aws-sdk-cognitoidentityprovider 1.86.0 → 1.87.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/client.rb +362 -140
- data/lib/aws-sdk-cognitoidentityprovider/client_api.rb +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/types.rb +374 -147
- data/lib/aws-sdk-cognitoidentityprovider.rb +1 -1
- data/sig/client.rbs +2 -2
- data/sig/types.rbs +1 -1
- metadata +2 -2
@@ -3037,8 +3037,8 @@ module Aws::CognitoIdentityProvider
|
|
3037
3037
|
# policies in requests for this API operation. For this operation, you
|
3038
3038
|
# can't use IAM credentials to authorize requests, and you can't grant
|
3039
3039
|
# IAM permissions in policies. For more information about authorization
|
3040
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
3041
|
-
#
|
3040
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
3041
|
+
# and user pool endpoints][2].
|
3042
3042
|
#
|
3043
3043
|
# </note>
|
3044
3044
|
#
|
@@ -3084,12 +3084,15 @@ module Aws::CognitoIdentityProvider
|
|
3084
3084
|
|
3085
3085
|
# Changes the password for a specified user in a user pool.
|
3086
3086
|
#
|
3087
|
+
# Authorize this action with a signed-in user's access token. It must
|
3088
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
3089
|
+
#
|
3087
3090
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
3088
3091
|
# policies in requests for this API operation. For this operation, you
|
3089
3092
|
# can't use IAM credentials to authorize requests, and you can't grant
|
3090
3093
|
# IAM permissions in policies. For more information about authorization
|
3091
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
3092
|
-
#
|
3094
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
3095
|
+
# and user pool endpoints][1].
|
3093
3096
|
#
|
3094
3097
|
# </note>
|
3095
3098
|
#
|
@@ -3127,20 +3130,25 @@ module Aws::CognitoIdentityProvider
|
|
3127
3130
|
end
|
3128
3131
|
|
3129
3132
|
# Confirms tracking of the device. This API call is the call that begins
|
3130
|
-
# device tracking.
|
3133
|
+
# device tracking. For more information about device authentication, see
|
3134
|
+
# [Working with user devices in your user pool][1].
|
3135
|
+
#
|
3136
|
+
# Authorize this action with a signed-in user's access token. It must
|
3137
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
3131
3138
|
#
|
3132
3139
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
3133
3140
|
# policies in requests for this API operation. For this operation, you
|
3134
3141
|
# can't use IAM credentials to authorize requests, and you can't grant
|
3135
3142
|
# IAM permissions in policies. For more information about authorization
|
3136
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
3137
|
-
#
|
3143
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
3144
|
+
# and user pool endpoints][2].
|
3138
3145
|
#
|
3139
3146
|
# </note>
|
3140
3147
|
#
|
3141
3148
|
#
|
3142
3149
|
#
|
3143
|
-
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-
|
3150
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html
|
3151
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
3144
3152
|
#
|
3145
3153
|
# @option params [required, String] :access_token
|
3146
3154
|
# A valid access token that Amazon Cognito issued to the user whose
|
@@ -3191,8 +3199,8 @@ module Aws::CognitoIdentityProvider
|
|
3191
3199
|
# policies in requests for this API operation. For this operation, you
|
3192
3200
|
# can't use IAM credentials to authorize requests, and you can't grant
|
3193
3201
|
# IAM permissions in policies. For more information about authorization
|
3194
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
3195
|
-
#
|
3202
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
3203
|
+
# and user pool endpoints][1].
|
3196
3204
|
#
|
3197
3205
|
# </note>
|
3198
3206
|
#
|
@@ -3330,8 +3338,8 @@ module Aws::CognitoIdentityProvider
|
|
3330
3338
|
# policies in requests for this API operation. For this operation, you
|
3331
3339
|
# can't use IAM credentials to authorize requests, and you can't grant
|
3332
3340
|
# IAM permissions in policies. For more information about authorization
|
3333
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
3334
|
-
#
|
3341
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
3342
|
+
# and user pool endpoints][3].
|
3335
3343
|
#
|
3336
3344
|
# </note>
|
3337
3345
|
#
|
@@ -3531,7 +3539,8 @@ module Aws::CognitoIdentityProvider
|
|
3531
3539
|
req.send_request(options)
