aws-sdk-cognitoidentityprovider 1.69.0 → 1.71.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3b0c1b613846b2cdb2ea2fee658581c78c8789b0df7ced9d753fabeccb7c4af3
4
- data.tar.gz: abf38571520a1bcc81ee854f42e974ec1674295c211dcc3a52becf2063caa085
3
+ metadata.gz: 390ff4767100b25fe34e4e87de3a85abc461fe848b76839de7dc9e1ba6e0c18c
4
+ data.tar.gz: 54bfe00cc0f1ba95b07a5fa20d46a2ec3d1ddcbd6cc3d0a3898ad289839451c1
5
5
  SHA512:
6
- metadata.gz: 9b14e79d8a9a0de573aa119daef864172f8f7b107e380b8efb4d43a9a97a7e05cbc57e776bfe88cf59dd9e705bce00c26437fe8191d3aaf18c662d73d2053918
7
- data.tar.gz: 0ea7ea807c66af61286903e2df84da3d59a95fbaf0be9c5cd6db53b020f7a89a1e81f7f942048b9d476d2882572769ccf123807123f9c570b3d8edd8f0cac712
6
+ metadata.gz: f775c3a1ed63da810a0fd3afa8525069fa127482124ce7fe6a9467c61f3fefc46b00d2f524be1e5596b62b09a31d9997f9cb08b9df59861e2f8e6c1546845ec4
7
+ data.tar.gz: af7590d16b8cdd2c65950cf592bf9ad063cfe8c31d5de1f6097b55e16b4dc0bd5e0304465e150b88af5f506b55700b1973811066395195bcd869f4bb99e8fa32
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.71.0 (2022-10-21)
5
+ ------------------
6
+
7
+ * Feature - This release adds a new "DeletionProtection" field to the UserPool in Cognito. Application admins can configure this value with either ACTIVE or INACTIVE value. Setting this field to ACTIVE will prevent a user pool from accidental deletion.
8
+
9
+ 1.70.0 (2022-09-02)
10
+ ------------------
11
+
12
+ * Feature - This release adds a new "AuthSessionValidity" field to the UserPoolClient in Cognito. Application admins can configure this value for their users' authentication duration, which is currently fixed at 3 minutes, up to 15 minutes. Setting this field will also apply to the SMS MFA authentication flow.
13
+
4
14
  1.69.0 (2022-08-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.69.0
1
+ 1.71.0
@@ -873,9 +873,12 @@ module Aws::CognitoIdentityProvider
873
873
  req.send_request(options)
874
874
  end
875
875
 
876
- # Disables the specified user.
876
+ # Deactivates a user and revokes all access tokens for the user. A
877
+ # deactivated user can't sign in, but still appears in the responses to
878
+ # `GetUser` and `ListUsers` API requests.
877
879
  #
878
- # Calling this action requires developer credentials.
880
+ # You must make this API request with Amazon Web Services credentials
881
+ # that have `cognito-idp:AdminDisableUser` permissions.
879
882
  #
880
883
  # @option params [required, String] :user_pool_id
881
884
  # The user pool ID for the user pool where you want to disable the user.
@@ -1500,7 +1503,9 @@ module Aws::CognitoIdentityProvider
1500
1503
  # The user pool username or an alias.
1501
1504
  #
1502
1505
  # @option params [Integer] :max_results
1503
- # The maximum number of authentication events to return.
1506
+ # The maximum number of authentication events to return. Returns 60
1507
+ # events if you set `MaxResults` to 0, or if you don't include a
1508
+ # `MaxResults` parameter.
1504
1509
  #
1505
1510
  # @option params [String] :next_token
1506
1511
  # A pagination token.
@@ -2970,6 +2975,17 @@ module Aws::CognitoIdentityProvider
2970
2975
  # @option params [Types::UserPoolPolicyType] :policies
2971
2976
  # The policies associated with the new user pool.
2972
2977
  #
2978
+ # @option params [String] :deletion_protection
2979
+ # When active, `DeletionProtection` prevents accidental deletion of your
2980
+ # user pool. Before you can delete a user pool that you have protected
2981
+ # against deletion, you must deactivate this feature.
2982
+ #
2983
+ # When you try to delete a protected user pool in a `DeleteUserPool` API
2984
+ # request, Amazon Cognito returns an `InvalidParameterException` error.
2985
+ # To delete a protected user pool, send a new `DeleteUserPool` request
2986
+ # after you deactivate deletion protection in an `UpdateUserPool` API
2987
+ # request.
2988
+ #
2973
2989
  # @option params [Types::LambdaConfigType] :lambda_config
2974
2990
  # The Lambda trigger configuration information for the new user pool.
2975
2991
  #
@@ -3005,25 +3021,28 @@ module Aws::CognitoIdentityProvider
3005
3021
  # username when they sign up.
3006
3022
  #
3007
3023
  # @option params [String] :sms_verification_message
3008
- # A string representing the SMS verification message.
3024
+ # This parameter is no longer used. See
3025
+ # [VerificationMessageTemplateType][1].
