aws-sdk-core 2.0.35 → 2.0.36
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/apis/autoscaling/2011-01-01/api-2.json +1951 -0
- data/apis/autoscaling/2011-01-01/docs-2.json +1246 -0
- data/apis/autoscaling/2011-01-01/paginators-1.json +52 -0
- data/apis/cloudformation/2010-05-15/api-2.json +872 -0
- data/apis/cloudformation/2010-05-15/docs-2.json +705 -0
- data/apis/cloudformation/2010-05-15/paginators-1.json +27 -0
- data/apis/cloudformation/2010-05-15/resources-1.json +194 -0
- data/apis/cloudfront/2014-11-06/api-2.json +2611 -0
- data/apis/cloudfront/2014-11-06/docs-2.json +1125 -0
- data/apis/cloudfront/2014-11-06/paginators-1.json +32 -0
- data/apis/cloudfront/2014-11-06/waiters-2.json +47 -0
- data/apis/cloudhsm/2014-05-30/api-2.json +928 -0
- data/apis/cloudhsm/2014-05-30/docs-2.json +472 -0
- data/apis/cloudsearch/2013-01-01/api-2.json +2001 -0
- data/apis/cloudsearch/2013-01-01/docs-2.json +865 -0
- data/apis/cloudsearch/2013-01-01/paginators-1.json +20 -0
- data/apis/cloudsearchdomain/2013-01-01/api-2.json +350 -0
- data/apis/cloudsearchdomain/2013-01-01/docs-2.json +303 -0
- data/apis/cloudtrail/2013-11-01/api-2.json +824 -0
- data/apis/cloudtrail/2013-11-01/docs-2.json +328 -0
- data/apis/cloudtrail/2013-11-01/paginators-1.json +7 -0
- data/apis/codedeploy/2014-10-06/api-2.json +2250 -0
- data/apis/codedeploy/2014-10-06/docs-2.json +1261 -0
- data/apis/codedeploy/2014-10-06/paginators-1.json +34 -0
- data/apis/cognito-identity/2014-06-30/api-2.json +1156 -0
- data/apis/cognito-identity/2014-06-30/docs-2.json +456 -0
- data/apis/cognito-sync/2014-06-30/api-2.json +1646 -0
- data/apis/cognito-sync/2014-06-30/docs-2.json +532 -0
- data/apis/config/2014-10-17/api-2.json +694 -0
- data/apis/config/2014-10-17/docs-2.json +513 -0
- data/apis/config/2014-10-17/paginators-1.json +10 -0
- data/apis/datapipeline/2012-10-29/api-2.json +1123 -0
- data/apis/datapipeline/2012-10-29/docs-2.json +583 -0
- data/apis/datapipeline/2012-10-29/paginators-1.json +26 -0
- data/apis/directconnect/2012-10-25/api-2.json +833 -0
- data/apis/directconnect/2012-10-25/docs-2.json +494 -0
- data/apis/directconnect/2012-10-25/paginators-1.json +22 -0
- data/apis/dynamodb/2012-08-10/api-2.json +1290 -0
- data/apis/dynamodb/2012-08-10/docs-2.json +970 -0
- data/apis/dynamodb/2012-08-10/paginators-1.json +25 -0
- data/apis/dynamodb/2012-08-10/waiters-2.json +35 -0
- data/apis/ec2/2014-10-01/api-2.json +10267 -0
- data/apis/ec2/2014-10-01/docs-2.json +4678 -0
- data/apis/ec2/2014-10-01/paginators-1.json +125 -0
- data/apis/ec2/2014-10-01/resources-1.json +2289 -0
- data/apis/ec2/2014-10-01/waiters-2.json +453 -0
- data/apis/ecs/2014-11-13/api-2.json +992 -0
- data/apis/ecs/2014-11-13/docs-2.json +617 -0
- data/apis/elasticache/2015-02-02/api-2.json +3807 -0
- data/apis/elasticache/2015-02-02/docs-2.json +1390 -0
- data/apis/elasticache/2015-02-02/paginators-1.json +76 -0
- data/apis/elasticbeanstalk/2010-12-01/api-2.json +1543 -0
- data/apis/elasticbeanstalk/2010-12-01/docs-2.json +1091 -0
- data/apis/elasticbeanstalk/2010-12-01/paginators-1.json +25 -0
- data/apis/elasticloadbalancing/2012-06-01/api-2.json +2144 -0
- data/apis/elasticloadbalancing/2012-06-01/docs-2.json +1077 -0
- data/apis/elasticloadbalancing/2012-06-01/paginators-1.json +18 -0
- data/apis/elasticloadbalancing/2012-06-01/waiters-2.json +31 -0
- data/apis/elasticmapreduce/2009-03-31/api-2.json +1357 -0
- data/apis/elasticmapreduce/2009-03-31/docs-2.json +969 -0
- data/apis/elasticmapreduce/2009-03-31/paginators-1.json +32 -0
- data/apis/elasticmapreduce/2009-03-31/waiters-2.json +42 -0
- data/apis/elastictranscoder/2012-09-25/api-2.json +1787 -0
- data/apis/elastictranscoder/2012-09-25/docs-2.json +1128 -0
- data/apis/elastictranscoder/2012-09-25/paginators-1.json +24 -0
- data/apis/elastictranscoder/2012-09-25/waiters-2.json +30 -0
- data/apis/email/2010-12-01/api-2.json +644 -0
- data/apis/email/2010-12-01/docs-2.json +440 -0
- data/apis/email/2010-12-01/paginators-1.json +13 -0
- data/apis/email/2010-12-01/waiters-2.json +18 -0
- data/apis/glacier/2012-06-01/api-2.json +1570 -0
- data/apis/glacier/2012-06-01/docs-2.json +537 -0
- data/apis/glacier/2012-06-01/paginators-1.json +28 -0
- data/apis/glacier/2012-06-01/resources-1.json +558 -0
- data/apis/glacier/2012-06-01/waiters-2.json +39 -0
- data/apis/iam/2010-05-08/api-2.json +6404 -0
- data/apis/iam/2010-05-08/docs-2.json +2111 -0
- data/apis/iam/2010-05-08/paginators-1.json +125 -0
- data/apis/iam/2010-05-08/resources-1.json +1724 -0
- data/apis/importexport/2010-06-01/api-2.json +655 -0
- data/apis/importexport/2010-06-01/docs-2.json +431 -0
- data/apis/importexport/2010-06-01/paginators-1.json +11 -0
- data/apis/kinesis/2013-12-02/api-2.json +782 -0
- data/apis/kinesis/2013-12-02/docs-2.json +417 -0
- data/apis/kinesis/2013-12-02/paginators-1.json +18 -0
- data/apis/kinesis/2013-12-02/waiters-2.json +18 -0
- data/apis/kms/2014-11-01/api-2.json +2017 -0
- data/apis/kms/2014-11-01/docs-2.json +617 -0
- data/apis/kms/2014-11-01/paginators-1.json +32 -0
- data/apis/lambda/2014-11-11/api-2.json +667 -0
- data/apis/lambda/2014-11-11/docs-2.json +303 -0
- data/apis/lambda/2014-11-11/paginators-1.json +16 -0
- data/apis/logs/2014-03-28/api-2.json +839 -0
- data/apis/logs/2014-03-28/docs-2.json +464 -0
- data/apis/logs/2014-03-28/paginators-1.json +28 -0
- data/apis/monitoring/2010-08-01/api-2.json +917 -0
- data/apis/monitoring/2010-08-01/docs-2.json +514 -0
- data/apis/monitoring/2010-08-01/paginators-1.json +24 -0
- data/apis/opsworks/2013-02-18/api-2.json +2784 -0
- data/apis/opsworks/2013-02-18/docs-2.json +1563 -0
- data/apis/opsworks/2013-02-18/paginators-1.json +49 -0
- data/apis/opsworks/2013-02-18/resources-1.json +173 -0
- data/apis/rds/2014-10-31/api-2.json +5019 -0
- data/apis/rds/2014-10-31/docs-2.json +2074 -0
- data/apis/rds/2014-10-31/paginators-1.json +110 -0
- data/apis/rds/2014-10-31/resources-1.json +71 -0
- data/apis/rds/2014-10-31/waiters-2.json +97 -0
- data/apis/redshift/2012-12-01/api-2.json +4857 -0
- data/apis/redshift/2012-12-01/docs-2.json +1890 -0
- data/apis/redshift/2012-12-01/paginators-1.json +94 -0
- data/apis/redshift/2012-12-01/waiters-2.json +68 -0
- data/apis/route53/2013-04-01/api-2.json +2314 -0
- data/apis/route53/2013-04-01/docs-2.json +1159 -0
- data/apis/route53/2013-04-01/paginators-1.json +33 -0
- data/apis/route53domains/2014-05-15/api-2.json +1313 -0
- data/apis/route53domains/2014-05-15/docs-2.json +620 -0
- data/apis/route53domains/2014-05-15/paginators-1.json +17 -0
- data/apis/s3/2006-03-01/api-2.json +4047 -0
- data/apis/s3/2006-03-01/docs-2.json +2157 -0
- data/apis/s3/2006-03-01/paginators-1.json +57 -0
- data/apis/s3/2006-03-01/resources-1.json +1158 -0
- data/apis/s3/2006-03-01/waiters-2.json +68 -0
- data/apis/sdb/2009-04-15/api-2.json +954 -0
- data/apis/sdb/2009-04-15/docs-2.json +339 -0
- data/apis/sdb/2009-04-15/paginators-1.json +15 -0
- data/apis/sns/2010-03-31/api-2.json +1760 -0
- data/apis/sns/2010-03-31/docs-2.json +564 -0
- data/apis/sns/2010-03-31/paginators-1.json +29 -0
- data/apis/sns/2010-03-31/resources-1.json +327 -0
- data/apis/sqs/2012-11-05/api-2.json +1159 -0
- data/apis/sqs/2012-11-05/docs-2.json +503 -0
- data/apis/sqs/2012-11-05/paginators-1.json +7 -0
- data/apis/ssm/2014-11-06/api-2.json +1047 -0
- data/apis/ssm/2014-11-06/docs-2.json +440 -0
- data/apis/storagegateway/2013-06-30/api-2.json +2385 -0
- data/apis/storagegateway/2013-06-30/docs-2.json +1300 -0
- data/apis/storagegateway/2013-06-30/paginators-1.json +52 -0
- data/apis/sts/2011-06-15/api-2.json +594 -0
- data/apis/sts/2011-06-15/docs-2.json +350 -0
- data/apis/support/2013-04-15/api-2.json +869 -0
- data/apis/support/2013-04-15/docs-2.json +680 -0
- data/apis/support/2013-04-15/paginators-1.json +25 -0
- data/apis/swf/2012-01-25/api-2.json +2675 -0
- data/apis/swf/2012-01-25/docs-2.json +1569 -0
- data/apis/swf/2012-01-25/paginators-1.json +46 -0
- data/lib/aws-sdk-core/version.rb +1 -1
- metadata +146 -1
@@ -0,0 +1,2111 @@
|
|
1
|
+
{
|
2
|
+
"version": "2.0",
|
3
|
+
"operations": {
|
4
|
+
"AddClientIDToOpenIDConnectProvider": "<p>Adds a new client ID (also known as audience) to the list of client IDs already registered for the specified IAM OpenID Connect provider.</p> <p>This action is idempotent; it does not fail or return an error if you add an existing client ID to the provider.</p>",
|
5
|
+
"AddRoleToInstanceProfile": "<p>Adds the specified role to the specified instance profile. For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html\">Working with Roles</a>. For more information about instance profiles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html\">About Instance Profiles</a>. </p>",
|
6
|
+
"AddUserToGroup": "<p>Adds the specified user to the specified group.</p>",
|
7
|
+
