aws-sdk-cognitoidentityprovider 1.103.0 → 1.105.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3d85e3e53d5476cf5924296d2bf78c4ea289362387a50ab35d2326b35e1e672d
4
- data.tar.gz: dbedb8bda94fc87b5c5ecc8eece998c855d934a57e831259d75472428fa4001d
3
+ metadata.gz: d9fc8575d67e9ff99ce987b2069fae44996e8baa744815adddb645e2a7a3dc96
4
+ data.tar.gz: 29cc79804ec28dae5efc4e6aaa5e066c12156afe26ba447b8b4666aab4d0be2b
5
5
  SHA512:
6
- metadata.gz: 3acbae1bbc3f3d09a3d0eea8224300177577aee6bbbf3dac04cacfc768d6233127d743ab3d75a5c46da0eaabee32dbf9e291e633692b3706994b527822131883
7
- data.tar.gz: 49ac3c1571fd773b64f8b3e371278bcb8cef6f241ab282c1aeffa3fd21c8c299c9ffeec308d07d7fa6273e659f6792e28639a6caad7183d92bd38422915c9003
6
+ metadata.gz: 8b982252d13391647f33e4a5e84b9ab4088a1c49c941818caafc4b3114348fb3b6827be4edc5e9b5bd6ea8f615db8e5e0e0ba2461e08a45d4f6ab498cf4b0929
7
+ data.tar.gz: 30c7b4862c17a264078024e53b291ec66ffbe0aa0ce4a42fda860b8be6de0f7505750ad7909c24f95e990edc28276183083da998ec5782615368832992731f94
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.105.0 (2024-09-20)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.104.0 (2024-09-12)
10
+ ------------------
11
+
12
+ * Feature - Added email MFA option to user pools with advanced security features.
13
+
4
14
  1.103.0 (2024-09-11)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.103.0
1
+ 1.105.0
@@ -130,13 +130,15 @@ module Aws::CognitoIdentityProvider
130
130
  # locations will be searched for credentials:
131
131
  #
132
132
  # * `Aws.config[:credentials]`
133
- # * The `:access_key_id`, `:secret_access_key`, and `:session_token` options.
134
- # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
133
+ # * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
134
+ # `:account_id` options.
135
+ # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'],
136
+ # ENV['AWS_SESSION_TOKEN'], and ENV['AWS_ACCOUNT_ID']
135
137
  # * `~/.aws/credentials`
136
138
  # * `~/.aws/config`
137
139
  # * EC2/ECS IMDS instance profile - When used by default, the timeouts
138
140
  # are very aggressive. Construct and pass an instance of
139
- # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
141
+ # `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
140
142
  # enable retries and extended timeouts. Instance profile credential
141
143
  # fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
142
144
  # to true.
@@ -155,6 +157,8 @@ module Aws::CognitoIdentityProvider
155
157
  #
156
158
  # @option options [String] :access_key_id
157
159
  #
160
+ # @option options [String] :account_id
161
+ #
158
162
  # @option options [Boolean] :active_endpoint_cache (false)
159
163
  # When set to `true`, a thread polling for endpoints will be running in
160
164
  # the background every 60 secs (default). Defaults to `false`.
@@ -376,7 +380,9 @@ module Aws::CognitoIdentityProvider
376
380
  # sending the request.
377
381
  #
378
382
  # @option options [Aws::CognitoIdentityProvider::EndpointProvider] :endpoint_provider
379
- # The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::CognitoIdentityProvider::EndpointParameters`
383
+ # The endpoint provider used to resolve endpoints. Any object that responds to
384
+ # `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
385
+ # `Aws::CognitoIdentityProvider::EndpointParameters`.
380
386
  #
381
387
  # @option options [Float] :http_continue_timeout (1)
382
388
  # The number of seconds to wait for a 100-continue response before sending the
@@ -676,7 +682,7 @@ module Aws::CognitoIdentityProvider
676
682
  # sign in.
677
683
  #
678
684
  # If you have never used SMS text messages with Amazon Cognito or any
679
- # other Amazon Web Services service, Amazon Simple Notification Service
685
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
680
686
  # might place your account in the SMS sandbox. In <i> <a
681
687
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
682
688
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -1474,7 +1480,7 @@ module Aws::CognitoIdentityProvider