3026
+ #
3027
+ #
3028
+ #
3029
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_VerificationMessageTemplateType.html
3009
3030
  #
3010
3031
  # @option params [String] :email_verification_message
3011
- # A string representing the email verification message.
3012
- # `EmailVerificationMessage` is allowed only if [EmailSendingAccount][1]
3013
- # is DEVELOPER.
3032
+ # This parameter is no longer used. See
3033
+ # [VerificationMessageTemplateType][1].
3014
3034
  #
3015
3035
  #
3016
3036
  #
3017
- # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_EmailConfigurationType.html#CognitoUserPools-Type-EmailConfigurationType-EmailSendingAccount
3037
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_VerificationMessageTemplateType.html
3018
3038
  #
3019
3039
  # @option params [String] :email_verification_subject
3020
- # A string representing the email verification subject.
3021
- # `EmailVerificationSubject` is allowed only if [EmailSendingAccount][1]
3022
- # is DEVELOPER.
3040
+ # This parameter is no longer used. See
3041
+ # [VerificationMessageTemplateType][1].
3023
3042
  #
3024
3043
  #
3025
3044
  #
3026
- # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_EmailConfigurationType.html#CognitoUserPools-Type-EmailConfigurationType-EmailSendingAccount
3045
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_VerificationMessageTemplateType.html
3027
3046
  #
3028
3047
  # @option params [Types::VerificationMessageTemplateType] :verification_message_template
3029
3048
  # The template for the verification message that the user sees when the
@@ -3125,6 +3144,7 @@ module Aws::CognitoIdentityProvider
3125
3144
  # temporary_password_validity_days: 1,
3126
3145
  # },
3127
3146
  # },
3147
+ # deletion_protection: "ACTIVE", # accepts ACTIVE, INACTIVE
3128
3148
  # lambda_config: {
3129
3149
  # pre_sign_up: "ArnType",
3130
3150
  # custom_message: "ArnType",
@@ -3236,6 +3256,7 @@ module Aws::CognitoIdentityProvider
3236
3256
  # resp.user_pool.policies.password_policy.require_numbers #=> Boolean
3237
3257
  # resp.user_pool.policies.password_policy.require_symbols #=> Boolean
3238
3258
  # resp.user_pool.policies.password_policy.temporary_password_validity_days #=> Integer
3259
+ # resp.user_pool.deletion_protection #=> String, one of "ACTIVE", "INACTIVE"
3239
3260
  # resp.user_pool.lambda_config.pre_sign_up #=> String
3240
3261
  # resp.user_pool.lambda_config.custom_message #=> String
3241
3262
  # resp.user_pool.lambda_config.post_confirmation #=> String
@@ -3357,6 +3378,9 @@ module Aws::CognitoIdentityProvider
3357
3378
  # Cognito overrides the value with the default value of 30 days. *Valid
3358
3379
  # range* is displayed below in seconds.
3359
3380
  #
3381
+ # If you don't specify otherwise in the configuration of your app
3382
+ # client, your refresh tokens are valid for 30 days.
3383
+ #
3360
3384
  # @option params [Integer] :access_token_validity
3361
3385
  # The access token time limit. After this limit expires, your user
3362
3386
  # can't use their access token. To specify the time unit for
@@ -3370,6 +3394,9 @@ module Aws::CognitoIdentityProvider
3370
3394
  # The default time unit for `AccessTokenValidity` in an API request is
3371
3395
  # hours. *Valid range* is displayed below in seconds.
3372
3396
  #
3397
+ # If you don't specify otherwise in the configuration of your app
3398
+ # client, your access tokens are valid for one hour.
3399
+ #
3373
3400
  # @option params [Integer] :id_token_validity
3374
3401
  # The ID token time limit. After this limit expires, your user can't
3375
3402
  # use their ID token. To specify the time unit for `IdTokenValidity` as
@@ -3383,6 +3410,9 @@ module Aws::CognitoIdentityProvider
3383
3410
  # The default time unit for `AccessTokenValidity` in an API request is
3384
3411
  # hours. *Valid range* is displayed below in seconds.
3385
3412
  #
3413
+ # If you don't specify otherwise in the configuration of your app
3414
+ # client, your ID tokens are valid for one hour.
3415
+ #
3386
3416
  # @option params [Types::TokenValidityUnitsType] :token_validity_units
3387
3417
  # The units in which the validity times are represented. The default
3388
3418
  # unit for RefreshToken is days, and default for ID and access tokens
@@ -3407,45 +3437,43 @@ module Aws::CognitoIdentityProvider
3407
3437
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-specifying-attribute-mapping.html
3408
3438
  #
3409
3439
  # @option params [Array<String>] :explicit_auth_flows
3410
- # The authentication flows that are supported by the user pool clients.
3411
- # Flow names without the `ALLOW_` prefix are no longer supported, in
3412
- # favor of new names with the `ALLOW_` prefix.
