aws-sdk-cognitoidentityprovider 1.127.0 → 1.128.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1665,30 +1665,44 @@ module Aws::CognitoIdentityProvider
1665
1665
  #
1666
1666
  # @option params [Hash<String,String>] :auth_parameters
1667
1667
  # The authentication parameters. These are inputs corresponding to the
1668
- # `AuthFlow` that you're invoking. The required values depend on the
1669
- # value of `AuthFlow` for example:
1668
+ # `AuthFlow` that you're invoking.
1669
+ #
1670
+ # The following are some authentication flows and their parameters. Add
1671
+ # a `SECRET_HASH` parameter if your app client has a client secret. Add
1672
+ # `DEVICE_KEY` if you want to bypass multi-factor authentication with a
1673
+ # remembered device.
1674
+ #
1675
+ # USER\_AUTH
1676
+ # : * `USERNAME` (required)
1677
+ #
1678
+ # * `PREFERRED_CHALLENGE`. If you don't provide a value for
1679
+ # `PREFERRED_CHALLENGE`, Amazon Cognito responds with the
1680
+ # `AvailableChallenges` parameter that specifies the available
1681
+ # sign-in methods.
1682
+ #
1683
+ # USER\_SRP\_AUTH
1684
+ # : * `USERNAME` (required)
1685
+ #
1686
+ # * `SRP_A` (required)
1670
1687
  #
1671
- # * For `USER_AUTH`: `USERNAME` (required), `PREFERRED_CHALLENGE`. If
1672
- # you don't provide a value for `PREFERRED_CHALLENGE`, Amazon Cognito
1673
- # responds with the `AvailableChallenges` parameter that specifies the
1674
- # available sign-in methods.
1688
+ # ADMIN\_USER\_PASSWORD\_AUTH
1689
+ # : * `USERNAME` (required)
1690
+ #
1691
+ # * `PASSWORD` (required)
1675
1692
  #
1676
- # * For `USER_SRP_AUTH`: `USERNAME` (required), `SRP_A` (required),
1677
- # `SECRET_HASH` (required if the app client is configured with a
1678
- # client secret), `DEVICE_KEY`.
1693
+ # REFRESH\_TOKEN\_AUTH/REFRESH\_TOKEN
1694
+ # : * `REFRESH_TOKEN`(required)
1679
1695
  #
1680
- # * For `ADMIN_USER_PASSWORD_AUTH`: `USERNAME` (required), `PASSWORD`
1681
- # (required), `SECRET_HASH` (required if the app client is configured
1682
- # with a client secret), `DEVICE_KEY`.
1696
+ # ^
1683
1697
  #
1684
- # * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`: `REFRESH_TOKEN` (required),
1685
- # `SECRET_HASH` (required if the app client is configured with a
1686
- # client secret), `DEVICE_KEY`.
1698
+ # CUSTOM\_AUTH
1699
+ # : * `USERNAME` (required)
1687
1700
  #
1688
- # * For `CUSTOM_AUTH`: `USERNAME` (required), `SECRET_HASH` (if app
1689
- # client is configured with client secret), `DEVICE_KEY`. To start the
1690
- # authentication flow with password verification, include
1691
- # `ChallengeName: SRP_A` and `SRP_A: (The SRP_A Value)`.
1701
+ # * `ChallengeName: SRP_A` (when preceding custom authentication with
1702
+ # SRP authentication)
1703
+ #
1704
+ # * `SRP_A: (An SRP_A value)` (when preceding custom authentication
1705
+ # with SRP authentication)
1692
1706
  #
1693
1707
  # For more information about `SECRET_HASH`, see [Computing secret hash
1694
1708
  # values][1]. For information about `DEVICE_KEY`, see [Working with user
@@ -2292,8 +2306,12 @@ module Aws::CognitoIdentityProvider
2292
2306
  req.send_request(options)
2293
2307
  end
2294
2308
 
2295
- # Resets the specified user's password in a user pool. This operation
2296
- # doesn't change the user's password, but sends a password-reset code.
2309
+ # Begins the password reset process. Sets the requested user’s account
2310
+ # into a `RESET_REQUIRED` status, and sends them a password-reset code.
2311
+ # Your user pool also sends the user a notification with a reset code
2312
+ # and the information that their password has been reset. At sign-in,
2313
+ # your application or the managed login session receives a challenge to
2314
+ # complete the reset by confirming the code and setting a new password.
2297
2315
  #
2298
2316
  # To use this API operation, your user pool must have self-service
2299
2317
  # account recovery configured.
@@ -2471,41 +2489,46 @@ module Aws::CognitoIdentityProvider
2471
2489
  # Possible challenges include the following:
2472
2490
  #
2473
2491
  # <note markdown="1"> All of the following challenges require `USERNAME` and, when the app
2474
- # client has a client secret, `SECRET_HASH` in the parameters.
2492
+ # client has a client secret, `SECRET_HASH` in the parameters. Include a
2493
+ # `DEVICE_KEY` for device authentication.
2475
2494
  #
2476
2495
  # </note>
2477
2496
  #
2478
2497
  # * `WEB_AUTHN`: Respond to the challenge with the results of a
2479
- # successful authentication with a WebAuthn authenticator, or passkey.
2480
- # Examples of WebAuthn authenticators include biometric devices and
2481
- # security keys.
2498
+ # successful authentication with a WebAuthn authenticator, or passkey,
2499
+ # as `CREDENTIAL`. Examples of WebAuthn authenticators include
2500
+ # biometric devices and security keys.
2482
2501
  #
2483
- # * `PASSWORD`: Respond with `USER_PASSWORD_AUTH` parameters: `USERNAME`
2484
- # (required), `PASSWORD` (required), `SECRET_HASH` (required if the
2485
- # app client is configured with a client secret), `DEVICE_KEY`.
2502
+ # * `PASSWORD`: Respond with the user's password as `PASSWORD`.