|
3532
3540
|
end
|
3533
3541
|
|
3534
|
-
#
|
3542
|
+
# Adds a configuration and trust relationship between a third-party
|
3543
|
+
# identity provider (IdP) and a user pool.
|
3535
3544
|
#
|
3536
3545
|
# <note markdown="1"> Amazon Cognito evaluates Identity and Access Management (IAM) policies
|
3537
3546
|
# in requests for this API operation. For this operation, you must use
|
@@ -3561,74 +3570,123 @@ module Aws::CognitoIdentityProvider
|
|
3561
3570
|
# The IdP type.
|
3562
3571
|
#
|
3563
3572
|
# @option params [required, Hash<String,String>] :provider_details
|
3564
|
-
# The
|
3565
|
-
# for each IdP
|
3566
|
-
#
|
3567
|
-
#
|
3568
|
-
#
|
3569
|
-
#
|
3570
|
-
#
|
3571
|
-
#
|
3572
|
-
#
|
3573
|
-
#
|
3574
|
-
#
|
3575
|
-
#
|
3576
|
-
#
|
3577
|
-
#
|
3578
|
-
#
|
3579
|
-
#
|
3580
|
-
#
|
3581
|
-
#
|
3582
|
-
#
|
3583
|
-
#
|
3584
|
-
#
|
3585
|
-
#
|
3586
|
-
#
|
3587
|
-
#
|
3588
|
-
#
|
3589
|
-
#
|
3590
|
-
#
|
3591
|
-
#
|
3592
|
-
#
|
3593
|
-
#
|
3594
|
-
#
|
3595
|
-
#
|
3596
|
-
#
|
3597
|
-
#
|
3598
|
-
#
|
3599
|
-
#
|
3600
|
-
#
|
3601
|
-
#
|
3602
|
-
#
|
3603
|
-
#
|
3604
|
-
#
|
3605
|
-
#
|
3606
|
-
#
|
3607
|
-
#
|
3608
|
-
#
|
3609
|
-
#
|
3610
|
-
#
|
3611
|
-
#
|
3612
|
-
#
|
3613
|
-
#
|
3614
|
-
#
|
3615
|
-
#
|
3616
|
-
#
|
3617
|
-
#
|
3618
|
-
#
|
3619
|
-
#
|
3620
|
-
#
|
3621
|
-
#
|
3622
|
-
#
|
3623
|
-
#
|
3624
|
-
#
|
3625
|
-
#
|
3626
|
-
#
|
3627
|
-
#
|
3628
|
-
#
|
3629
|
-
#
|
3630
|
-
#
|
3631
|
-
#
|
3573
|
+
# The scopes, URLs, and identifiers for your external identity provider.
|
3574
|
+
# The following examples describe the provider detail keys for each IdP
|
3575
|
+
# type. These values and their schema are subject to change. Social IdP
|
3576
|
+
# `authorize_scopes` values must match the values listed here.
|
3577
|
+
#
|
3578
|
+
# OpenID Connect (OIDC)
|
3579
|
+
#
|
3580
|
+
# : Amazon Cognito accepts the following elements when it can't
|
3581
|
+
# discover endpoint URLs from `oidc_issuer`: `attributes_url`,
|
3582
|
+
# `authorize_url`, `jwks_uri`, `token_url`.
|
3583
|
+
#
|
3584
|
+
# Create or update request: `"ProviderDetails": \{
|
3585
|
+
# "attributes_request_method": "GET", "attributes_url":
|
3586
|
+
# "https://auth.example.com/userInfo", "authorize_scopes": "openid
|
3587
|
+
# profile email", "authorize_url":
|
3588
|
+
# "https://auth.example.com/authorize", "client_id":
|
3589
|
+
# "1example23456789", "client_secret": "provider-app-client-secret",
|
3590
|
+
# "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
|
3591
|
+
# "oidc_issuer": "https://auth.example.com", "token_url":
|
3592
|
+
# "https://example.com/token" \}`
|
3593
|
+
#
|
3594
|
+
# Describe response: `"ProviderDetails": \{
|
3595
|
+
# "attributes_request_method": "GET", "attributes_url":
|
3596
|
+
# "https://auth.example.com/userInfo",
|
3597
|
+
# "attributes_url_add_attributes": "false", "authorize_scopes":
|
3598
|
+
# "openid profile email", "authorize_url":
|
3599
|
+
# "https://auth.example.com/authorize", "client_id":
|
3600
|
+
# "1example23456789", "client_secret": "provider-app-client-secret",
|
3601
|
+
# "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
|
3602
|
+
# "oidc_issuer": "https://auth.example.com", "token_url":
|
3603
|
+
# "https://example.com/token" \}`
|
3604
|
+
#
|
3605
|
+
# SAML
|
3606
|
+
#
|
3607
|
+
# : Create or update request with Metadata URL: `"ProviderDetails": \{
|
3608
|
+
# "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
|
3609
|
+
# "true", "MetadataURL": "https://auth.example.com/sso/saml/metadata",
|
3610
|
+
# "RequestSigningAlgorithm": "rsa-sha256" \}`
|
3611
|
+
#
|
3612
|
+
# Create or update request with Metadata file: `"ProviderDetails": \{
|
3613
|
+
# "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
|
3614
|
+
# "true", "MetadataFile": "[metadata XML]", "RequestSigningAlgorithm":
|
3615
|
+
# "rsa-sha256" \}`
|
3616
|
+
#
|
3617
|
+
# The value of `MetadataFile` must be the plaintext metadata document
|
3618
|
+
# with all quote (") characters escaped by backslashes.
|
3619
|
+
#
|
3620
|
+
# Describe response: `"ProviderDetails": \{ "IDPInit": "true",
|
3621
|
+
# "IDPSignout": "true", "EncryptedResponses" : "true",
|
3622
|
+
# "ActiveEncryptionCertificate": "[certificate]", "MetadataURL":
|
3623
|
+
# "https://auth.example.com/sso/saml/metadata",
|
3624
|
+
# "RequestSigningAlgorithm": "rsa-sha256", "SLORedirectBindingURI":
|
3625
|
+
# "https://auth.example.com/slo/saml", "SSORedirectBindingURI":
|
3626
|
+
# "https://auth.example.com/sso/saml" \}`
|
3627
|
+
#
|
3628
|
+
# LoginWithAmazon
|
3629
|
+
#
|
3630
|
+
# : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
|
3631
|
+
# "profile postal_code", "client_id":
|
3632
|
+
# "amzn1.application-oa2-client.1example23456789", "client_secret":
|
3633
|
+
# "provider-app-client-secret"`
|
3634
|
+
#
|
3635
|
+
# Describe response: `"ProviderDetails": \{ "attributes_url":
|
3636
|
+
# "https://api.amazon.com/user/profile",
|
3637
|