"AttachGroupPolicy": "<p>Attaches the specified managed policy to the specified group.</p> <p>You use this API to attach a managed policy to a group. To embed an inline policy in a group, use <a>PutGroupPolicy</a>. </p> <p>For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
8
|
+
"AttachRolePolicy": "<p>Attaches the specified managed policy to the specified role.</p> <p>When you attach a managed policy to a role, the managed policy is used as the role's access (permissions) policy. You cannot use a managed policy as the role's trust policy. The role's trust policy is created at the same time as the role, using <a>CreateRole</a>. You can update a role's trust policy using <a>UpdateAssumeRolePolicy</a>. </p> <p>Use this API to attach a managed policy to a role. To embed an inline policy in a role, use <a>PutRolePolicy</a>. For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide.</p>",
|
9
|
+
"AttachUserPolicy": "<p>Attaches the specified managed policy to the specified user.</p> <p>You use this API to attach a managed policy to a user. To embed an inline policy in a user, use <a>PutUserPolicy</a>. </p> <p>For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
10
|
+
"ChangePassword": "<p>Changes the password of the IAM user who is calling this action. The root account password is not affected by this action. </p> <p>To change the password for a different user, see <a>UpdateLoginProfile</a>. For more information about modifying passwords, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html\">Managing Passwords</a> in the <i>Using IAM</i> guide. </p>",
|
11
|
+
"CreateAccessKey": "<p> Creates a new AWS secret access key and corresponding AWS access key ID for the specified user. The default status for new keys is <code>Active</code>. </p> <p> If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p> <p> For information about limits on the number of keys you can create, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p> <important> To ensure the security of your AWS account, the secret access key is accessible only during key and user creation. You must save the key (for example, in a text file) if you want to be able to access it again. If a secret key is lost, you can delete the access keys for the associated user and then create new keys. </important>",
|
12
|
+
"CreateAccountAlias": "<p>Creates an alias for your AWS account. For information about using an AWS account alias, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAlias.html\">Using an Alias for Your AWS Account ID</a> in the <i>Using IAM</i> guide. </p>",
|
13
|
+
"CreateGroup": "<p>Creates a new group.</p> <p> For information about the number of groups you can create, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p>",
|
14
|
+
"CreateInstanceProfile": "<p> Creates a new instance profile. For information about instance profiles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html\">About Instance Profiles</a>. </p> <p> For information about the number of instance profiles you can create, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p>",
|
15
|
+
"CreateLoginProfile": "<p> Creates a password for the specified user, giving the user the ability to access AWS services through the AWS Management Console. For more information about managing passwords, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html\">Managing Passwords</a> in the <i>Using IAM</i> guide. </p>",
|
16
|
+
"CreateOpenIDConnectProvider": "<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>. </p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy to establish a trust relationship between AWS and the OIDC provider. </p> <p>When you create the IAM OIDC provider, you specify the URL of the OIDC identity provider (IdP) to trust, a list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider, and a list of thumbprints of the server certificate(s) that the IdP uses. You get all of this information from the OIDC IdP that you want to use for access to AWS. </p> <note>Because trust for the OIDC provider is ultimately derived from the IAM provider that this action creates, it is a best practice to limit access to the <a>CreateOpenIDConnectProvider</a> action to highly-privileged users. </note>",
|
17
|
+
"CreatePolicy": "<p>Creates a new managed policy for your AWS account. </p> <p>This operation creates a policy version with a version identifier of <code>v1</code> and sets v1 as the policy's default version. For more information about policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p> <p>For more information about managed policies in general, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
18
|
+
"CreatePolicyVersion": "<p>Creates a new version of the specified managed policy. To update a managed policy, you create a new policy version. A managed policy can have up to five versions. If the policy has five versions, you must delete an existing version using <a>DeletePolicyVersion</a> before you create a new version. </p> <p>Optionally, you can set the new version as the policy's default version. The default version is the operative version; that is, the version that is in effect for the IAM users, groups, and roles that the policy is attached to. </p> <p>For more information about managed policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>",
|
19
|
+
"CreateRole": "<p> Creates a new role for your AWS account. For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html\">Working with Roles</a>. For information about limitations on role names and the number of roles you can create, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p> <p> The example policy grants permission to an EC2 instance to assume the role. The policy is URL-encoded according to RFC 3986. For more information about RFC 3986, go to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">http://www.faqs.org/rfcs/rfc3986.html</a>. </p>",
|
20
|
+
"CreateSAMLProvider": "<p>Creates an IAM entity to describe an identity provider (IdP) that supports SAML 2.0.</p> <p> The SAML provider that you create with this operation can be used as a principal in a role's trust policy to establish a trust relationship between AWS and a SAML identity provider. You can create an IAM role that supports Web-based single sign-on (SSO) to the AWS Management Console or one that supports API access to AWS. </p> <p> When you create the SAML provider, you upload an a SAML metadata document that you get from your IdP and that includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP. </p> <note> This operation requires <a href=\"http://docs.aws.amazon.com/general/latest/gr/signature-version-4.html\">Signature Version 4</a>. </note> <p> For more information, see <a href=\"http://docs.aws.amazon.com/STS/latest/UsingSTS/STSMgmtConsole-SAML.html\">Giving Console Access Using SAML</a> and <a href=\"http://docs.aws.amazon.com/STS/latest/UsingSTS/CreatingSAML.html\">Creating Temporary Security Credentials for SAML Federation</a> in the <i>Using Temporary Credentials</i> guide. </p>",
|
21
|
+
"CreateUser": "<p>Creates a new user for your AWS account.</p> <p> For information about limitations on the number of users you can create, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p>",
|
22
|
+
"CreateVirtualMFADevice": "<p> Creates a new virtual MFA device for the AWS account. After creating the virtual MFA, use <a>EnableMFADevice</a> to attach the MFA device to an IAM user. For more information about creating and working with virtual MFA devices, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html\">Using a Virtual MFA Device</a> in the <i>Using IAM</i> guide. </p> <p> For information about limits on the number of MFA devices you can create, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on Entities</a> in the <i>Using IAM</i> guide. </p> <important> The seed information contained in the QR code and the Base32 string should be treated like any other secret access information, such as your AWS access keys or your passwords. After you provision your virtual device, you should ensure that the information is destroyed following secure procedures. </important>",
|
23
|
+
"DeactivateMFADevice": "<p>Deactivates the specified MFA device and removes it from association with the user name for which it was originally enabled. </p> <p>For more information about creating and working with virtual MFA devices, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html\">Using a Virtual MFA Device</a> in the <i>Using IAM</i> guide. </p>",
|
24
|
+
"DeleteAccessKey": "<p>Deletes the access key associated with the specified user.</p> <p> If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p>",
|
25
|
+
"DeleteAccountAlias": "<p> Deletes the specified AWS account alias. For information about using an AWS account alias, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAlias.html\">Using an Alias for Your AWS Account ID</a> in the <i>Using IAM</i> guide. </p>",
|
26
|
+
"DeleteAccountPasswordPolicy": "<p>Deletes the password policy for the AWS account.</p>",