2486
2503
  #
2487
- # * `PASSWORD_SRP`: Respond with `USER_SRP_AUTH` parameters: `USERNAME`
2488
- # (required), `SRP_A` (required), `SECRET_HASH` (required if the app
2489
- # client is configured with a client secret), `DEVICE_KEY`.
2504
+ # * `PASSWORD_SRP`: Respond with the initial SRP secret as `SRP_A`.
2490
2505
  #
2491
- # * `SELECT_CHALLENGE`: Respond to the challenge with `USERNAME` and an
2492
- # `ANSWER` that matches one of the challenge types in the
2493
- # `AvailableChallenges` response parameter.
2506
+ # * `SELECT_CHALLENGE`: Respond with a challenge selection as `ANSWER`.
2507
+ # It must be one of the challenge types in the `AvailableChallenges`
2508
+ # response parameter. Add the parameters of the selected challenge,
2509
+ # for example `USERNAME` and `SMS_OTP`.
2494
2510
  #
2495
- # * `SMS_MFA`: Respond with an `SMS_MFA_CODE` that your user pool
2496
- # delivered in an SMS message.
2511
+ # * `SMS_MFA`: Respond with the code that your user pool delivered in an
2512
+ # SMS message, as `SMS_MFA_CODE`
2497
2513
  #
2498
- # * `EMAIL_OTP`: Respond with an `EMAIL_OTP_CODE` that your user pool
2499
- # delivered in an email message.
2514
+ # * `EMAIL_MFA`: Respond with the code that your user pool delivered in
2515
+ # an email message, as `EMAIL_MFA_CODE`
2500
2516
  #
2501
- # * `PASSWORD_VERIFIER`: Respond with `PASSWORD_CLAIM_SIGNATURE`,
2502
- # `PASSWORD_CLAIM_SECRET_BLOCK`, and `TIMESTAMP` after client-side SRP
2503
- # calculations.
2517
+ # * `EMAIL_OTP`: Respond with the code that your user pool delivered in
2518
+ # an email message, as `EMAIL_OTP_CODE` .
2519
+ #
2520
+ # * `SMS_OTP`: Respond with the code that your user pool delivered in an
2521
+ # SMS message, as `SMS_OTP_CODE`.
2522
+ #
2523
+ # * `PASSWORD_VERIFIER`: Respond with the second stage of SRP secrets as
2524
+ # `PASSWORD_CLAIM_SIGNATURE`, `PASSWORD_CLAIM_SECRET_BLOCK`, and
2525
+ # `TIMESTAMP`.
2504
2526
  #
2505
2527
  # * `CUSTOM_CHALLENGE`: This is returned if your custom authentication
2506
2528
  # flow determines that the user should pass another challenge before
2507
2529
  # tokens are issued. The parameters of the challenge are determined by
2508
- # your Lambda function.
2530
+ # your Lambda function and issued in the `ChallengeParameters` of a
2531
+ # challenge response.
2509
2532
  #
2510
2533
  # * `DEVICE_SRP_AUTH`: Respond with the initial parameters of device SRP
2511
2534
  # authentication. For more information, see [Signing in with a
@@ -2601,6 +2624,23 @@ module Aws::CognitoIdentityProvider
2601
2624
  # * `"ChallengeName": "SELECT_CHALLENGE", "ChallengeResponses": {
2602
2625
  # "ANSWER": "EMAIL_OTP", "USERNAME": "[username]"}`
2603
2626
  #
2627
+ # WEB\_AUTHN
2628
+ #
2629
+ # : `"ChallengeName": "WEB_AUTHN", "ChallengeResponses": { "USERNAME":
2630
+ # "[username]", "CREDENTIAL": "[AuthenticationResponseJSON]"}`
2631
+ #
2632
+ # See [ AuthenticationResponseJSON][1].
2633
+ #
2634
+ # PASSWORD
2635
+ #
2636
+ # : `"ChallengeName": "PASSWORD", "ChallengeResponses": { "USERNAME":
2637
+ # "[username]", "PASSWORD": "[password]"}`
2638
+ #
2639
+ # PASSWORD\_SRP
2640
+ #
2641
+ # : `"ChallengeName": "PASSWORD_SRP", "ChallengeResponses": {
2642
+ # "USERNAME": "[username]", "SRP_A": "[SRP_A]"}`
2643
+ #
2604
2644
  # SMS\_OTP
2605
2645
  #
2606
2646
  # : `"ChallengeName": "SMS_OTP", "ChallengeResponses": {"SMS_OTP_CODE":
@@ -2628,15 +2668,11 @@ module Aws::CognitoIdentityProvider
2628
2668
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
2629
2669
  # [timestamp], "USERNAME": "[username]"}`
2630
2670
  #
2631
- # Add `"DEVICE_KEY"` when you sign in with a remembered device.
2632
- #
2633
2671
  # CUSTOM\_CHALLENGE
2634
2672
  #
2635
2673
  # : `"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
2636
2674
  # {"USERNAME": "[username]", "ANSWER": "[challenge_answer]"}`
2637
2675
  #
2638
- # Add `"DEVICE_KEY"` when you sign in with a remembered device.
2639
- #
2640
2676
  # NEW\_PASSWORD\_REQUIRED
2641
2677
  #
2642
2678
  # : `"ChallengeName": "NEW_PASSWORD_REQUIRED", "ChallengeResponses":
@@ -2686,8 +2722,8 @@ module Aws::CognitoIdentityProvider
2686
2722
  # SELECT\_MFA\_TYPE
2687
2723
  #
2688
2724
  # : `"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses":
2689
- # {"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
2690
- # SOFTWARE_TOKEN_MFA]"}`
2725
+ # {"USERNAME": "[username]", "ANSWER":
2726
+ # "[SMS_MFA|EMAIL_MFA|SOFTWARE_TOKEN_MFA]"}`
2691
2727
  #
2692
2728
  # For more information about `SECRET_HASH`, see [Computing secret hash
2693
2729
  # values][2]. For information about `DEVICE_KEY`, see [Working with user
@@ -4298,7 +4334,7 @@ module Aws::CognitoIdentityProvider
4298
4334
 
4299
4335
  # Creates a new set of branding settings for a user pool style and
4300
4336
  # associates it with an app client. This operation is the programmatic
4301
- # option for the creation of a new style in the branding designer.