+
# "attributes_url_add_attributes": "false", "authorize_scopes":
|
3638
|
+
# "profile postal_code", "authorize_url":
|
3639
|
+
# "https://www.amazon.com/ap/oa", "client_id":
|
3640
|
+
# "amzn1.application-oa2-client.1example23456789", "client_secret":
|
3641
|
+
# "provider-app-client-secret", "token_request_method": "POST",
|
3642
|
+
# "token_url": "https://api.amazon.com/auth/o2/token" \}`
|
3643
|
+
#
|
3644
|
+
# Google
|
3645
|
+
#
|
3646
|
+
# : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
|
3647
|
+
# "email profile openid", "client_id":
|
3648
|
+
# "1example23456789.apps.googleusercontent.com", "client_secret":
|
3649
|
+
# "provider-app-client-secret" \}`
|
3650
|
+
#
|
3651
|
+
# Describe response: `"ProviderDetails": \{ "attributes_url":
|
3652
|
+
# "https://people.googleapis.com/v1/people/me?personFields=",
|
3653
|
+
# "attributes_url_add_attributes": "true", "authorize_scopes": "email
|
3654
|
+
# profile openid", "authorize_url":
|
3655
|
+
# "https://accounts.google.com/o/oauth2/v2/auth", "client_id":
|
3656
|
+
# "1example23456789.apps.googleusercontent.com", "client_secret":
|
3657
|
+
# "provider-app-client-secret", "oidc_issuer":
|
3658
|
+
# "https://accounts.google.com", "token_request_method": "POST",
|
3659
|
+
# "token_url": "https://www.googleapis.com/oauth2/v4/token" \}`
|
3660
|
+
#
|
3661
|
+
# SignInWithApple
|
3662
|
+
#
|
3663
|
+
# : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
|
3664
|
+
# "email name", "client_id": "com.example.cognito", "private_key":
|
3665
|
+
# "1EXAMPLE", "key_id": "2EXAMPLE", "team_id": "3EXAMPLE" \}`
|
3666
|
+
#
|
3667
|
+
# Describe response: `"ProviderDetails": \{
|
3668
|
+
# "attributes_url_add_attributes": "false", "authorize_scopes": "email
|
3669
|
+
# name", "authorize_url": "https://appleid.apple.com/auth/authorize",
|
3670
|
+
# "client_id": "com.example.cognito", "key_id": "1EXAMPLE",
|
3671
|
+
# "oidc_issuer": "https://appleid.apple.com", "team_id": "2EXAMPLE",
|
3672
|
+
# "token_request_method": "POST", "token_url":
|
3673
|
+
# "https://appleid.apple.com/auth/token" \}`
|
3674
|
+
#
|
3675
|
+
# Facebook
|
3676
|
+
#
|
3677
|
+
# : Create or update request: `"ProviderDetails": \{ "api_version":
|
3678
|
+
# "v17.0", "authorize_scopes": "public_profile, email", "client_id":
|
3679
|
+
# "1example23456789", "client_secret": "provider-app-client-secret"
|
3680
|
+
# \}`
|
3681
|
+
#
|
3682
|
+
# Describe response: `"ProviderDetails": \{ "api_version": "v17.0",
|
3683
|
+
# "attributes_url": "https://graph.facebook.com/v17.0/me?fields=",
|
3684
|
+
# "attributes_url_add_attributes": "true", "authorize_scopes":
|
3685
|
+
# "public_profile, email", "authorize_url":
|
3686
|
+
# "https://www.facebook.com/v17.0/dialog/oauth", "client_id":
|
3687
|
+
# "1example23456789", "client_secret": "provider-app-client-secret",
|
3688
|
+
# "token_request_method": "GET", "token_url":
|
3689
|
+
# "https://graph.facebook.com/v17.0/oauth/access_token" \}`
|
3632
3690
|
#
|
3633
3691
|
# @option params [Hash<String,String>] :attribute_mapping
|
3634
3692
|
# A mapping of IdP attributes to standard and custom user pool
|
@@ -4525,11 +4583,11 @@ module Aws::CognitoIdentityProvider
|
|
4525
4583
|
# create_auth_challenge: "ArnType",
|
4526
4584
|
# verify_auth_challenge_response: "ArnType",
|
4527
4585
|
# pre_token_generation: "ArnType",
|
4586
|
+
# user_migration: "ArnType",
|
4528
4587
|
# pre_token_generation_config: {
|
4529
4588
|
# lambda_version: "V1_0", # required, accepts V1_0, V2_0
|
4530
4589
|
# lambda_arn: "ArnType", # required
|
4531
4590
|
# },
|
4532
|
-
# user_migration: "ArnType",
|
4533
4591
|
# custom_sms_sender: {
|
4534
4592
|
# lambda_version: "V1_0", # required, accepts V1_0
|
4535
4593
|
# lambda_arn: "ArnType", # required
|
@@ -4640,9 +4698,9 @@ module Aws::CognitoIdentityProvider
|
|
4640
4698
|
# resp.user_pool.lambda_config.create_auth_challenge #=> String
|
4641
4699
|
# resp.user_pool.lambda_config.verify_auth_challenge_response #=> String
|
4642
4700
|
# resp.user_pool.lambda_config.pre_token_generation #=> String
|
4701
|
+
# resp.user_pool.lambda_config.user_migration #=> String
|
4643
4702
|
# resp.user_pool.lambda_config.pre_token_generation_config.lambda_version #=> String, one of "V1_0", "V2_0"
|
4644
4703
|
# resp.user_pool.lambda_config.pre_token_generation_config.lambda_arn #=> String
|
4645
|
-
# resp.user_pool.lambda_config.user_migration #=> String
|
4646
4704
|
# resp.user_pool.lambda_config.custom_sms_sender.lambda_version #=> String, one of "V1_0"
|
4647
4705
|
# resp.user_pool.lambda_config.custom_sms_sender.lambda_arn #=> String
|
4648
4706
|
# resp.user_pool.lambda_config.custom_email_sender.lambda_version #=> String, one of "V1_0"
|
@@ -4957,7 +5015,9 @@ module Aws::CognitoIdentityProvider
|
|
4957
5015
|
# [1]: https://tools.ietf.org/html/rfc6749#section-3.1.2
|
4958
5016
|
#
|
4959
5017
|
# @option params [Array<String>] :allowed_o_auth_flows
|
4960
|
-
# The
|
5018
|
+
