aws-sdk-cognitoidentityprovider 1.27.0 → 1.28.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: c61021bd9eb04d38a294367ad4fce2dcdcd77e2f
4
- data.tar.gz: 518e71cb755bb218db2b30497a9dff87e91e6ae1
3
+ metadata.gz: 201c2dae29af53f1d9b0a56accf6abd58bfe4063
4
+ data.tar.gz: e7c0371129e3e44fd16d55a738fa887d3c79235a
5
5
  SHA512:
6
- metadata.gz: 7513a1c1f7578ed52bbc0bad0456585d83c01f4e00635d3ccb57445e3b48d649a73675ba496fe02147aa6c4b9f5e857172f7e38f319feb88e2b8157d91dd536f
7
- data.tar.gz: d834b929aa4ab2ff16dfa3f2298e165e3159c2849ea46c1d716fd90d0b36db3a389df64169fa9ed7f1291b0e04e8a3d9e58bdb10d0ed8e10a07eff5bf6965222
6
+ metadata.gz: ad161717df9a0fa462795286b7b488f4e452837fdf755eba0f95f7f2f7dc0b8764c1d06a22f1740b748ede3fcf3a00f47dcaad5417b32ed7876707236ea74b98
7
+ data.tar.gz: d0984dc7926258b3bb85c70f346322a27bde345cad6804d18f8a048a8d3f225c71e549cc5f26d7775d887fddf5965259416eb584f57b4017880d027b9e80874a
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-cognitoidentityprovider/customizations'
42
42
  # @service
43
43
  module Aws::CognitoIdentityProvider
44
44
 
45
- GEM_VERSION = '1.27.0'
45
+ GEM_VERSION = '1.28.0'
46
46
 
47
47
  end
@@ -975,6 +975,11 @@ module Aws::CognitoIdentityProvider
975
975
  # set, this flow will invoke the user migration Lambda if the USERNAME
976
976
  # is not found in the user pool.
977
977
  #
978
+ # * `ADMIN_USER_PASSWORD_AUTH`\: Admin-based user password
979
+ # authentication. This replaces the `ADMIN_NO_SRP_AUTH` authentication
980
+ # flow. In this flow, Cognito receives the password in the request
981
+ # instead of using the SRP process to verify passwords.
982
+ #
978
983
  # @option params [Hash<String,String>] :auth_parameters
979
984
  # The authentication parameters. These are inputs corresponding to the
980
985
  # `AuthFlow` that you are invoking. The required values depend on the
@@ -1079,7 +1084,7 @@ module Aws::CognitoIdentityProvider
1079
1084
  # resp = client.admin_initiate_auth({
1080
1085
  # user_pool_id: "UserPoolIdType", # required
1081
1086
  # client_id: "ClientIdType", # required
1082
- # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
1087
+ # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH, ADMIN_USER_PASSWORD_AUTH
1083
1088
  # auth_parameters: {
1084
1089
  # "StringType" => "StringType",
1085
1090
  # },
@@ -2126,14 +2131,14 @@ module Aws::CognitoIdentityProvider
2126
2131
  #
2127
2132
  # You create custom workflows by assigning AWS Lambda functions to user
2128
2133
  # pool triggers. When you use the ConfirmForgotPassword API action,
2129
- # Amazon Cognito invokes the functions that are assigned to the *post
2130
- # confirmation* and *pre mutation* triggers. When Amazon Cognito invokes
2131
- # either of these functions, it passes a JSON payload, which the
2132
- # function receives as input. This payload contains a `clientMetadata`
2133
- # attribute, which provides the data that you assigned to the
2134
- # ClientMetadata parameter in your ConfirmForgotPassword request. In
2135
- # your function code in AWS Lambda, you can process the `clientMetadata`
2136
- # value to enhance your workflow for your specific needs.
2134
+ # Amazon Cognito invokes the function that is assigned to the *post
2135
+ # confirmation* trigger. When Amazon Cognito invokes this function, it
2136
+ # passes a JSON payload, which the function receives as input. This
2137
+ # payload contains a `clientMetadata` attribute, which provides the data
2138
+ # that you assigned to the ClientMetadata parameter in your
2139
+ # ConfirmForgotPassword request. In your function code in AWS Lambda,
2140
+ # you can process the `clientMetadata` value to enhance your workflow
2141
+ # for your specific needs.
2137
2142
  #
2138
2143
  # For more information, see [Customizing User Pool Workflows with Lambda
2139
2144
  # Triggers][1] in the *Amazon Cognito Developer Guide*.
@@ -2826,7 +2831,29 @@ module Aws::CognitoIdentityProvider
2826
2831
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-specifying-attribute-mapping.html
2827
2832
  #
2828
2833
  # @option params [Array<String>] :explicit_auth_flows
2829
- # The explicit authentication flows.
2834
+ # The authentication flows that are supported by the user pool clients.
2835
+ # Flow names without the `ALLOW_` prefix are deprecated in favor of new
2836
+ # names with the `ALLOW_` prefix. Note that values with `ALLOW_` prefix
2837
+ # cannot be used along with values without `ALLOW_` prefix.
2838
+ #
2839
+ # Valid values include:
2840
+ #
2841
+ # * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user password
2842
+ # authentication flow `ADMIN_USER_PASSWORD_AUTH`. This setting
2843
+ # replaces the `ADMIN_NO_SRP_AUTH` setting. With this authentication
2844
+ # flow, Cognito receives the password in the request instead of using
2845
+ # the SRP (Secure Remote Password protocol) protocol to verify
2846
+ # passwords.
2847
+ #
2848
+ # * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
2849
+ #
2850
+ # * `ALLOW_USER_PASSWORD_AUTH`\: Enable user password-based
2851
+ # authentication. In this flow, Cognito receives the password in the
2852
+ # request instead of using the SRP protocol to verify passwords.
2853
+ #
2854
+ # * `ALLOW_USER_SRP_AUTH`\: Enable SRP based authentication.