1474
1480
  # sign in.
1475
1481
  #
1476
1482
  # If you have never used SMS text messages with Amazon Cognito or any
1477
- # other Amazon Web Services service, Amazon Simple Notification Service
1483
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
1478
1484
  # might place your account in the SMS sandbox. In <i> <a
1479
1485
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
1480
1486
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -1685,7 +1691,7 @@ module Aws::CognitoIdentityProvider
1685
1691
  #
1686
1692
  # @example Response structure
1687
1693
  #
1688
- # resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
1694
+ # resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
1689
1695
  # resp.session #=> String
1690
1696
  # resp.challenge_parameters #=> Hash
1691
1697
  # resp.challenge_parameters["StringType"] #=> String
@@ -2135,7 +2141,7 @@ module Aws::CognitoIdentityProvider
2135
2141
  # sign in.
2136
2142
  #
2137
2143
  # If you have never used SMS text messages with Amazon Cognito or any
2138
- # other Amazon Web Services service, Amazon Simple Notification Service
2144
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
2139
2145
  # might place your account in the SMS sandbox. In <i> <a
2140
2146
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
2141
2147
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -2266,7 +2272,7 @@ module Aws::CognitoIdentityProvider
2266
2272
  # sign in.
2267
2273
  #
2268
2274
  # If you have never used SMS text messages with Amazon Cognito or any
2269
- # other Amazon Web Services service, Amazon Simple Notification Service
2275
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
2270
2276
  # might place your account in the SMS sandbox. In <i> <a
2271
2277
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
2272
2278
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -2323,11 +2329,21 @@ module Aws::CognitoIdentityProvider
2323
2329
  # SMS\_MFA
2324
2330
  #
2325
2331
  # : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
2326
- # "[SMS_code]", "USERNAME": "[username]"\}`
2332
+ # "[code]", "USERNAME": "[username]"\}`
2333
+ #
2334
+ # EMAIL\_OTP
2335
+ #
2336
+ # : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
2337
+ # \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
2327
2338
  #
2328
2339
  # PASSWORD\_VERIFIER
2329
2340
  #
2330
- # : `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
2341
+ # : This challenge response is part of the SRP flow. Amazon Cognito
2342
+ # requires that your application respond to this challenge within a
2343
+ # few seconds. When the response time exceeds this period, your user
2344
+ # pool returns a `NotAuthorizedException` error.
2345
+ #
2346
+ # `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
2331
2347
  # \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
2332
2348
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
2333
2349
  # [timestamp], "USERNAME": "[username]"\}`
@@ -2486,7 +2502,7 @@ module Aws::CognitoIdentityProvider
2486
2502
  # resp = client.admin_respond_to_auth_challenge({
2487
2503
  # user_pool_id: "UserPoolIdType", # required
2488
2504
  # client_id: "ClientIdType", # required
2489
- # challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
2505
+ # challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
2490
2506
  # challenge_responses: {
2491
2507
  # "StringType" => "StringType",
2492
2508
  # },
@@ -2513,7 +2529,7 @@ module Aws::CognitoIdentityProvider
2513
2529
  #
2514
2530
  # @example Response structure
2515
2531
  #
2516
- # resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
2532
+ # resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
2517
2533
  # resp.session #=> String
2518
2534
  # resp.challenge_parameters #=> Hash
2519
2535
  # resp.challenge_parameters["StringType"] #=> String
@@ -2534,12 +2550,12 @@ module Aws::CognitoIdentityProvider
2534
2550
  req.send_request(options)
2535
2551
  end
2536
2552
 
2537
- # The user's multi-factor authentication (MFA) preference, including
2538
- # which MFA options are activated, and if any are preferred. Only one
2539
- # factor can be set as preferred. The preferred MFA factor will be used
2540
- # to authenticate a user if multiple factors are activated. If multiple
2541
- # options are activated and no preference is set, a challenge to choose
2542
- # an MFA option will be returned during sign-in.
2553
+ # Sets the user's multi-factor authentication (MFA) preference,
2554
+ # including which MFA options are activated, and if any are preferred.
2555
+ # Only one factor can be set as preferred. The preferred MFA factor will
2556
+ # be used to authenticate a user if multiple factors are activated. If
2557
+ # multiple options are activated and no preference is set, a challenge
2558
+ # to choose an MFA option will be returned during sign-in.
2543
2559
  #
2544
2560
  # <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
2545
2561
  # in requests for this API operation. For this operation, you must use
@@ -2560,10 +2576,24 @@ module Aws::CognitoIdentityProvider
2560
2576
  # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
2561
2577
  #
2562
2578
  # @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
2563
- # The SMS text message MFA settings.
2579
+ # User preferences for SMS message MFA. Activates or deactivates SMS MFA
2580
+ # and sets it as the preferred MFA method when multiple methods are
2581
+ # available.
2564
2582
  #
2565
2583
  # @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
2566
- # The time-based one-time password software token MFA settings.