3440
+ # The authentication flows that you want your user pool client to
3441
+ # support. For each app client in your user pool, you can sign in your
3442
+ # users with any combination of one or more flows, including with a user
3443
+ # name and Secure Remote Password (SRP), a user name and password, or a
3444
+ # custom authentication process that you define with Lambda functions.
3413
3445
  #
3414
- # <note markdown="1"> Values with `ALLOW_` prefix must be used only along with the `ALLOW_`
3415
- # prefix.
3446
+ # <note markdown="1"> If you don't specify a value for `ExplicitAuthFlows`, your user
3447
+ # client supports `ALLOW_REFRESH_TOKEN_AUTH`, `ALLOW_USER_SRP_AUTH`, and
3448
+ # `ALLOW_CUSTOM_AUTH`.
3416
3449
  #
3417
3450
  # </note>
3418
3451
  #
3419
3452
  # Valid values include:
3420
3453
  #
3421
- # ALLOW\_ADMIN\_USER\_PASSWORD\_AUTH
3422
- #
3423
- # : Enable admin based user password authentication flow
3424
- # `ADMIN_USER_PASSWORD_AUTH`. This setting replaces the
3425
- # `ADMIN_NO_SRP_AUTH` setting. With this authentication flow, Amazon
3426
- # Cognito receives the password in the request instead of using the
3427
- # Secure Remote Password (SRP) protocol to verify passwords.
3428
- #
3429
- # ALLOW\_CUSTOM\_AUTH
3430
- #
3431
- # : Enable Lambda trigger based authentication.
3432
- #
3433
- # ALLOW\_USER\_PASSWORD\_AUTH
3434
- #
3435
- # : Enable user password-based authentication. In this flow, Amazon
3436
- # Cognito receives the password in the request instead of using the
3437
- # SRP protocol to verify passwords.
3454
+ # * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user password
3455
+ # authentication flow `ADMIN_USER_PASSWORD_AUTH`. This setting
3456
+ # replaces the `ADMIN_NO_SRP_AUTH` setting. With this authentication
3457
+ # flow, your app passes a user name and password to Amazon Cognito in
3458
+ # the request, instead of using the Secure Remote Password (SRP)
3459
+ # protocol to securely transmit the password.
3438
3460
  #
3439
- # ALLOW\_USER\_SRP\_AUTH
3461
+ # * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
3440
3462
  #
3441
- # : Enable SRP-based authentication.
3463
+ # * `ALLOW_USER_PASSWORD_AUTH`\: Enable user password-based
3464
+ # authentication. In this flow, Amazon Cognito receives the password
3465
+ # in the request instead of using the SRP protocol to verify
3466
+ # passwords.
3442
3467
  #
3443
- # ALLOW\_REFRESH\_TOKEN\_AUTH
3468
+ # * `ALLOW_USER_SRP_AUTH`\: Enable SRP-based authentication.
3444
3469
  #
3445
- # : Enable the authflow that refreshes tokens.
3470
+ # * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
3446
3471
  #
3447
- # If you don't specify a value for `ExplicitAuthFlows`, your user
3448
- # client supports `ALLOW_USER_SRP_AUTH` and `ALLOW_CUSTOM_AUTH`.
3472
+ # In some environments, you will see the values `ADMIN_NO_SRP_AUTH`,
3473
+ # `CUSTOM_AUTH_FLOW_ONLY`, or `USER_PASSWORD_AUTH`. You can't assign
3474
+ # these legacy `ExplicitAuthFlows` values to user pool clients at the
3475
+ # same time as values that begin with `ALLOW_`, like
3476
+ # `ALLOW_USER_SRP_AUTH`.
3449
3477
  #
3450
3478
  # @option params [Array<String>] :supported_identity_providers
3451
3479
  # A list of provider names for the identity providers (IdPs) that are
@@ -3585,6 +3613,12 @@ module Aws::CognitoIdentityProvider
3585
3613
  #
3586
3614
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
3587
3615
  #
3616
+ # @option params [Integer] :auth_session_validity
3617
+ # Amazon Cognito creates a session token for each API request in an
3618
+ # authentication flow. `AuthSessionValidity` is the duration, in
3619
+ # minutes, of that session token. Your user pool native user must
3620
+ # respond to each authentication challenge before the session expires.
