aws-sdk-cognitoidentityprovider 1.50.0 → 1.51.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cognitoidentityprovider.rb +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/client.rb +20 -4
- data/lib/aws-sdk-cognitoidentityprovider/customizations.rb +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/types.rb +55 -5
- metadata +5 -5
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6d3d64050f79e1fcb7d4883eca09cc07d23444b08f7c9d761904372451c9cebb
|
4
|
+
data.tar.gz: bd98c31f566339d42c190942a3ebeea3411b1c4351bb375b446a8efcc9474d07
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: e9f46f53363bea3ec058191702966534af925eb4e20d23f5f8689abf95b1ff58f8f5d55be5358919715d43a7f336dbac28b47981cbd5b8db857921c443303164
|
7
|
+
data.tar.gz: e5275ea362c4655546c887233ef8b5494f1e474903a769539b7b4f86a4ea97d76fa95bd287eb6df64d24921cc685d7f7f2e665be95619be61741ac7828b24e6e
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.51.0
|
@@ -1629,6 +1629,9 @@ module Aws::CognitoIdentityProvider
|
|
1629
1629
|
# attributes, `USERNAME`, `SECRET_HASH` (if app client is configured
|
1630
1630
|
# with client secret).
|
1631
1631
|
#
|
1632
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
1633
|
+
# value returned by `VerifySoftwareToken` in the `Session` parameter.
|
1634
|
+
#
|
1632
1635
|
# The value of the `USERNAME` attribute must be the user's actual
|
1633
1636
|
# username, not an alias (such as email address or phone number). To
|
1634
1637
|
# make this easier, the `AdminInitiateAuth` response includes the actual
|
@@ -3346,7 +3349,7 @@ module Aws::CognitoIdentityProvider
|
|
3346
3349
|
req.send_request(options)
|
3347
3350
|
end
|
3348
3351
|
|
3349
|
-
# Deletes a group.
|
3352
|
+
# Deletes a group.
|
3350
3353
|
#
|
3351
3354
|
# Calling this action requires developer credentials.
|
3352
3355
|
#
|
@@ -5366,6 +5369,9 @@ module Aws::CognitoIdentityProvider
|
|
5366
5369
|
# * `DEVICE_PASSWORD_VERIFIER` requires everything that
|
5367
5370
|
# `PASSWORD_VERIFIER` requires plus `DEVICE_KEY`.
|
5368
5371
|
#
|
5372
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
5373
|
+
# value returned by `VerifySoftwareToken` in the `Session` parameter.
|
5374
|
+
#
|
5369
5375
|
# @option params [Types::AnalyticsMetadataType] :analytics_metadata
|
5370
5376
|
# The Amazon Pinpoint analytics metadata for collecting metrics for
|
5371
5377
|
# `RespondToAuthChallenge` calls.
|
@@ -5708,7 +5714,11 @@ module Aws::CognitoIdentityProvider
|
|
5708
5714
|
# The software token MFA configuration.
|
5709
5715
|
#
|
5710
5716
|
# @option params [String] :mfa_configuration
|
5711
|
-
# The MFA configuration.
|
5717
|
+
# The MFA configuration. Users who don't have an MFA factor set up
|
5718
|
+
# won't be able to sign-in if you set the MfaConfiguration value to
|
5719
|
+
# ‘ON’. See [Adding Multi-Factor Authentication (MFA) to a User
|
5720
|
+
# Pool](cognito/latest/developerguide/user-pool-settings-mfa.html) to
|
5721
|
+
# learn more. Valid values include:
|
5712
5722
|
#
|
5713
5723
|
# * `OFF` MFA will not be used for any users.
|
5714
5724
|
#
|
@@ -6461,11 +6471,17 @@ module Aws::CognitoIdentityProvider
|
|
6461
6471
|
# user registration.
|
6462
6472
|
#
|
6463
6473
|
# * `ON` - MFA tokens are required for all user registrations. You can
|
6464
|
-
# only specify
|
6474
|
+
# only specify ON when you are initially creating a user pool. You can
|
6475
|
+
# use the [SetUserPoolMfaConfig][1] API operation to turn MFA "ON"
|
6476
|
+
# for existing user pools.
|
6465
6477
|
#
|
6466
6478
|
# * `OPTIONAL` - Users have the option when registering to create an MFA
|
6467
6479
|
# token.
|
6468
6480
|
#
|
6481
|
+
#
|
6482
|
+
#
|
6483
|
+
# [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_SetUserPoolMfaConfig.html
|
6484
|
+
#
|
6469
6485
|
# @option params [Types::DeviceConfigurationType] :device_configuration
|
6470
6486
|
# Device configuration.
|
6471
6487
|
#
|
@@ -7032,7 +7048,7 @@ module Aws::CognitoIdentityProvider
|
|
7032
7048
|
params: params,
|
7033
7049
|
config: config)
|
7034
7050
|
context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
|
7035
|
-
context[:gem_version] = '1.
