aws-sdk-cognitoidentityprovider 1.50.0 → 1.51.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2a2ad06d5689bad34d9a5f7ff0e885838ea1cf89e5cbfe396818ca00712074cd
4
- data.tar.gz: ee20b6499bd2880d2db93ad9f32878a10d9161ee2463b15cdd152262c3e6ce12
3
+ metadata.gz: 6d3d64050f79e1fcb7d4883eca09cc07d23444b08f7c9d761904372451c9cebb
4
+ data.tar.gz: bd98c31f566339d42c190942a3ebeea3411b1c4351bb375b446a8efcc9474d07
5
5
  SHA512:
6
- metadata.gz: 8f19c84d71d568deedb942a51d791d0e90cfe0edf50e3d9cb8bdbe6dcc24339132afff2b8f0183e0dc41cc90272fd7ff9dc76493becf42e95b6eca99b18fcf3f
7
- data.tar.gz: 61f84679de160e86a4bf502543d866cab182a660dc5d55517de61c1f31280a38399df959fb5be7d991f87836519bd075c185377b87248e7e12a6e74a79b9bbfb
6
+ metadata.gz: e9f46f53363bea3ec058191702966534af925eb4e20d23f5f8689abf95b1ff58f8f5d55be5358919715d43a7f336dbac28b47981cbd5b8db857921c443303164
7
+ data.tar.gz: e5275ea362c4655546c887233ef8b5494f1e474903a769539b7b4f86a4ea97d76fa95bd287eb6df64d24921cc685d7f7f2e665be95619be61741ac7828b24e6e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.51.0 (2021-04-22)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for cognito-idp
8
+
4
9
  1.50.0 (2021-03-10)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.50.0
1
+ 1.51.0
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-cognitoidentityprovider/customizations'
48
48
  # @!group service
49
49
  module Aws::CognitoIdentityProvider
50
50
 
51
- GEM_VERSION = '1.50.0'
51
+ GEM_VERSION = '1.51.0'
52
52
 
53
53
  end
@@ -1629,6 +1629,9 @@ module Aws::CognitoIdentityProvider
1629
1629
  # attributes, `USERNAME`, `SECRET_HASH` (if app client is configured
1630
1630
  # with client secret).
1631
1631
  #
1632
+ # * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
1633
+ # value returned by `VerifySoftwareToken` in the `Session` parameter.
1634
+ #
1632
1635
  # The value of the `USERNAME` attribute must be the user's actual
1633
1636
  # username, not an alias (such as email address or phone number). To
1634
1637
  # make this easier, the `AdminInitiateAuth` response includes the actual
@@ -3346,7 +3349,7 @@ module Aws::CognitoIdentityProvider
3346
3349
  req.send_request(options)
3347
3350
  end
3348
3351
 
3349
- # Deletes a group. Currently only groups with no members can be deleted.
3352
+ # Deletes a group.
3350
3353
  #
3351
3354
  # Calling this action requires developer credentials.
3352
3355
  #
@@ -5366,6 +5369,9 @@ module Aws::CognitoIdentityProvider
5366
5369
  # * `DEVICE_PASSWORD_VERIFIER` requires everything that
5367
5370
  # `PASSWORD_VERIFIER` requires plus `DEVICE_KEY`.
5368
5371
  #
5372
+ # * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
5373
+ # value returned by `VerifySoftwareToken` in the `Session` parameter.
5374
+ #
5369
5375
  # @option params [Types::AnalyticsMetadataType] :analytics_metadata
5370
5376
  # The Amazon Pinpoint analytics metadata for collecting metrics for
5371
5377
  # `RespondToAuthChallenge` calls.
@@ -5708,7 +5714,11 @@ module Aws::CognitoIdentityProvider
5708
5714
  # The software token MFA configuration.
5709
5715
  #
5710
5716
  # @option params [String] :mfa_configuration
5711
- # The MFA configuration. Valid values include:
5717
+ # The MFA configuration. Users who don't have an MFA factor set up
5718
+ # won't be able to sign-in if you set the MfaConfiguration value to
5719
+ # ‘ON’. See [Adding Multi-Factor Authentication (MFA) to a User
5720
+ # Pool](cognito/latest/developerguide/user-pool-settings-mfa.html) to
5721
+ # learn more. Valid values include:
5712
5722
  #
5713
5723
  # * `OFF` MFA will not be used for any users.
5714
5724
  #
@@ -6461,11 +6471,17 @@ module Aws::CognitoIdentityProvider
6461
6471
  # user registration.
6462
6472
  #
6463
6473
  # * `ON` - MFA tokens are required for all user registrations. You can
6464
- # only specify required when you are initially creating a user pool.
6474
+ # only specify ON when you are initially creating a user pool. You can
6475
+ # use the [SetUserPoolMfaConfig][1] API operation to turn MFA "ON"
6476
+ # for existing user pools.
6465
6477
  #
6466
6478
  # * `OPTIONAL` - Users have the option when registering to create an MFA
6467
6479
  # token.
6468
6480
  #
6481
+ #
6482
+ #
6483
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_SetUserPoolMfaConfig.html
6484
+ #
6469
6485
  # @option params [Types::DeviceConfigurationType] :device_configuration
6470
6486
  # Device configuration.
6471
6487
  #
@@ -7032,7 +7048,7 @@ module Aws::CognitoIdentityProvider
7032
7048
  params: params,
7033
7049
  config: config)
7034
7050
  context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
7035
- context[:gem_version] = '1.50.0'
7051
+ context[:gem_version] = '1.51.0'
7036
7052
  Seahorse::Client::Request.new(handlers, context)
7037
7053
  end
7038
7054
 