4337
+ # option for the creation of a new style in the branding editor.
4302
4338
  #
4303
4339
  # Provides values for UI customization in a `Settings` JSON object and
4304
4340
  # image files in an `Assets` array. To send the JSON object `Document`
@@ -4343,7 +4379,7 @@ module Aws::CognitoIdentityProvider
4343
4379
  # @option params [Boolean] :use_cognito_provided_values
4344
4380
  # When true, applies the default branding style options. These default
4345
4381
  # options are managed by Amazon Cognito. You can modify them later in
4346
- # the branding designer.
4382
+ # the branding editor.
4347
4383
  #
4348
4384
  # When you specify `true` for this option, you must also omit values for
4349
4385
  # `Settings` and `Assets` in the request.
@@ -4352,11 +4388,27 @@ module Aws::CognitoIdentityProvider
4352
4388
  # A JSON file, encoded as a `Document` type, with the the settings that
4353
4389
  # you want to apply to your style.
4354
4390
  #
4391
+ # The following components are not currently implemented and reserved
4392
+ # for future use:
4393
+ #
4394
+ # * `signUp`
4395
+ #
4396
+ # * `instructions`
4397
+ #
4398
+ # * `sessionTimerDisplay`
4399
+ #
4400
+ # * `languageSelector` (for localization, see [Managed login
4401
+ # localization)][1]
4402
+ #
4355
4403
  # Document type used to carry open content
4356
4404
  # (Hash,Array,String,Numeric,Boolean). A document type value is
4357
4405
  # serialized using the same format as its surroundings and requires no
4358
4406
  # additional encoding or escaping.
4359
4407
  #
4408
+ #
4409
+ #
4410
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-localization
4411
+ #
4360
4412
  # @option params [Array<Types::AssetType>] :assets
4361
4413
  # An array of image files that you want to apply to functions like
4362
4414
  # backgrounds, logos, and icons. Each object must also indicate whether
@@ -4490,6 +4542,112 @@ module Aws::CognitoIdentityProvider
4490
4542
  req.send_request(options)
4491
4543
  end
4492
4544
 
4545
+ # Creates terms documents for the requested app client. When Terms and
4546
+ # conditions and Privacy policy documents are configured, the app client
4547
+ # displays links to them in the sign-up page of managed login for the
4548
+ # app client.
4549
+ #
4550
+ # You can provide URLs for terms documents in the languages that are
4551
+ # supported by [managed login localization][1]. Amazon Cognito directs
4552
+ # users to the terms documents for their current language, with fallback
4553
+ # to `default` if no document exists for the language.
4554
+ #
4555
+ # Each request accepts one type of terms document and a map of
4556
+ # language-to-link for that document type. You must provide both types
4557
+ # of terms documents in at least one language before Amazon Cognito
4558
+ # displays your terms documents. Supply each type in separate requests.
4559
+ #
4560
+ # For more information, see [Terms documents][2].
4561
+ #
4562
+ # <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
4563
+ # in requests for this API operation. For this operation, you must use
4564
+ # IAM credentials to authorize requests, and you must grant yourself the
4565
+ # corresponding IAM permission in a policy.
4566
+ #
4567
+ # **Learn more**
4568
+ #
4569
+ # * [Signing Amazon Web Services API Requests][3]
4570
+ #
4571
+ # * [Using the Amazon Cognito user pools API and user pool endpoints][4]
4572
+ #
4573
+ # </note>
4574
+ #
4575
+ #
4576
+ #
4577
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-localization
4578
+ # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-terms-documents
4579
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html
4580
+ # [4]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
4581
+ #
4582
+ # @option params [required, String] :user_pool_id
4583
+ # The ID of the user pool where you want to create terms documents.
4584
+ #
4585
+ # @option params [required, String] :client_id
4586
+ # The ID of the app client where you want to create terms documents.
4587
+ # Must be an app client in the requested user pool.
4588
+ #
4589
+ # @option params [required, String] :terms_name
4590
+ # A friendly name for the document that you want to create in the
4591
+ # current request. Must begin with `terms-of-use` or `privacy-policy` as
4592
+ # identification of the document type. Provide URLs for both
4593
+ # `terms-of-use` and `privacy-policy` in separate requests.
4594
+ #
4595
+ # @option params [required, String] :terms_source
4596
+ # This parameter is reserved for future use and currently accepts only
4597
+ # one value.
4598
+ #
4599
+ # @option params [required, String] :enforcement
4600
+ # This parameter is reserved for future use and currently accepts only
4601
+ # one value.
4602
+ #
4603
+ # @option params [Hash<String,String>] :links
4604
+ # A map of URLs to languages. For each localized language that will view
4605
+ # the requested `TermsName`, assign a URL. A selection of
4606
+ # `cognito:default` displays for all languages that don't have a
4607
+ # language-specific URL.
4608
+ #
4609
+ # For example, `"cognito:default": "https://terms.example.com",
4610
+ # "cognito:spanish": "https://terms.example.com/es"`.