# The OAuth grant types that you want your app client to generate. To
|
5019
|
+
# create an app client that generates client credentials grants, you
|
5020
|
+
# must add `client_credentials` as the only allowed OAuth flow.
|
4961
5021
|
#
|
4962
5022
|
# code
|
4963
5023
|
#
|
@@ -5436,12 +5496,15 @@ module Aws::CognitoIdentityProvider
|
|
5436
5496
|
|
5437
5497
|
# Allows a user to delete their own user profile.
|
5438
5498
|
#
|
5499
|
+
# Authorize this action with a signed-in user's access token. It must
|
5500
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
5501
|
+
#
|
5439
5502
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
5440
5503
|
# policies in requests for this API operation. For this operation, you
|
5441
5504
|
# can't use IAM credentials to authorize requests, and you can't grant
|
5442
5505
|
# IAM permissions in policies. For more information about authorization
|
5443
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
5444
|
-
#
|
5506
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
5507
|
+
# and user pool endpoints][1].
|
5445
5508
|
#
|
5446
5509
|
# </note>
|
5447
5510
|
#
|
@@ -5472,12 +5535,15 @@ module Aws::CognitoIdentityProvider
|
|
5472
5535
|
|
5473
5536
|
# Deletes the attributes for a user.
|
5474
5537
|
#
|
5538
|
+
# Authorize this action with a signed-in user's access token. It must
|
5539
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
5540
|
+
#
|
5475
5541
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
5476
5542
|
# policies in requests for this API operation. For this operation, you
|
5477
5543
|
# can't use IAM credentials to authorize requests, and you can't grant
|
5478
5544
|
# IAM permissions in policies. For more information about authorization
|
5479
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
5480
|
-
#
|
5545
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
5546
|
+
# and user pool endpoints][1].
|
5481
5547
|
#
|
5482
5548
|
# </note>
|
5483
5549
|
#
|
@@ -5828,9 +5894,9 @@ module Aws::CognitoIdentityProvider
|
|
5828
5894
|
# resp.user_pool.lambda_config.create_auth_challenge #=> String
|
5829
5895
|
# resp.user_pool.lambda_config.verify_auth_challenge_response #=> String
|
5830
5896
|
# resp.user_pool.lambda_config.pre_token_generation #=> String
|
5897
|
+
# resp.user_pool.lambda_config.user_migration #=> String
|
5831
5898
|
# resp.user_pool.lambda_config.pre_token_generation_config.lambda_version #=> String, one of "V1_0", "V2_0"
|
5832
5899
|
# resp.user_pool.lambda_config.pre_token_generation_config.lambda_arn #=> String
|
5833
|
-
# resp.user_pool.lambda_config.user_migration #=> String
|
5834
5900
|
# resp.user_pool.lambda_config.custom_sms_sender.lambda_version #=> String, one of "V1_0"
|
5835
5901
|
# resp.user_pool.lambda_config.custom_sms_sender.lambda_arn #=> String
|
5836
5902
|
# resp.user_pool.lambda_config.custom_email_sender.lambda_version #=> String, one of "V1_0"
|
@@ -6032,20 +6098,25 @@ module Aws::CognitoIdentityProvider
|
|
6032
6098
|
req.send_request(options)
|
6033
6099
|
end
|
6034
6100
|
|
6035
|
-
# Forgets the specified device.
|
6101
|
+
# Forgets the specified device. For more information about device
|
6102
|
+
# authentication, see [Working with user devices in your user pool][1].
|
6103
|
+
#
|
6104
|
+
# Authorize this action with a signed-in user's access token. It must
|
6105
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
6036
6106
|
#
|
6037
6107
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
6038
6108
|
# policies in requests for this API operation. For this operation, you
|
6039
6109
|
# can't use IAM credentials to authorize requests, and you can't grant
|
6040
6110
|
# IAM permissions in policies. For more information about authorization
|
6041
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
6042
|
-
#
|
6111
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
6112
|
+
# and user pool endpoints][2].
|
6043
6113
|
#
|
6044
6114
|
# </note>
|
6045
6115
|
#
|
6046
6116
|
#
|
6047
6117
|
#
|
6048
|
-
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-
|
6118
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html
|
6119
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
6049
6120
|
#
|
6050
6121
|
# @option params [String] :access_token
|
6051
6122
|
# A valid access token that Amazon Cognito issued to the user whose
|
@@ -6090,8 +6161,8 @@ module Aws::CognitoIdentityProvider
|
|
6090
6161
|
# policies in requests for this API operation. For this operation, you
|
6091
6162
|
# can't use IAM credentials to authorize requests, and you can't grant
|
6092
6163
|
# IAM permissions in policies. For more information about authorization
|
6093
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
6094
|
-
#
|
6164
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
6165
|
+
# and user pool endpoints][3].
|
6095
6166
|
#
|
6096
6167
|
# </note>
|
6097
6168
|
#
|
@@ -6256,20 +6327,25 @@ module Aws::CognitoIdentityProvider
|
|
6256
6327
|
req.send_request(options)