2584
+ # User preferences for time-based one-time password (TOTP) MFA.
2585
+ # Activates or deactivates TOTP MFA and sets it as the preferred MFA
2586
+ # method when multiple methods are available.
2587
+ #
2588
+ # @option params [Types::EmailMfaSettingsType] :email_mfa_settings
2589
+ # User preferences for email message MFA. Activates or deactivates email
2590
+ # MFA and sets it as the preferred MFA method when multiple methods are
2591
+ # available. To activate this setting, [ advanced security features][1]
2592
+ # must be active in your user pool.
2593
+ #
2594
+ #
2595
+ #
2596
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
2567
2597
  #
2568
2598
  # @option params [required, String] :username
2569
2599
  # The username of the user that you want to query or modify. The value
@@ -2573,7 +2603,8 @@ module Aws::CognitoIdentityProvider
2573
2603
  # username of a user from a third-party IdP.
2574
2604
  #
2575
2605
  # @option params [required, String] :user_pool_id
2576
- # The user pool ID.
2606
+ # The ID of the user pool where you want to set a user's MFA
2607
+ # preferences.
2577
2608
  #
2578
2609
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2579
2610
  #
@@ -2588,6 +2619,10 @@ module Aws::CognitoIdentityProvider
2588
2619
  # enabled: false,
2589
2620
  # preferred_mfa: false,
2590
2621
  # },
2622
+ # email_mfa_settings: {
2623
+ # enabled: false,
2624
+ # preferred_mfa: false,
2625
+ # },
2591
2626
  # username: "UsernameType", # required
2592
2627
  # user_pool_id: "UserPoolIdType", # required
2593
2628
  # })
@@ -2876,7 +2911,7 @@ module Aws::CognitoIdentityProvider
2876
2911
  # sign in.
2877
2912
  #
2878
2913
  # If you have never used SMS text messages with Amazon Cognito or any
2879
- # other Amazon Web Services service, Amazon Simple Notification Service
2914
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
2880
2915
  # might place your account in the SMS sandbox. In <i> <a
2881
2916
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
2882
2917
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -3970,7 +4005,7 @@ module Aws::CognitoIdentityProvider
3970
4005
  # sign in.
3971
4006
  #
3972
4007
  # If you have never used SMS text messages with Amazon Cognito or any
3973
- # other Amazon Web Services service, Amazon Simple Notification Service
4008
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
3974
4009
  # might place your account in the SMS sandbox. In <i> <a
3975
4010
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
3976
4011
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -4960,9 +4995,9 @@ module Aws::CognitoIdentityProvider
4960
4995
  # are hours.
4961
4996
  #
4962
4997
  # @option params [Array<String>] :read_attributes
4963
- # The list of user attributes that you want your app client to have
4964
- # read-only access to. After your user authenticates in your app, their
4965
- # access token authorizes them to read their own attribute value for any
4998
+ # The list of user attributes that you want your app client to have read
4999
+ # access to. After your user authenticates in your app, their access
5000
+ # token authorizes them to read their own attribute value for any
4966
5001
  # attribute in this list. An example of this kind of activity is when
4967
5002
  # your user selects a link to view their profile information. Your app
4968
5003
  # makes a [GetUser][1] API request to retrieve and display your user's
@@ -4970,11 +5005,11 @@ module Aws::CognitoIdentityProvider
4970
5005
  #
4971
5006
  # When you don't specify the `ReadAttributes` for your app client, your
4972
5007
  # app can read the values of `email_verified`, `phone_number_verified`,
4973
- # and the Standard attributes of your user pool. When your user pool has
4974
- # read access to these default attributes, `ReadAttributes` doesn't
4975
- # return any information. Amazon Cognito only populates `ReadAttributes`
4976
- # in the API response if you have specified your own custom set of read
4977
- # attributes.
5008
+ # and the Standard attributes of your user pool. When your user pool app
5009
+ # client has read access to these default attributes, `ReadAttributes`
5010
+ # doesn't return any information. Amazon Cognito only populates
5011
+ # `ReadAttributes` in the API response if you have specified your own
5012
+ # custom set of read attributes.