2855
+ #
2856
+ # * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
2830
2857
  #
2831
2858
  # @option params [Array<String>] :supported_identity_providers
2832
2859
  # A list of provider names for the identity providers that are supported
@@ -2902,6 +2929,48 @@ module Aws::CognitoIdentityProvider
2902
2929
  # The Amazon Pinpoint analytics configuration for collecting metrics for
2903
2930
  # this user pool.
2904
2931
  #
2932
+ # @option params [String] :prevent_user_existence_errors
2933
+ # Use this setting to choose which errors and responses are returned by
2934
+ # Cognito APIs during authentication, account confirmation, and password
2935
+ # recovery when the user does not exist in the user pool. When set to
2936
+ # `ENABLED` and the user does not exist, authentication returns an error
2937
+ # indicating either the username or password was incorrect, and account
2938
+ # confirmation and password recovery return a response indicating a code
2939
+ # was sent to a simulated destination. When set to `LEGACY`, those APIs
2940
+ # will return a `UserNotFoundException` exception if the user does not
2941
+ # exist in the user pool.
2942
+ #
2943
+ # Valid values include:
2944
+ #
2945
+ # * `ENABLED` - This prevents user existence-related errors.
2946
+ #
2947
+ # * `LEGACY` - This represents the old behavior of Cognito where user
2948
+ # existence related errors are not prevented.
2949
+ #
2950
+ # This setting affects the behavior of following APIs:
2951
+ #
2952
+ # * AdminInitiateAuth
2953
+ #
2954
+ # * AdminRespondToAuthChallenge
2955
+ #
2956
+ # * InitiateAuth
2957
+ #
2958
+ # * RespondToAuthChallenge
2959
+ #
2960
+ # * ForgotPassword
2961
+ #
2962
+ # * ConfirmForgotPassword
2963
+ #
2964
+ # * ConfirmSignUp
2965
+ #
2966
+ # * ResendConfirmationCode
2967
+ #
2968
+ # <note markdown="1"> After January 1st 2020, the value of `PreventUserExistenceErrors` will
2969
+ # default to `ENABLED` for newly created user pool clients if no value
2970
+ # is provided.
2971
+ #
2972
+ # </note>
2973
+ #
2905
2974
  # @return [Types::CreateUserPoolClientResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2906
2975
  #
2907
2976
  # * {Types::CreateUserPoolClientResponse#user_pool_client #user_pool_client} => Types::UserPoolClientType
@@ -2915,7 +2984,7 @@ module Aws::CognitoIdentityProvider
2915
2984
  # refresh_token_validity: 1,
2916
2985
  # read_attributes: ["ClientPermissionType"],
2917
2986
  # write_attributes: ["ClientPermissionType"],
2918
- # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
2987
+ # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH
2919
2988
  # supported_identity_providers: ["ProviderNameType"],
2920
2989
  # callback_urls: ["RedirectUrlType"],
2921
2990
  # logout_urls: ["RedirectUrlType"],
@@ -2929,6 +2998,7 @@ module Aws::CognitoIdentityProvider
2929
2998
  # external_id: "StringType", # required
2930
2999
  # user_data_shared: false,
2931
3000
  # },
3001
+ # prevent_user_existence_errors: "LEGACY", # accepts LEGACY, ENABLED
2932
3002
  # })
2933
3003
  #
2934
3004
  # @example Response structure
@@ -2945,7 +3015,7 @@ module Aws::CognitoIdentityProvider
2945
3015
  # resp.user_pool_client.write_attributes #=> Array
2946
3016
  # resp.user_pool_client.write_attributes[0] #=> String
2947
3017
  # resp.user_pool_client.explicit_auth_flows #=> Array
2948
- # resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH"
3018
+ # resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH", "ALLOW_ADMIN_USER_PASSWORD_AUTH", "ALLOW_CUSTOM_AUTH", "ALLOW_USER_PASSWORD_AUTH", "ALLOW_USER_SRP_AUTH", "ALLOW_REFRESH_TOKEN_AUTH"
2949
3019
  # resp.user_pool_client.supported_identity_providers #=> Array
2950
3020
  # resp.user_pool_client.supported_identity_providers[0] #=> String
2951
3021
  # resp.user_pool_client.callback_urls #=> Array
@@ -2962,6 +3032,7 @@ module Aws::CognitoIdentityProvider
2962
3032
  # resp.user_pool_client.analytics_configuration.role_arn #=> String
2963
3033
  # resp.user_pool_client.analytics_configuration.external_id #=> String
2964
3034
  # resp.user_pool_client.analytics_configuration.user_data_shared #=> Boolean
3035
+ # resp.user_pool_client.prevent_user_existence_errors #=> String, one of "LEGACY", "ENABLED"
2965
3036
  #
2966
3037
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/CreateUserPoolClient AWS API Documentation
2967
3038
  #
@@ -3543,7 +3614,7 @@ module Aws::CognitoIdentityProvider
3543
3614
  # resp.user_pool_client.write_attributes #=> Array
3544
3615
  # resp.user_pool_client.write_attributes[0] #=> String
3545
3616
  # resp.user_pool_client.explicit_auth_flows #=> Array
3546
- # resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH"
3617
+ # resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH", "ALLOW_ADMIN_USER_PASSWORD_AUTH", "ALLOW_CUSTOM_AUTH", "ALLOW_USER_PASSWORD_AUTH", "ALLOW_USER_SRP_AUTH", "ALLOW_REFRESH_TOKEN_AUTH"
3547
3618
  # resp.user_pool_client.supported_identity_providers #=> Array
3548
3619
  # resp.user_pool_client.supported_identity_providers[0] #=> String
3549
3620
  # resp.user_pool_client.callback_urls #=> Array
@@ -3560,6 +3631,7 @@ module Aws::CognitoIdentityProvider
3560
3631
  # resp.user_pool_client.analytics_configuration.role_arn #=> String
3561
3632
  # resp.user_pool_client.analytics_configuration.external_id #=> String
3562
3633
  # resp.user_pool_client.analytics_configuration.user_data_shared #=> Boolean
3634
+ # resp.user_pool_client.prevent_user_existence_errors #=> String, one of "LEGACY", "ENABLED"
3563
3635
  #
3564
3636
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/DescribeUserPoolClient AWS API Documentation
3565
3637
  #
@@ -4166,6 +4238,11 @@ module Aws::CognitoIdentityProvider
4166
4238
  # set, this flow will invoke the user migration Lambda if the USERNAME
4167
4239
  # is not found in the user pool.
4168
4240
  #
4241
+ # * `ADMIN_USER_PASSWORD_AUTH`\: Admin-based user password
4242
+ # authentication. This replaces the `ADMIN_NO_SRP_AUTH` authentication
4243
+ # flow. In this flow, Cognito receives the password in the request
4244
+ # instead of using the SRP process to verify passwords.