|
6257
6328
|
end
|
6258
6329
|
|
6259
|
-
# Gets the device.
|
6330
|
+
# Gets the device. For more information about device authentication, see
|
6331
|
+
# [Working with user devices in your user pool][1].
|
6332
|
+
#
|
6333
|
+
# Authorize this action with a signed-in user's access token. It must
|
6334
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
6260
6335
|
#
|
6261
6336
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
6262
6337
|
# policies in requests for this API operation. For this operation, you
|
6263
6338
|
# can't use IAM credentials to authorize requests, and you can't grant
|
6264
6339
|
# IAM permissions in policies. For more information about authorization
|
6265
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
6266
|
-
#
|
6340
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
6341
|
+
# and user pool endpoints][2].
|
6267
6342
|
#
|
6268
6343
|
# </note>
|
6269
6344
|
#
|
6270
6345
|
#
|
6271
6346
|
#
|
6272
|
-
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-
|
6347
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html
|
6348
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
6273
6349
|
#
|
6274
6350
|
# @option params [required, String] :device_key
|
6275
6351
|
# The device key.
|
@@ -6502,12 +6578,15 @@ module Aws::CognitoIdentityProvider
|
|
6502
6578
|
|
6503
6579
|
# Gets the user attributes and metadata for a user.
|
6504
6580
|
#
|
6581
|
+
# Authorize this action with a signed-in user's access token. It must
|
6582
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
6583
|
+
#
|
6505
6584
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
6506
6585
|
# policies in requests for this API operation. For this operation, you
|
6507
6586
|
# can't use IAM credentials to authorize requests, and you can't grant
|
6508
6587
|
# IAM permissions in policies. For more information about authorization
|
6509
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
6510
|
-
#
|
6588
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
6589
|
+
# and user pool endpoints][1].
|
6511
6590
|
#
|
6512
6591
|
# </note>
|
6513
6592
|
#
|
@@ -6559,12 +6638,15 @@ module Aws::CognitoIdentityProvider
|
|
6559
6638
|
# attribute name. Sends a message to a user with a code that they must
|
6560
6639
|
# return in a VerifyUserAttribute request.
|
6561
6640
|
#
|
6641
|
+
# Authorize this action with a signed-in user's access token. It must
|
6642
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
6643
|
+
#
|
6562
6644
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
6563
6645
|
# policies in requests for this API operation. For this operation, you
|
6564
6646
|
# can't use IAM credentials to authorize requests, and you can't grant
|
6565
6647
|
# IAM permissions in policies. For more information about authorization
|
6566
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
6567
|
-
#
|
6648
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
6649
|
+
# and user pool endpoints][1].
|
6568
6650
|
#
|
6569
6651
|
# </note>
|
6570
6652
|
#
|
@@ -6728,12 +6810,15 @@ module Aws::CognitoIdentityProvider
|
|
6728
6810
|
#
|
6729
6811
|
# Other requests might be valid until your user's token expires.
|
6730
6812
|
#
|
6813
|
+
# Authorize this action with a signed-in user's access token. It must
|
6814
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
6815
|
+
#
|
6731
6816
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
6732
6817
|
# policies in requests for this API operation. For this operation, you
|
6733
6818
|
# can't use IAM credentials to authorize requests, and you can't grant
|
6734
6819
|
# IAM permissions in policies. For more information about authorization
|
6735
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
6736
|
-
#
|
6820
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
6821
|
+
# and user pool endpoints][1].
|
6737
6822
|
#
|
6738
6823
|
# </note>
|
6739
6824
|
#
|
@@ -6773,8 +6858,8 @@ module Aws::CognitoIdentityProvider
|
|
6773
6858
|
# policies in requests for this API operation. For this operation, you
|
6774
6859
|
# can't use IAM credentials to authorize requests, and you can't grant
|
6775
6860
|
# IAM permissions in policies. For more information about authorization
|
6776
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
6777
|
-
#
|
6861
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
6862
|
+
# and user pool endpoints][2].
|
6778
6863
|
#
|
6779
6864
|
# </note>
|
6780
6865
|
#
|
@@ -7029,20 +7114,25 @@ module Aws::CognitoIdentityProvider
|
|
7029
7114
|
end
|
7030
7115
|
|
7031
7116
|
# Lists the sign-in devices that Amazon Cognito has registered to the
|
7032
|
-
# current user.
|
7117
|
+
# current user. For more information about device authentication, see
|
7118
|
+
# [Working with user devices in your user pool][1].
|
7119
|
+
#
|
7120
|
+
# Authorize this action with a signed-in user's access token. It must
|
7121
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
7033
7122
|
#
|
7034
7123
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
7035
7124
|
# policies in requests for this API operation. For this operation, you
|
7036
7125
|
# can't use IAM credentials to authorize requests, and you can't grant
|
7037
7126
|
# IAM permissions in policies. For more information about authorization
|
7038
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
7039
|
-
#
|
7127
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
7128
|
+
# and user pool endpoints][2].
|
7040
7129
|
#
|
7041
7130
|
# </note>
|
7042
7131
|
#
|
7043
7132
|
#
|
7044
7133
|
#
|
7045
|
-
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-
|
7134
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html
|
7135
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
7046
7136
|
#
|
7047
7137
|