4978
5013
  #
4979
5014
  #
4980
5015
  #
@@ -6282,7 +6317,7 @@ module Aws::CognitoIdentityProvider
6282
6317
  # sign in.
6283
6318
  #
6284
6319
  # If you have never used SMS text messages with Amazon Cognito or any
6285
- # other Amazon Web Services service, Amazon Simple Notification Service
6320
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
6286
6321
  # might place your account in the SMS sandbox. In <i> <a
6287
6322
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
6288
6323
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -6770,7 +6805,7 @@ module Aws::CognitoIdentityProvider
6770
6805
  # sign in.
6771
6806
  #
6772
6807
  # If you have never used SMS text messages with Amazon Cognito or any
6773
- # other Amazon Web Services service, Amazon Simple Notification Service
6808
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
6774
6809
  # might place your account in the SMS sandbox. In <i> <a
6775
6810
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
6776
6811
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -6870,6 +6905,7 @@ module Aws::CognitoIdentityProvider
6870
6905
  #
6871
6906
  # * {Types::GetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
6872
6907
  # * {Types::GetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
6908
+ # * {Types::GetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
6873
6909
  # * {Types::GetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
6874
6910
  #
6875
6911
  # @example Request syntax with placeholder values
@@ -6885,6 +6921,8 @@ module Aws::CognitoIdentityProvider
6885
6921
  # resp.sms_mfa_configuration.sms_configuration.external_id #=> String
6886
6922
  # resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
6887
6923
  # resp.software_token_mfa_configuration.enabled #=> Boolean
6924
+ # resp.email_mfa_configuration.message #=> String
6925
+ # resp.email_mfa_configuration.subject #=> String
6888
6926
  # resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
6889
6927
  #
6890
6928
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetUserPoolMfaConfig AWS API Documentation
@@ -6983,7 +7021,7 @@ module Aws::CognitoIdentityProvider
6983
7021
  # sign in.
6984
7022
  #
6985
7023
  # If you have never used SMS text messages with Amazon Cognito or any
6986
- # other Amazon Web Services service, Amazon Simple Notification Service
7024
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
6987
7025
  # might place your account in the SMS sandbox. In <i> <a
6988
7026
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
6989
7027
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -7202,7 +7240,7 @@ module Aws::CognitoIdentityProvider
7202
7240
  #
7203
7241
  # @example Response structure
7204
7242
  #
7205
- # resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
7243
+ # resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
7206
7244
  # resp.session #=> String
7207
7245
  # resp.challenge_parameters #=> Hash
7208
7246
  # resp.challenge_parameters["StringType"] #=> String
@@ -8073,7 +8111,7 @@ module Aws::CognitoIdentityProvider
8073
8111
  # sign in.
8074
8112
  #
8075
8113
  # If you have never used SMS text messages with Amazon Cognito or any
8076
- # other Amazon Web Services service, Amazon Simple Notification Service
8114
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
8077
8115
  # might place your account in the SMS sandbox. In <i> <a
8078
8116
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
8079
8117
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -8219,7 +8257,7 @@ module Aws::CognitoIdentityProvider
8219
8257
  # sign in.
8220
8258
  #
8221
8259
  # If you have never used SMS text messages with Amazon Cognito or any
8222
- # other Amazon Web Services service, Amazon Simple Notification Service
8260
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
8223
8261
  # might place your account in the SMS sandbox. In <i> <a
8224
8262
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
8225
8263
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -8268,11 +8306,21 @@ module Aws::CognitoIdentityProvider
8268
8306
  # SMS\_MFA
8269
8307
  #
8270
8308
  # : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
8271
- # "[SMS_code]", "USERNAME": "[username]"\}`
8309
+ # "[code]", "USERNAME": "[username]"\}`
8310
+ #
8311
+ # EMAIL\_OTP
8312
+ #
8313
+ # : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
8314
+ # \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
8272
8315
  #
8273
8316
  # PASSWORD\_VERIFIER
8274
8317
  #
8275
- # : `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
8318
+ # : This challenge response is part of the SRP flow. Amazon Cognito
8319
+ # requires that your application respond to this challenge within a
8320
+ # few seconds. When the response time exceeds this period, your user
8321
+ # pool returns a `NotAuthorizedException` error.