4611
+ #
4612
+ # @return [Types::CreateTermsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4613
+ #
4614
+ # * {Types::CreateTermsResponse#terms #terms} => Types::TermsType
4615
+ #
4616
+ # @example Request syntax with placeholder values
4617
+ #
4618
+ # resp = client.create_terms({
4619
+ # user_pool_id: "UserPoolIdType", # required
4620
+ # client_id: "ClientIdType", # required
4621
+ # terms_name: "TermsNameType", # required
4622
+ # terms_source: "LINK", # required, accepts LINK
4623
+ # enforcement: "NONE", # required, accepts NONE
4624
+ # links: {
4625
+ # "LanguageIdType" => "LinkUrlType",
4626
+ # },
4627
+ # })
4628
+ #
4629
+ # @example Response structure
4630
+ #
4631
+ # resp.terms.terms_id #=> String
4632
+ # resp.terms.user_pool_id #=> String
4633
+ # resp.terms.client_id #=> String
4634
+ # resp.terms.terms_name #=> String
4635
+ # resp.terms.terms_source #=> String, one of "LINK"
4636
+ # resp.terms.enforcement #=> String, one of "NONE"
4637
+ # resp.terms.links #=> Hash
4638
+ # resp.terms.links["LanguageIdType"] #=> String
4639
+ # resp.terms.creation_date #=> Time
4640
+ # resp.terms.last_modified_date #=> Time
4641
+ #
4642
+ # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/CreateTerms AWS API Documentation
4643
+ #
4644
+ # @overload create_terms(params = {})
4645
+ # @param [Hash] params ({})
4646
+ def create_terms(params = {}, options = {})
4647
+ req = build_request(:create_terms, params)
4648
+ req.send_request(options)
4649
+ end
4650
+
4493
4651
  # Creates a user import job. You can import users into user pools from a
4494
4652
  # comma-separated values (CSV) file without adding Amazon Cognito MAU
4495
4653
  # costs to your Amazon Web Services bill.
@@ -6431,6 +6589,52 @@ module Aws::CognitoIdentityProvider
6431
6589
  req.send_request(options)
6432
6590
  end
6433
6591
 
6592
+ # Deletes the terms documents with the requested ID from your app
6593
+ # client.
6594
+ #
6595
+ # <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
6596
+ # in requests for this API operation. For this operation, you must use
6597
+ # IAM credentials to authorize requests, and you must grant yourself the
6598
+ # corresponding IAM permission in a policy.
6599
+ #
6600
+ # **Learn more**
6601
+ #
6602
+ # * [Signing Amazon Web Services API Requests][1]
6603
+ #
6604
+ # * [Using the Amazon Cognito user pools API and user pool endpoints][2]
6605
+ #
6606
+ # </note>
6607
+ #
6608
+ #
6609
+ #
6610
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html
6611
+ # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6612
+ #
6613
+ # @option params [required, String] :terms_id
6614
+ # The ID of the terms documents that you want to delete.
6615
+ #
6616
+ # @option params [required, String] :user_pool_id
6617
+ # The ID of the user pool that contains the terms documents that you
6618
+ # want to delete.
6619
+ #
6620
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
6621
+ #
6622
+ # @example Request syntax with placeholder values
6623
+ #
6624
+ # resp = client.delete_terms({
6625
+ # terms_id: "TermsIdType", # required
6626
+ # user_pool_id: "UserPoolIdType", # required
6627
+ # })
6628
+ #
6629
+ # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/DeleteTerms AWS API Documentation
6630
+ #
6631
+ # @overload delete_terms(params = {})
6632
+ # @param [Hash] params ({})
6633
+ def delete_terms(params = {}, options = {})
6634
+ req = build_request(:delete_terms, params)
6635
+ req.send_request(options)
6636
+ end
6637
+
6434
6638
  # Deletes the profile of the currently signed-in user. A deleted user
6435
6639
  # profile can no longer be used to sign in and can't be restored.
6436
6640
  #
@@ -6930,6 +7134,68 @@ module Aws::CognitoIdentityProvider
6930
7134
  req.send_request(options)
6931
7135
  end
6932
7136
 
7137
+ # Returns details for the requested terms documents ID. For more
7138
+ # information, see [Terms documents][1].
7139
+ #
7140
+ # <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
7141
+ # in requests for this API operation. For this operation, you must use
7142
+ # IAM credentials to authorize requests, and you must grant yourself the
7143
+ # corresponding IAM permission in a policy.
7144
+ #
7145
+ # **Learn more**
7146
+ #
7147
+ # * [Signing Amazon Web Services API Requests][2]
7148
+ #
7149
+ # * [Using the Amazon Cognito user pools API and user pool endpoints][3]
7150
+ #
7151
+ # </note>
7152
+ #
7153
+ #
7154
+ #
7155
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-terms-documents
7156
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html
7157
+ # [3]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7158
+ #
7159
+ # @option params [required, String] :terms_id
7160
+ # The ID of the terms documents that you want to describe.
7161
+ #
7162
+ # @option params [required, String] :user_pool_id
7163
+ # The ID of the user pool that contains the terms documents that you
7164
+ # want to describe.
7165
+ #
7166
+ # @return [Types::DescribeTermsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7167
+ #
7168
+ # * {Types::DescribeTermsResponse#terms #terms} => Types::TermsType
7169
+ #
7170
+ # @example Request syntax with placeholder values
7171
+ #
7172
+ # resp = client.describe_terms({
7173
+ # terms_id: "TermsIdType", # required
7174
+ # user_pool_id: "UserPoolIdType", # required
7175
+ # })
7176
+ #
7177
+ # @example Response structure
7178
+ #
7179
+ # resp.terms.terms_id #=> String
7180
+ # resp.terms.user_pool_id #=> String
7181
+ # resp.terms.client_id #=> String
7182
+ # resp.terms.terms_name #=> String
7183
+ # resp.terms.terms_source #=> String, one of "LINK"
7184
+ # resp.terms.enforcement #=> String, one of "NONE"
7185
+ # resp.terms.links #=> Hash
7186
+ # resp.terms.links["LanguageIdType"] #=> String
7187
+ # resp.terms.creation_date #=> Time
7188
+ # resp.terms.last_modified_date #=> Time
7189
+ #
7190
+ # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/DescribeTerms AWS API Documentation
7191
+ #
7192
+ # @overload describe_terms(params = {})
7193
+ # @param [Hash] params ({})
7194
+ def describe_terms(params = {}, options = {})
7195
+ req = build_request(:describe_terms, params)
7196
+ req.send_request(options)
7197
+ end
7198
+
6933
7199
  # Describes a user import job. For more information about user CSV
6934
7200
  # import, see [Importing users from a CSV file][1].
6935
7201
  #
@@ -7317,10 +7583,13 @@ module Aws::CognitoIdentityProvider
7317
7583
  req.send_request(options)
7318
7584
  end
7319
7585
 
7320
- # Sends a password-reset confirmation code for the currently signed-in
7321
- # user.
