aws-sdk-cognitoidentityprovider 1.50.0 → 1.51.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cognitoidentityprovider.rb +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/client.rb +20 -4
- data/lib/aws-sdk-cognitoidentityprovider/customizations.rb +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/types.rb +55 -5
- metadata +5 -5
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6d3d64050f79e1fcb7d4883eca09cc07d23444b08f7c9d761904372451c9cebb
|
4
|
+
data.tar.gz: bd98c31f566339d42c190942a3ebeea3411b1c4351bb375b446a8efcc9474d07
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: e9f46f53363bea3ec058191702966534af925eb4e20d23f5f8689abf95b1ff58f8f5d55be5358919715d43a7f336dbac28b47981cbd5b8db857921c443303164
|
7
|
+
data.tar.gz: e5275ea362c4655546c887233ef8b5494f1e474903a769539b7b4f86a4ea97d76fa95bd287eb6df64d24921cc685d7f7f2e665be95619be61741ac7828b24e6e
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.51.0
|
@@ -1629,6 +1629,9 @@ module Aws::CognitoIdentityProvider
|
|
1629
1629
|
# attributes, `USERNAME`, `SECRET_HASH` (if app client is configured
|
1630
1630
|
# with client secret).
|
1631
1631
|
#
|
1632
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
1633
|
+
# value returned by `VerifySoftwareToken` in the `Session` parameter.
|
1634
|
+
#
|
1632
1635
|
# The value of the `USERNAME` attribute must be the user's actual
|
1633
1636
|
# username, not an alias (such as email address or phone number). To
|
1634
1637
|
# make this easier, the `AdminInitiateAuth` response includes the actual
|
@@ -3346,7 +3349,7 @@ module Aws::CognitoIdentityProvider
|
|
3346
3349
|
req.send_request(options)
|
3347
3350
|
end
|
3348
3351
|
|
3349
|
-
# Deletes a group.
|
3352
|
+
# Deletes a group.
|
3350
3353
|
#
|
3351
3354
|
# Calling this action requires developer credentials.
|
3352
3355
|
#
|
@@ -5366,6 +5369,9 @@ module Aws::CognitoIdentityProvider
|
|
5366
5369
|
# * `DEVICE_PASSWORD_VERIFIER` requires everything that
|
5367
5370
|
# `PASSWORD_VERIFIER` requires plus `DEVICE_KEY`.
|
5368
5371
|
#
|
5372
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
5373
|
+
# value returned by `VerifySoftwareToken` in the `Session` parameter.
|
5374
|
+
#
|
5369
5375
|
# @option params [Types::AnalyticsMetadataType] :analytics_metadata
|
5370
5376
|
# The Amazon Pinpoint analytics metadata for collecting metrics for
|
5371
5377
|
# `RespondToAuthChallenge` calls.
|
@@ -5708,7 +5714,11 @@ module Aws::CognitoIdentityProvider
|
|
5708
5714
|
# The software token MFA configuration.
|
5709
5715
|
#
|
5710
5716
|
# @option params [String] :mfa_configuration
|
5711
|
-
# The MFA configuration.
|
5717
|
+
# The MFA configuration. Users who don't have an MFA factor set up
|
5718
|
+
# won't be able to sign-in if you set the MfaConfiguration value to
|
5719
|
+
# ‘ON’. See [Adding Multi-Factor Authentication (MFA) to a User
|
5720
|
+
# Pool](cognito/latest/developerguide/user-pool-settings-mfa.html) to
|
5721
|
+
# learn more. Valid values include:
|
5712
5722
|
#
|
5713
5723
|
# * `OFF` MFA will not be used for any users.
|
5714
5724
|
#
|
@@ -6461,11 +6471,17 @@ module Aws::CognitoIdentityProvider
|
|
6461
6471
|
# user registration.
|
6462
6472
|
#
|
6463
6473
|
# * `ON` - MFA tokens are required for all user registrations. You can
|
6464
|
-
# only specify
|
6474
|
+
# only specify ON when you are initially creating a user pool. You can
|
6475
|
+
# use the [SetUserPoolMfaConfig][1] API operation to turn MFA "ON"
|
6476
|
+
# for existing user pools.
|
6465
6477
|
#
|
6466
6478
|
# * `OPTIONAL` - Users have the option when registering to create an MFA
|
6467
6479
|
# token.
|
6468
6480
|
#
|
6481
|
+
#
|
6482
|
+
#
|
6483
|
+
# [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_SetUserPoolMfaConfig.html
|
6484
|
+
#
|
6469
6485
|
# @option params [Types::DeviceConfigurationType] :device_configuration
|
6470
6486
|
# Device configuration.
|
6471
6487
|
#
|
@@ -7032,7 +7048,7 @@ module Aws::CognitoIdentityProvider
|
|
7032
7048
|
params: params,
|
7033
7049
|
config: config)
|
7034
7050
|
context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
|
7035
|
-
context[:gem_version] = '1.