# @option params [required, String] :access_token
|
7048
7138
|
# A valid access token that Amazon Cognito issued to the user whose list
|
@@ -7519,9 +7609,9 @@ module Aws::CognitoIdentityProvider
|
|
7519
7609
|
# resp.user_pools[0].lambda_config.create_auth_challenge #=> String
|
7520
7610
|
# resp.user_pools[0].lambda_config.verify_auth_challenge_response #=> String
|
7521
7611
|
# resp.user_pools[0].lambda_config.pre_token_generation #=> String
|
7612
|
+
# resp.user_pools[0].lambda_config.user_migration #=> String
|
7522
7613
|
# resp.user_pools[0].lambda_config.pre_token_generation_config.lambda_version #=> String, one of "V1_0", "V2_0"
|
7523
7614
|
# resp.user_pools[0].lambda_config.pre_token_generation_config.lambda_arn #=> String
|
7524
|
-
# resp.user_pools[0].lambda_config.user_migration #=> String
|
7525
7615
|
# resp.user_pools[0].lambda_config.custom_sms_sender.lambda_version #=> String, one of "V1_0"
|
7526
7616
|
# resp.user_pools[0].lambda_config.custom_sms_sender.lambda_arn #=> String
|
7527
7617
|
# resp.user_pools[0].lambda_config.custom_email_sender.lambda_version #=> String, one of "V1_0"
|
@@ -7858,8 +7948,8 @@ module Aws::CognitoIdentityProvider
|
|
7858
7948
|
# policies in requests for this API operation. For this operation, you
|
7859
7949
|
# can't use IAM credentials to authorize requests, and you can't grant
|
7860
7950
|
# IAM permissions in policies. For more information about authorization
|
7861
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
7862
|
-
#
|
7951
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
7952
|
+
# and user pool endpoints][1].
|
7863
7953
|
#
|
7864
7954
|
# </note>
|
7865
7955
|
#
|
@@ -8003,8 +8093,8 @@ module Aws::CognitoIdentityProvider
|
|
8003
8093
|
# policies in requests for this API operation. For this operation, you
|
8004
8094
|
# can't use IAM credentials to authorize requests, and you can't grant
|
8005
8095
|
# IAM permissions in policies. For more information about authorization
|
8006
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
8007
|
-
#
|
8096
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
8097
|
+
# and user pool endpoints][2].
|
8008
8098
|
#
|
8009
8099
|
# </note>
|
8010
8100
|
#
|
@@ -8255,8 +8345,8 @@ module Aws::CognitoIdentityProvider
|
|
8255
8345
|
# policies in requests for this API operation. For this operation, you
|
8256
8346
|
# can't use IAM credentials to authorize requests, and you can't grant
|
8257
8347
|
# IAM permissions in policies. For more information about authorization
|
8258
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
8259
|
-
#
|
8348
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
8349
|
+
# and user pool endpoints][1].
|
8260
8350
|
#
|
8261
8351
|
# </note>
|
8262
8352
|
#
|
@@ -8537,12 +8627,15 @@ module Aws::CognitoIdentityProvider
|
|
8537
8627
|
# based on the assessed risk level of sign-in attempts, deactivate MFA
|
8538
8628
|
# for users and turn on Adaptive Authentication for the user pool.
|
8539
8629
|
#
|
8630
|
+
# Authorize this action with a signed-in user's access token. It must
|
8631
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
8632
|
+
#
|
8540
8633
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
8541
8634
|
# policies in requests for this API operation. For this operation, you
|
8542
8635
|
# can't use IAM credentials to authorize requests, and you can't grant
|
8543
8636
|
# IAM permissions in policies. For more information about authorization
|
8544
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
8545
|
-
#
|
8637
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
8638
|
+
# and user pool endpoints][1].
|
8546
8639
|
#
|
8547
8640
|
# </note>
|
8548
8641
|
#
|
@@ -8686,12 +8779,15 @@ module Aws::CognitoIdentityProvider
|
|
8686
8779
|
# (TOTP) software token MFA. To configure either type of MFA, use
|
8687
8780
|
# [SetUserMFAPreference][1] instead.
|
8688
8781
|
#
|
8782
|
+
# Authorize this action with a signed-in user's access token. It must
|
8783
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
8784
|
+
#
|
8689
8785
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
8690
8786
|
# policies in requests for this API operation. For this operation, you
|
8691
8787
|
# can't use IAM credentials to authorize requests, and you can't grant
|
8692
8788
|
# IAM permissions in policies. For more information about authorization
|
8693
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
8694
|
-
#
|
8789
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
8790
|
+
# and user pool endpoints][2].
|
8695
8791
|
#
|
8696
8792
|
# </note>
|
8697
8793
|
#
|
@@ -8738,8 +8834,8 @@ module Aws::CognitoIdentityProvider
|
|
8738
8834
|
# policies in requests for this API operation. For this operation, you
|
8739
8835
|
# can't use IAM credentials to authorize requests, and you can't grant
|
8740
8836
|
# IAM permissions in policies. For more information about authorization
|
8741
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
8742
|
-
#
|
8837
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
8838
|
+
# and user pool endpoints][1].
|
8743
8839
|
#
|
8744
8840
|
# </note>
|
8745
8841
|
#
|
@@ -9087,8 +9183,8 @@ module Aws::CognitoIdentityProvider
|
|
9087
9183
|
# policies in requests for this API operation. For this operation, you
|
9088
9184
|
# can't use IAM credentials to authorize requests, and you can't grant
|
9089
9185
|
# IAM permissions in policies. For more information about authorization
|
9090
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
9091
|
-
#
|
9186
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
9187
|
+
# and user pool endpoints][1].
|
9092
9188
|
#
|
9093
9189
|
# </note>
|
9094
9190
|
#
|
@@ -9140,20 +9236,25 @@ module Aws::CognitoIdentityProvider
|
|
9140
9236
|
req.send_request(options)