7586
+ # Sends a password-reset confirmation code to the email address or phone
7587
+ # number of the requested username. The message delivery method is
7588
+ # determined by the user's available attributes and the
7589
+ # `AccountRecoverySetting` configuration of the user pool.
7322
7590
  #
7323
- # For the `Username` parameter, you can use the username or user alias.
7591
+ # For the `Username` parameter, you can use the username or an email,
7592
+ # phone, or preferred username alias.
7324
7593
  #
7325
7594
  # If neither a verified phone number nor a verified email exists, Amazon
7326
7595
  # Cognito responds with an `InvalidParameterException` error . If your
@@ -7831,7 +8100,8 @@ module Aws::CognitoIdentityProvider
7831
8100
  # @option params [required, String] :refresh_token
7832
8101
  # A valid refresh token that can authorize the request for new tokens.
7833
8102
  # When refresh token rotation is active in the requested app client,
7834
- # this token is invalidated after the request is complete.
8103
+ # this token is invalidated after the request is complete and after an
8104
+ # optional grace period.
7835
8105
  #
7836
8106
  # @option params [required, String] :client_id
7837
8107
  # The app client that issued the refresh token to the user who wants to
@@ -8449,29 +8719,42 @@ module Aws::CognitoIdentityProvider
8449
8719
  # The authentication parameters. These are inputs corresponding to the
8450
8720
  # `AuthFlow` that you're invoking.
8451
8721
  #
8452
- # The required values are specific to the InitiateAuthRequest$AuthFlow.
8453
- #
8454
8722
  # The following are some authentication flows and their parameters. Add
8455
- # a `SECRET_HASH` parameter if your app client has a client secret.
8723
+ # a `SECRET_HASH` parameter if your app client has a client secret. Add
8724
+ # `DEVICE_KEY` if you want to bypass multi-factor authentication with a
8725
+ # remembered device.
8726
+ #
8727
+ # USER\_AUTH
8728
+ # : * `USERNAME` (required)
8729
+ #
8730
+ # * `PREFERRED_CHALLENGE`. If you don't provide a value for
8731
+ # `PREFERRED_CHALLENGE`, Amazon Cognito responds with the
8732
+ # `AvailableChallenges` parameter that specifies the available
8733
+ # sign-in methods.
8734
+ #
8735
+ # USER\_SRP\_AUTH
8736
+ # : * `USERNAME` (required)
8737
+ #
8738
+ # * `SRP_A` (required)
8456
8739
  #
8457
- # * `USER_AUTH`: `USERNAME` (required), `PREFERRED_CHALLENGE`. If you
8458
- # don't provide a value for `PREFERRED_CHALLENGE`, Amazon Cognito
8459
- # responds with the `AvailableChallenges` parameter that specifies the
8460
- # available sign-in methods.
8740
+ # USER\_PASSWORD\_AUTH
8741
+ # : * `USERNAME` (required)
8461
8742
  #
8462
- # * `USER_SRP_AUTH`: `USERNAME` (required), `SRP_A` (required),
8463
- # `DEVICE_KEY`.
8743
+ # * `PASSWORD` (required)
8464
8744
  #
8465
- # * `USER_PASSWORD_AUTH`: `USERNAME` (required), `PASSWORD` (required),
8466
- # `DEVICE_KEY`.
8745
+ # REFRESH\_TOKEN\_AUTH/REFRESH\_TOKEN
8746
+ # : * `REFRESH_TOKEN`(required)
8467
8747
  #
8468
- # * `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`: `REFRESH_TOKEN` (required),
8469
- # `DEVICE_KEY`.
8748
+ # ^
8749
+ #
8750
+ # CUSTOM\_AUTH
8751
+ # : * `USERNAME` (required)
8470
8752
  #
8471
- # * `CUSTOM_AUTH`: `USERNAME` (required), `SECRET_HASH` (if app client
8472
- # is configured with client secret), `DEVICE_KEY`. To start the
8473
- # authentication flow with password verification, include
8474
- # `ChallengeName: SRP_A` and `SRP_A: (The SRP_A Value)`.
8753
+ # * `ChallengeName: SRP_A` (when doing SRP authentication before
8754
+ # custom challenges)
8755
+ #
8756
+ # * `SRP_A: (An SRP_A value)` (when doing SRP authentication before
8757
+ # custom challenges)
8475
8758
  #
8476
8759
  # For more information about `SECRET_HASH`, see [Computing secret hash
8477
8760
  # values][1]. For information about `DEVICE_KEY`, see [Working with user
@@ -8989,6 +9272,73 @@ module Aws::CognitoIdentityProvider
8989
9272
  req.send_request(options)
8990
9273
  end
8991
9274
 
9275
+ # Returns details about all terms documents for the requested user pool.
9276
+ #
9277
+ # <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
9278
+ # in requests for this API operation. For this operation, you must use
9279
+ # IAM credentials to authorize requests, and you must grant yourself the
9280
+ # corresponding IAM permission in a policy.
9281
+ #
9282
+ # **Learn more**
9283
+ #
9284
+ # * [Signing Amazon Web Services API Requests][1]
9285
+ #
9286
+ # * [Using the Amazon Cognito user pools API and user pool endpoints][2]
9287
+ #
9288
+ # </note>
9289
+ #
9290
+ #
9291
+ #
9292
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html
9293
+ # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
9294
+ #
9295
+ # @option params [required, String] :user_pool_id
9296
+ # The ID of the user pool where you want to list terms documents.
9297
+ #
9298
+ # @option params [Integer] :max_results
9299
+ # The maximum number of terms documents that you want Amazon Cognito to
9300
+ # return in the response.