4245
+ #
4169
4246
  # `ADMIN_NO_SRP_AUTH` is not a valid value.
4170
4247
  #
4171
4248
  # @option params [Hash<String,String>] :auth_parameters
@@ -4269,7 +4346,7 @@ module Aws::CognitoIdentityProvider
4269
4346
  # @example Request syntax with placeholder values
4270
4347
  #
4271
4348
  # resp = client.initiate_auth({
4272
- # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
4349
+ # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH, ADMIN_USER_PASSWORD_AUTH
4273
4350
  # auth_parameters: {
4274
4351
  # "StringType" => "StringType",
4275
4352
  # },
@@ -5774,6 +5851,9 @@ module Aws::CognitoIdentityProvider
5774
5851
  #
5775
5852
  # Calling this action requires developer credentials.
5776
5853
  #
5854
+ # If you don't provide a value for an attribute, it will be set to the
5855
+ # default value.
5856
+ #
5777
5857
  # @option params [required, String] :group_name
5778
5858
  # The name of the group.
5779
5859
  #
@@ -5886,6 +5966,9 @@ module Aws::CognitoIdentityProvider
5886
5966
  # Updates the name and scopes of resource server. All other fields are
5887
5967
  # read-only.
5888
5968
  #
5969
+ # If you don't provide a value for an attribute, it will be set to the
5970
+ # default value.
5971
+ #
5889
5972
  # @option params [required, String] :user_pool_id
5890
5973
  # The user pool ID for the user pool.
5891
5974
  #
@@ -5951,14 +6034,14 @@ module Aws::CognitoIdentityProvider
5951
6034
  #
5952
6035
  # You create custom workflows by assigning AWS Lambda functions to user
5953
6036
  # pool triggers. When you use the UpdateUserAttributes API action,
5954
- # Amazon Cognito invokes the functions that are assigned to the *custom
5955
- # message* and *pre mutation* triggers. When Amazon Cognito invokes
5956
- # either of these functions, it passes a JSON payload, which the
5957
- # function receives as input. This payload contains a `clientMetadata`
5958
- # attribute, which provides the data that you assigned to the
5959
- # ClientMetadata parameter in your UpdateUserAttributes request. In your
5960
- # function code in AWS Lambda, you can process the `clientMetadata`
5961
- # value to enhance your workflow for your specific needs.
6037
+ # Amazon Cognito invokes the function that is assigned to the *custom
6038
+ # message* trigger. When Amazon Cognito invokes this function, it passes
6039
+ # a JSON payload, which the function receives as input. This payload
6040
+ # contains a `clientMetadata` attribute, which provides the data that
6041
+ # you assigned to the ClientMetadata parameter in your
6042
+ # UpdateUserAttributes request. In your function code in AWS Lambda, you
6043
+ # can process the `clientMetadata` value to enhance your workflow for
6044
+ # your specific needs.
5962
6045
  #
5963
6046
  # For more information, see [Customizing User Pool Workflows with Lambda
5964
6047
  # Triggers][1] in the *Amazon Cognito Developer Guide*.
@@ -6018,9 +6101,11 @@ module Aws::CognitoIdentityProvider
6018
6101
  req.send_request(options)
6019
6102
  end
6020
6103
 
6021
- # Updates the specified user pool with the specified attributes. If you
6022
- # don't provide a value for an attribute, it will be set to the default
6023
- # value. You can get a list of the current user pool settings with .
6104
+ # Updates the specified user pool with the specified attributes. You can
6105
+ # get a list of the current user pool settings with .
6106
+ #
6107
+ # If you don't provide a value for an attribute, it will be set to the
6108
+ # default value.
6024
6109
  #
6025
6110
  # @option params [required, String] :user_pool_id
6026
6111
  # The user pool ID for the user pool you want to update.
@@ -6166,9 +6251,11 @@ module Aws::CognitoIdentityProvider
6166
6251
  end
6167
6252
 
6168
6253
  # Updates the specified user pool app client with the specified
6169
- # attributes. If you don't provide a value for an attribute, it will be
6170
- # set to the default value. You can get a list of the current user pool
6171
- # app client settings with .
6254
+ # attributes. You can get a list of the current user pool app client
6255
+ # settings with .
6256
+ #
6257
+ # If you don't provide a value for an attribute, it will be set to the
6258
+ # default value.
6172
6259
  #
6173
6260
  # @option params [required, String] :user_pool_id
6174
6261
  # The user pool ID for the user pool where you want to update the user
@@ -6191,7 +6278,29 @@ module Aws::CognitoIdentityProvider
6191
6278
  # The writeable attributes of the user pool.
6192
6279
  #
6193
6280
  # @option params [Array<String>] :explicit_auth_flows
6194
- # Explicit authentication flows.
6281
+ # The authentication flows that are supported by the user pool clients.
6282
+ # Flow names without the `ALLOW_` prefix are deprecated in favor of new
6283
+ # names with the `ALLOW_` prefix. Note that values with `ALLOW_` prefix
6284
+ # cannot be used along with values without `ALLOW_` prefix.
6285
+ #
6286
+ # Valid values include:
6287
+ #
6288
+ # * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user password
6289
+ # authentication flow `ADMIN_USER_PASSWORD_AUTH`. This setting
6290
+ # replaces the `ADMIN_NO_SRP_AUTH` setting. With this authentication
6291
+ # flow, Cognito receives the password in the request instead of using
6292
+ # the SRP (Secure Remote Password protocol) protocol to verify
6293
+ # passwords.