3621
+ #
3588
3622
  # @return [Types::CreateUserPoolClientResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3589
3623
  #
3590
3624
  # * {Types::CreateUserPoolClientResponse#user_pool_client #user_pool_client} => Types::UserPoolClientType
@@ -3623,6 +3657,7 @@ module Aws::CognitoIdentityProvider
3623
3657
  # prevent_user_existence_errors: "LEGACY", # accepts LEGACY, ENABLED
3624
3658
  # enable_token_revocation: false,
3625
3659
  # enable_propagate_additional_user_context_data: false,
3660
+ # auth_session_validity: 1,
3626
3661
  # })
3627
3662
  #
3628
3663
  # @example Response structure
@@ -3665,6 +3700,7 @@ module Aws::CognitoIdentityProvider
3665
3700
  # resp.user_pool_client.prevent_user_existence_errors #=> String, one of "LEGACY", "ENABLED"
3666
3701
  # resp.user_pool_client.enable_token_revocation #=> Boolean
3667
3702
  # resp.user_pool_client.enable_propagate_additional_user_context_data #=> Boolean
3703
+ # resp.user_pool_client.auth_session_validity #=> Integer
3668
3704
  #
3669
3705
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/CreateUserPoolClient AWS API Documentation
3670
3706
  #
@@ -4147,6 +4183,7 @@ module Aws::CognitoIdentityProvider
4147
4183
  # resp.user_pool.policies.password_policy.require_numbers #=> Boolean
4148
4184
  # resp.user_pool.policies.password_policy.require_symbols #=> Boolean
4149
4185
  # resp.user_pool.policies.password_policy.temporary_password_validity_days #=> Integer
4186
+ # resp.user_pool.deletion_protection #=> String, one of "ACTIVE", "INACTIVE"
4150
4187
  # resp.user_pool.lambda_config.pre_sign_up #=> String
4151
4188
  # resp.user_pool.lambda_config.custom_message #=> String
4152
4189
  # resp.user_pool.lambda_config.post_confirmation #=> String
@@ -4292,6 +4329,7 @@ module Aws::CognitoIdentityProvider
4292
4329
  # resp.user_pool_client.prevent_user_existence_errors #=> String, one of "LEGACY", "ENABLED"
4293
4330
  # resp.user_pool_client.enable_token_revocation #=> Boolean
4294
4331
  # resp.user_pool_client.enable_propagate_additional_user_context_data #=> Boolean
4332
+ # resp.user_pool_client.auth_session_validity #=> Integer
4295
4333
  #
4296
4334
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/DescribeUserPoolClient AWS API Documentation
4297
4335
  #
@@ -4656,6 +4694,12 @@ module Aws::CognitoIdentityProvider
4656
4694
  end
4657
4695
 
4658
4696
  # This method takes a user pool ID, and returns the signing certificate.
4697
+ # The issued certificate is valid for 10 years from the date of issue.
4698
+ #
4699
+ # Amazon Cognito issues and assigns a new signing certificate annually.
4700
+ # This process returns a new value in the response to
4701
+ # `GetSigningCertificate`, but doesn't invalidate the original
4702
+ # certificate.
4659
4703
  #
4660
4704
  # @option params [required, String] :user_pool_id
4661
4705
  # The user pool ID.
@@ -4908,11 +4952,9 @@ module Aws::CognitoIdentityProvider
4908
4952
  end
4909
4953
 
4910
4954
  # Signs out users from all devices. It also invalidates all refresh
4911
- # tokens that Amazon Cognito has issued to a user. The user's current
4912
- # access and ID tokens remain valid until their expiry. By default,
4913
- # access and ID tokens expire one hour after Amazon Cognito issues them.
4914
- # A user can still use a hosted UI cookie to retrieve new tokens for the
4915
- # duration of the cookie validity period of 1 hour.
4955
+ # tokens that Amazon Cognito has issued to a user. A user can still use
4956
+ # a hosted UI cookie to retrieve new tokens for the duration of the
4957
+ # 1-hour cookie validity period.
4916
4958
  #
4917
4959
  # @option params [required, String] :access_token
4918
4960
  # A valid access token that Amazon Cognito issued to the user who you
@@ -6037,9 +6079,10 @@ module Aws::CognitoIdentityProvider
6037
6079
  req.send_request(options)
6038
6080
  end
6039
6081
 
6040
- # Revokes all of the access tokens generated by the specified refresh
6041
- # token. After the token is revoked, you can't use the revoked token to
6042
- # access Amazon Cognito authenticated APIs.
6082
+ # Revokes all of the access tokens generated by, and at the same time
6083
+ # as, the specified refresh token. After a token is revoked, you can't
6084
+ # use the revoked token to access Amazon Cognito user APIs, or to
6085
+ # authorize access to your resource server.
6043
6086
  #
6044
6087
  # @option params [required, String] :token
6045
6088
  # The refresh token that you want to revoke.
@@ -6342,8 +6385,7 @@ module Aws::CognitoIdentityProvider
6342
6385
  # @option params [String] :mfa_configuration
6343
6386
  # The MFA configuration. If you set the MfaConfiguration value to ‘ON’,
6344
6387
  # only users who have set up an MFA factor can sign in. To learn more,
6345
- # see [Adding Multi-Factor Authentication (MFA) to a user
6346
- # pool](cognito/latest/developerguide/user-pool-settings-mfa.html).
6388
+ # see [Adding Multi-Factor Authentication (MFA) to a user pool][1].