|
7051
|
+
context[:gem_version] = '1.51.0'
|
7036
7052
|
Seahorse::Client::Request.new(handlers, context)
|
7037
7053
|
end
|
7038
7054
|
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# WARNING ABOUT GENERATED CODE
|
3
3
|
#
|
4
4
|
# This file is generated. See the contributing for info on making contributions:
|
5
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
5
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
6
6
|
#
|
7
7
|
# WARNING ABOUT GENERATED CODE
|
8
8
|
|
@@ -705,7 +705,7 @@ module Aws::CognitoIdentityProvider
|
|
705
705
|
#
|
706
706
|
class AdminDisableProviderForUserResponse < Aws::EmptyStructure; end
|
707
707
|
|
708
|
-
# Represents the request to disable
|
708
|
+
# Represents the request to disable the user as an administrator.
|
709
709
|
#
|
710
710
|
# @note When making an API call, you may pass AdminDisableUserRequest
|
711
711
|
# data as a hash:
|
@@ -1191,10 +1191,22 @@ module Aws::CognitoIdentityProvider
|
|
1191
1191
|
# with `USERNAME` and `PASSWORD` directly. An app client must be
|
1192
1192
|
# enabled to use this flow.
|
1193
1193
|
#
|
1194
|
-
# * `NEW_PASSWORD_REQUIRED`\: For users
|
1194
|
+
# * `NEW_PASSWORD_REQUIRED`\: For users who are required to change
|
1195
1195
|
# their passwords after successful first login. This challenge
|
1196
1196
|
# should be passed with `NEW_PASSWORD` and any other required
|
1197
1197
|
# attributes.
|
1198
|
+
#
|
1199
|
+
# * `MFA_SETUP`\: For users who are required to setup an MFA factor
|
1200
|
+
# before they can sign-in. The MFA types enabled for the user pool
|
1201
|
+
# will be listed in the challenge parameters `MFA_CAN_SETUP` value.
|
1202
|
+
#
|
1203
|
+
# To setup software token MFA, use the session returned here from
|
1204
|
+
# `InitiateAuth` as an input to `AssociateSoftwareToken`, and use
|
1205
|
+
# the session returned by `VerifySoftwareToken` as an input to
|
1206
|
+
# `RespondToAuthChallenge` with challenge name `MFA_SETUP` to
|
1207
|
+
# complete sign-in. To setup SMS MFA, users will need help from an
|
1208
|
+
# administrator to add a phone number to their account and then call
|
1209
|
+
# `InitiateAuth` again to restart sign-in.
|
1198
1210
|
# @return [String]
|
1199
1211
|
#
|
1200
1212
|
# @!attribute [rw] session
|
@@ -1671,6 +1683,10 @@ module Aws::CognitoIdentityProvider
|
|
1671
1683
|
# attributes, `USERNAME`, `SECRET_HASH` (if app client is configured
|
1672
1684
|
# with client secret).
|
1673
1685
|
#
|
1686
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
1687
|
+
# value returned by `VerifySoftwareToken` in the `Session`
|
1688
|
+
# parameter.
|
1689
|
+
#
|
1674
1690
|
# The value of the `USERNAME` attribute must be the user's actual
|
1675
1691
|
# username, not an alias (such as email address or phone number). To
|
1676
1692
|
# make this easier, the `AdminInitiateAuth` response includes the
|
@@ -5889,10 +5905,22 @@ module Aws::CognitoIdentityProvider
|
|
5889
5905
|
# * `DEVICE_PASSWORD_VERIFIER`\: Similar to `PASSWORD_VERIFIER`, but
|
5890
5906
|
# for devices only.
|
5891
5907
|
#
|
5892
|
-
# * `NEW_PASSWORD_REQUIRED`\: For users
|
5908
|
+
# * `NEW_PASSWORD_REQUIRED`\: For users who are required to change
|
5893
5909
|
# their passwords after successful first login. This challenge
|
5894
5910
|
# should be passed with `NEW_PASSWORD` and any other required
|
5895
5911
|
# attributes.
|
5912
|
+
#
|
5913
|
+
# * `MFA_SETUP`\: For users who are required to setup an MFA factor
|
5914
|
+
# before they can sign-in. The MFA types enabled for the user pool
|
5915
|
+
# will be listed in the challenge parameters `MFA_CAN_SETUP` value.
|
5916
|
+
#
|
5917
|
+
# To setup software token MFA, use the session returned here from
|
5918
|
+
# `InitiateAuth` as an input to `AssociateSoftwareToken`, and use
|
5919
|
+
# the session returned by `VerifySoftwareToken` as an input to
|
5920
|
+
# `RespondToAuthChallenge` with challenge name `MFA_SETUP` to
|
5921
|
+
# complete sign-in. To setup SMS MFA, users will need help from an
|