9301
+ #
9302
+ # @option params [String] :next_token
9303
+ # This API operation returns a limited number of results. The pagination
9304
+ # token is an identifier that you can present in an additional API
9305
+ # request with the same parameters. When you include the pagination
9306
+ # token, Amazon Cognito returns the next set of items after the current
9307
+ # list. Subsequent requests return a new pagination token. By use of
9308
+ # this token, you can paginate through the full list of items.
9309
+ #
9310
+ # @return [Types::ListTermsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
9311
+ #
9312
+ # * {Types::ListTermsResponse#terms #terms} => Array&lt;Types::TermsDescriptionType&gt;
9313
+ # * {Types::ListTermsResponse#next_token #next_token} => String
9314
+ #
9315
+ # @example Request syntax with placeholder values
9316
+ #
9317
+ # resp = client.list_terms({
9318
+ # user_pool_id: "UserPoolIdType", # required
9319
+ # max_results: 1,
9320
+ # next_token: "StringType",
9321
+ # })
9322
+ #
9323
+ # @example Response structure
9324
+ #
9325
+ # resp.terms #=> Array
9326
+ # resp.terms[0].terms_id #=> String
9327
+ # resp.terms[0].terms_name #=> String
9328
+ # resp.terms[0].enforcement #=> String, one of "NONE"
9329
+ # resp.terms[0].creation_date #=> Time
9330
+ # resp.terms[0].last_modified_date #=> Time
9331
+ # resp.next_token #=> String
9332
+ #
9333
+ # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/ListTerms AWS API Documentation
9334
+ #
9335
+ # @overload list_terms(params = {})
9336
+ # @param [Hash] params ({})
9337
+ def list_terms(params = {}, options = {})
9338
+ req = build_request(:list_terms, params)
9339
+ req.send_request(options)
9340
+ end
9341
+
8992
9342
  # Given a user pool ID, returns user import jobs and their details.
8993
9343
  # Import jobs are retained in user pool configuration so that you can
8994
9344
  # stage, stop, start, review, and delete them. For more information
@@ -9825,41 +10175,46 @@ module Aws::CognitoIdentityProvider
9825
10175
  # Possible challenges include the following:
9826
10176
  #
9827
10177
  # <note markdown="1"> All of the following challenges require `USERNAME` and, when the app
9828
- # client has a client secret, `SECRET_HASH` in the parameters.
10178
+ # client has a client secret, `SECRET_HASH` in the parameters. Include a
10179
+ # `DEVICE_KEY` for device authentication.
9829
10180
  #
9830
10181
  # </note>
9831
10182
  #
9832
10183
  # * `WEB_AUTHN`: Respond to the challenge with the results of a
9833
- # successful authentication with a WebAuthn authenticator, or passkey.
9834
- # Examples of WebAuthn authenticators include biometric devices and
9835
- # security keys.
10184
+ # successful authentication with a WebAuthn authenticator, or passkey,
10185
+ # as `CREDENTIAL`. Examples of WebAuthn authenticators include
10186
+ # biometric devices and security keys.
9836
10187
  #
9837
- # * `PASSWORD`: Respond with `USER_PASSWORD_AUTH` parameters: `USERNAME`
9838
- # (required), `PASSWORD` (required), `SECRET_HASH` (required if the
9839
- # app client is configured with a client secret), `DEVICE_KEY`.
10188
+ # * `PASSWORD`: Respond with the user's password as `PASSWORD`.
9840
10189
  #
9841
- # * `PASSWORD_SRP`: Respond with `USER_SRP_AUTH` parameters: `USERNAME`
9842
- # (required), `SRP_A` (required), `SECRET_HASH` (required if the app
9843
- # client is configured with a client secret), `DEVICE_KEY`.
10190
+ # * `PASSWORD_SRP`: Respond with the initial SRP secret as `SRP_A`.
9844
10191
  #
9845
- # * `SELECT_CHALLENGE`: Respond to the challenge with `USERNAME` and an
9846
- # `ANSWER` that matches one of the challenge types in the
9847
- # `AvailableChallenges` response parameter.
10192
+ # * `SELECT_CHALLENGE`: Respond with a challenge selection as `ANSWER`.
10193
+ # It must be one of the challenge types in the `AvailableChallenges`
10194
+ # response parameter. Add the parameters of the selected challenge,
10195
+ # for example `USERNAME` and `SMS_OTP`.
9848
10196
  #
9849
- # * `SMS_MFA`: Respond with an `SMS_MFA_CODE` that your user pool
9850
- # delivered in an SMS message.
10197
+ # * `SMS_MFA`: Respond with the code that your user pool delivered in an
10198
+ # SMS message, as `SMS_MFA_CODE`
9851
10199
  #
9852
- # * `EMAIL_OTP`: Respond with an `EMAIL_OTP_CODE` that your user pool
9853
- # delivered in an email message.
10200
+ # * `EMAIL_MFA`: Respond with the code that your user pool delivered in
10201
+ # an email message, as `EMAIL_MFA_CODE`
9854
10202
  #
9855
- # * `PASSWORD_VERIFIER`: Respond with `PASSWORD_CLAIM_SIGNATURE`,
9856
- # `PASSWORD_CLAIM_SECRET_BLOCK`, and `TIMESTAMP` after client-side SRP
9857
- # calculations.
10203
+ # * `EMAIL_OTP`: Respond with the code that your user pool delivered in
10204
+ # an email message, as `EMAIL_OTP_CODE` .
10205
+ #
10206
+ # * `SMS_OTP`: Respond with the code that your user pool delivered in an
10207
+ # SMS message, as `SMS_OTP_CODE`.
10208
+ #
10209
+ # * `PASSWORD_VERIFIER`: Respond with the second stage of SRP secrets as
10210
+ # `PASSWORD_CLAIM_SIGNATURE`, `PASSWORD_CLAIM_SECRET_BLOCK`, and
10211
+ # `TIMESTAMP`.
