
# Activates or deactivates TOTP MFA and sets it as the preferred MFA
|
8820
|
+
# method when multiple methods are available.
|
8821
|
+
#
|
8822
|
+
# @option params [Types::EmailMfaSettingsType] :email_mfa_settings
|
8823
|
+
# User preferences for email message MFA. Activates or deactivates email
|
8824
|
+
# MFA and sets it as the preferred MFA method when multiple methods are
|
8825
|
+
# available. To activate this setting, [ advanced security features][1]
|
8826
|
+
# must be active in your user pool.
|
8827
|
+
#
|
8828
|
+
#
|
8829
|
+
#
|
8830
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
8769
8831
|
#
|
8770
8832
|
# @option params [required, String] :access_token
|
8771
8833
|
# A valid access token that Amazon Cognito issued to the user whose MFA
|
@@ -8784,6 +8846,10 @@ module Aws::CognitoIdentityProvider
|
|
8784
8846
|
# enabled: false,
|
8785
8847
|
# preferred_mfa: false,
|
8786
8848
|
# },
|
8849
|
+
# email_mfa_settings: {
|
8850
|
+
# enabled: false,
|
8851
|
+
# preferred_mfa: false,
|
8852
|
+
# },
|
8787
8853
|
# access_token: "TokenModelType", # required
|
8788
8854
|
# })
|
8789
8855
|
#
|
@@ -8808,7 +8874,7 @@ module Aws::CognitoIdentityProvider
|
|
8808
8874
|
# sign in.
|
8809
8875
|
#
|
8810
8876
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8811
|
-
# other Amazon Web
|
8877
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8812
8878
|
# might place your account in the SMS sandbox. In <i> <a
|
8813
8879
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8814
8880
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -8828,10 +8894,22 @@ module Aws::CognitoIdentityProvider