|
9141
9237
|
end
|
9142
9238
|
|
9143
|
-
# Updates the device status.
|
9239
|
+
# Updates the device status. For more information about device
|
9240
|
+
# authentication, see [Working with user devices in your user pool][1].
|
9241
|
+
#
|
9242
|
+
# Authorize this action with a signed-in user's access token. It must
|
9243
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
9144
9244
|
#
|
9145
9245
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
9146
9246
|
# policies in requests for this API operation. For this operation, you
|
9147
9247
|
# can't use IAM credentials to authorize requests, and you can't grant
|
9148
9248
|
# IAM permissions in policies. For more information about authorization
|
9149
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
9150
|
-
#
|
9249
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
9250
|
+
# and user pool endpoints][2].
|
9151
9251
|
#
|
9152
9252
|
# </note>
|
9153
9253
|
#
|
9154
9254
|
#
|
9155
9255
|
#
|
9156
|
-
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-
|
9256
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html
|
9257
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
|
9157
9258
|
#
|
9158
9259
|
# @option params [required, String] :access_token
|
9159
9260
|
# A valid access token that Amazon Cognito issued to the user whose
|
@@ -9286,8 +9387,123 @@ module Aws::CognitoIdentityProvider
|
|
9286
9387
|
# The IdP name.
|
9287
9388
|
#
|
9288
9389
|
# @option params [Hash<String,String>] :provider_details
|
9289
|
-
# The
|
9290
|
-
#
|
9390
|
+
# The scopes, URLs, and identifiers for your external identity provider.
|
9391
|
+
# The following examples describe the provider detail keys for each IdP
|
9392
|
+
# type. These values and their schema are subject to change. Social IdP
|
9393
|
+
# `authorize_scopes` values must match the values listed here.
|
9394
|
+
#
|
9395
|
+
# OpenID Connect (OIDC)
|
9396
|
+
#
|
9397
|
+
# : Amazon Cognito accepts the following elements when it can't
|
9398
|
+
# discover endpoint URLs from `oidc_issuer`: `attributes_url`,
|
9399
|
+
# `authorize_url`, `jwks_uri`, `token_url`.
|
9400
|
+
#
|
9401
|
+
# Create or update request: `"ProviderDetails": \{
|
9402
|
+
# "attributes_request_method": "GET", "attributes_url":
|
9403
|
+
# "https://auth.example.com/userInfo", "authorize_scopes": "openid
|
9404
|
+
# profile email", "authorize_url":
|
9405
|
+
# "https://auth.example.com/authorize", "client_id":
|
9406
|
+
# "1example23456789", "client_secret": "provider-app-client-secret",
|
9407
|
+
# "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
|
9408
|
+
# "oidc_issuer": "https://auth.example.com", "token_url":
|
9409
|
+
# "https://example.com/token" \}`
|
9410
|
+
#
|
9411
|
+
# Describe response: `"ProviderDetails": \{
|
9412
|
+
# "attributes_request_method": "GET", "attributes_url":
|
9413
|
+
# "https://auth.example.com/userInfo",
|
9414
|
+
# "attributes_url_add_attributes": "false", "authorize_scopes":
|
9415
|
+
# "openid profile email", "authorize_url":
|
9416
|
+
# "https://auth.example.com/authorize", "client_id":
|
9417
|
+
# "1example23456789", "client_secret": "provider-app-client-secret",
|
9418
|
+
# "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
|
9419
|
+
# "oidc_issuer": "https://auth.example.com", "token_url":
|
9420
|
+
# "https://example.com/token" \}`
|
9421
|
+
#
|
9422
|
+
# SAML
|
9423
|
+
#
|
9424
|
+
# : Create or update request with Metadata URL: `"ProviderDetails": \{
|
9425
|
+
# "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
|
9426
|
+
# "true", "MetadataURL": "https://auth.example.com/sso/saml/metadata",
|
9427
|
+
# "RequestSigningAlgorithm": "rsa-sha256" \}`
|
9428
|
+
#
|
9429
|
+
# Create or update request with Metadata file: `"ProviderDetails": \{
|
9430
|
+
# "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
|
9431
|
+
# "true", "MetadataFile": "[metadata XML]", "RequestSigningAlgorithm":
|
9432
|
+
# "rsa-sha256" \}`
|
9433
|
+
#
|
9434
|
+
# The value of `MetadataFile` must be the plaintext metadata document
|
9435
|
+
# with all quote (") characters escaped by backslashes.
|
9436
|
+
#
|
9437
|
+
# Describe response: `"ProviderDetails": \{ "IDPInit": "true",
|
9438
|
+
# "IDPSignout": "true", "EncryptedResponses" : "true",
|
9439
|
+
# "ActiveEncryptionCertificate": "[certificate]", "MetadataURL":
|
9440
|
+
# "https://auth.example.com/sso/saml/metadata",
|
9441
|
+
# "RequestSigningAlgorithm": "rsa-sha256", "SLORedirectBindingURI":
|
9442
|
+
# "https://auth.example.com/slo/saml", "SSORedirectBindingURI":
|
9443
|
+
# "https://auth.example.com/sso/saml" \}`
|
9444
|
+
#
|
9445
|
+
# LoginWithAmazon
|
9446
|
+
#
|
9447
|
+
# : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
|
9448
|
+
# "profile postal_code", "client_id":
|
9449
|
+
# "amzn1.application-oa2-client.1example23456789", "client_secret":
|
9450
|
+
# "provider-app-client-secret"`
|
9451
|
+
#
|
9452
|
+
# Describe response: `"ProviderDetails": \{ "attributes_url":
|
9453
|
+
# "https://api.amazon.com/user/profile",
|
9454
|
+
# "attributes_url_add_attributes": "false", "authorize_scopes":
|
9455
|
+
# "profile postal_code", "authorize_url":
|
9456
|
+
# "https://www.amazon.com/ap/oa", "client_id":
|
9457
|
+
# "amzn1.application-oa2-client.1example23456789", "client_secret":
|
9458
|
+
# "provider-app-client-secret", "token_request_method": "POST",
|
9459
|
+
# "token_url": "https://api.amazon.com/auth/o2/token" \}`
|
9460
|
+
#
|
9461
|
+
# Google
|
9462
|
+
#
|
9463
|
+
# : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
|
9464
|
+
# "email profile openid", "client_id":
|
9465
|
+
# "1example23456789.apps.googleusercontent.com", "client_secret":
|
9466
|
+
# "provider-app-client-secret" \}`
|
9467
|
+
#
|
9468
|
+
# Describe response: `"ProviderDetails": \{ "attributes_url":
|
9469
|
+