|
27
|
+
"DeleteGroup": "<p> Deletes the specified group. The group must not contain any users or have any attached policies. </p>",
|
28
|
+
"DeleteGroupPolicy": "<p>Deletes the specified inline policy that is embedded in the specified group.</p> <p>A group can also have managed policies attached to it. To detach a managed policy from a group, use <a>DetachGroupPolicy</a>. For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
29
|
+
"DeleteInstanceProfile": "<p> Deletes the specified instance profile. The instance profile must not have an associated role. </p> <important> Make sure you do not have any Amazon EC2 instances running with the instance profile you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance. </important> <p> For more information about instance profiles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html\">About Instance Profiles</a>. </p>",
|
30
|
+
"DeleteLoginProfile": "<p> Deletes the password for the specified user, which terminates the user's ability to access AWS services through the AWS Management Console. </p> <important> Deleting a user's password does not prevent a user from accessing IAM through the command line interface or the API. To prevent all user access you must also either make the access key inactive or delete it. For more information about making keys inactive or deleting them, see <a>UpdateAccessKey</a> and <a>DeleteAccessKey</a>. </important>",
|
31
|
+
"DeleteOpenIDConnectProvider": "<p>Deletes an IAM OpenID Connect identity provider.</p> <p>Deleting an OIDC provider does not update any roles that reference the provider as a principal in their trust policies. Any attempt to assume a role that references a provider that has been deleted will fail. </p> <p>This action is idempotent; it does not fail or return an error if you call the action for a provider that was already deleted.</p>",
|
32
|
+
"DeletePolicy": "<p>Deletes the specified managed policy.</p> <p>Before you can delete a managed policy, you must detach the policy from all users, groups, and roles that it is attached to, and you must delete all of the policy's versions. The following steps describe the process for deleting a managed policy: <ol> <li>Detach the policy from all users, groups, and roles that the policy is attached to, using the <a>DetachUserPolicy</a>, <a>DetachGroupPolicy</a>, or <a>DetachRolePolicy</a> APIs. To list all the users, groups, and roles that a policy is attached to, use <a>ListEntitiesForPolicy</a>. </li> <li>Delete all versions of the policy using <a>DeletePolicyVersion</a>. To list the policy's versions, use <a>ListPolicyVersions</a>. You cannot use <a>DeletePolicyVersion</a> to delete the version that is marked as the default version. You delete the policy's default version in the next step of the process. </li> <li>Delete the policy (this automatically deletes the policy's default version) using this API. </li> </ol> </p> <p>For information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
33
|
+
"DeletePolicyVersion": "<p>Deletes the specified version of the specified managed policy.</p> <p>You cannot delete the default version of a policy using this API. To delete the default version of a policy, use <a>DeletePolicy</a>. To find out which version of a policy is marked as the default version, use <a>ListPolicyVersions</a>. </p> <p>For information about versions for managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>",
|
34
|
+
"DeleteRole": "<p> Deletes the specified role. The role must not have any policies attached. For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html\">Working with Roles</a>. </p> <important> Make sure you do not have any Amazon EC2 instances running with the role you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance. </important>",
|
35
|
+
"DeleteRolePolicy": "<p>Deletes the specified inline policy that is embedded in the specified role.</p> <p>A role can also have managed policies attached to it. To detach a managed policy from a role, use <a>DetachRolePolicy</a>. For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
36
|
+
"DeleteSAMLProvider": "<p>Deletes a SAML provider.</p> <p> Deleting the provider does not update any roles that reference the SAML provider as a principal in their trust policies. Any attempt to assume a role that references a SAML provider that has been deleted will fail. </p> <note> This operation requires <a href=\"http://docs.aws.amazon.com/general/latest/gr/signature-version-4.html\">Signature Version 4</a>. </note>",
|
37
|
+
"DeleteServerCertificate": "<p>Deletes the specified server certificate.</p> <important> If you are using a server certificate with Elastic Load Balancing, deleting the certificate could have implications for your application. If Elastic Load Balancing doesn't detect the deletion of bound certificates, it may continue to use the certificates. This could cause Elastic Load Balancing to stop accepting traffic. We recommend that you remove the reference to the certificate from Elastic Load Balancing before using this command to delete the certificate. For more information, go to <a href=\"http://docs.aws.amazon.com/ElasticLoadBalancing/latest/APIReference/API_DeleteLoadBalancerListeners.html\">DeleteLoadBalancerListeners</a> in the <i>Elastic Load Balancing API Reference</i>. </important>",
|
38
|
+
"DeleteSigningCertificate": "<p>Deletes the specified signing certificate associated with the specified user.</p> <p> If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p>",
|
39
|
+
"DeleteUser": "<p> Deletes the specified user. The user must not belong to any groups, have any keys or signing certificates, or have any attached policies. </p>",
|
40
|
+
"DeleteUserPolicy": "<p>Deletes the specified inline policy that is embedded in the specified user.</p> <p>A user can also have managed policies attached to it. To detach a managed policy from a user, use <a>DetachUserPolicy</a>. For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
41
|
+
"DeleteVirtualMFADevice": "<p>Deletes a virtual MFA device.</p> <note> You must deactivate a user's virtual MFA device before you can delete it. For information about deactivating MFA devices, see <a>DeactivateMFADevice</a>. </note>",
|
42
|
+
"DetachGroupPolicy": "<p>Removes the specified managed policy from the specified group. </p> <p>A group can also have inline policies embedded with it. To delete an inline policy, use the <a>DeleteGroupPolicy</a> API. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
43
|
+
"DetachRolePolicy": "<p>Removes the specified managed policy from the specified role. </p> <p>A role can also have inline policies embedded with it. To delete an inline policy, use the <a>DeleteRolePolicy</a> API. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
44
|
+
"DetachUserPolicy": "<p>Removes the specified managed policy from the specified user. </p> <p>A user can also have inline policies embedded with it. To delete an inline policy, use the <a>DeleteUserPolicy</a> API. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
45
|
+
"EnableMFADevice": "<p> Enables the specified MFA device and associates it with the specified user name. When enabled, the MFA device is required for every subsequent login by the user name associated with the device. </p>",
|
46
|
+
"GenerateCredentialReport": "<p> Generates a credential report for the AWS account. For more information about the credential report, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html\">Getting Credential Reports</a> in the <i>Using IAM</i> guide. </p>",
|
47
|
+
"GetAccountAuthorizationDetails": "<p>Retrieves information about all IAM users, groups, and roles in your account, including their relationships to one another and their policies. Use this API to obtain a snapshot of the configuration of IAM permissions (users, groups, roles, and policies) in your account.</p> <p>You can optionally filter the results using the <code>Filter</code> parameter. You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters.</p>",
|
48
|
+
"GetAccountPasswordPolicy": "<p> Retrieves the password policy for the AWS account. For more information about using a password policy, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingPasswordPolicies.html\">Managing an IAM Password Policy</a>. </p>",
|
49
|
+
"GetAccountSummary": "<p>Retrieves information about IAM entity usage and IAM quotas in the AWS account.</p> <p> For information about limitations on IAM entities, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p>",
|
50
|
+
"GetCredentialReport": "<p> Retrieves a credential report for the AWS account. For more information about the credential report, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html\">Getting Credential Reports</a> in the <i>Using IAM</i> guide. </p>",
|
51
|
+
"GetGroup": "<p> Returns a list of users that are in the specified group. You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