8322
+ #
8323
+ # `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
8276
8324
  # \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
8277
8325
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
8278
8326
  # [timestamp], "USERNAME": "[username]"\}`
@@ -8407,7 +8455,7 @@ module Aws::CognitoIdentityProvider
8407
8455
  #
8408
8456
  # resp = client.respond_to_auth_challenge({
8409
8457
  # client_id: "ClientIdType", # required
8410
- # challenge_name: "SMS_MFA", # required, accepts SMS_MFA, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
8458
+ # challenge_name: "SMS_MFA", # required, accepts SMS_MFA, EMAIL_OTP, SOFTWARE_TOKEN_MFA, SELECT_MFA_TYPE, MFA_SETUP, PASSWORD_VERIFIER, CUSTOM_CHALLENGE, DEVICE_SRP_AUTH, DEVICE_PASSWORD_VERIFIER, ADMIN_NO_SRP_AUTH, NEW_PASSWORD_REQUIRED
8411
8459
  # session: "SessionType",
8412
8460
  # challenge_responses: {
8413
8461
  # "StringType" => "StringType",
@@ -8426,7 +8474,7 @@ module Aws::CognitoIdentityProvider
8426
8474
  #
8427
8475
  # @example Response structure
8428
8476
  #
8429
- # resp.challenge_name #=> String, one of "SMS_MFA", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
8477
+ # resp.challenge_name #=> String, one of "SMS_MFA", "EMAIL_OTP", "SOFTWARE_TOKEN_MFA", "SELECT_MFA_TYPE", "MFA_SETUP", "PASSWORD_VERIFIER", "CUSTOM_CHALLENGE", "DEVICE_SRP_AUTH", "DEVICE_PASSWORD_VERIFIER", "ADMIN_NO_SRP_AUTH", "NEW_PASSWORD_REQUIRED"
8430
8478
  # resp.session #=> String
8431
8479
  # resp.challenge_parameters #=> Hash
8432
8480
  # resp.challenge_parameters["StringType"] #=> String
@@ -8762,10 +8810,24 @@ module Aws::CognitoIdentityProvider
8762
8810
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
8763
8811
  #
8764
8812
  # @option params [Types::SMSMfaSettingsType] :sms_mfa_settings
8765
- # The SMS text message multi-factor authentication (MFA) settings.
8813
+ # User preferences for SMS message MFA. Activates or deactivates SMS MFA
8814
+ # and sets it as the preferred MFA method when multiple methods are
8815
+ # available.
8766
8816
  #
8767
8817
  # @option params [Types::SoftwareTokenMfaSettingsType] :software_token_mfa_settings
8768
- # The time-based one-time password (TOTP) software token MFA settings.
8818
+ # User preferences for time-based one-time password (TOTP) MFA.
8819
+ # Activates or deactivates TOTP MFA and sets it as the preferred MFA
8820
+ # method when multiple methods are available.
8821
+ #
8822
+ # @option params [Types::EmailMfaSettingsType] :email_mfa_settings
8823
+ # User preferences for email message MFA. Activates or deactivates email
8824
+ # MFA and sets it as the preferred MFA method when multiple methods are
8825
+ # available. To activate this setting, [ advanced security features][1]
8826
+ # must be active in your user pool.
8827
+ #
8828
+ #
8829
+ #
8830
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
8769
8831
  #
8770
8832
  # @option params [required, String] :access_token
8771
8833
  # A valid access token that Amazon Cognito issued to the user whose MFA
@@ -8784,6 +8846,10 @@ module Aws::CognitoIdentityProvider
8784
8846
  # enabled: false,
8785
8847
  # preferred_mfa: false,
8786
8848
  # },
8849
+ # email_mfa_settings: {
8850
+ # enabled: false,
8851
+ # preferred_mfa: false,
8852
+ # },
8787
8853
  # access_token: "TokenModelType", # required
8788
8854
  # })
8789
8855
  #
@@ -8808,7 +8874,7 @@ module Aws::CognitoIdentityProvider
8808
8874
  # sign in.
8809
8875
  #
8810
8876
  # If you have never used SMS text messages with Amazon Cognito or any
8811
- # other Amazon Web Services service, Amazon Simple Notification Service
8877
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
8812
8878
  # might place your account in the SMS sandbox. In <i> <a
8813
8879
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
8814
8880
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -8828,10 +8894,22 @@ module Aws::CognitoIdentityProvider
8828
8894
  # The user pool ID.
8829
8895
  #
8830
8896
  # @option params [Types::SmsMfaConfigType] :sms_mfa_configuration
8831
- # The SMS text message MFA configuration.
8897
+ # Configures user pool SMS messages for MFA. Sets the message template
8898
+ # and the SMS message sending configuration for Amazon SNS.
8832
8899
  #
8833
8900
  # @option params [Types::SoftwareTokenMfaConfigType] :software_token_mfa_configuration
8834
- # The software token MFA configuration.
8901
+ # Configures a user pool for time-based one-time password (TOTP) MFA.
8902
+ # Enables or disables TOTP.
8903
+ #
8904
+ # @option params [Types::EmailMfaConfigType] :email_mfa_configuration
8905
+ # Configures user pool email messages for MFA. Sets the subject and body
8906
+ # of the email message template for MFA messages. To activate this
8907
+ # setting, [ advanced security features][1] must be active in your user
8908
+ # pool.