6294
+ #
6295
+ # * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
6296
+ #
6297
+ # * `ALLOW_USER_PASSWORD_AUTH`\: Enable user password-based
6298
+ # authentication. In this flow, Cognito receives the password in the
6299
+ # request instead of using the SRP protocol to verify passwords.
6300
+ #
6301
+ # * `ALLOW_USER_SRP_AUTH`\: Enable SRP based authentication.
6302
+ #
6303
+ # * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
6195
6304
  #
6196
6305
  # @option params [Array<String>] :supported_identity_providers
6197
6306
  # A list of provider names for the identity providers that are supported
@@ -6263,6 +6372,48 @@ module Aws::CognitoIdentityProvider
6263
6372
  # The Amazon Pinpoint analytics configuration for collecting metrics for
6264
6373
  # this user pool.
6265
6374
  #
6375
+ # @option params [String] :prevent_user_existence_errors
6376
+ # Use this setting to choose which errors and responses are returned by
6377
+ # Cognito APIs during authentication, account confirmation, and password
6378
+ # recovery when the user does not exist in the user pool. When set to
6379
+ # `ENABLED` and the user does not exist, authentication returns an error
6380
+ # indicating either the username or password was incorrect, and account
6381
+ # confirmation and password recovery return a response indicating a code
6382
+ # was sent to a simulated destination. When set to `LEGACY`, those APIs
6383
+ # will return a `UserNotFoundException` exception if the user does not
6384
+ # exist in the user pool.
6385
+ #
6386
+ # Valid values include:
6387
+ #
6388
+ # * `ENABLED` - This prevents user existence-related errors.
6389
+ #
6390
+ # * `LEGACY` - This represents the old behavior of Cognito where user
6391
+ # existence related errors are not prevented.
6392
+ #
6393
+ # This setting affects the behavior of following APIs:
6394
+ #
6395
+ # * AdminInitiateAuth
6396
+ #
6397
+ # * AdminRespondToAuthChallenge
6398
+ #
6399
+ # * InitiateAuth
6400
+ #
6401
+ # * RespondToAuthChallenge
6402
+ #
6403
+ # * ForgotPassword
6404
+ #
6405
+ # * ConfirmForgotPassword
6406
+ #
6407
+ # * ConfirmSignUp
6408
+ #
6409
+ # * ResendConfirmationCode
6410
+ #
6411
+ # <note markdown="1"> After January 1st 2020, the value of `PreventUserExistenceErrors` will
6412
+ # default to `ENABLED` for newly created user pool clients if no value
6413
+ # is provided.
6414
+ #
6415
+ # </note>
6416
+ #
6266
6417
  # @return [Types::UpdateUserPoolClientResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
6267
6418
  #
6268
6419
  # * {Types::UpdateUserPoolClientResponse#user_pool_client #user_pool_client} => Types::UserPoolClientType
@@ -6276,7 +6427,7 @@ module Aws::CognitoIdentityProvider
6276
6427
  # refresh_token_validity: 1,
6277
6428
  # read_attributes: ["ClientPermissionType"],
6278
6429
  # write_attributes: ["ClientPermissionType"],
6279
- # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
6430
+ # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH
6280
6431
  # supported_identity_providers: ["ProviderNameType"],
6281
6432
  # callback_urls: ["RedirectUrlType"],
6282
6433
  # logout_urls: ["RedirectUrlType"],
@@ -6290,6 +6441,7 @@ module Aws::CognitoIdentityProvider
6290
6441
  # external_id: "StringType", # required
6291
6442
  # user_data_shared: false,
6292
6443
  # },
6444
+ # prevent_user_existence_errors: "LEGACY", # accepts LEGACY, ENABLED
6293
6445
  # })
6294
6446
  #
6295
6447
  # @example Response structure
@@ -6306,7 +6458,7 @@ module Aws::CognitoIdentityProvider
6306
6458
  # resp.user_pool_client.write_attributes #=> Array
6307
6459
  # resp.user_pool_client.write_attributes[0] #=> String
6308
6460
  # resp.user_pool_client.explicit_auth_flows #=> Array
6309
- # resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH"
6461
+ # resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH", "ALLOW_ADMIN_USER_PASSWORD_AUTH", "ALLOW_CUSTOM_AUTH", "ALLOW_USER_PASSWORD_AUTH", "ALLOW_USER_SRP_AUTH", "ALLOW_REFRESH_TOKEN_AUTH"
6310
6462
  # resp.user_pool_client.supported_identity_providers #=> Array
6311
6463
  # resp.user_pool_client.supported_identity_providers[0] #=> String
6312
6464
  # resp.user_pool_client.callback_urls #=> Array
@@ -6323,6 +6475,7 @@ module Aws::CognitoIdentityProvider
6323
6475
  # resp.user_pool_client.analytics_configuration.role_arn #=> String
6324
6476
  # resp.user_pool_client.analytics_configuration.external_id #=> String
6325
6477
  # resp.user_pool_client.analytics_configuration.user_data_shared #=> Boolean
6478
+ # resp.user_pool_client.prevent_user_existence_errors #=> String, one of "LEGACY", "ENABLED"
6326
6479
  #
6327
6480
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/UpdateUserPoolClient AWS API Documentation
6328
6481
  #
@@ -6500,7 +6653,7 @@ module Aws::CognitoIdentityProvider
6500
6653
  params: params,
6501
6654
  config: config)
6502
6655
  context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
6503
- context[:gem_version] = '1.27.0'
6656
+ context[:gem_version] = '1.28.0'
6504
6657
  Seahorse::Client::Request.new(handlers, context)
6505
6658
  end
6506
6659
 
@@ -308,6 +308,7 @@ module Aws::CognitoIdentityProvider
308
308
  PreSignedUrlType = Shapes::StringShape.new(name: 'PreSignedUrlType')
309
309
  PrecedenceType = Shapes::IntegerShape.new(name: 'PrecedenceType')