52
|
+
"GetGroupPolicy": "<p>Retrieves the specified inline policy document that is embedded in the specified group. </p> <p>A group can also have managed policies attached to it. To retrieve a managed policy document that is attached to a group, use <a>GetPolicy</a> to determine the policy's default version, then use <a>GetPolicyVersion</a> to retrieve the policy document. </p> <p>For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
53
|
+
"GetInstanceProfile": "<p> Retrieves information about the specified instance profile, including the instance profile's path, GUID, ARN, and role. For more information about instance profiles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html\">About Instance Profiles</a>. For more information about ARNs, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html#Identifiers_ARNs\">ARNs</a>. </p>",
|
54
|
+
"GetLoginProfile": "<p> Retrieves the user name and password-creation date for the specified user. If the user has not been assigned a password, the action returns a 404 (<code>NoSuchEntity</code>) error. </p>",
|
55
|
+
"GetOpenIDConnectProvider": "<p>Returns information about the specified OpenID Connect provider.</p>",
|
56
|
+
"GetPolicy": "<p>Retrieves information about the specified managed policy, including the policy's default version and the total number of users, groups, and roles that the policy is attached to. For a list of the specific users, groups, and roles that the policy is attached to, use the <a>ListEntitiesForPolicy</a> API. This API returns metadata about the policy. To retrieve the policy document for a specific version of the policy, use <a>GetPolicyVersion</a>. </p> <p>This API retrieves information about managed policies. To retrieve information about an inline policy that is embedded with a user, group, or role, use the <a>GetUserPolicy</a>, <a>GetGroupPolicy</a>, or <a>GetRolePolicy</a> API. </p> <p>For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
57
|
+
"GetPolicyVersion": "<p>Retrieves information about the specified version of the specified managed policy, including the policy document. </p> <p>To list the available versions for a policy, use <a>ListPolicyVersions</a>. </p> <p>This API retrieves information about managed policies. To retrieve information about an inline policy that is embedded in a user, group, or role, use the <a>GetUserPolicy</a>, <a>GetGroupPolicy</a>, or <a>GetRolePolicy</a> API. </p> <p>For more information about the types of policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
58
|
+
"GetRole": "<p> Retrieves information about the specified role, including the role's path, GUID, ARN, and the policy granting permission to assume the role. For more information about ARNs, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html#Identifiers_ARNs\">ARNs</a>. For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html\">Working with Roles</a>. </p> <p> The returned policy is URL-encoded according to RFC 3986. For more information about RFC 3986, go to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">http://www.faqs.org/rfcs/rfc3986.html</a>. </p>",
|
59
|
+
"GetRolePolicy": "<p>Retrieves the specified inline policy document that is embedded with the specified role. </p> <p>A role can also have managed policies attached to it. To retrieve a managed policy document that is attached to a role, use <a>GetPolicy</a> to determine the policy's default version, then use <a>GetPolicyVersion</a> to retrieve the policy document. </p> <p>For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html\">Using Roles to Delegate Permissions and Federate Identities</a>. </p>",
|
60
|
+
"GetSAMLProvider": "<p> Returns the SAML provider metadocument that was uploaded when the provider was created or updated. </p> <note> This operation requires <a href=\"http://docs.aws.amazon.com/general/latest/gr/signature-version-4.html\">Signature Version 4</a>. </note>",
|
61
|
+
"GetServerCertificate": "<p>Retrieves information about the specified server certificate.</p>",
|
62
|
+
"GetUser": "<p>Retrieves information about the specified user, including the user's creation date, path, unique ID, and ARN. </p> <p>If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID used to sign the request. </p>",
|
63
|
+
"GetUserPolicy": "<p>Retrieves the specified inline policy document that is embedded in the specified user. </p> <p>A user can also have managed policies attached to it. To retrieve a managed policy document that is attached to a user, use <a>GetPolicy</a> to determine the policy's default version, then use <a>GetPolicyVersion</a> to retrieve the policy document. </p> <p>For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
64
|
+
"ListAccessKeys": "<p> Returns information about the access key IDs associated with the specified user. If there are none, the action returns an empty list. </p> <p> Although each user is limited to a small number of keys, you can still paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p> <p> If the <code>UserName</code> field is not specified, the UserName is determined implicitly based on the AWS access key ID used to sign the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p> <note> To ensure the security of your AWS account, the secret access key is accessible only during key and user creation. </note>",
|
65
|
+
"ListAccountAliases": "<p> Lists the account aliases associated with the account. For information about using an AWS account alias, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAlias.html\">Using an Alias for Your AWS Account ID</a> in the <i>Using IAM</i> guide. </p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
66
|
+
"ListAttachedGroupPolicies": "<p>Lists all managed policies that are attached to the specified group.</p> <p>A group can also have inline policies embedded with it. To list the inline policies for a group, use the <a>ListGroupPolicies</a> API. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. You can use the <code>PathPrefix</code> parameter to limit the list of policies to only those matching the specified path prefix. If there are no policies attached to the specified group (or none that match the specified path prefix), the action returns an empty list. </p>",
|
67
|
+
"ListAttachedRolePolicies": "<p>Lists all managed policies that are attached to the specified role. </p> <p>A role can also have inline policies embedded with it. To list the inline policies for a role, use the <a>ListRolePolicies</a> API. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. You can use the <code>PathPrefix</code> parameter to limit the list of policies to only those matching the specified path prefix. If there are no policies attached to the specified role (or none that match the specified path prefix), the action returns an empty list. </p>",
|
68
|
+
"ListAttachedUserPolicies": "<p>Lists all managed policies that are attached to the specified user. </p> <p>A user can also have inline policies embedded with it. To list the inline policies for a user, use the <a>ListUserPolicies</a> API. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. You can use the <code>PathPrefix</code> parameter to limit the list of policies to only those matching the specified path prefix. If there are no policies attached to the specified group (or none that match the specified path prefix), the action returns an empty list. </p>",
|
69
|
+
"ListEntitiesForPolicy": "<p>Lists all users, groups, and roles that the specified managed policy is attached to. </p> <p>You can use the optional <code>EntityFilter</code> parameter to limit the results to a particular type of entity (users, groups, or roles). For example, to list only the roles that are attached to the specified policy, set <code>EntityFilter</code> to <code>Role</code>. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
70
|
+
"ListGroupPolicies": "<p>Lists the names of the inline policies that are embedded in the specified group. </p> <p>A group can also have managed policies attached to it. To list the managed policies that are attached to a group, use <a>ListAttachedGroupPolicies</a>. For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. If there are no inline policies embedded with the specified group, the action returns an empty list. </p>",
|
71
|
+
"ListGroups": "<p>Lists the groups that have the specified path prefix.</p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
72
|
+
"ListGroupsForUser": "<p>Lists the groups the specified user belongs to.</p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
73
|
+
"ListInstanceProfiles": "<p> Lists the instance profiles that have the specified path prefix. If there are none, the action returns an empty list. For more information about instance profiles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html\">About Instance Profiles</a>. </p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