|
7051
|
+
context[:gem_version] = '1.51.0'
|
7036
7052
|
Seahorse::Client::Request.new(handlers, context)
|
7037
7053
|
end
|
7038
7054
|
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# WARNING ABOUT GENERATED CODE
|
3
3
|
#
|
4
4
|
# This file is generated. See the contributing for info on making contributions:
|
5
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
5
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
6
6
|
#
|
7
7
|
# WARNING ABOUT GENERATED CODE
|
8
8
|
|
@@ -705,7 +705,7 @@ module Aws::CognitoIdentityProvider
|
|
705
705
|
#
|
706
706
|
class AdminDisableProviderForUserResponse < Aws::EmptyStructure; end
|
707
707
|
|
708
|
-
# Represents the request to disable
|
708
|
+
# Represents the request to disable the user as an administrator.
|
709
709
|
#
|
710
710
|
# @note When making an API call, you may pass AdminDisableUserRequest
|
711
711
|
# data as a hash:
|
@@ -1191,10 +1191,22 @@ module Aws::CognitoIdentityProvider
|
|
1191
1191
|
# with `USERNAME` and `PASSWORD` directly. An app client must be
|
1192
1192
|
# enabled to use this flow.
|
1193
1193
|
#
|
1194
|
-
# * `NEW_PASSWORD_REQUIRED`\: For users
|
1194
|
+
# * `NEW_PASSWORD_REQUIRED`\: For users who are required to change
|
1195
1195
|
# their passwords after successful first login. This challenge
|
1196
1196
|
# should be passed with `NEW_PASSWORD` and any other required
|
1197
1197
|
# attributes.
|
1198
|
+
#
|
1199
|
+
# * `MFA_SETUP`\: For users who are required to setup an MFA factor
|
1200
|
+
# before they can sign-in. The MFA types enabled for the user pool
|
1201
|
+
# will be listed in the challenge parameters `MFA_CAN_SETUP` value.
|
1202
|
+
#
|
1203
|
+
# To setup software token MFA, use the session returned here from
|
1204
|
+
# `InitiateAuth` as an input to `AssociateSoftwareToken`, and use
|
1205
|
+
# the session returned by `VerifySoftwareToken` as an input to
|
1206
|
+
# `RespondToAuthChallenge` with challenge name `MFA_SETUP` to
|
1207
|
+
# complete sign-in. To setup SMS MFA, users will need help from an
|
1208
|
+
# administrator to add a phone number to their account and then call
|
1209
|
+
# `InitiateAuth` again to restart sign-in.
|
1198
1210
|
# @return [String]
|
1199
1211
|
#
|
1200
1212
|
# @!attribute [rw] session
|
@@ -1671,6 +1683,10 @@ module Aws::CognitoIdentityProvider
|
|
1671
1683
|
# attributes, `USERNAME`, `SECRET_HASH` (if app client is configured
|
1672
1684
|
# with client secret).
|
1673
1685
|
#
|
1686
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
1687
|
+
# value returned by `VerifySoftwareToken` in the `Session`
|
1688
|
+
# parameter.
|
1689
|
+
#
|
1674
1690
|
# The value of the `USERNAME` attribute must be the user's actual
|
1675
1691
|
# username, not an alias (such as email address or phone number). To
|
1676
1692
|
# make this easier, the `AdminInitiateAuth` response includes the
|
@@ -5889,10 +5905,22 @@ module Aws::CognitoIdentityProvider
|
|
5889
5905
|
# * `DEVICE_PASSWORD_VERIFIER`\: Similar to `PASSWORD_VERIFIER`, but
|
5890
5906
|
# for devices only.
|
5891
5907
|
#
|
5892
|
-
# * `NEW_PASSWORD_REQUIRED`\: For users
|
5908
|
+
# * `NEW_PASSWORD_REQUIRED`\: For users who are required to change
|
5893
5909
|
# their passwords after successful first login. This challenge
|
5894
5910
|
# should be passed with `NEW_PASSWORD` and any other required
|
5895
5911
|
# attributes.
|
5912
|
+
#
|
5913
|
+
# * `MFA_SETUP`\: For users who are required to setup an MFA factor
|
5914
|
+
# before they can sign-in. The MFA types enabled for the user pool
|
5915
|
+
# will be listed in the challenge parameters `MFA_CAN_SETUP` value.
|
5916
|
+
#
|
5917
|
+
# To setup software token MFA, use the session returned here from
|
5918
|
+
# `InitiateAuth` as an input to `AssociateSoftwareToken`, and use
|
5919
|
+
# the session returned by `VerifySoftwareToken` as an input to
|
5920
|
+
# `RespondToAuthChallenge` with challenge name `MFA_SETUP` to
|
5921
|
+
# complete sign-in. To setup SMS MFA, users will need help from an
|
5922