310
310
  PreconditionNotMetException = Shapes::StructureShape.new(name: 'PreconditionNotMetException')
311
+ PreventUserExistenceErrorTypes = Shapes::StringShape.new(name: 'PreventUserExistenceErrorTypes')
311
312
  ProviderDescription = Shapes::StructureShape.new(name: 'ProviderDescription')
312
313
  ProviderDetailsType = Shapes::MapShape.new(name: 'ProviderDetailsType')
313
314
  ProviderNameType = Shapes::StringShape.new(name: 'ProviderNameType')
@@ -890,6 +891,7 @@ module Aws::CognitoIdentityProvider
890
891
  CreateUserPoolClientRequest.add_member(:allowed_o_auth_scopes, Shapes::ShapeRef.new(shape: ScopeListType, location_name: "AllowedOAuthScopes"))
891
892
  CreateUserPoolClientRequest.add_member(:allowed_o_auth_flows_user_pool_client, Shapes::ShapeRef.new(shape: BooleanType, location_name: "AllowedOAuthFlowsUserPoolClient"))
892
893
  CreateUserPoolClientRequest.add_member(:analytics_configuration, Shapes::ShapeRef.new(shape: AnalyticsConfigurationType, location_name: "AnalyticsConfiguration"))
894
+ CreateUserPoolClientRequest.add_member(:prevent_user_existence_errors, Shapes::ShapeRef.new(shape: PreventUserExistenceErrorTypes, location_name: "PreventUserExistenceErrors"))
893
895
  CreateUserPoolClientRequest.struct_class = Types::CreateUserPoolClientRequest
894
896
 
895
897
  CreateUserPoolClientResponse.add_member(:user_pool_client, Shapes::ShapeRef.new(shape: UserPoolClientType, location_name: "UserPoolClient"))
@@ -1694,6 +1696,7 @@ module Aws::CognitoIdentityProvider
1694
1696
  UpdateUserPoolClientRequest.add_member(:allowed_o_auth_scopes, Shapes::ShapeRef.new(shape: ScopeListType, location_name: "AllowedOAuthScopes"))
1695
1697
  UpdateUserPoolClientRequest.add_member(:allowed_o_auth_flows_user_pool_client, Shapes::ShapeRef.new(shape: BooleanType, location_name: "AllowedOAuthFlowsUserPoolClient"))
1696
1698
  UpdateUserPoolClientRequest.add_member(:analytics_configuration, Shapes::ShapeRef.new(shape: AnalyticsConfigurationType, location_name: "AnalyticsConfiguration"))
1699
+ UpdateUserPoolClientRequest.add_member(:prevent_user_existence_errors, Shapes::ShapeRef.new(shape: PreventUserExistenceErrorTypes, location_name: "PreventUserExistenceErrors"))
1697
1700
  UpdateUserPoolClientRequest.struct_class = Types::UpdateUserPoolClientRequest
1698
1701
 
1699
1702
  UpdateUserPoolClientResponse.add_member(:user_pool_client, Shapes::ShapeRef.new(shape: UserPoolClientType, location_name: "UserPoolClient"))
@@ -1792,6 +1795,7 @@ module Aws::CognitoIdentityProvider
1792
1795
  UserPoolClientType.add_member(:allowed_o_auth_scopes, Shapes::ShapeRef.new(shape: ScopeListType, location_name: "AllowedOAuthScopes"))
1793
1796
  UserPoolClientType.add_member(:allowed_o_auth_flows_user_pool_client, Shapes::ShapeRef.new(shape: BooleanType, location_name: "AllowedOAuthFlowsUserPoolClient", metadata: {"box"=>true}))
1794
1797
  UserPoolClientType.add_member(:analytics_configuration, Shapes::ShapeRef.new(shape: AnalyticsConfigurationType, location_name: "AnalyticsConfiguration"))
1798
+ UserPoolClientType.add_member(:prevent_user_existence_errors, Shapes::ShapeRef.new(shape: PreventUserExistenceErrorTypes, location_name: "PreventUserExistenceErrors"))
1795
1799
  UserPoolClientType.struct_class = Types::UserPoolClientType
1796
1800
 
1797
1801
  UserPoolDescriptionType.add_member(:id, Shapes::ShapeRef.new(shape: UserPoolIdType, location_name: "Id"))
@@ -916,7 +916,7 @@ module Aws::CognitoIdentityProvider
916
916
  # {
917
917
  # user_pool_id: "UserPoolIdType", # required
918
918
  # client_id: "ClientIdType", # required
919
- # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
919
+ # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH, ADMIN_USER_PASSWORD_AUTH
920
920
  # auth_parameters: {
921
921
  # "StringType" => "StringType",
922
922
  # },
@@ -980,6 +980,12 @@ module Aws::CognitoIdentityProvider
980
980
  # PASSWORD are passed directly. If a user migration Lambda trigger
981
981
  # is set, this flow will invoke the user migration Lambda if the
982
982
  # USERNAME is not found in the user pool.
983
+ #
984
+ # * `ADMIN_USER_PASSWORD_AUTH`\: Admin-based user password
985
+ # authentication. This replaces the `ADMIN_NO_SRP_AUTH`
986
+ # authentication flow. In this flow, Cognito receives the password
987
+ # in the request instead of using the SRP process to verify
988
+ # passwords.
983
989
  # @return [String]
984
990
  #
985
991
  # @!attribute [rw] auth_parameters
@@ -2584,15 +2590,14 @@ module Aws::CognitoIdentityProvider
2584
2590
  #
2585
2591
  # You create custom workflows by assigning AWS Lambda functions to
2586
2592
  # user pool triggers. When you use the ConfirmForgotPassword API
2587
- # action, Amazon Cognito invokes the functions that are assigned to
2588
- # the *post confirmation* and *pre mutation* triggers. When Amazon
2589
- # Cognito invokes either of these functions, it passes a JSON payload,
2590
- # which the function receives as input. This payload contains a
2591
- # `clientMetadata` attribute, which provides the data that you
2592
- # assigned to the ClientMetadata parameter in your
2593
- # ConfirmForgotPassword request. In your function code in AWS Lambda,
2594
- # you can process the `clientMetadata` value to enhance your workflow
2595
- # for your specific needs.