74
|
+
"ListInstanceProfilesForRole": "<p> Lists the instance profiles that have the specified associated role. If there are none, the action returns an empty list. For more information about instance profiles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html\">About Instance Profiles</a>. </p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
75
|
+
"ListMFADevices": "<p> Lists the MFA devices. If the request includes the user name, then this action lists all the MFA devices associated with the specified user name. If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. </p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
76
|
+
"ListOpenIDConnectProviders": "<p>Lists information about the OpenID Connect providers in the AWS account. </p>",
|
77
|
+
"ListPolicies": "<p>Lists all the managed policies that are available to your account, including your own customer managed policies and all AWS managed policies. </p> <p>You can filter the list of policies that is returned using the optional <code>OnlyAttached</code>, <code>Scope</code>, and <code>PathPrefix</code> parameters. For example, to list only the customer managed policies in your AWS account, set <code>Scope</code> to <code>Local</code>. To list only AWS managed policies, set <code>Scope</code> to <code>AWS</code>. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
78
|
+
"ListPolicyVersions": "<p>Lists information about the versions of the specified managed policy, including the version that is set as the policy's default version. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
79
|
+
"ListRolePolicies": "<p>Lists the names of the inline policies that are embedded in the specified role. </p> <p>A role can also have managed policies attached to it. To list the managed policies that are attached to a role, use <a>ListAttachedRolePolicies</a>. For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. If there are no inline policies embedded with the specified role, the action returns an empty list. </p>",
|
80
|
+
"ListRoles": "<p> Lists the roles that have the specified path prefix. If there are none, the action returns an empty list. For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html\">Working with Roles</a>. </p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p> <p> The returned policy is URL-encoded according to RFC 3986. For more information about RFC 3986, go to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">http://www.faqs.org/rfcs/rfc3986.html</a>. </p>",
|
81
|
+
"ListSAMLProviders": "<p>Lists the SAML providers in the account.</p> <note> This operation requires <a href=\"http://docs.aws.amazon.com/general/latest/gr/signature-version-4.html\">Signature Version 4</a>. </note>",
|
82
|
+
"ListServerCertificates": "<p> Lists the server certificates that have the specified path prefix. If none exist, the action returns an empty list. </p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
83
|
+
"ListSigningCertificates": "<p> Returns information about the signing certificates associated with the specified user. If there are none, the action returns an empty list. </p> <p> Although each user is limited to a small number of signing certificates, you can still paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p> <p> If the <code>UserName</code> field is not specified, the user name is determined implicitly based on the AWS access key ID used to sign the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p>",
|
84
|
+
"ListUserPolicies": "<p>Lists the names of the inline policies embedded in the specified user. </p> <p>A user can also have managed policies attached to it. To list the managed policies that are attached to a user, use <a>ListAttachedUserPolicies</a>. For more information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. If there are no inline policies embedded with the specified user, the action returns an empty list. </p>",
|
85
|
+
"ListUsers": "<p>Lists the IAM users that have the specified path prefix. If no path prefix is specified, the action returns all users in the AWS account. If there are none, the action returns an empty list. </p> <p>You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
86
|
+
"ListVirtualMFADevices": "<p> Lists the virtual MFA devices under the AWS account by assignment status. If you do not specify an assignment status, the action returns a list of all virtual MFA devices. Assignment status can be <code>Assigned</code>, <code>Unassigned</code>, or <code>Any</code>. </p> <p> You can paginate the results using the <code>MaxItems</code> and <code>Marker</code> parameters. </p>",
|
87
|
+
"PutGroupPolicy": "<p>Adds (or updates) an inline policy document that is embedded in the specified group. </p> <p>A user can also have managed policies attached to it. To attach a managed policy to a group, use <a>AttachGroupPolicy</a>. To create a new managed policy, use <a>CreatePolicy</a>. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>For information about limits on the number of inline policies that you can embed in a group, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p> <note>Because policy documents can be large, you should use POST rather than GET when calling <code>PutGroupPolicy</code>. For general information about using the Query API with IAM, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html\">Making Query Requests</a> in the <i>Using IAM</i> guide. </note>",
|
88
|
+
"PutRolePolicy": "<p>Adds (or updates) an inline policy document that is embedded in the specified role. </p> <p>When you embed an inline policy in a role, the inline policy is used as the role's access (permissions) policy. The role's trust policy is created at the same time as the role, using <a>CreateRole</a>. You can update a role's trust policy using <a>UpdateAssumeRolePolicy</a>. For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html\">Using Roles to Delegate Permissions and Federate Identities</a>. </p> <p>A role can also have a managed policy attached to it. To attach a managed policy to a role, use <a>AttachRolePolicy</a>. To create a new managed policy, use <a>CreatePolicy</a>. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>For information about limits on the number of inline policies that you can embed with a role, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p> <note>Because policy documents can be large, you should use POST rather than GET when calling <code>PutRolePolicy</code>. For general information about using the Query API with IAM, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html\">Making Query Requests</a> in the <i>Using IAM</i> guide. </note>",
|
89
|
+
"PutUserPolicy": "<p>Adds (or updates) an inline policy document that is embedded in the specified user. </p> <p>A user can also have a managed policy attached to it. To attach a managed policy to a user, use <a>AttachUserPolicy</a>. To create a new managed policy, use <a>CreatePolicy</a>. For information about policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> <p>For information about limits on the number of inline policies that you can embed in a user, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p> <note>Because policy documents can be large, you should use POST rather than GET when calling <code>PutUserPolicy</code>. For general information about using the Query API with IAM, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html\">Making Query Requests</a> in the <i>Using IAM</i> guide. </note>",
|
90
|
+
"RemoveClientIDFromOpenIDConnectProvider": "<p>Removes the specified client ID (also known as audience) from the list of client IDs registered for the specified IAM OpenID Connect provider.</p> <p>This action is idempotent; it does not fail or return an error if you try to remove a client ID that was removed previously.</p>",
|
91
|
+
"RemoveRoleFromInstanceProfile": "<p>Removes the specified role from the specified instance profile.</p> <important> Make sure you do not have any Amazon EC2 instances running with the role you are about to remove from the instance profile. Removing a role from an instance profile that is associated with a running instance will break any applications running on the instance. </important> <p> For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html\">Working with Roles</a>. For more information about instance profiles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html\">About Instance Profiles</a>. </p>",
|
92
|
+
"RemoveUserFromGroup": "<p>Removes the specified user from the specified group.</p>",
|
93
|
+
"ResyncMFADevice": "<p>Synchronizes the specified MFA device with AWS servers.</p> <p>For more information about creating and working with virtual MFA devices, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html\">Using a Virtual MFA Device</a> in the <i>Using IAM</i> guide. </p>",
|
94
|
+