9858
10212
  #
9859
10213
  # * `CUSTOM_CHALLENGE`: This is returned if your custom authentication
9860
10214
  # flow determines that the user should pass another challenge before
9861
10215
  # tokens are issued. The parameters of the challenge are determined by
9862
- # your Lambda function.
10216
+ # your Lambda function and issued in the `ChallengeParameters` of a
10217
+ # challenge response.
9863
10218
  #
9864
10219
  # * `DEVICE_SRP_AUTH`: Respond with the initial parameters of device SRP
9865
10220
  # authentication. For more information, see [Signing in with a
@@ -9964,6 +10319,23 @@ module Aws::CognitoIdentityProvider
9964
10319
  # * `"ChallengeName": "SELECT_CHALLENGE", "ChallengeResponses": {
9965
10320
  # "ANSWER": "EMAIL_OTP", "USERNAME": "[username]"}`
9966
10321
  #
10322
+ # WEB\_AUTHN
10323
+ #
10324
+ # : `"ChallengeName": "WEB_AUTHN", "ChallengeResponses": { "USERNAME":
10325
+ # "[username]", "CREDENTIAL": "[AuthenticationResponseJSON]"}`
10326
+ #
10327
+ # See [ AuthenticationResponseJSON][1].
10328
+ #
10329
+ # PASSWORD
10330
+ #
10331
+ # : `"ChallengeName": "PASSWORD", "ChallengeResponses": { "USERNAME":
10332
+ # "[username]", "PASSWORD": "[password]"}`
10333
+ #
10334
+ # PASSWORD\_SRP
10335
+ #
10336
+ # : `"ChallengeName": "PASSWORD_SRP", "ChallengeResponses": {
10337
+ # "USERNAME": "[username]", "SRP_A": "[SRP_A]"}`
10338
+ #
9967
10339
  # SMS\_OTP
9968
10340
  #
9969
10341
  # : `"ChallengeName": "SMS_OTP", "ChallengeResponses": {"SMS_OTP_CODE":
@@ -9991,15 +10363,11 @@ module Aws::CognitoIdentityProvider
9991
10363
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
9992
10364
  # [timestamp], "USERNAME": "[username]"}`
9993
10365
  #
9994
- # Add `"DEVICE_KEY"` when you sign in with a remembered device.
9995
- #
9996
10366
  # CUSTOM\_CHALLENGE
9997
10367
  #
9998
10368
  # : `"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
9999
10369
  # {"USERNAME": "[username]", "ANSWER": "[challenge_answer]"}`
10000
10370
  #
10001
- # Add `"DEVICE_KEY"` when you sign in with a remembered device.
10002
- #
10003
10371
  # NEW\_PASSWORD\_REQUIRED
10004
10372
  #
10005
10373
  # : `"ChallengeName": "NEW_PASSWORD_REQUIRED", "ChallengeResponses":
@@ -10049,8 +10417,8 @@ module Aws::CognitoIdentityProvider
10049
10417
  # SELECT\_MFA\_TYPE
10050
10418
  #
10051
10419
  # : `"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses":
10052
- # {"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
10053
- # SOFTWARE_TOKEN_MFA]"}`
10420
+ # {"USERNAME": "[username]", "ANSWER":
10421
+ # "[SMS_MFA|EMAIL_MFA|SOFTWARE_TOKEN_MFA]"}`
10054
10422
  #
10055
10423
  # For more information about `SECRET_HASH`, see [Computing secret hash
10056
10424
  # values][2]. For information about `DEVICE_KEY`, see [Working with user
@@ -11212,7 +11580,7 @@ module Aws::CognitoIdentityProvider
11212
11580
  # suspicious authentication events. Users invoke this operation when
11213
11581
  # they select the link that corresponds to `{one-click-link-valid}` or
11214
11582
  # `{one-click-link-invalid}` in your notification template. Because
11215
- # `FeedbackToken` is a required parameter, you can' make requests to
11583
+ # `FeedbackToken` is a required parameter, you can't make requests to
11216
11584
  # `UpdateAuthEventFeedback` without the contents of the notification
11217
11585
  # email message.
11218
11586
  #
@@ -11644,7 +12012,7 @@ module Aws::CognitoIdentityProvider
11644
12012
 
11645
12013
  # Configures the branding settings for a user pool style. This operation
11646
12014
  # is the programmatic option for the configuration of a style in the
11647
- # branding designer.
12015
+ # branding editor.
11648
12016
  #
11649
12017
  # Provides values for UI customization in a `Settings` JSON object and
11650
12018
  # image files in an `Assets` array.
@@ -11685,7 +12053,7 @@ module Aws::CognitoIdentityProvider
11685
12053
  # @option params [Boolean] :use_cognito_provided_values
11686
12054
  # When `true`, applies the default branding style options. This option
11687
12055
  # reverts to default style options that are managed by Amazon Cognito.
11688
- # You can modify them later in the branding designer.
12056
+ # You can modify them later in the branding editor.
11689
12057
  #
11690
12058
  # When you specify `true` for this option, you must also omit values for
11691
12059
  # `Settings` and `Assets` in the request.
@@ -11694,11 +12062,27 @@ module Aws::CognitoIdentityProvider
11694
12062
  # A JSON file, encoded as a `Document` type, with the the settings that
11695
12063
  # you want to apply to your style.
11696
12064
  #
12065
+ # The following components are not currently implemented and reserved
12066
+ # for future use:
12067
+ #
12068
+ # * `signUp`
12069
+ #
12070
+ # * `instructions`
12071
+ #
12072
+ # * `sessionTimerDisplay`
12073
+ #
12074
+ # * `languageSelector` (for localization, see [Managed login
12075
+ # localization)][1]
12076
+ #
11697
12077
  # Document type used to carry open content
11698
12078
  # (Hash,Array,String,Numeric,Boolean). A document type value is
11699
12079
  # serialized using the same format as its surroundings and requires no
11700
12080
  # additional encoding or escaping.
11701
12081
  #
12082
+ #
12083
+ #
12084
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-localization
12085
+ #
11702
12086
  # @option params [Array<Types::AssetType>] :assets
11703
12087
  # An array of image files that you want to apply to roles like
11704
12088
  # backgrounds, logos, and icons. Each object must also indicate whether
@@ -11833,6 +12217,109 @@ module Aws::CognitoIdentityProvider
11833
12217
  req.send_request(options)
11834
12218
  end
11835
12219
 
12220
+ # Modifies existing terms documents for the requested app client. When
12221
+ # Terms and conditions and Privacy policy documents are configured, the
12222
+ # app client displays links to them in the sign-up page of managed login
12223
+ # for the app client.