6347
6389
  # Valid values include:
6348
6390
  #
6349
6391
  # * `OFF` MFA won't be used for any users.
@@ -6353,6 +6395,10 @@ module Aws::CognitoIdentityProvider
6353
6395
  # * `OPTIONAL` MFA will be required only for individual users who have
6354
6396
  # an MFA factor activated.
6355
6397
  #
6398
+ #
6399
+ #
6400
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa.html
6401
+ #
6356
6402
  # @return [Types::SetUserPoolMfaConfigResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
6357
6403
  #
6358
6404
  # * {Types::SetUserPoolMfaConfigResponse#sms_mfa_configuration #sms_mfa_configuration} => Types::SmsMfaConfigType
@@ -7151,6 +7197,17 @@ module Aws::CognitoIdentityProvider
7151
7197
  # @option params [Types::UserPoolPolicyType] :policies
7152
7198
  # A container with the policies you want to update in a user pool.
7153
7199
  #
7200
+ # @option params [String] :deletion_protection
7201
+ # When active, `DeletionProtection` prevents accidental deletion of your
7202
+ # user pool. Before you can delete a user pool that you have protected
7203
+ # against deletion, you must deactivate this feature.
7204
+ #
7205
+ # When you try to delete a protected user pool in a `DeleteUserPool` API
7206
+ # request, Amazon Cognito returns an `InvalidParameterException` error.
7207
+ # To delete a protected user pool, send a new `DeleteUserPool` request
7208
+ # after you deactivate deletion protection in an `UpdateUserPool` API
7209
+ # request.
7210
+ #
7154
7211
  # @option params [Types::LambdaConfigType] :lambda_config
7155
7212
  # The Lambda configuration information from the request to update the
7156
7213
  # user pool.
@@ -7160,13 +7217,28 @@ module Aws::CognitoIdentityProvider
7160
7217
  # requests to update user pools.
7161
7218
  #
7162
7219
  # @option params [String] :sms_verification_message
7163
- # A container with information about the SMS verification message.
7220
+ # This parameter is no longer used. See
7221
+ # [VerificationMessageTemplateType][1].
7222
+ #
7223
+ #
7224
+ #
7225
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_VerificationMessageTemplateType.html
7164
7226
  #
7165
7227
  # @option params [String] :email_verification_message
7166
- # The contents of the email verification message.
7228
+ # This parameter is no longer used. See
7229
+ # [VerificationMessageTemplateType][1].
7230
+ #
7231
+ #
7232
+ #
7233
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_VerificationMessageTemplateType.html
7167
7234
  #
7168
7235
  # @option params [String] :email_verification_subject
7169
- # The subject of the email verification message.
7236
+ # This parameter is no longer used. See
7237
+ # [VerificationMessageTemplateType][1].
7238
+ #
7239
+ #
7240
+ #
7241
+ # [1]: https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_VerificationMessageTemplateType.html
7170
7242
  #
7171
7243
  # @option params [Types::VerificationMessageTemplateType] :verification_message_template
7172
7244
  # The template for verification messages.
@@ -7266,6 +7338,7 @@ module Aws::CognitoIdentityProvider
7266
7338
  # temporary_password_validity_days: 1,
7267
7339
  # },
7268
7340
  # },
7341
+ # deletion_protection: "ACTIVE", # accepts ACTIVE, INACTIVE
7269
7342
  # lambda_config: {
7270
7343
  # pre_sign_up: "ArnType",
7271
7344
  # custom_message: "ArnType",
@@ -7395,6 +7468,9 @@ module Aws::CognitoIdentityProvider
7395
7468
  # Cognito overrides the value with the default value of 30 days. *Valid
7396
7469
  # range* is displayed below in seconds.
7397
7470
  #
7471
+ # If you don't specify otherwise in the configuration of your app
7472
+ # client, your refresh tokens are valid for 30 days.
7473
+ #
7398
7474
  # @option params [Integer] :access_token_validity
7399
7475
  # The access token time limit. After this limit expires, your user
7400
7476
  # can't use their access token. To specify the time unit for
@@ -7408,6 +7484,9 @@ module Aws::CognitoIdentityProvider
7408
7484
  # The default time unit for `AccessTokenValidity` in an API request is
7409
7485
  # hours. *Valid range* is displayed below in seconds.
7410
7486
  #
7487
+ # If you don't specify otherwise in the configuration of your app
7488
+ # client, your access tokens are valid for one hour.
7489
+ #
7411
7490
  # @option params [Integer] :id_token_validity
7412
7491
  # The ID token time limit. After this limit expires, your user can't
7413
7492
  # use their ID token. To specify the time unit for `IdTokenValidity` as
@@ -7421,6 +7500,9 @@ module Aws::CognitoIdentityProvider
7421
7500
  # The default time unit for `AccessTokenValidity` in an API request is
7422
7501
  # hours. *Valid range* is displayed below in seconds.
7423
7502
  #
7503
+ # If you don't specify otherwise in the configuration of your app
7504
+ # client, your ID tokens are valid for one hour.
7505
+ #
7424
7506
  # @option params [Types::TokenValidityUnitsType] :token_validity_units
7425
7507
  # The units in which the validity times are represented. The default
7426
7508
  # unit for RefreshToken is days, and the default for ID and access
@@ -7433,19 +7515,26 @@ module Aws::CognitoIdentityProvider
7433
7515
  # The writeable attributes of the user pool.
7434
7516
  #
7435
7517
  # @option params [Array<String>] :explicit_auth_flows
7436
- # The authentication flows that are supported by the user pool clients.