"SetDefaultPolicyVersion": "<p>Sets the specified version of the specified policy as the policy's default (operative) version. </p> <p>This action affects all users, groups, and roles that the policy is attached to. To list the users, groups, and roles that the policy is attached to, use the <a>ListEntitiesForPolicy</a> API. </p> <p>For information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
95
|
+
"UpdateAccessKey": "<p> Changes the status of the specified access key from Active to Inactive, or vice versa. This action can be used to disable a user's key as part of a key rotation work flow. </p> <p> If the <code>UserName</code> field is not specified, the UserName is determined implicitly based on the AWS access key ID used to sign the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p> <p> For information about rotating keys, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingCredentials.html\">Managing Keys and Certificates</a> in the <i>Using IAM</i> guide. </p>",
|
96
|
+
"UpdateAccountPasswordPolicy": "<p>Updates the password policy settings for the AWS account.</p> <note> <p> This action does not support partial updates. No parameters are required, but if you do not specify a parameter, that parameter's value reverts to its default value. See the <b>Request Parameters</b> section for each parameter's default value. </p> </note> <p> For more information about using a password policy, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingPasswordPolicies.html\">Managing an IAM Password Policy</a> in the <i>Using IAM</i> guide. </p>",
|
97
|
+
"UpdateAssumeRolePolicy": "<p> Updates the policy that grants an entity permission to assume a role. For more information about roles, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html\">Using Roles to Delegate Permissions and Federate Identities</a>. </p>",
|
98
|
+
"UpdateGroup": "<p>Updates the name and/or the path of the specified group.</p> <important> You should understand the implications of changing a group's path or name. For more information, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_WorkingWithGroupsAndUsers.html\">Renaming Users and Groups</a> in the <i>Using IAM</i> guide. </important> <note> To change a group name the requester must have appropriate permissions on both the source object and the target object. For example, to change Managers to MGRs, the entity making the request must have permission on Managers and MGRs, or must have permission on all (*). For more information about permissions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/PermissionsAndPolicies.html\" target=\"blank\">Permissions and Policies</a>. </note>",
|
99
|
+
"UpdateLoginProfile": "<p>Changes the password for the specified user.</p> <p>Users can change their own passwords by calling <a>ChangePassword</a>. For more information about modifying passwords, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html\">Managing Passwords</a> in the <i>Using IAM</i> guide. </p>",
|
100
|
+
"UpdateOpenIDConnectProviderThumbprint": "<p>Replaces the existing list of server certificate thumbprints with a new list. </p> <p>The list that you pass with this action completely replaces the existing list of thumbprints. (The lists are not merged.)</p> <p>Typically, you need to update a thumbprint only when the identity provider's certificate changes, which occurs rarely. However, if the provider's certificate <i>does</i> change, any attempt to assume an IAM role that specifies the OIDC provider as a principal will fail until the certificate thumbprint is updated.</p> <note>Because trust for the OpenID Connect provider is ultimately derived from the provider's certificate and is validated by the thumbprint, it is a best practice to limit access to the <code>UpdateOpenIDConnectProviderThumbprint</code> action to highly-privileged users. </note>",
|
101
|
+
"UpdateSAMLProvider": "<p>Updates the metadata document for an existing SAML provider.</p> <note> This operation requires <a href=\"http://docs.aws.amazon.com/general/latest/gr/signature-version-4.html\">Signature Version 4</a>. </note>",
|
102
|
+
"UpdateServerCertificate": "<p>Updates the name and/or the path of the specified server certificate.</p> <important> You should understand the implications of changing a server certificate's path or name. For more information, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingServerCerts.html\">Managing Server Certificates</a> in the <i>Using IAM</i> guide. </important> <note> To change a server certificate name the requester must have appropriate permissions on both the source object and the target object. For example, to change the name from ProductionCert to ProdCert, the entity making the request must have permission on ProductionCert and ProdCert, or must have permission on all (*). For more information about permissions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/PermissionsAndPolicies.html\" target=\"blank\">Permissions and Policies</a>. </note>",
|
103
|
+
"UpdateSigningCertificate": "<p> Changes the status of the specified signing certificate from active to disabled, or vice versa. This action can be used to disable a user's signing certificate as part of a certificate rotation work flow. </p> <p> If the <code>UserName</code> field is not specified, the UserName is determined implicitly based on the AWS access key ID used to sign the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p> <p> For information about rotating certificates, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingCredentials.html\">Managing Keys and Certificates</a> in the <i>Using IAM</i> guide. </p>",
|
104
|
+
"UpdateUser": "<p>Updates the name and/or the path of the specified user.</p> <important> You should understand the implications of changing a user's path or name. For more information, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_WorkingWithGroupsAndUsers.html\">Renaming Users and Groups</a> in the <i>Using IAM</i> guide. </important> <note> To change a user name the requester must have appropriate permissions on both the source object and the target object. For example, to change Bob to Robert, the entity making the request must have permission on Bob and Robert, or must have permission on all (*). For more information about permissions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/PermissionsAndPolicies.html\" target=\"blank\">Permissions and Policies</a>. </note>",
|
105
|
+
"UploadServerCertificate": "<p> Uploads a server certificate entity for the AWS account. The server certificate entity includes a public key certificate, a private key, and an optional certificate chain, which should all be PEM-encoded. </p> <p> For information about the number of server certificates you can upload, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html\">Limitations on IAM Entities</a> in the <i>Using IAM</i> guide. </p> <note> Because the body of the public key certificate, private key, and the certificate chain can be large, you should use POST rather than GET when calling <code>UploadServerCertificate</code>. For information about setting up signatures and authorization through the API, go to <a href=\"http://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html\">Signing AWS API Requests</a> in the <i>AWS General Reference</i>. For general information about using the Query API with IAM, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html\">Making Query Requests</a> in the <i>Using IAM</i> guide. </note>",
|
106
|
+
"UploadSigningCertificate": "<p> Uploads an X.509 signing certificate and associates it with the specified user. Some AWS services use X.509 signing certificates to validate requests that are signed with a corresponding private key. When you upload the certificate, its default status is <code>Active</code>. </p> <p> If the <code>UserName</code> field is not specified, the user name is determined implicitly based on the AWS access key ID used to sign the request. Because this action works for access keys under the AWS account, you can use this action to manage root credentials even if the AWS account has no associated users. </p> <note> Because the body of a X.509 certificate can be large, you should use POST rather than GET when calling <code>UploadSigningCertificate</code>. For information about setting up signatures and authorization through the API, go to <a href=\"http://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html\">Signing AWS API Requests</a> in the <i>AWS General Reference</i>. For general information about using the Query API with IAM, go to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html\">Making Query Requests</a> in the <i>Using IAM</i>guide. </note>"
|
107
|
+
},
|
108
|
+