5922
|
+
# administrator to add a phone number to their account and then call
|
5923
|
+
# `InitiateAuth` again to restart sign-in.
|
5896
5924
|
# @return [String]
|
5897
5925
|
#
|
5898
5926
|
# @!attribute [rw] session
|
@@ -7467,6 +7495,10 @@ module Aws::CognitoIdentityProvider
|
|
7467
7495
|
#
|
7468
7496
|
# * `DEVICE_PASSWORD_VERIFIER` requires everything that
|
7469
7497
|
# `PASSWORD_VERIFIER` requires plus `DEVICE_KEY`.
|
7498
|
+
#
|
7499
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
7500
|
+
# value returned by `VerifySoftwareToken` in the `Session`
|
7501
|
+
# parameter.
|
7470
7502
|
# @return [Hash<String,String>]
|
7471
7503
|
#
|
7472
7504
|
# @!attribute [rw] analytics_metadata
|
@@ -8017,7 +8049,11 @@ module Aws::CognitoIdentityProvider
|
|
8017
8049
|
# @return [Types::SoftwareTokenMfaConfigType]
|
8018
8050
|
#
|
8019
8051
|
# @!attribute [rw] mfa_configuration
|
8020
|
-
# The MFA configuration.
|
8052
|
+
# The MFA configuration. Users who don't have an MFA factor set up
|
8053
|
+
# won't be able to sign-in if you set the MfaConfiguration value to
|
8054
|
+
# ‘ON’. See [Adding Multi-Factor Authentication (MFA) to a User
|
8055
|
+
# Pool](cognito/latest/developerguide/user-pool-settings-mfa.html) to
|
8056
|
+
# learn more. Valid values include:
|
8021
8057
|
#
|
8022
8058
|
# * `OFF` MFA will not be used for any users.
|
8023
8059
|
#
|
@@ -8297,6 +8333,14 @@ module Aws::CognitoIdentityProvider
|
|
8297
8333
|
# role for SMS MFA, Cognito will create a role with the required
|
8298
8334
|
# permissions and a trust policy that demonstrates use of the
|
8299
8335
|
# `ExternalId`.
|
8336
|
+
#
|
8337
|
+
# For more information about the `ExternalId` of a role, see [How to
|
8338
|
+
# use an external ID when granting access to your AWS resources to a
|
8339
|
+
# third party][1]
|
8340
|
+
#
|
8341
|
+
#
|
8342
|
+
#
|
8343
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html
|
8300
8344
|
# @return [String]
|
8301
8345
|
#
|
8302
8346
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SmsConfigurationType AWS API Documentation
|
@@ -9564,10 +9608,16 @@ module Aws::CognitoIdentityProvider
|
|
9564
9608
|
# user registration.
|
9565
9609
|
#
|
9566
9610
|
# * `ON` - MFA tokens are required for all user registrations. You can
|
9567
|
-
# only specify
|
9611
|
+
# only specify ON when you are initially creating a user pool. You
|
9612
|
+
# can use the [SetUserPoolMfaConfig][1] API operation to turn MFA
|
9613
|
+
# "ON" for existing user pools.
|
9568
9614
|
#
|
9569
9615
|
# * `OPTIONAL` - Users have the option when registering to create an
|
9570
9616
|
# MFA token.
|
9617
|
+
#
|
9618
|
+
#
|
9619
|
+
#
|
9620
|
+
# [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_SetUserPoolMfaConfig.html
|
9571
9621
|
# @return [String]
|
9572
9622
|
#
|
9573
9623
|
# @!attribute [rw] device_configuration
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-cognitoidentityprovider
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.51.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-04-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -66,8 +66,8 @@ homepage: https://github.com/aws/aws-sdk-ruby
|
|
66
66
|
licenses:
|
67
67
|
- Apache-2.0
|
68
68
|
metadata:
|
69
|
-
source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/
|
70
|
-
changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/
|
69
|
+
source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-cognitoidentityprovider
|
70
|
+
changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-cognitoidentityprovider/CHANGELOG.md
|
71
71
|
post_install_message:
|
72
72
|
rdoc_options: []
|
73
73
|
require_paths:
|
@@ -84,7 +84,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
84
84
|
version: '0'
|
85
85
|
requirements: []
|
86
86
|
rubyforge_project:
|
87
|
-
rubygems_version: 2.7.6.
|
87
|
+
rubygems_version: 2.7.6.3
|
88
88
|
signing_key:
|
89
89
|
specification_version: 4
|
90
90
|
summary: AWS SDK for Ruby - Amazon Cognito Identity Provider
|