2593
+ # action, Amazon Cognito invokes the function that is assigned to the
2594
+ # *post confirmation* trigger. When Amazon Cognito invokes this
2595
+ # function, it passes a JSON payload, which the function receives as
2596
+ # input. This payload contains a `clientMetadata` attribute, which
2597
+ # provides the data that you assigned to the ClientMetadata parameter
2598
+ # in your ConfirmForgotPassword request. In your function code in AWS
2599
+ # Lambda, you can process the `clientMetadata` value to enhance your
2600
+ # workflow for your specific needs.
2596
2601
  #
2597
2602
  # For more information, see [Customizing User Pool Workflows with
2598
2603
  # Lambda Triggers][1] in the *Amazon Cognito Developer Guide*.
@@ -3061,7 +3066,7 @@ module Aws::CognitoIdentityProvider
3061
3066
  # refresh_token_validity: 1,
3062
3067
  # read_attributes: ["ClientPermissionType"],
3063
3068
  # write_attributes: ["ClientPermissionType"],
3064
- # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
3069
+ # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH
3065
3070
  # supported_identity_providers: ["ProviderNameType"],
3066
3071
  # callback_urls: ["RedirectUrlType"],
3067
3072
  # logout_urls: ["RedirectUrlType"],
@@ -3075,6 +3080,7 @@ module Aws::CognitoIdentityProvider
3075
3080
  # external_id: "StringType", # required
3076
3081
  # user_data_shared: false,
3077
3082
  # },
3083
+ # prevent_user_existence_errors: "LEGACY", # accepts LEGACY, ENABLED
3078
3084
  # }
3079
3085
  #
3080
3086
  # @!attribute [rw] user_pool_id
@@ -3118,7 +3124,30 @@ module Aws::CognitoIdentityProvider
3118
3124
  # @return [Array<String>]
3119
3125
  #
3120
3126
  # @!attribute [rw] explicit_auth_flows
3121
- # The explicit authentication flows.
3127
+ # The authentication flows that are supported by the user pool
3128
+ # clients. Flow names without the `ALLOW_` prefix are deprecated in
3129
+ # favor of new names with the `ALLOW_` prefix. Note that values with
3130
+ # `ALLOW_` prefix cannot be used along with values without `ALLOW_`
3131
+ # prefix.
3132
+ #
3133
+ # Valid values include:
3134
+ #
3135
+ # * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user
3136
+ # password authentication flow `ADMIN_USER_PASSWORD_AUTH`. This
3137
+ # setting replaces the `ADMIN_NO_SRP_AUTH` setting. With this
3138
+ # authentication flow, Cognito receives the password in the request
3139
+ # instead of using the SRP (Secure Remote Password protocol)
3140
+ # protocol to verify passwords.
3141
+ #
3142
+ # * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
3143
+ #
3144
+ # * `ALLOW_USER_PASSWORD_AUTH`\: Enable user password-based
3145
+ # authentication. In this flow, Cognito receives the password in the
3146
+ # request instead of using the SRP protocol to verify passwords.
3147
+ #
3148
+ # * `ALLOW_USER_SRP_AUTH`\: Enable SRP based authentication.
3149
+ #
3150
+ # * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
3122
3151
  # @return [Array<String>]
3123
3152
  #
3124
3153
  # @!attribute [rw] supported_identity_providers
@@ -3204,6 +3233,49 @@ module Aws::CognitoIdentityProvider
3204
3233
  # for this user pool.
3205
3234
  # @return [Types::AnalyticsConfigurationType]
3206
3235
  #
3236
+ # @!attribute [rw] prevent_user_existence_errors
3237
+ # Use this setting to choose which errors and responses are returned
3238
+ # by Cognito APIs during authentication, account confirmation, and
3239
+ # password recovery when the user does not exist in the user pool.
3240
+ # When set to `ENABLED` and the user does not exist, authentication
3241
+ # returns an error indicating either the username or password was
3242
+ # incorrect, and account confirmation and password recovery return a
3243
+ # response indicating a code was sent to a simulated destination. When
3244
+ # set to `LEGACY`, those APIs will return a `UserNotFoundException`
3245
+ # exception if the user does not exist in the user pool.
3246
+ #
3247
+ # Valid values include:
3248
+ #
3249
+ # * `ENABLED` - This prevents user existence-related errors.
3250
+ #
3251
+ # * `LEGACY` - This represents the old behavior of Cognito where user
3252
+ # existence related errors are not prevented.
3253
+ #
3254
+ # This setting affects the behavior of following APIs:
3255
+ #
3256
+ # * AdminInitiateAuth
3257
+ #
3258
+ # * AdminRespondToAuthChallenge
3259
+ #
3260
+ # * InitiateAuth
3261
+ #
3262
+ # * RespondToAuthChallenge
3263
+ #
3264
+ # * ForgotPassword
3265
+ #
3266
+ # * ConfirmForgotPassword
3267
+ #
3268
+ # * ConfirmSignUp
3269
+ #
3270
+ # * ResendConfirmationCode
3271
+ #
3272
+ # <note markdown="1"> After January 1st 2020, the value of `PreventUserExistenceErrors`
3273
+ # will default to `ENABLED` for newly created user pool clients if no
3274
+ # value is provided.