|
|
8828
8894
|
# The user pool ID.
|
8829
8895
|
#
|
8830
8896
|
# @option params [Types::SmsMfaConfigType] :sms_mfa_configuration
|
8831
|
-
#
|
8897
|
+
# Configures user pool SMS messages for MFA. Sets the message template
|
8898
|
+
# and the SMS message sending configuration for Amazon SNS.
|
8832
8899
|
#
|
8833
8900
|
# @option params [Types::SoftwareTokenMfaConfigType] :software_token_mfa_configuration
|
8834
|
-
#
|
8901
|
+
# Configures a user pool for time-based one-time password (TOTP) MFA.
|
8902
|
+
# Enables or disables TOTP.
|
8903
|
+
#
|
8904
|
+
# @option params [Types::EmailMfaConfigType] :email_mfa_configuration
|
8905
|
+
# Configures user pool email messages for MFA. Sets the subject and body
|
8906
|
+
# of the email message template for MFA messages. To activate this
|
8907
|
+
# setting, [ advanced security features][1] must be active in your user
|
8908
|
+
# pool.
|
8909
|
+
#
|
8910
|
+
#
|
8911
|
+
#
|
8912
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
|
8835
8913
|
#
|
8836
8914
|
# @option params [String] :mfa_configuration
|
8837
8915
|
# The MFA configuration. If you set the MfaConfiguration value to ‘ON’,
|
@@ -8854,6 +8932,7 @@ module Aws::CognitoIdentityProvider
|
|
8854
8932
|
#
|
8855
8933
|
# * {Types::SetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
|
8856
8934
|
# * {Types::SetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
|
8935
|
+
# * {Types::SetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
|
8857
8936
|
# * {Types::SetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
|
8858
8937
|
#
|
8859
8938
|
# @example Request syntax with placeholder values
|
@@ -8871,6 +8950,10 @@ module Aws::CognitoIdentityProvider
|
|
8871
8950
|
# software_token_mfa_configuration: {
|
8872
8951
|
# enabled: false,
|
8873
8952
|
# },
|
8953
|
+
# email_mfa_configuration: {
|
8954
|
+
# message: "EmailMfaMessageType",
|
8955
|
+
# subject: "EmailMfaSubjectType",
|
8956
|
+
# },
|
8874
8957
|
# mfa_configuration: "OFF", # accepts OFF, ON, OPTIONAL
|
8875
8958
|
# })
|
8876
8959
|
#
|
@@ -8881,6 +8964,8 @@ module Aws::CognitoIdentityProvider
|
|
8881
8964
|
# resp.sms_mfa_configuration.sms_configuration.external_id #=> String
|
8882
8965
|
# resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
|
8883
8966
|
# resp.software_token_mfa_configuration.enabled #=> Boolean
|
8967
|
+
# resp.email_mfa_configuration.message #=> String
|
8968
|
+
# resp.email_mfa_configuration.subject #=> String
|
8884
8969
|
# resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
|
8885
8970
|
#
|
8886
8971
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SetUserPoolMfaConfig AWS API Documentation
|
@@ -8967,7 +9052,7 @@ module Aws::CognitoIdentityProvider
|
|
8967
9052
|
# sign in.
|
8968
9053
|
#
|
8969
9054
|
# If you have never used SMS text messages with Amazon Cognito or any
|
8970
|
-
# other Amazon Web
|
9055
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
8971
9056
|
# might place your account in the SMS sandbox. In <i> <a
|
8972
9057
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
8973
9058
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -9778,7 +9863,7 @@ module Aws::CognitoIdentityProvider
|
|
9778
9863
|
# sign in.
|
9779
9864
|
#
|
9780
9865
|
# If you have never used SMS text messages with Amazon Cognito or any
|
9781
|
-
# other Amazon Web
|
9866
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
9782
9867
|
# might place your account in the SMS sandbox. In <i> <a
|
9783
9868
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
9784
9869
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -9893,7 +9978,7 @@ module Aws::CognitoIdentityProvider