|
+
# administrator to add a phone number to their account and then call
|
5923
|
+
# `InitiateAuth` again to restart sign-in.
|
5896
5924
|
# @return [String]
|
5897
5925
|
#
|
5898
5926
|
# @!attribute [rw] session
|
@@ -7467,6 +7495,10 @@ module Aws::CognitoIdentityProvider
|
|
7467
7495
|
#
|
7468
7496
|
# * `DEVICE_PASSWORD_VERIFIER` requires everything that
|
7469
7497
|
# `PASSWORD_VERIFIER` requires plus `DEVICE_KEY`.
|
7498
|
+
#
|
7499
|
+
# * `MFA_SETUP` requires `USERNAME`, plus you need to use the session
|
7500
|
+
# value returned by `VerifySoftwareToken` in the `Session`
|
7501
|
+
# parameter.
|
7470
7502
|
# @return [Hash<String,String>]
|
7471
7503
|
#
|
7472
7504
|
# @!attribute [rw] analytics_metadata
|
@@ -8017,7 +8049,11 @@ module Aws::CognitoIdentityProvider
|
|
8017
8049
|
# @return [Types::SoftwareTokenMfaConfigType]
|
8018
8050
|
#
|
8019
8051
|
# @!attribute [rw] mfa_configuration
|
8020
|
-
# The MFA configuration.
|
8052
|
+
# The MFA configuration. Users who don't have an MFA factor set up
|
8053
|
+
# won't be able to sign-in if you set the MfaConfiguration value to
|
8054
|
+
# ‘ON’. See [Adding Multi-Factor Authentication (MFA) to a User
|
8055
|
+
# Pool](cognito/latest/developerguide/user-pool-settings-mfa.html) to
|
8056
|
+
# learn more. Valid values include:
|
8021
8057
|
#
|
8022
8058
|
# * `OFF` MFA will not be used for any users.
|
8023
8059
|
#
|
@@ -8297,6 +8333,14 @@ module Aws::CognitoIdentityProvider
|
|
8297
8333
|
# role for SMS MFA, Cognito will create a role with the required
|
8298
8334
|
# permissions and a trust policy that demonstrates use of the
|
8299
8335
|
# `ExternalId`.
|
8336
|
+
#
|
8337
|
+
# For more information about the `ExternalId` of a role, see [How to
|
8338
|
+
# use an external ID when granting access to your AWS resources to a
|
8339
|
+
# third party][1]
|
8340
|
+
#
|
8341
|
+
#
|
8342
|
+
#
|
8343
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html
|
8300
8344
|
# @return [String]
|
8301
8345
|
#
|
8302
8346
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SmsConfigurationType AWS API Documentation
|
@@ -9564,10 +9608,16 @@ module Aws::CognitoIdentityProvider
|
|
9564
9608
|
# user registration.
|
9565
9609
|
#
|
9566
9610
|
# * `ON` - MFA tokens are required for all user registrations. You can
|
9567
|
-
# only specify
|
9611
|
+
# only specify ON when you are initially creating a user pool. You
|
9612
|
+
# can use the [SetUserPoolMfaConfig][1] API operation to turn MFA
|
9613
|
+
# "ON" for existing user pools.
|
9568
9614
|
#
|
9569
9615
|
# * `OPTIONAL` - Users have the option when registering to create an
|
9570
9616
|
# MFA token.
|
9617
|
+
#
|
9618
|
+
#
|
9619
|
+
#
|
9620
|
+
# [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_SetUserPoolMfaConfig.html
|
9571
9621
|
# @return [String]
|
9572
9622
|
#
|
9573
9623
|
# @!attribute [rw] device_configuration
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-cognitoidentityprovider
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.51.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-04-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -66,8 +66,8 @@ homepage: https://github.com/aws/aws-sdk-ruby
|
|
66
66
|
licenses:
|
67
67
|
- Apache-2.0
|
68
68
|
metadata:
|
69
|
-
source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/
|
70
|
-
changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/
|
69
|
+
source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-cognitoidentityprovider
|
70
|
+
changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-cognitoidentityprovider/CHANGELOG.md
|
71
71
|
post_install_message:
|
72
72
|
rdoc_options: []
|
73
73
|
require_paths:
|
@@ -84,7 +84,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
84
84
|
version: '0'
|
85
85
|
requirements: []
|
86
86
|
rubyforge_project:
|
87
|
-
rubygems_version: 2.7.6.
|
87
|
+
rubygems_version: 2.7.6.3
|
88
88
|
signing_key:
|
89
89
|
specification_version: 4
|
90
90
|
summary: AWS SDK for Ruby - Amazon Cognito Identity Provider
|