"service": "<fullname>AWS Identity and Access Management</fullname> <p> AWS Identity and Access Management (IAM) is a web service that you can use to manage users and user permissions under your AWS account. This guide provides descriptions of IAM actions that you can call programmatically. For general information about IAM, see <a href=\"http://aws.amazon.com/iam/\">AWS Identity and Access Management (IAM)</a>. For the user guide for IAM, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/\">Using IAM</a>. </p> <note> AWS provides SDKs that consist of libraries and sample code for various programming languages and platforms (Java, Ruby, .NET, iOS, Android, etc.). The SDKs provide a convenient way to create programmatic access to IAM and AWS. For example, the SDKs take care of tasks such as cryptographically signing requests (see below), managing errors, and retrying requests automatically. For information about the AWS SDKs, including how to download and install them, see the <a href=\"http://aws.amazon.com/tools/\">Tools for Amazon Web Services</a> page. </note> <p> We recommend that you use the AWS SDKs to make programmatic API calls to IAM. However, you can also use the IAM Query API to make direct calls to the IAM web service. To learn more about the IAM Query API, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html\">Making Query Requests</a> in the <i>Using IAM</i> guide. IAM supports GET and POST requests for all actions. That is, the API does not require you to use GET for some actions and POST for others. However, GET requests are subject to the limitation size of a URL. Therefore, for operations that require larger sizes, use a POST request. </p> <p> <b>Signing Requests</b> </p> <p> Requests must be signed using an access key ID and a secret access key. We strongly recommend that you do not use your AWS account access key ID and secret access key for everyday work with IAM. You can use the access key ID and secret access key for an IAM user or you can use the AWS Security Token Service to generate temporary security credentials and use those to sign requests. </p> <p> To sign requests, we recommend that you use <a href=\"http://docs.aws.amazon.com/general/latest/gr/signature-version-4.html\">Signature Version 4</a>. If you have an existing application that uses Signature Version 2, you do not have to update it to use Signature Version 4. However, some operations now require Signature Version 4. The documentation for operations that require version 4 indicate this requirement. </p> <p> <b>Recording API requests</b> </p> <p> IAM supports AWS CloudTrail, which is a service that records AWS calls for your AWS account and delivers log files to an Amazon S3 bucket. By using information collected by CloudTrail, you can determine what requests were successfully made to IAM, who made the request, when it was made, and so on. To learn more about CloudTrail, including how to turn it on and find your log files, see the <a href=\"http://docs.aws.amazon.com/awscloudtrail/latest/userguide/whatisawscloudtrail.html\">AWS CloudTrail User Guide</a>. </p> <p> <b>Additional Resources</b> </p> <p>For more information, see the following:</p> <ul> <li> <a href=\"http://docs.aws.amazon.com/general/latest/gr/aws-security-credentials.html\">AWS Security Credentials</a>. This topic provides general information about the types of credentials used for accessing AWS. </li> <li> <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/IAMBestPractices.html\">IAM Best Practices</a>. This topic presents a list of suggestions for using the IAM service to help secure your AWS resources. </li> <li> <a href=\"http://docs.aws.amazon.com/STS/latest/UsingSTS/\">AWS Security Token Service</a>. This guide describes how to create and use temporary security credentials. </li> <li> <a href=\"http://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html\">Signing AWS API Requests</a>. This set of topics walk you through the process of signing a request using an access key ID and secret access key. </li> </ul>",
|
109
|
+
"shapes": {
|
110
|
+
"AccessKey": {
|
111
|
+
"base": "<p>Contains information about an AWS access key.</p> <p> This data type is used as a response element in the <a>CreateAccessKey</a> and <a>ListAccessKeys</a> actions. </p> <note>The <code>SecretAccessKey</code> value is returned only in response to <a>CreateAccessKey</a>. You can get a secret access key only when you first create an access key; you cannot recover the secret access key later. If you lose a secret access key, you must create a new access key. </note>",
|
112
|
+
"refs": {
|
113
|
+
"CreateAccessKeyResponse$AccessKey": "<p>Information about the access key.</p>"
|
114
|
+
}
|
115
|
+
},
|
116
|
+
"AccessKeyMetadata": {
|
117
|
+
"base": "<p>Contains information about an AWS access key, without its secret key.</p> <p>This data type is used as a response element in the <a>ListAccessKeys</a> action.</p>",
|
118
|
+
"refs": {
|
119
|
+
"accessKeyMetadataListType$member": null
|
120
|
+
}
|
121
|
+
},
|
122
|
+
"AddClientIDToOpenIDConnectProviderRequest": {
|
123
|
+
"base": null,
|
124
|
+
"refs": {
|
125
|
+
}
|
126
|
+
},
|
127
|
+
"AddRoleToInstanceProfileRequest": {
|
128
|
+
"base": null,
|
129
|
+
"refs": {
|
130
|
+
}
|
131
|
+
},
|
132
|
+
"AddUserToGroupRequest": {
|
133
|
+
"base": null,
|
134
|
+
"refs": {
|
135
|
+
}
|
136
|
+
},
|
137
|
+
"AttachGroupPolicyRequest": {
|
138
|
+
"base": null,
|
139
|
+
"refs": {
|
140
|
+
}
|
141
|
+
},
|
142
|
+
"AttachRolePolicyRequest": {
|
143
|
+
"base": null,
|
144
|
+
"refs": {
|
145
|
+
}
|
146
|
+
},
|
147
|
+
"AttachUserPolicyRequest": {
|
148
|
+
"base": null,
|
149
|
+
"refs": {
|
150
|
+
}
|
151
|
+
},
|
152
|
+
"AttachedPolicy": {
|
153
|
+
"base": "<p>Contains information about an attached policy.</p> <p>An attached policy is a managed policy that has been attached to a user, group, or role. This data type is used as a response element in the <a>ListAttachedGroupPolicies</a>, <a>ListAttachedRolePolicies</a>, <a>ListAttachedUserPolicies</a>, and <a>GetAccountAuthorizationDetails</a> actions. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
154
|
+
"refs": {
|
155
|
+
"attachedPoliciesListType$member": null
|
156
|
+
}
|
157
|
+
},
|
158
|
+
"BootstrapDatum": {
|
159
|
+
"base": null,
|
160
|
+
"refs": {
|
161
|
+
"VirtualMFADevice$Base32StringSeed": "<p> The Base32 seed defined as specified in <a href=\"http://www.ietf.org/rfc/rfc3548.txt\">RFC3548</a>. The <code>Base32StringSeed</code> is Base64-encoded. </p>",
|
162
|
+
"VirtualMFADevice$QRCodePNG": "<p> A QR code PNG image that encodes <code>otpauth://totp/$virtualMFADeviceName@$AccountName?secret=$Base32String</code> where <code>$virtualMFADeviceName</code> is one of the create call arguments, <code>AccountName</code> is the user name if set (otherwise, the account ID otherwise), and <code>Base32String</code> is the seed in Base32 format. The <code>Base32String</code> value is Base64-encoded. </p>"
|
163
|
+
}
|
164
|
+
},
|
165
|
+
"ChangePasswordRequest": {
|
166
|
+
"base": null,
|
167
|
+
"refs": {
|
168
|
+
}
|
169
|
+
},
|
170
|
+
"CreateAccessKeyRequest": {
|
171
|
+
"base": null,
|
172
|
+
"refs": {
|
173
|
+
}
|
174
|
+
},
|
175
|
+
"CreateAccessKeyResponse": {
|
176
|
+
"base": "<p>Contains the response to a successful <a>CreateAccessKey</a> request. </p>",
|
177
|
+
"refs": {
|
178
|
+
}
|
179
|
+
},
|
180
|
+
"CreateAccountAliasRequest": {
|
181
|
+
"base": null,
|
182
|
+
"refs": {
|
183
|
+
}
|
184
|
+
},
|
185
|
+
"CreateGroupRequest": {
|
186
|
+
"base": null,
|
187
|
+
"refs": {
|
188
|
+
}
|
189
|
+
},
|
190
|
+
"CreateGroupResponse": {
|
191
|
+
"base": "<p>Contains the response to a successful <a>CreateGroup</a> request. </p>",
|
192
|
+
"refs": {
|
193
|
+
}
|
194
|
+
},
|
195
|
+
"CreateInstanceProfileRequest": {
|
196
|
+
"base": null,
|
197
|
+
"refs": {
|
198
|
+
}
|
199
|
+
},
|
200
|
+
"CreateInstanceProfileResponse": {
|
201
|
+
"base": "<p>Contains the response to a successful <a>CreateInstanceProfile</a> request. </p>",
|
202
|
+
"refs": {
|
203
|
+
}
|
204
|
+
},
|
205
|
+
"CreateLoginProfileRequest": {
|
206
|
+
"base": null,
|
207
|
+
"refs": {
|
208
|
+
}
|
209
|
+
},
|
210
|
+
"CreateLoginProfileResponse": {
|
211
|
+
"base": "<p>Contains the response to a successful <a>CreateLoginProfile</a> request. </p>",
|
212
|
+
"refs": {
|
213
|
+
}
|
214
|
+
},
|
215
|
+
"CreateOpenIDConnectProviderRequest": {
|
216
|
+
"base": null,
|
217
|
+
"refs": {
|
218
|
+
}
|
219
|
+
},
|
220
|
+
"CreateOpenIDConnectProviderResponse": {
|
221
|
+
"base": "<p>Contains the response to a successful <a>CreateOpenIDConnectProvider</a> request. </p>",
|
222
|
+
"refs": {
|
223
|
+
}
|
224
|
+
},
|
225
|
+
"CreatePolicyRequest": {
|
226
|
+
"base": null,
|
227
|
+
"refs": {
|
228
|
+
}
|
229
|
+
},
|
230
|
+
"CreatePolicyResponse": {
|
231
|
+
"base": "<p>Contains the response to a successful <a>CreatePolicy</a> request. </p>",
|
232
|
+
"refs": {
|
233
|
+
}
|
234
|
+
},
|
235
|
+
"CreatePolicyVersionRequest": {
|
236
|
+
"base": null,
|
237
|
+
"refs": {
|
238
|
+
}
|
239
|
+
},
|
240
|
+