8909
+ #
8910
+ #
8911
+ #
8912
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
8835
8913
  #
8836
8914
  # @option params [String] :mfa_configuration
8837
8915
  # The MFA configuration. If you set the MfaConfiguration value to ‘ON’,
@@ -8854,6 +8932,7 @@ module Aws::CognitoIdentityProvider
8854
8932
  #
8855
8933
  # * {Types::SetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
8856
8934
  # * {Types::SetUserPoolMfaConfigResponse#software_token_mfa_configuration #software_token_mfa_configuration} => Types::SoftwareTokenMfaConfigType
8935
+ # * {Types::SetUserPoolMfaConfigResponse#email_mfa_configuration #email_mfa_configuration} => Types::EmailMfaConfigType
8857
8936
  # * {Types::SetUserPoolMfaConfigResponse#mfa_configuration #mfa_configuration} => String
8858
8937
  #
8859
8938
  # @example Request syntax with placeholder values
@@ -8871,6 +8950,10 @@ module Aws::CognitoIdentityProvider
8871
8950
  # software_token_mfa_configuration: {
8872
8951
  # enabled: false,
8873
8952
  # },
8953
+ # email_mfa_configuration: {
8954
+ # message: "EmailMfaMessageType",
8955
+ # subject: "EmailMfaSubjectType",
8956
+ # },
8874
8957
  # mfa_configuration: "OFF", # accepts OFF, ON, OPTIONAL
8875
8958
  # })
8876
8959
  #
@@ -8881,6 +8964,8 @@ module Aws::CognitoIdentityProvider
8881
8964
  # resp.sms_mfa_configuration.sms_configuration.external_id #=> String
8882
8965
  # resp.sms_mfa_configuration.sms_configuration.sns_region #=> String
8883
8966
  # resp.software_token_mfa_configuration.enabled #=> Boolean
8967
+ # resp.email_mfa_configuration.message #=> String
8968
+ # resp.email_mfa_configuration.subject #=> String
8884
8969
  # resp.mfa_configuration #=> String, one of "OFF", "ON", "OPTIONAL"
8885
8970
  #
8886
8971
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SetUserPoolMfaConfig AWS API Documentation
@@ -8967,7 +9052,7 @@ module Aws::CognitoIdentityProvider
8967
9052
  # sign in.
8968
9053
  #
8969
9054
  # If you have never used SMS text messages with Amazon Cognito or any
8970
- # other Amazon Web Services service, Amazon Simple Notification Service
9055
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
8971
9056
  # might place your account in the SMS sandbox. In <i> <a
8972
9057
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
8973
9058
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -9778,7 +9863,7 @@ module Aws::CognitoIdentityProvider
9778
9863
  # sign in.
9779
9864
  #
9780
9865
  # If you have never used SMS text messages with Amazon Cognito or any
9781
- # other Amazon Web Services service, Amazon Simple Notification Service
9866
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
9782
9867
  # might place your account in the SMS sandbox. In <i> <a
9783
9868
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
9784
9869
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -9893,7 +9978,7 @@ module Aws::CognitoIdentityProvider
9893
9978
  # sign in.
9894
9979
  #
9895
9980
  # If you have never used SMS text messages with Amazon Cognito or any
9896
- # other Amazon Web Services service, Amazon Simple Notification Service
9981
+ # other Amazon Web Servicesservice, Amazon Simple Notification Service
9897
9982
  # might place your account in the SMS sandbox. In <i> <a
9898
9983
  # href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
9899
9984
  # mode</a> </i>, you can send messages only to verified phone numbers.
@@ -10282,9 +10367,9 @@ module Aws::CognitoIdentityProvider
10282
10367
  # default for ID and access tokens is hours.
10283
10368
  #
10284
10369
  # @option params [Array<String>] :read_attributes
10285
- # The list of user attributes that you want your app client to have
10286
- # read-only access to. After your user authenticates in your app, their
10287
- # access token authorizes them to read their own attribute value for any
10370
+ # The list of user attributes that you want your app client to have read
10371
+ # access to. After your user authenticates in your app, their access
10372
+ # token authorizes them to read their own attribute value for any
10288
10373
  # attribute in this list. An example of this kind of activity is when
10289
10374
  # your user selects a link to view their profile information. Your app
10290
10375
  # makes a [GetUser][1] API request to retrieve and display your user's
@@ -10292,11 +10377,11 @@ module Aws::CognitoIdentityProvider
10292
10377
  #
10293
10378
  # When you don't specify the `ReadAttributes` for your app client, your
10294
10379
  # app can read the values of `email_verified`, `phone_number_verified`,
10295
- # and the Standard attributes of your user pool. When your user pool has
10296
- # read access to these default attributes, `ReadAttributes` doesn't
10297
- # return any information. Amazon Cognito only populates `ReadAttributes`
10298
- # in the API response if you have specified your own custom set of read
10299
- # attributes.