7437
- # Flow names without the `ALLOW_` prefix are no longer supported in
7438
- # favor of new names with the `ALLOW_` prefix. Note that values with
7439
- # `ALLOW_` prefix must be used only along with values with the `ALLOW_`
7440
- # prefix.
7518
+ # The authentication flows that you want your user pool client to
7519
+ # support. For each app client in your user pool, you can sign in your
7520
+ # users with any combination of one or more flows, including with a user
7521
+ # name and Secure Remote Password (SRP), a user name and password, or a
7522
+ # custom authentication process that you define with Lambda functions.
7523
+ #
7524
+ # <note markdown="1"> If you don't specify a value for `ExplicitAuthFlows`, your user
7525
+ # client supports `ALLOW_REFRESH_TOKEN_AUTH`, `ALLOW_USER_SRP_AUTH`, and
7526
+ # `ALLOW_CUSTOM_AUTH`.
7527
+ #
7528
+ # </note>
7441
7529
  #
7442
7530
  # Valid values include:
7443
7531
  #
7444
7532
  # * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user password
7445
7533
  # authentication flow `ADMIN_USER_PASSWORD_AUTH`. This setting
7446
7534
  # replaces the `ADMIN_NO_SRP_AUTH` setting. With this authentication
7447
- # flow, Amazon Cognito receives the password in the request instead of
7448
- # using the Secure Remote Password (SRP) protocol to verify passwords.
7535
+ # flow, your app passes a user name and password to Amazon Cognito in
7536
+ # the request, instead of using the Secure Remote Password (SRP)
7537
+ # protocol to securely transmit the password.
7449
7538
  #
7450
7539
  # * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
7451
7540
  #
@@ -7458,6 +7547,12 @@ module Aws::CognitoIdentityProvider
7458
7547
  #
7459
7548
  # * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
7460
7549
  #
7550
+ # In some environments, you will see the values `ADMIN_NO_SRP_AUTH`,
7551
+ # `CUSTOM_AUTH_FLOW_ONLY`, or `USER_PASSWORD_AUTH`. You can't assign
7552
+ # these legacy `ExplicitAuthFlows` values to user pool clients at the
7553
+ # same time as values that begin with `ALLOW_`, like
7554
+ # `ALLOW_USER_SRP_AUTH`.
7555
+ #
7461
7556
  # @option params [Array<String>] :supported_identity_providers
7462
7557
  # A list of provider names for the IdPs that this client supports. The
7463
7558
  # following are supported: `COGNITO`, `Facebook`, `Google`,
@@ -7592,6 +7687,12 @@ module Aws::CognitoIdentityProvider
7592
7687
  #
7593
7688
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html
7594
7689
  #
7690
+ # @option params [Integer] :auth_session_validity
7691
+ # Amazon Cognito creates a session token for each API request in an
7692
+ # authentication flow. `AuthSessionValidity` is the duration, in
7693
+ # minutes, of that session token. Your user pool native user must
7694
+ # respond to each authentication challenge before the session expires.
7695
+ #
7595
7696
  # @return [Types::UpdateUserPoolClientResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7596
7697
  #
7597
7698
  # * {Types::UpdateUserPoolClientResponse#user_pool_client #user_pool_client} => Types::UserPoolClientType
@@ -7630,6 +7731,7 @@ module Aws::CognitoIdentityProvider
7630
7731
  # prevent_user_existence_errors: "LEGACY", # accepts LEGACY, ENABLED
7631
7732
  # enable_token_revocation: false,
7632
7733
  # enable_propagate_additional_user_context_data: false,
7734
+ # auth_session_validity: 1,
7633
7735
  # })
7634
7736
  #
7635
7737
  # @example Response structure
@@ -7672,6 +7774,7 @@ module Aws::CognitoIdentityProvider
7672
7774
  # resp.user_pool_client.prevent_user_existence_errors #=> String, one of "LEGACY", "ENABLED"
7673
7775
  # resp.user_pool_client.enable_token_revocation #=> Boolean
7674
7776
  # resp.user_pool_client.enable_propagate_additional_user_context_data #=> Boolean
7777
+ # resp.user_pool_client.auth_session_validity #=> Integer
7675
7778
  #
7676
7779
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/UpdateUserPoolClient AWS API Documentation
7677
7780
  #
@@ -7867,7 +7970,7 @@ module Aws::CognitoIdentityProvider
7867
7970
  params: params,
7868
7971
  config: config)
7869
7972
  context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
7870
- context[:gem_version] = '1.69.0'
7973
+ context[:gem_version] = '1.71.0'
7871
7974
  Seahorse::Client::Request.new(handlers, context)
7872
7975
  end