12224
+ #
12225
+ # You can provide URLs for terms documents in the languages that are
12226
+ # supported by [managed login localization][1]. Amazon Cognito directs
12227
+ # users to the terms documents for their current language, with fallback
12228
+ # to `default` if no document exists for the language.
12229
+ #
12230
+ # Each request accepts one type of terms document and a map of
12231
+ # language-to-link for that document type. You must provide both types
12232
+ # of terms documents in at least one language before Amazon Cognito
12233
+ # displays your terms documents. Supply each type in separate requests.
12234
+ #
12235
+ # For more information, see [Terms documents][2].
12236
+ #
12237
+ # <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
12238
+ # in requests for this API operation. For this operation, you must use
12239
+ # IAM credentials to authorize requests, and you must grant yourself the
12240
+ # corresponding IAM permission in a policy.
12241
+ #
12242
+ # **Learn more**
12243
+ #
12244
+ # * [Signing Amazon Web Services API Requests][3]
12245
+ #
12246
+ # * [Using the Amazon Cognito user pools API and user pool endpoints][4]
12247
+ #
12248
+ # </note>
12249
+ #
12250
+ #
12251
+ #
12252
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-localization
12253
+ # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-terms-documents
12254
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html
12255
+ # [4]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
12256
+ #
12257
+ # @option params [required, String] :terms_id
12258
+ # The ID of the terms document that you want to update.
12259
+ #
12260
+ # @option params [required, String] :user_pool_id
12261
+ # The ID of the user pool that contains the terms that you want to
12262
+ # update.
12263
+ #
12264
+ # @option params [String] :terms_name
12265
+ # The new name that you want to apply to the requested terms documents.
12266
+ #
12267
+ # @option params [String] :terms_source
12268
+ # This parameter is reserved for future use and currently accepts only
12269
+ # one value.
12270
+ #
12271
+ # @option params [String] :enforcement
12272
+ # This parameter is reserved for future use and currently accepts only
12273
+ # one value.
12274
+ #
12275
+ # @option params [Hash<String,String>] :links
12276
+ # A map of URLs to languages. For each localized language that will view
12277
+ # the requested `TermsName`, assign a URL. A selection of
12278
+ # `cognito:default` displays for all languages that don't have a
12279
+ # language-specific URL.
12280
+ #
12281
+ # For example, `"cognito:default": "https://terms.example.com",
12282
+ # "cognito:spanish": "https://terms.example.com/es"`.
12283
+ #
12284
+ # @return [Types::UpdateTermsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
12285
+ #
12286
+ # * {Types::UpdateTermsResponse#terms #terms} => Types::TermsType
12287
+ #
12288
+ # @example Request syntax with placeholder values
12289
+ #
12290
+ # resp = client.update_terms({
12291
+ # terms_id: "TermsIdType", # required
12292
+ # user_pool_id: "UserPoolIdType", # required
12293
+ # terms_name: "TermsNameType",
12294
+ # terms_source: "LINK", # accepts LINK
12295
+ # enforcement: "NONE", # accepts NONE
12296
+ # links: {
12297
+ # "LanguageIdType" => "LinkUrlType",
12298
+ # },
12299
+ # })
12300
+ #
12301
+ # @example Response structure
12302
+ #
12303
+ # resp.terms.terms_id #=> String
12304
+ # resp.terms.user_pool_id #=> String
12305
+ # resp.terms.client_id #=> String
12306
+ # resp.terms.terms_name #=> String
12307
+ # resp.terms.terms_source #=> String, one of "LINK"
12308
+ # resp.terms.enforcement #=> String, one of "NONE"
12309
+ # resp.terms.links #=> Hash
12310
+ # resp.terms.links["LanguageIdType"] #=> String
12311
+ # resp.terms.creation_date #=> Time
12312
+ # resp.terms.last_modified_date #=> Time
12313
+ #
12314
+ # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/UpdateTerms AWS API Documentation
12315
+ #
12316
+ # @overload update_terms(params = {})
12317
+ # @param [Hash] params ({})
12318
+ def update_terms(params = {}, options = {})
12319
+ req = build_request(:update_terms, params)
12320
+ req.send_request(options)
12321
+ end
12322
+
11836
12323
  # Updates the currently signed-in user's attributes. To delete an
11837
12324
  # attribute from the user, submit the attribute in your API request with
11838
12325
  # a blank value.
@@ -12841,7 +13328,7 @@ module Aws::CognitoIdentityProvider
12841
13328
  # @option params [Integer] :managed_login_version
12842
13329
  # A version number that indicates the state of managed login for your
12843
13330
  # domain. Version `1` is hosted UI (classic). Version `2` is the newer
12844
- # managed login with the branding designer. For more information, see
13331
+ # managed login with the branding editor. For more information, see
12845
13332
  # [Managed login][1].
12846
13333
  #
12847
13334
  #
@@ -13025,7 +13512,7 @@ module Aws::CognitoIdentityProvider
13025
13512
  tracer: tracer
13026
13513
  )
13027
13514
  context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
13028
- context[:gem_version] = '1.127.0'
13515
+ context[:gem_version] = '1.128.0'
13029
13516
  Seahorse::Client::Request.new(handlers, context)
13030
13517
  end
13031
13518