@@ -2,7 +2,7 @@
2
2
  # WARNING ABOUT GENERATED CODE
3
3
  #
4
4
  # This file is generated. See the contributing for info on making contributions:
5
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
5
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
6
6
  #
7
7
  # WARNING ABOUT GENERATED CODE
8
8
 
@@ -705,7 +705,7 @@ module Aws::CognitoIdentityProvider
705
705
  #
706
706
  class AdminDisableProviderForUserResponse < Aws::EmptyStructure; end
707
707
 
708
- # Represents the request to disable any user as an administrator.
708
+ # Represents the request to disable the user as an administrator.
709
709
  #
710
710
  # @note When making an API call, you may pass AdminDisableUserRequest
711
711
  # data as a hash:
@@ -1191,10 +1191,22 @@ module Aws::CognitoIdentityProvider
1191
1191
  # with `USERNAME` and `PASSWORD` directly. An app client must be
1192
1192
  # enabled to use this flow.
1193
1193
  #
1194
- # * `NEW_PASSWORD_REQUIRED`\: For users which are required to change
1194
+ # * `NEW_PASSWORD_REQUIRED`\: For users who are required to change
1195
1195
  # their passwords after successful first login. This challenge
1196
1196
  # should be passed with `NEW_PASSWORD` and any other required
1197
1197
  # attributes.
1198
+ #
1199
+ # * `MFA_SETUP`\: For users who are required to setup an MFA factor
1200
+ # before they can sign-in. The MFA types enabled for the user pool
1201
+ # will be listed in the challenge parameters `MFA_CAN_SETUP` value.
1202
+ #
1203
+ # To setup software token MFA, use the session returned here from
1204
+ # `InitiateAuth` as an input to `AssociateSoftwareToken`, and use
1205
+ # the session returned by `VerifySoftwareToken` as an input to
1206
+ # `RespondToAuthChallenge` with challenge name `MFA_SETUP` to
1207
+ # complete sign-in. To setup SMS MFA, users will need help from an
1208
+ # administrator to add a phone number to their account and then call
1209
+ # `InitiateAuth` again to restart sign-in.
1198
1210
  # @return [String]
1199
1211
  #
1200
1212
  # @!attribute [rw] session
@@ -1671,6 +1683,10 @@ module Aws::CognitoIdentityProvider
1671
1683
  # attributes, `USERNAME`, `SECRET_HASH` (if app client is configured
1672
1684
  # with client secret).
1673
1685
  #
1686
+ # * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
1687
+ # value returned by `VerifySoftwareToken` in the `Session`
1688
+ # parameter.
1689
+ #
1674
1690
  # The value of the `USERNAME` attribute must be the user's actual
1675
1691
  # username, not an alias (such as email address or phone number). To
1676
1692
  # make this easier, the `AdminInitiateAuth` response includes the
@@ -5889,10 +5905,22 @@ module Aws::CognitoIdentityProvider
5889
5905
  # * `DEVICE_PASSWORD_VERIFIER`\: Similar to `PASSWORD_VERIFIER`, but
5890
5906
  # for devices only.
5891
5907
  #
5892
- # * `NEW_PASSWORD_REQUIRED`\: For users which are required to change
5908
+ # * `NEW_PASSWORD_REQUIRED`\: For users who are required to change
5893
5909
  # their passwords after successful first login. This challenge
5894
5910
  # should be passed with `NEW_PASSWORD` and any other required
5895
5911
  # attributes.
5912
+ #
5913
+ # * `MFA_SETUP`\: For users who are required to setup an MFA factor
5914
+ # before they can sign-in. The MFA types enabled for the user pool
5915
+ # will be listed in the challenge parameters `MFA_CAN_SETUP` value.
5916
+ #
5917
+ # To setup software token MFA, use the session returned here from
5918
+ # `InitiateAuth` as an input to `AssociateSoftwareToken`, and use
5919
+ # the session returned by `VerifySoftwareToken` as an input to
5920
+ # `RespondToAuthChallenge` with challenge name `MFA_SETUP` to
5921
+ # complete sign-in. To setup SMS MFA, users will need help from an
5922
+ # administrator to add a phone number to their account and then call
5923
+ # `InitiateAuth` again to restart sign-in.
5896
5924