3275
+ #
3276
+ # </note>
3277
+ # @return [String]
3278
+ #
3207
3279
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/CreateUserPoolClientRequest AWS API Documentation
3208
3280
  #
3209
3281
  class CreateUserPoolClientRequest < Struct.new(
@@ -3221,7 +3293,8 @@ module Aws::CognitoIdentityProvider
3221
3293
  :allowed_o_auth_flows,
3222
3294
  :allowed_o_auth_scopes,
3223
3295
  :allowed_o_auth_flows_user_pool_client,
3224
- :analytics_configuration)
3296
+ :analytics_configuration,
3297
+ :prevent_user_existence_errors)
3225
3298
  include Aws::Structure
3226
3299
  end
3227
3300
 
@@ -5077,7 +5150,7 @@ module Aws::CognitoIdentityProvider
5077
5150
  # data as a hash:
5078
5151
  #
5079
5152
  # {
5080
- # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
5153
+ # auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH, ADMIN_USER_PASSWORD_AUTH
5081
5154
  # auth_parameters: {
5082
5155
  # "StringType" => "StringType",
5083
5156
  # },
@@ -5122,6 +5195,12 @@ module Aws::CognitoIdentityProvider
5122
5195
  # is set, this flow will invoke the user migration Lambda if the
5123
5196
  # USERNAME is not found in the user pool.
5124
5197
  #
5198
+ # * `ADMIN_USER_PASSWORD_AUTH`\: Admin-based user password
5199
+ # authentication. This replaces the `ADMIN_NO_SRP_AUTH`
5200
+ # authentication flow. In this flow, Cognito receives the password
5201
+ # in the request instead of using the SRP process to verify
5202
+ # passwords.
5203
+ #
5125
5204
  # `ADMIN_NO_SRP_AUTH` is not a valid value.
5126
5205
  # @return [String]
5127
5206
  #
@@ -8171,12 +8250,11 @@ module Aws::CognitoIdentityProvider
8171
8250
  #
8172
8251
  # You create custom workflows by assigning AWS Lambda functions to
8173
8252
  # user pool triggers. When you use the UpdateUserAttributes API
8174
- # action, Amazon Cognito invokes the functions that are assigned to
8175
- # the *custom message* and *pre mutation* triggers. When Amazon
8176
- # Cognito invokes either of these functions, it passes a JSON payload,
8177
- # which the function receives as input. This payload contains a
8178
- # `clientMetadata` attribute, which provides the data that you
8179
- # assigned to the ClientMetadata parameter in your
8253
+ # action, Amazon Cognito invokes the function that is assigned to the
8254
+ # *custom message* trigger. When Amazon Cognito invokes this function,
8255
+ # it passes a JSON payload, which the function receives as input. This
8256
+ # payload contains a `clientMetadata` attribute, which provides the
8257
+ # data that you assigned to the ClientMetadata parameter in your
8180
8258
  # UpdateUserAttributes request. In your function code in AWS Lambda,
8181
8259
  # you can process the `clientMetadata` value to enhance your workflow
8182
8260
  # for your specific needs.
@@ -8241,7 +8319,7 @@ module Aws::CognitoIdentityProvider
8241
8319
  # refresh_token_validity: 1,
8242
8320
  # read_attributes: ["ClientPermissionType"],
8243
8321
  # write_attributes: ["ClientPermissionType"],
8244
- # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
8322
+ # explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH
8245
8323
  # supported_identity_providers: ["ProviderNameType"],
8246
8324
  # callback_urls: ["RedirectUrlType"],
8247
8325
  # logout_urls: ["RedirectUrlType"],
@@ -8255,6 +8333,7 @@ module Aws::CognitoIdentityProvider
8255
8333
  # external_id: "StringType", # required
8256
8334
  # user_data_shared: false,
8257
8335
  # },
8336
+ # prevent_user_existence_errors: "LEGACY", # accepts LEGACY, ENABLED
8258
8337
  # }
8259
8338
  #
8260
8339
  # @!attribute [rw] user_pool_id
@@ -8284,7 +8363,30 @@ module Aws::CognitoIdentityProvider
8284
8363
  # @return [Array<String>]
8285
8364
  #
8286
8365
  # @!attribute [rw] explicit_auth_flows
8287
- # Explicit authentication flows.
8366
+ # The authentication flows that are supported by the user pool
8367
+ # clients. Flow names without the `ALLOW_` prefix are deprecated in
8368
+ # favor of new names with the `ALLOW_` prefix. Note that values with
8369
+ # `ALLOW_` prefix cannot be used along with values without `ALLOW_`
8370
+ # prefix.
8371
+ #
8372
+ # Valid values include:
8373
+ #
8374
+ # * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user
8375
+ # password authentication flow `ADMIN_USER_PASSWORD_AUTH`. This
8376
+ # setting replaces the `ADMIN_NO_SRP_AUTH` setting. With this
8377
+ # authentication flow, Cognito receives the password in the request
8378
+ # instead of using the SRP (Secure Remote Password protocol)
8379
+ # protocol to verify passwords.
8380
+ #
8381
+ # * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
8382
+ #
8383
+ # * `ALLOW_USER_PASSWORD_AUTH`\: Enable user password-based
8384
+ # authentication. In this flow, Cognito receives the password in the
8385
+ # request instead of using the SRP protocol to verify passwords.
8386
+ #
8387
+ # * `ALLOW_USER_SRP_AUTH`\: Enable SRP based authentication.
8388
+ #
8389
+ # * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
8288
8390
  # @return [Array<String>]
8289
8391
  #
8290
8392
  # @!attribute [rw] supported_identity_providers
@@ -8366,6 +8468,49 @@ module Aws::CognitoIdentityProvider
8366
8468
  # for this user pool.
8367
8469
  # @return [Types::AnalyticsConfigurationType]
8368
8470
  #
8471
+ # @!attribute [rw] prevent_user_existence_errors
8472
+ # Use this setting to choose which errors and responses are returned
8473
+ # by Cognito APIs during authentication, account confirmation, and
8474
+ # password recovery when the user does not exist in the user pool.
8475
+ # When set to `ENABLED` and the user does not exist, authentication
8476
+ # returns an error indicating either the username or password was
8477
+ # incorrect, and account confirmation and password recovery return a
8478
+ # response indicating a code was sent to a simulated destination. When
8479
+ # set to `LEGACY`, those APIs will return a `UserNotFoundException`
8480
+ # exception if the user does not exist in the user pool.
8481
+ #
8482
+ # Valid values include:
8483
+ #
8484
+ # * `ENABLED` - This prevents user existence-related errors.