10380
+ # and the Standard attributes of your user pool. When your user pool app
10381
+ # client has read access to these default attributes, `ReadAttributes`
10382
+ # doesn't return any information. Amazon Cognito only populates
10383
+ # `ReadAttributes` in the API response if you have specified your own
10384
+ # custom set of read attributes.
10300
10385
  #
10301
10386
  #
10302
10387
  #
@@ -10854,7 +10939,7 @@ module Aws::CognitoIdentityProvider
10854
10939
  tracer: tracer
10855
10940
  )
10856
10941
  context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
10857
- context[:gem_version] = '1.103.0'
10942
+ context[:gem_version] = '1.105.0'
10858
10943
  Seahorse::Client::Request.new(handlers, context)
10859
10944
  end
10860
10945
 
@@ -202,6 +202,10 @@ module Aws::CognitoIdentityProvider
202
202
  DuplicateProviderException = Shapes::StructureShape.new(name: 'DuplicateProviderException')
203
203
  EmailAddressType = Shapes::StringShape.new(name: 'EmailAddressType')
204
204
  EmailConfigurationType = Shapes::StructureShape.new(name: 'EmailConfigurationType')
205
+ EmailMfaConfigType = Shapes::StructureShape.new(name: 'EmailMfaConfigType')
206
+ EmailMfaMessageType = Shapes::StringShape.new(name: 'EmailMfaMessageType')
207
+ EmailMfaSettingsType = Shapes::StructureShape.new(name: 'EmailMfaSettingsType')
208
+ EmailMfaSubjectType = Shapes::StringShape.new(name: 'EmailMfaSubjectType')
205
209
  EmailNotificationBodyType = Shapes::StringShape.new(name: 'EmailNotificationBodyType')
206
210
  EmailNotificationSubjectType = Shapes::StringShape.new(name: 'EmailNotificationSubjectType')
207
211
  EmailSendingAccountType = Shapes::StringShape.new(name: 'EmailSendingAccountType')
@@ -691,6 +695,7 @@ module Aws::CognitoIdentityProvider
691
695
 
692
696
  AdminSetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
693
697
  AdminSetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
698
+ AdminSetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
694
699
  AdminSetUserMFAPreferenceRequest.add_member(:username, Shapes::ShapeRef.new(shape: UsernameType, required: true, location_name: "Username"))
695
700
  AdminSetUserMFAPreferenceRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
696
701
  AdminSetUserMFAPreferenceRequest.struct_class = Types::AdminSetUserMFAPreferenceRequest
@@ -1132,6 +1137,14 @@ module Aws::CognitoIdentityProvider
1132
1137
  EmailConfigurationType.add_member(:configuration_set, Shapes::ShapeRef.new(shape: SESConfigurationSet, location_name: "ConfigurationSet"))
1133
1138
  EmailConfigurationType.struct_class = Types::EmailConfigurationType
1134
1139
 
1140
+ EmailMfaConfigType.add_member(:message, Shapes::ShapeRef.new(shape: EmailMfaMessageType, location_name: "Message"))
1141
+ EmailMfaConfigType.add_member(:subject, Shapes::ShapeRef.new(shape: EmailMfaSubjectType, location_name: "Subject"))
1142
+ EmailMfaConfigType.struct_class = Types::EmailMfaConfigType
1143
+
1144
+ EmailMfaSettingsType.add_member(:enabled, Shapes::ShapeRef.new(shape: BooleanType, location_name: "Enabled"))
1145
+ EmailMfaSettingsType.add_member(:preferred_mfa, Shapes::ShapeRef.new(shape: BooleanType, location_name: "PreferredMfa"))
1146
+ EmailMfaSettingsType.struct_class = Types::EmailMfaSettingsType
1147
+
1135
1148
  EnableSoftwareTokenMFAException.add_member(:message, Shapes::ShapeRef.new(shape: MessageType, location_name: "message"))
1136
1149
  EnableSoftwareTokenMFAException.struct_class = Types::EnableSoftwareTokenMFAException
1137
1150
 
@@ -1240,6 +1253,7 @@ module Aws::CognitoIdentityProvider
1240
1253
 
1241
1254
  GetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
1242
1255
  GetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
1256
+ GetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
1243
1257
  GetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
1244
1258
  GetUserPoolMfaConfigResponse.struct_class = Types::GetUserPoolMfaConfigResponse
1245
1259
 
@@ -1655,6 +1669,7 @@ module Aws::CognitoIdentityProvider
1655
1669
 
1656
1670
  SetUserMFAPreferenceRequest.add_member(:sms_mfa_settings, Shapes::ShapeRef.new(shape: SMSMfaSettingsType, location_name: "SMSMfaSettings"))
1657
1671