7873
7976
 
@@ -95,6 +95,7 @@ module Aws::CognitoIdentityProvider
95
95
  AuthEventsType = Shapes::ListShape.new(name: 'AuthEventsType')
96
96
  AuthFlowType = Shapes::StringShape.new(name: 'AuthFlowType')
97
97
  AuthParametersType = Shapes::MapShape.new(name: 'AuthParametersType')
98
+ AuthSessionValidityType = Shapes::IntegerShape.new(name: 'AuthSessionValidityType')
98
99
  AuthenticationResultType = Shapes::StructureShape.new(name: 'AuthenticationResultType')
99
100
  BlockedIPRangeListType = Shapes::ListShape.new(name: 'BlockedIPRangeListType')
100
101
  BooleanType = Shapes::BooleanShape.new(name: 'BooleanType')
@@ -166,6 +167,7 @@ module Aws::CognitoIdentityProvider
166
167
  DeleteUserPoolDomainResponse = Shapes::StructureShape.new(name: 'DeleteUserPoolDomainResponse')
167
168
  DeleteUserPoolRequest = Shapes::StructureShape.new(name: 'DeleteUserPoolRequest')
168
169
  DeleteUserRequest = Shapes::StructureShape.new(name: 'DeleteUserRequest')
170
+ DeletionProtectionType = Shapes::StringShape.new(name: 'DeletionProtectionType')
169
171
  DeliveryMediumListType = Shapes::ListShape.new(name: 'DeliveryMediumListType')
170
172
  DeliveryMediumType = Shapes::StringShape.new(name: 'DeliveryMediumType')
171
173
  DescribeIdentityProviderRequest = Shapes::StructureShape.new(name: 'DescribeIdentityProviderRequest')
@@ -930,6 +932,7 @@ module Aws::CognitoIdentityProvider
930
932
  CreateUserPoolClientRequest.add_member(:prevent_user_existence_errors, Shapes::ShapeRef.new(shape: PreventUserExistenceErrorTypes, location_name: "PreventUserExistenceErrors"))
931
933
  CreateUserPoolClientRequest.add_member(:enable_token_revocation, Shapes::ShapeRef.new(shape: WrappedBooleanType, location_name: "EnableTokenRevocation"))
932
934
  CreateUserPoolClientRequest.add_member(:enable_propagate_additional_user_context_data, Shapes::ShapeRef.new(shape: WrappedBooleanType, location_name: "EnablePropagateAdditionalUserContextData"))
935
+ CreateUserPoolClientRequest.add_member(:auth_session_validity, Shapes::ShapeRef.new(shape: AuthSessionValidityType, location_name: "AuthSessionValidity"))
933
936
  CreateUserPoolClientRequest.struct_class = Types::CreateUserPoolClientRequest
934
937
 
935
938
  CreateUserPoolClientResponse.add_member(:user_pool_client, Shapes::ShapeRef.new(shape: UserPoolClientType, location_name: "UserPoolClient"))
@@ -945,6 +948,7 @@ module Aws::CognitoIdentityProvider
945
948
 
946
949
  CreateUserPoolRequest.add_member(:pool_name, Shapes::ShapeRef.new(shape: UserPoolNameType, required: true, location_name: "PoolName"))
947
950
  CreateUserPoolRequest.add_member(:policies, Shapes::ShapeRef.new(shape: UserPoolPolicyType, location_name: "Policies"))
951
+ CreateUserPoolRequest.add_member(:deletion_protection, Shapes::ShapeRef.new(shape: DeletionProtectionType, location_name: "DeletionProtection"))
948
952
  CreateUserPoolRequest.add_member(:lambda_config, Shapes::ShapeRef.new(shape: LambdaConfigType, location_name: "LambdaConfig"))
949
953
  CreateUserPoolRequest.add_member(:auto_verified_attributes, Shapes::ShapeRef.new(shape: VerifiedAttributesListType, location_name: "AutoVerifiedAttributes"))
950
954
  CreateUserPoolRequest.add_member(:alias_attributes, Shapes::ShapeRef.new(shape: AliasAttributesListType, location_name: "AliasAttributes"))
@@ -1788,6 +1792,7 @@ module Aws::CognitoIdentityProvider
1788
1792
  UpdateUserPoolClientRequest.add_member(:prevent_user_existence_errors, Shapes::ShapeRef.new(shape: PreventUserExistenceErrorTypes, location_name: "PreventUserExistenceErrors"))
1789
1793
  UpdateUserPoolClientRequest.add_member(:enable_token_revocation, Shapes::ShapeRef.new(shape: WrappedBooleanType, location_name: "EnableTokenRevocation"))
1790
1794
  UpdateUserPoolClientRequest.add_member(:enable_propagate_additional_user_context_data, Shapes::ShapeRef.new(shape: WrappedBooleanType, location_name: "EnablePropagateAdditionalUserContextData"))
1795
+ UpdateUserPoolClientRequest.add_member(:auth_session_validity, Shapes::ShapeRef.new(shape: AuthSessionValidityType, location_name: "AuthSessionValidity"))
1791
1796
  UpdateUserPoolClientRequest.struct_class = Types::UpdateUserPoolClientRequest
1792
1797
 
1793
1798
  UpdateUserPoolClientResponse.add_member(:user_pool_client, Shapes::ShapeRef.new(shape: UserPoolClientType, location_name: "UserPoolClient"))