8485
+ #
8486
+ # * `LEGACY` - This represents the old behavior of Cognito where user
8487
+ # existence related errors are not prevented.
8488
+ #
8489
+ # This setting affects the behavior of following APIs:
8490
+ #
8491
+ # * AdminInitiateAuth
8492
+ #
8493
+ # * AdminRespondToAuthChallenge
8494
+ #
8495
+ # * InitiateAuth
8496
+ #
8497
+ # * RespondToAuthChallenge
8498
+ #
8499
+ # * ForgotPassword
8500
+ #
8501
+ # * ConfirmForgotPassword
8502
+ #
8503
+ # * ConfirmSignUp
8504
+ #
8505
+ # * ResendConfirmationCode
8506
+ #
8507
+ # <note markdown="1"> After January 1st 2020, the value of `PreventUserExistenceErrors`
8508
+ # will default to `ENABLED` for newly created user pool clients if no
8509
+ # value is provided.
8510
+ #
8511
+ # </note>
8512
+ # @return [String]
8513
+ #
8369
8514
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/UpdateUserPoolClientRequest AWS API Documentation
8370
8515
  #
8371
8516
  class UpdateUserPoolClientRequest < Struct.new(
@@ -8383,7 +8528,8 @@ module Aws::CognitoIdentityProvider
8383
8528
  :allowed_o_auth_flows,
8384
8529
  :allowed_o_auth_scopes,
8385
8530
  :allowed_o_auth_flows_user_pool_client,
8386
- :analytics_configuration)
8531
+ :analytics_configuration,
8532
+ :prevent_user_existence_errors)
8387
8533
  include Aws::Structure
8388
8534
  end
8389
8535
 
@@ -8910,7 +9056,30 @@ module Aws::CognitoIdentityProvider
8910
9056
  # @return [Array<String>]
8911
9057
  #
8912
9058
  # @!attribute [rw] explicit_auth_flows
8913
- # The explicit authentication flows.
9059
+ # The authentication flows that are supported by the user pool
9060
+ # clients. Flow names without the `ALLOW_` prefix are deprecated in
9061
+ # favor of new names with the `ALLOW_` prefix. Note that values with
9062
+ # `ALLOW_` prefix cannot be used along with values without `ALLOW_`
9063
+ # prefix.
9064
+ #
9065
+ # Valid values include:
9066
+ #
9067
+ # * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user
9068
+ # password authentication flow `ADMIN_USER_PASSWORD_AUTH`. This
9069
+ # setting replaces the `ADMIN_NO_SRP_AUTH` setting. With this
9070
+ # authentication flow, Cognito receives the password in the request
9071
+ # instead of using the SRP (Secure Remote Password protocol)
9072
+ # protocol to verify passwords.
9073
+ #
9074
+ # * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
9075
+ #
9076
+ # * `ALLOW_USER_PASSWORD_AUTH`\: Enable user password-based
9077
+ # authentication. In this flow, Cognito receives the password in the
9078
+ # request instead of using the SRP protocol to verify passwords.
9079
+ #
9080
+ # * `ALLOW_USER_SRP_AUTH`\: Enable SRP based authentication.
9081
+ #
9082
+ # * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
8914
9083
  # @return [Array<String>]
8915
9084
  #
8916
9085
  # @!attribute [rw] supported_identity_providers
@@ -8995,6 +9164,49 @@ module Aws::CognitoIdentityProvider
8995
9164
  # client.
8996
9165
  # @return [Types::AnalyticsConfigurationType]
8997
9166
  #
9167
+ # @!attribute [rw] prevent_user_existence_errors
9168
+ # Use this setting to choose which errors and responses are returned
9169
+ # by Cognito APIs during authentication, account confirmation, and
9170
+ # password recovery when the user does not exist in the user pool.
9171
+ # When set to `ENABLED` and the user does not exist, authentication
9172
+ # returns an error indicating either the username or password was
9173
+ # incorrect, and account confirmation and password recovery return a
9174
+ # response indicating a code was sent to a simulated destination. When
9175
+ # set to `LEGACY`, those APIs will return a `UserNotFoundException`
9176
+ # exception if the user does not exist in the user pool.
9177
+ #
9178
+ # Valid values include:
9179
+ #
9180
+ # * `ENABLED` - This prevents user existence-related errors.
9181
+ #
9182
+ # * `LEGACY` - This represents the old behavior of Cognito where user
9183
+ # existence related errors are not prevented.
9184
+ #
9185
+ # This setting affects the behavior of following APIs:
9186
+ #
9187
+ # * AdminInitiateAuth
9188
+ #
9189
+ # * AdminRespondToAuthChallenge
9190
+ #
9191
+ # * InitiateAuth
9192
+ #
9193
+ # * RespondToAuthChallenge
9194
+ #
9195
+ # * ForgotPassword
9196
+ #
9197
+ # * ConfirmForgotPassword
9198
+ #
9199
+ # * ConfirmSignUp
9200
+ #
9201
+ # * ResendConfirmationCode
9202
+ #
9203
+ # <note markdown="1"> After January 1st 2020, the value of `PreventUserExistenceErrors`
9204
+ # will default to `ENABLED` for newly created user pool clients if no
9205
+ # value is provided.
9206
+ #
9207
+ # </note>
9208
+ # @return [String]
9209
+ #
8998
9210
  # @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/UserPoolClientType AWS API Documentation
8999
9211
  #
9000
9212
  class UserPoolClientType < Struct.new(
@@ -9015,7 +9227,8 @@ module Aws::CognitoIdentityProvider
9015
9227
  :allowed_o_auth_flows,
9016
9228
  :allowed_o_auth_scopes,
9017
9229
  :allowed_o_auth_flows_user_pool_client,
9018
- :analytics_configuration)
9230
+ :analytics_configuration,
9231
+ :prevent_user_existence_errors)
9019
9232
  include Aws::Structure
9020
9233
  end
9021
9234
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cognitoidentityprovider
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.27.0
4
+ version: 1.28.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-10-23 00:00:00.000000000 Z
11
+ date: 2019-11-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core