|
|
9893
9978
|
# sign in.
|
9894
9979
|
#
|
9895
9980
|
# If you have never used SMS text messages with Amazon Cognito or any
|
9896
|
-
# other Amazon Web
|
9981
|
+
# other Amazon Web Servicesservice, Amazon Simple Notification Service
|
9897
9982
|
# might place your account in the SMS sandbox. In <i> <a
|
9898
9983
|
# href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
|
9899
9984
|
# mode</a> </i>, you can send messages only to verified phone numbers.
|
@@ -10282,9 +10367,9 @@ module Aws::CognitoIdentityProvider
|
|
10282
10367
|
# default for ID and access tokens is hours.
|
10283
10368
|
#
|
10284
10369
|
# @option params [Array<String>] :read_attributes
|
10285
|
-
# The list of user attributes that you want your app client to have
|
10286
|
-
#
|
10287
|
-
#
|
10370
|
+
# The list of user attributes that you want your app client to have read
|
10371
|
+
# access to. After your user authenticates in your app, their access
|
10372
|
+
# token authorizes them to read their own attribute value for any
|
10288
10373
|
# attribute in this list. An example of this kind of activity is when
|
10289
10374
|
# your user selects a link to view their profile information. Your app
|
10290
10375
|
# makes a [GetUser][1] API request to retrieve and display your user's
|
@@ -10292,11 +10377,11 @@ module Aws::CognitoIdentityProvider
|
|
10292
10377
|
#
|
10293
10378
|
# When you don't specify the `ReadAttributes` for your app client, your
|
10294
10379
|
# app can read the values of `email_verified`, `phone_number_verified`,
|
10295
|
-
# and the Standard attributes of your user pool. When your user pool
|
10296
|
-
# read access to these default attributes, `ReadAttributes`
|
10297
|
-
# return any information. Amazon Cognito only populates
|
10298
|
-
# in the API response if you have specified your own
|
10299
|
-
# attributes.
|
10380
|
+
# and the Standard attributes of your user pool. When your user pool app
|
10381
|
+
# client has read access to these default attributes, `ReadAttributes`
|
10382
|
+
# doesn't return any information. Amazon Cognito only populates
|
10383
|
+
# `ReadAttributes` in the API response if you have specified your own
|
10384
|
+
# custom set of read attributes.
|
10300
10385
|
#
|
10301
10386
|
#
|
10302
10387
|
#
|
@@ -10854,7 +10939,7 @@ module Aws::CognitoIdentityProvider
|
|
10854
10939
|
tracer: tracer
|
10855
10940
|
)
|
10856
10941
|
context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
|
10857
|
-
context[:gem_version] = '1.
|
10942
|
+
context[:gem_version] = '1.105.0'
|
10858
10943
|
Seahorse::Client::Request.new(handlers, context)
|
10859
10944
|
end
|
10860
10945
|
|
@@ -202,6 +202,10 @@ module Aws::CognitoIdentityProvider
|
|
202
202
|
DuplicateProviderException = Shapes::StructureShape.new(name: 'DuplicateProviderException')
|
203
203
|
EmailAddressType = Shapes::StringShape.new(name: 'EmailAddressType')
|
204
204
|
EmailConfigurationType = Shapes::StructureShape.new(name: 'EmailConfigurationType')
|
205
|
+
EmailMfaConfigType = Shapes::StructureShape.new(name: 'EmailMfaConfigType')
|
206
|
+
EmailMfaMessageType = Shapes::StringShape.new(name: 'EmailMfaMessageType')
|
207
|
+
EmailMfaSettingsType = Shapes::StructureShape.new(name: 'EmailMfaSettingsType')
|
208
|
+
EmailMfaSubjectType = Shapes::StringShape.new(name: 'EmailMfaSubjectType')
|
205
209
|
EmailNotificationBodyType = Shapes::StringShape.new(name: 'EmailNotificationBodyType')
|
206
210
|
EmailNotificationSubjectType = Shapes::StringShape.new(name: 'EmailNotificationSubjectType')
|
207
211
|
EmailSendingAccountType = Shapes::StringShape.new(name: 'EmailSendingAccountType')
|
@@ -691,6 +695,7 @@ module Aws::CognitoIdentityProvider
|
|
691
695
|
|
692
696
|
AdminSetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
|
693
697
|
AdminSetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
|
698
|
+
AdminSetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
|
694
699
|
AdminSetUserMFAPreferenceRequest.add_member(:username, Shapes::ShapeRef.new(shape: UsernameType, required: true, location_name: "Username"))
|
695
700
|
AdminSetUserMFAPreferenceRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
696
701
|
AdminSetUserMFAPreferenceRequest.struct_class = Types::AdminSetUserMFAPreferenceRequest
|
@@ -1132,6 +1137,14 @@ module Aws::CognitoIdentityProvider
|
|
1132
1137
|
EmailConfigurationType.add_member(:configuration_set, Shapes::ShapeRef.new(shape: SESConfigurationSet, location_name: "ConfigurationSet"))
|
1133
1138
|
EmailConfigurationType.struct_class = Types::EmailConfigurationType
|
1134
1139
|
|
1140
|
+
EmailMfaConfigType.add_member(:message, Shapes::ShapeRef.new(shape: EmailMfaMessageType, location_name: "Message"))
|
1141
|
+
EmailMfaConfigType.add_member(:subject, Shapes::ShapeRef.new(shape: EmailMfaSubjectType, location_name: "Subject"))