  # @return [String]
5897
5925
  #
5898
5926
  # @!attribute [rw] session
@@ -7467,6 +7495,10 @@ module Aws::CognitoIdentityProvider
7467
7495
  #
7468
7496
  # * `DEVICE_PASSWORD_VERIFIER` requires everything that
7469
7497
  # `PASSWORD_VERIFIER` requires plus `DEVICE_KEY`.
7498
+ #
7499
+ # * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
7500
+ # value returned by `VerifySoftwareToken` in the `Session`
7501
+ # parameter.
7470
7502
  # @return [Hash<String,String>]
7471
7503
  #
7472
7504
  # @!attribute [rw] analytics_metadata
@@ -8017,7 +8049,11 @@ module Aws::CognitoIdentityProvider
8017
8049
  # @return [Types::SoftwareTokenMfaConfigType]
8018
8050
  #
8019
8051
  # @!attribute [rw] mfa_configuration
8020
- # The MFA configuration. Valid values include:
8052
+ # The MFA configuration. Users who don't have an MFA factor set up
8053
+ # won't be able to sign-in if you set the MfaConfiguration value to
8054
+ # ‘ON’. See [Adding Multi-Factor Authentication (MFA) to a User
8055
+ # Pool](cognito/latest/developerguide/user-pool-settings-mfa.html) to
8056
+ # learn more. Valid values include:
8021
8057
  #
8022
8058
  # * `OFF` MFA will not be used for any users.
8023
8059
  #
@@ -8297,6 +8333,14 @@ module Aws::CognitoIdentityProvider
8297
8333
  # role for SMS MFA, Cognito will create a role with the required
8298
8334
  # permissions and a trust policy that demonstrates use of the
8299
8335
  # `ExternalId`.
8336
+ #
8337
+ # For more information about the `ExternalId` of a role, see [How to
8338
+ # use an external ID when granting access to your AWS resources to a
8339
+ # third party][1]
8340
+ #
8341
+ #
8342
+ #
8343
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html
8300
8344
  # @return [String]
8301
8345
  #
8302
8346
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SmsConfigurationType AWS API Documentation
@@ -9564,10 +9608,16 @@ module Aws::CognitoIdentityProvider
9564
9608
  # user registration.
9565
9609
  #
9566
9610
  # * `ON` - MFA tokens are required for all user registrations. You can
9567
- # only specify required when you are initially creating a user pool.
9611
+ # only specify ON when you are initially creating a user pool. You
9612
+ # can use the [SetUserPoolMfaConfig][1] API operation to turn MFA
9613
+ # "ON" for existing user pools.
9568
9614
  #
9569
9615
  # * `OPTIONAL` - Users have the option when registering to create an
9570
9616
  # MFA token.
9617
+ #
9618
+ #
9619
+ #
9620
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_SetUserPoolMfaConfig.html
9571
9621
  # @return [String]
9572
9622
  #
9573
9623
  # @!attribute [rw] device_configuration
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cognitoidentityprovider
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.50.0
4
+ version: 1.51.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-03-10 00:00:00.000000000 Z
11
+ date: 2021-04-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -66,8 +66,8 @@ homepage: https://github.com/aws/aws-sdk-ruby
66
66
  licenses:
67
67
  - Apache-2.0
68
68
  metadata:
69
- source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/master/gems/aws-sdk-cognitoidentityprovider
70
- changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/master/gems/aws-sdk-cognitoidentityprovider/CHANGELOG.md
69
+ source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-cognitoidentityprovider
70
+ changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-cognitoidentityprovider/CHANGELOG.md
71
71
  post_install_message:
72
72
  rdoc_options: []
73
73
  require_paths:
@@ -84,7 +84,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
84
84
  version: '0'
85
85
  requirements: []
86
86
  rubyforge_project:
87
- rubygems_version: 2.7.6.2
87
+ rubygems_version: 2.7.6.3
88
88
  signing_key:
89
89
  specification_version: 4
90
90
  summary: AWS SDK for Ruby - Amazon Cognito Identity Provider