# "https://people.googleapis.com/v1/people/me?personFields=",
|
9470
|
+
# "attributes_url_add_attributes": "true", "authorize_scopes": "email
|
9471
|
+
# profile openid", "authorize_url":
|
9472
|
+
# "https://accounts.google.com/o/oauth2/v2/auth", "client_id":
|
9473
|
+
# "1example23456789.apps.googleusercontent.com", "client_secret":
|
9474
|
+
# "provider-app-client-secret", "oidc_issuer":
|
9475
|
+
# "https://accounts.google.com", "token_request_method": "POST",
|
9476
|
+
# "token_url": "https://www.googleapis.com/oauth2/v4/token" \}`
|
9477
|
+
#
|
9478
|
+
# SignInWithApple
|
9479
|
+
#
|
9480
|
+
# : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
|
9481
|
+
# "email name", "client_id": "com.example.cognito", "private_key":
|
9482
|
+
# "1EXAMPLE", "key_id": "2EXAMPLE", "team_id": "3EXAMPLE" \}`
|
9483
|
+
#
|
9484
|
+
# Describe response: `"ProviderDetails": \{
|
9485
|
+
# "attributes_url_add_attributes": "false", "authorize_scopes": "email
|
9486
|
+
# name", "authorize_url": "https://appleid.apple.com/auth/authorize",
|
9487
|
+
# "client_id": "com.example.cognito", "key_id": "1EXAMPLE",
|
9488
|
+
# "oidc_issuer": "https://appleid.apple.com", "team_id": "2EXAMPLE",
|
9489
|
+
# "token_request_method": "POST", "token_url":
|
9490
|
+
# "https://appleid.apple.com/auth/token" \}`
|
9491
|
+
#
|
9492
|
+
# Facebook
|
9493
|
+
#
|
9494
|
+
# : Create or update request: `"ProviderDetails": \{ "api_version":
|
9495
|
+
# "v17.0", "authorize_scopes": "public_profile, email", "client_id":
|
9496
|
+
# "1example23456789", "client_secret": "provider-app-client-secret"
|
9497
|
+
# \}`
|
9498
|
+
#
|
9499
|
+
# Describe response: `"ProviderDetails": \{ "api_version": "v17.0",
|
9500
|
+
# "attributes_url": "https://graph.facebook.com/v17.0/me?fields=",
|
9501
|
+
# "attributes_url_add_attributes": "true", "authorize_scopes":
|
9502
|
+
# "public_profile, email", "authorize_url":
|
9503
|
+
# "https://www.facebook.com/v17.0/dialog/oauth", "client_id":
|
9504
|
+
# "1example23456789", "client_secret": "provider-app-client-secret",
|
9505
|
+
# "token_request_method": "GET", "token_url":
|
9506
|
+
# "https://graph.facebook.com/v17.0/oauth/access_token" \}`
|
9291
9507
|
#
|
9292
9508
|
# @option params [Hash<String,String>] :attribute_mapping
|
9293
9509
|
# The IdP attribute mapping to be changed.
|
@@ -9414,12 +9630,15 @@ module Aws::CognitoIdentityProvider
|
|
9414
9630
|
# submit the attribute in your API request with a blank value. Custom
|
9415
9631
|
# attribute values in this request must include the `custom:` prefix.
|
9416
9632
|
#
|
9633
|
+
# Authorize this action with a signed-in user's access token. It must
|
9634
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
9635
|
+
#
|
9417
9636
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
9418
9637
|
# policies in requests for this API operation. For this operation, you
|
9419
9638
|
# can't use IAM credentials to authorize requests, and you can't grant
|
9420
9639
|
# IAM permissions in policies. For more information about authorization
|
9421
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
9422
|
-
#
|
9640
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
9641
|
+
# and user pool endpoints][1].
|
9423
9642
|
#
|
9424
9643
|
# </note>
|
9425
9644
|
#
|
@@ -9754,11 +9973,11 @@ module Aws::CognitoIdentityProvider
|
|
9754
9973
|
# create_auth_challenge: "ArnType",
|
9755
9974
|
# verify_auth_challenge_response: "ArnType",
|
9756
9975
|
# pre_token_generation: "ArnType",
|
9976
|
+
# user_migration: "ArnType",
|
9757
9977
|
# pre_token_generation_config: {
|
9758
9978
|
# lambda_version: "V1_0", # required, accepts V1_0, V2_0
|
9759
9979
|
# lambda_arn: "ArnType", # required
|
9760
9980
|
# },
|
9761
|
-
# user_migration: "ArnType",
|
9762
9981
|
# custom_sms_sender: {
|
9763
9982
|
# lambda_version: "V1_0", # required, accepts V1_0
|
9764
9983
|
# lambda_arn: "ArnType", # required
|
@@ -10376,8 +10595,8 @@ module Aws::CognitoIdentityProvider
|
|
10376
10595
|
# policies in requests for this API operation. For this operation, you
|
10377
10596
|
# can't use IAM credentials to authorize requests, and you can't grant
|
10378
10597
|
# IAM permissions in policies. For more information about authorization
|
10379
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
10380
|
-
#
|
10598
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
10599
|
+
# and user pool endpoints][1].
|
10381
10600
|
#
|
10382
10601
|
# </note>
|
10383
10602
|
#
|
@@ -10439,12 +10658,15 @@ module Aws::CognitoIdentityProvider
|
|
10439
10658
|
# attribute to its pending value. For more information, see [
|
10440
10659
|
# UserAttributeUpdateSettingsType][1].
|
10441
10660
|
#
|
10661
|
+
# Authorize this action with a signed-in user's access token. It must
|
10662
|
+
# include the scope `aws.cognito.signin.user.admin`.
|
10663
|
+
#
|
10442
10664
|
# <note markdown="1"> Amazon Cognito doesn't evaluate Identity and Access Management (IAM)
|
10443
10665
|
# policies in requests for this API operation. For this operation, you
|
10444
10666
|
# can't use IAM credentials to authorize requests, and you can't grant
|
10445
10667
|
# IAM permissions in policies. For more information about authorization
|
10446
|
-
# models in Amazon Cognito, see [Using the Amazon Cognito
|
10447
|
-
#
|
10668
|
+
# models in Amazon Cognito, see [Using the Amazon Cognito user pools API
|
10669
|
+
# and user pool endpoints][2].
|
10448
10670
|
#
|
10449
10671
|
# </note>
|
10450
10672
|
#
|
@@ -10495,7 +10717,7 @@ module Aws::CognitoIdentityProvider
|
|
10495
10717
|
params: params,
|
10496
10718
|
config: config)
|
10497
10719
|
context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
|
10498
|
-
context[:gem_version] = '1.
|
10720
|
+
context[:gem_version] = '1.87.0'
|
10499
10721
|
Seahorse::Client::Request.new(handlers, context)
|
10500
10722
|
end
|
10501
10723
|
|