|
1142
|
+
EmailMfaConfigType.struct_class = Types::EmailMfaConfigType
|
1143
|
+
|
1144
|
+
EmailMfaSettingsType.add_member(:enabled, Shapes::ShapeRef.new(shape: BooleanType, location_name: "Enabled"))
|
1145
|
+
EmailMfaSettingsType.add_member(:preferred_mfa, Shapes::ShapeRef.new(shape: BooleanType, location_name: "PreferredMfa"))
|
1146
|
+
EmailMfaSettingsType.struct_class = Types::EmailMfaSettingsType
|
1147
|
+
|
1135
1148
|
EnableSoftwareTokenMFAException.add_member(:message, Shapes::ShapeRef.new(shape: MessageType, location_name: "message"))
|
1136
1149
|
EnableSoftwareTokenMFAException.struct_class = Types::EnableSoftwareTokenMFAException
|
1137
1150
|
|
@@ -1240,6 +1253,7 @@ module Aws::CognitoIdentityProvider
|
|
1240
1253
|
|
1241
1254
|
GetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1242
1255
|
GetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1256
|
+
GetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1243
1257
|
GetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1244
1258
|
GetUserPoolMfaConfigResponse.struct_class = Types::GetUserPoolMfaConfigResponse
|
1245
1259
|
|
@@ -1655,6 +1669,7 @@ module Aws::CognitoIdentityProvider
|
|
1655
1669
|
|
1656
1670
|
SetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
|
1657
1671
|
SetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
|
1672
|
+
SetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
|
1658
1673
|
SetUserMFAPreferenceRequest.add_member(:access_token, Shapes::ShapeRef.new(shape: TokenModelType, required: true, location_name: "AccessToken"))
|
1659
1674
|
SetUserMFAPreferenceRequest.struct_class = Types::SetUserMFAPreferenceRequest
|
1660
1675
|
|
@@ -1663,11 +1678,13 @@ module Aws::CognitoIdentityProvider
|
|
1663
1678
|
SetUserPoolMfaConfigRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
1664
1679
|
SetUserPoolMfaConfigRequest.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1665
1680
|
SetUserPoolMfaConfigRequest.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1681
|
+
SetUserPoolMfaConfigRequest.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1666
1682
|
SetUserPoolMfaConfigRequest.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1667
1683
|
SetUserPoolMfaConfigRequest.struct_class = Types::SetUserPoolMfaConfigRequest
|
1668
1684
|
|
1669
1685
|
SetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
|
1670
1686
|
SetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
|
1687
|
+
SetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
|
1671
1688
|
SetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
|
1672
1689
|
SetUserPoolMfaConfigResponse.struct_class = Types::SetUserPoolMfaConfigResponse
|
1673
1690
|
|
@@ -2298,6 +2315,7 @@ module Aws::CognitoIdentityProvider
|
|
2298
2315
|
o.errors << Shapes::ShapeRef.new(shape: InvalidLambdaResponseException)
|
2299
2316
|
o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
|
2300
2317
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
2318
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
2301
2319
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
2302
2320
|
o.errors << Shapes::ShapeRef.new(shape: PasswordResetRequiredException)
|
2303
2321
|
o.errors << Shapes::ShapeRef.new(shape: UserNotFoundException)
|
@@ -2430,6 +2448,7 @@ module Aws::CognitoIdentityProvider
|
|
2430
2448
|
o.errors << Shapes::ShapeRef.new(shape: InvalidUserPoolConfigurationException)
|
2431
2449
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
2432
2450
|
o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
|
2451
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
2433
2452
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
2434
2453
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
2435
2454
|
o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
|
@@ -3217,6 +3236,7 @@ module Aws::CognitoIdentityProvider
|
|
3217
3236
|
o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
|
3218
3237
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
3219
3238
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
3239
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
3220
3240
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
3221
3241
|
o.errors << Shapes::ShapeRef.new(shape: ForbiddenException)
|
3222
3242
|
end)
|
@@ -3450,6 +3470,7 @@ module Aws::CognitoIdentityProvider
|
|
3450
3470
|
o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
|
3451
3471
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
|
3452
3472
|
o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
|
3473
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
|
3453
3474
|
o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
|
3454
3475
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
3455
3476
|
o.errors << Shapes::ShapeRef.new(shape: SoftwareTokenMFANotFoundException)
|