@@ -1803,6 +1808,7 @@ module Aws::CognitoIdentityProvider
1803
1808
 
1804
1809
  UpdateUserPoolRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
1805
1810
  UpdateUserPoolRequest.add_member(:policies, Shapes::ShapeRef.new(shape: UserPoolPolicyType, location_name: "Policies"))
1811
+ UpdateUserPoolRequest.add_member(:deletion_protection, Shapes::ShapeRef.new(shape: DeletionProtectionType, location_name: "DeletionProtection"))
1806
1812
  UpdateUserPoolRequest.add_member(:lambda_config, Shapes::ShapeRef.new(shape: LambdaConfigType, location_name: "LambdaConfig"))
1807
1813
  UpdateUserPoolRequest.add_member(:auto_verified_attributes, Shapes::ShapeRef.new(shape: VerifiedAttributesListType, location_name: "AutoVerifiedAttributes"))
1808
1814
  UpdateUserPoolRequest.add_member(:sms_verification_message, Shapes::ShapeRef.new(shape: SmsVerificationMessageType, location_name: "SmsVerificationMessage"))
@@ -1898,6 +1904,7 @@ module Aws::CognitoIdentityProvider
1898
1904
  UserPoolClientType.add_member(:prevent_user_existence_errors, Shapes::ShapeRef.new(shape: PreventUserExistenceErrorTypes, location_name: "PreventUserExistenceErrors"))
1899
1905
  UserPoolClientType.add_member(:enable_token_revocation, Shapes::ShapeRef.new(shape: WrappedBooleanType, location_name: "EnableTokenRevocation"))
1900
1906
  UserPoolClientType.add_member(:enable_propagate_additional_user_context_data, Shapes::ShapeRef.new(shape: WrappedBooleanType, location_name: "EnablePropagateAdditionalUserContextData"))
1907
+ UserPoolClientType.add_member(:auth_session_validity, Shapes::ShapeRef.new(shape: AuthSessionValidityType, location_name: "AuthSessionValidity"))
1901
1908
  UserPoolClientType.struct_class = Types::UserPoolClientType
1902
1909
 
1903
1910
  UserPoolDescriptionType.add_member(:id, Shapes::ShapeRef.new(shape: UserPoolIdType, location_name: "Id"))
@@ -1924,6 +1931,7 @@ module Aws::CognitoIdentityProvider
1924
1931
  UserPoolType.add_member(:id, Shapes::ShapeRef.new(shape: UserPoolIdType, location_name: "Id"))
1925
1932
  UserPoolType.add_member(:name, Shapes::ShapeRef.new(shape: UserPoolNameType, location_name: "Name"))
1926
1933
  UserPoolType.add_member(:policies, Shapes::ShapeRef.new(shape: UserPoolPolicyType, location_name: "Policies"))
1934
+ UserPoolType.add_member(:deletion_protection, Shapes::ShapeRef.new(shape: DeletionProtectionType, location_name: "DeletionProtection"))
1927
1935
  UserPoolType.add_member(:lambda_config, Shapes::ShapeRef.new(shape: LambdaConfigType, location_name: "LambdaConfig"))
1928
1936
  UserPoolType.add_member(:status, Shapes::ShapeRef.new(shape: StatusType, location_name: "Status"))
1929
1937
  UserPoolType.add_member(:last_modified_date, Shapes::ShapeRef.new(shape: DateType, location_name: "LastModifiedDate"))
@@ -2700,6 +2708,7 @@ module Aws::CognitoIdentityProvider
2700
2708
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
2701
2709
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
2702
2710
  o.errors << Shapes::ShapeRef.new(shape: UnsupportedIdentityProviderException)
2711
+ o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
2703
2712
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
2704
2713
  o.errors << Shapes::ShapeRef.new(shape: NotAuthorizedException)
2705
2714
  o.errors << Shapes::ShapeRef.new(shape: TooManyRequestsException)
@@ -2779,6 +2788,7 @@ module Aws::CognitoIdentityProvider
2779
2788
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
2780
2789
  o.errors << Shapes::ShapeRef.new(shape: TooManyRequestsException)
2781
2790
  o.errors << Shapes::ShapeRef.new(shape: NotAuthorizedException)
2791
+ o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
2782
2792
  o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
2783
2793
  end)
2784
2794
 
@@ -3561,6 +3571,7 @@ module Aws::CognitoIdentityProvider
3561
3571
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
3562
3572
  o.errors << Shapes::ShapeRef.new(shape: UnsupportedIdentityProviderException)
3563
3573
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
3574
+ o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
3564
3575
  o.errors << Shapes::ShapeRef.new(shape: NotAuthorizedException)
3565
3576
  o.errors << Shapes::ShapeRef.new(shape: TooManyRequestsException)
3566
3577
  o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)