  SetUserMFAPreferenceRequest.add_member(:software_token_mfa_settings, Shapes::ShapeRef.new(shape: SoftwareTokenMfaSettingsType, location_name: "SoftwareTokenMfaSettings"))
1672
+ SetUserMFAPreferenceRequest.add_member(:email_mfa_settings, Shapes::ShapeRef.new(shape: EmailMfaSettingsType, location_name: "EmailMfaSettings"))
1658
1673
  SetUserMFAPreferenceRequest.add_member(:access_token, Shapes::ShapeRef.new(shape: TokenModelType, required: true, location_name: "AccessToken"))
1659
1674
  SetUserMFAPreferenceRequest.struct_class = Types::SetUserMFAPreferenceRequest
1660
1675
 
@@ -1663,11 +1678,13 @@ module Aws::CognitoIdentityProvider
1663
1678
  SetUserPoolMfaConfigRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
1664
1679
  SetUserPoolMfaConfigRequest.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
1665
1680
  SetUserPoolMfaConfigRequest.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
1681
+ SetUserPoolMfaConfigRequest.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
1666
1682
  SetUserPoolMfaConfigRequest.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
1667
1683
  SetUserPoolMfaConfigRequest.struct_class = Types::SetUserPoolMfaConfigRequest
1668
1684
 
1669
1685
  SetUserPoolMfaConfigResponse.add_member(:sms_mfa_configuration, Shapes::ShapeRef.new(shape: SmsMfaConfigType, location_name: "SmsMfaConfiguration"))
1670
1686
  SetUserPoolMfaConfigResponse.add_member(:software_token_mfa_configuration, Shapes::ShapeRef.new(shape: SoftwareTokenMfaConfigType, location_name: "SoftwareTokenMfaConfiguration"))
1687
+ SetUserPoolMfaConfigResponse.add_member(:email_mfa_configuration, Shapes::ShapeRef.new(shape: EmailMfaConfigType, location_name: "EmailMfaConfiguration"))
1671
1688
  SetUserPoolMfaConfigResponse.add_member(:mfa_configuration, Shapes::ShapeRef.new(shape: UserPoolMfaType, location_name: "MfaConfiguration"))
1672
1689
  SetUserPoolMfaConfigResponse.struct_class = Types::SetUserPoolMfaConfigResponse
1673
1690
 
@@ -2298,6 +2315,7 @@ module Aws::CognitoIdentityProvider
2298
2315
  o.errors << Shapes::ShapeRef.new(shape: InvalidLambdaResponseException)
2299
2316
  o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
2300
2317
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
2318
+ o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
2301
2319
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
2302
2320
  o.errors << Shapes::ShapeRef.new(shape: PasswordResetRequiredException)
2303
2321
  o.errors << Shapes::ShapeRef.new(shape: UserNotFoundException)
@@ -2430,6 +2448,7 @@ module Aws::CognitoIdentityProvider
2430
2448
  o.errors << Shapes::ShapeRef.new(shape: InvalidUserPoolConfigurationException)
2431
2449
  o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
2432
2450
  o.errors << Shapes::ShapeRef.new(shape: MFAMethodNotFoundException)
2451
+ o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
2433
2452
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
2434
2453
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
2435
2454
  o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
@@ -3217,6 +3236,7 @@ module Aws::CognitoIdentityProvider
3217
3236
  o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
3218
3237
  o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
3219
3238
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
3239
+ o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
3220
3240
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
3221
3241
  o.errors << Shapes::ShapeRef.new(shape: ForbiddenException)
3222
3242
  end)
@@ -3450,6 +3470,7 @@ module Aws::CognitoIdentityProvider
3450
3470
  o.errors << Shapes::ShapeRef.new(shape: UserNotConfirmedException)
3451
3471
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleAccessPolicyException)
3452
3472
  o.errors << Shapes::ShapeRef.new(shape: InvalidSmsRoleTrustRelationshipException)
3473
+ o.errors << Shapes::ShapeRef.new(shape: InvalidEmailRoleAccessPolicyException)
3453
3474
  o.errors << Shapes::ShapeRef.new(shape: AliasExistsException)
3454
3475
  o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
3455
3476
  o.errors << Shapes::ShapeRef.new(shape: SoftwareTokenMFANotFoundException)