"CreatePolicyVersionResponse": {
|
241
|
+
"base": "<p>Contains the response to a successful <a>CreatePolicyVersion</a> request. </p>",
|
242
|
+
"refs": {
|
243
|
+
}
|
244
|
+
},
|
245
|
+
"CreateRoleRequest": {
|
246
|
+
"base": null,
|
247
|
+
"refs": {
|
248
|
+
}
|
249
|
+
},
|
250
|
+
"CreateRoleResponse": {
|
251
|
+
"base": "<p>Contains the response to a successful <a>CreateRole</a> request. </p>",
|
252
|
+
"refs": {
|
253
|
+
}
|
254
|
+
},
|
255
|
+
"CreateSAMLProviderRequest": {
|
256
|
+
"base": null,
|
257
|
+
"refs": {
|
258
|
+
}
|
259
|
+
},
|
260
|
+
"CreateSAMLProviderResponse": {
|
261
|
+
"base": "<p>Contains the response to a successful <a>CreateSAMLProvider</a> request. </p>",
|
262
|
+
"refs": {
|
263
|
+
}
|
264
|
+
},
|
265
|
+
"CreateUserRequest": {
|
266
|
+
"base": null,
|
267
|
+
"refs": {
|
268
|
+
}
|
269
|
+
},
|
270
|
+
"CreateUserResponse": {
|
271
|
+
"base": "<p>Contains the response to a successful <a>CreateUser</a> request. </p>",
|
272
|
+
"refs": {
|
273
|
+
}
|
274
|
+
},
|
275
|
+
"CreateVirtualMFADeviceRequest": {
|
276
|
+
"base": null,
|
277
|
+
"refs": {
|
278
|
+
}
|
279
|
+
},
|
280
|
+
"CreateVirtualMFADeviceResponse": {
|
281
|
+
"base": "<p>Contains the response to a successful <a>CreateVirtualMFADevice</a> request. </p>",
|
282
|
+
"refs": {
|
283
|
+
}
|
284
|
+
},
|
285
|
+
"CredentialReportExpiredException": {
|
286
|
+
"base": "<p> The request was rejected because the most recent credential report has expired. To generate a new credential report, use <a>GenerateCredentialReport</a>. For more information about credential report expiration, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html\">Getting Credential Reports</a> in the <i>Using IAM</i> guide. </p>",
|
287
|
+
"refs": {
|
288
|
+
}
|
289
|
+
},
|
290
|
+
"CredentialReportNotPresentException": {
|
291
|
+
"base": "<p> The request was rejected because the credential report does not exist. To generate a credential report, use <a>GenerateCredentialReport</a>. </p>",
|
292
|
+
"refs": {
|
293
|
+
}
|
294
|
+
},
|
295
|
+
"CredentialReportNotReadyException": {
|
296
|
+
"base": "<p>The request was rejected because the credential report is still being generated.</p>",
|
297
|
+
"refs": {
|
298
|
+
}
|
299
|
+
},
|
300
|
+
"DeactivateMFADeviceRequest": {
|
301
|
+
"base": null,
|
302
|
+
"refs": {
|
303
|
+
}
|
304
|
+
},
|
305
|
+
"DeleteAccessKeyRequest": {
|
306
|
+
"base": null,
|
307
|
+
"refs": {
|
308
|
+
}
|
309
|
+
},
|
310
|
+
"DeleteAccountAliasRequest": {
|
311
|
+
"base": null,
|
312
|
+
"refs": {
|
313
|
+
}
|
314
|
+
},
|
315
|
+
"DeleteConflictException": {
|
316
|
+
"base": "<p> The request was rejected because it attempted to delete a resource that has attached subordinate entities. The error message describes these entities. </p>",
|
317
|
+
"refs": {
|
318
|
+
}
|
319
|
+
},
|
320
|
+
"DeleteGroupPolicyRequest": {
|
321
|
+
"base": null,
|
322
|
+
"refs": {
|
323
|
+
}
|
324
|
+
},
|
325
|
+
"DeleteGroupRequest": {
|
326
|
+
"base": null,
|
327
|
+
"refs": {
|
328
|
+
}
|
329
|
+
},
|
330
|
+
"DeleteInstanceProfileRequest": {
|
331
|
+
"base": null,
|
332
|
+
"refs": {
|
333
|
+
}
|
334
|
+
},
|
335
|
+
"DeleteLoginProfileRequest": {
|
336
|
+
"base": null,
|
337
|
+
"refs": {
|
338
|
+
}
|
339
|
+
},
|
340
|
+
"DeleteOpenIDConnectProviderRequest": {
|
341
|
+
"base": null,
|
342
|
+
"refs": {
|
343
|
+
}
|
344
|
+
},
|
345
|
+
"DeletePolicyRequest": {
|
346
|
+
"base": null,
|
347
|
+
"refs": {
|
348
|
+
}
|
349
|
+
},
|
350
|
+
"DeletePolicyVersionRequest": {
|
351
|
+
"base": null,
|
352
|
+
"refs": {
|
353
|
+
}
|
354
|
+
},
|
355
|
+
"DeleteRolePolicyRequest": {
|
356
|
+
"base": null,
|
357
|
+
"refs": {
|
358
|
+
}
|
359
|
+
},
|
360
|
+
"DeleteRoleRequest": {
|
361
|
+
"base": null,
|
362
|
+
"refs": {
|
363
|
+
}
|
364
|
+
},
|
365
|
+
"DeleteSAMLProviderRequest": {
|
366
|
+
"base": null,
|
367
|
+
"refs": {
|
368
|
+
}
|
369
|
+
},
|
370
|
+
"DeleteServerCertificateRequest": {
|
371
|
+
"base": null,
|
372
|
+
"refs": {
|
373
|
+
}
|
374
|
+
},
|
375
|
+
"DeleteSigningCertificateRequest": {
|
376
|
+
"base": null,
|
377
|
+
"refs": {
|
378
|
+
}
|
379
|
+
},
|
380
|
+
"DeleteUserPolicyRequest": {
|
381
|
+
"base": null,
|
382
|
+
"refs": {
|
383
|
+
}
|
384
|
+
},
|
385
|
+
"DeleteUserRequest": {
|
386
|
+
"base": null,
|
387
|
+
"refs": {
|
388
|
+
}
|
389
|
+
},
|
390
|
+
"DeleteVirtualMFADeviceRequest": {
|
391
|
+
"base": null,
|
392
|
+
"refs": {
|
393
|
+
}
|
394
|
+
},
|
395
|
+
"DetachGroupPolicyRequest": {
|
396
|
+
"base": null,
|
397
|
+
"refs": {
|
398
|
+
}
|
399
|
+
},
|
400
|
+
"DetachRolePolicyRequest": {
|
401
|
+
"base": null,
|
402
|
+
"refs": {
|
403
|
+
}
|
404
|
+
},
|
405
|
+
"DetachUserPolicyRequest": {
|
406
|
+
"base": null,
|
407
|
+
"refs": {
|
408
|
+
}
|
409
|
+
},
|
410
|
+
"DuplicateCertificateException": {
|
411
|
+
"base": "<p> The request was rejected because the same certificate is associated to another user under the account. </p>",
|
412
|
+
"refs": {
|
413
|
+
}
|
414
|
+
},
|
415
|
+
"EnableMFADeviceRequest": {
|
416
|
+
"base": null,
|
417
|
+
"refs": {
|
418
|
+
}
|
419
|
+
},
|
420
|
+
"EntityAlreadyExistsException": {
|
421
|
+
"base": "<p>The request was rejected because it attempted to create a resource that already exists.</p>",
|
422
|
+
"refs": {
|
423
|
+
}
|
424
|
+
},
|
425
|
+
"EntityTemporarilyUnmodifiableException": {
|
426
|
+
"base": "<p> The request was rejected because it referenced an entity that is temporarily unmodifiable, such as a user name that was deleted and then recreated. The error indicates that the request is likely to succeed if you try again after waiting several minutes. The error message describes the entity. </p>",
|
427
|
+
"refs": {
|
428
|
+
}
|
429
|
+
},
|
430
|
+
"EntityType": {
|
431
|
+
"base": null,
|
432
|
+
"refs": {
|
433
|
+
"ListEntitiesForPolicyRequest$EntityFilter": "<p>The entity type to use for filtering the results. </p> <p>For example, when <code>EntityFilter</code> is <code>Role</code>, only the roles that are attached to the specified policy are returned. This parameter is optional. If it is not included, all attached entities (users, groups, and roles) are returned. </p>",
|
434
|
+
"entityListType$member": null
|
435
|
+
}
|
436
|
+
},
|
437
|
+
"GenerateCredentialReportResponse": {
|
438
|
+
"base": "<p>Contains the response to a successful <a>GenerateCredentialReport</a> request. </p>",
|
439
|
+
"refs": {
|
440
|
+
}
|
441
|
+
},
|
442
|
+
"GetAccountAuthorizationDetailsRequest": {
|
443
|
+
"base": null,
|
444
|
+
"refs": {
|
445
|
+
}
|
446
|
+
},
|
447
|
+
"GetAccountAuthorizationDetailsResponse": {
|
448
|
+
"base": "<p>Contains the response to a successful <a>GetAccountAuthorizationDetails</a> request. </p>",
|
449
|
+
"refs": {
|
450
|
+
}
|
451
|
+
},
|
452
|
+
"GetAccountPasswordPolicyResponse": {
|
453
|
+
"base": "<p>Contains the response to a successful <a>GetAccountPasswordPolicy</a> request. </p>",
|
454
|
+
"refs": {
|
455
|
+
}
|
456
|
+
},
|
457
|
+
"GetAccountSummaryResponse": {
|
458
|
+
"base": "<p>Contains the response to a successful <a>GetAccountSummary</a> request. </p>",
|
459
|
+
"refs": {
|
460
|
+
}
|
461
|
+
},
|
462
|
+
"GetCredentialReportResponse": {
|
463
|
+
"base": "<p>Contains the response to a successful <a>GetCredentialReport</a> request. </p>",
|
464
|
+
"refs": {
|
465
|
+
}
|
466
|
+
},
|
467
|
+
"GetGroupPolicyRequest": {
|
468
|
+
"base": null,
|
469
|
+
"refs": {
|
470
|
+
}
|
471
|
+
},
|
472
|
+
"GetGroupPolicyResponse": {
|
473
|
+
"base": "<p>Contains the response to a successful <a>GetGroupPolicy</a> request. </p>",
|
474
|
+
"refs": {
|
475
|
+
}
|
476
|
+
},
|
477
|
+
"GetGroupRequest": {
|
478
|
+
"base": null,
|
479
|
+
"refs": {
|
480
|
+
}
|
481
|
+
},
|
482
|
+
"GetGroupResponse": {
|
483
|
+
"base": "<p>Contains the response to a successful <a>GetGroup</a> request. </p>",
|
484
|
+
"refs": {
|
485
|
+
}
|
486
|
+
},
|
487
|
+
"GetInstanceProfileRequest": {
|
488
|
+
"base": null,
|
489
|
+
"refs": {
|
490
|
+
}
|
491
|
+
},
|
492
|
+
"GetInstanceProfileResponse": {
|
493
|
+
"base": "<p>Contains the response to a successful <a>GetInstanceProfile</a> request. </p>",
|
494
|
+
"refs": {
|
495
|
+
}
|
496
|
+
},
|
497
|
+
"GetLoginProfileRequest": {
|
498
|
+
"base": null,
|
499
|
+
"refs": {
|
500
|
+
}
|
501
|
+
},
|
502
|
+
"GetLoginProfileResponse": {
|
503
|
+
"base": "<p>Contains the response to a successful <a>GetLoginProfile</a> request. </p>",
|
504
|
+
"refs": {
|
505
|
+
}
|
506
|
+
},
|
507
|
+
"GetOpenIDConnectProviderRequest": {
|
508
|
+
"base": null,
|
509
|
+
"refs": {
|
510
|
+
}
|
511
|
+
},
|
512
|
+
"GetOpenIDConnectProviderResponse": {
|
513
|
+
"base": "<p>Contains the response to a successful <a>GetOpenIDConnectProvider</a> request. </p>",
|
514
|
+
"refs": {
|
515
|
+
}
|
516
|
+
},
|
517
|
+
"GetPolicyRequest": {
|
518
|
+
"base": null,
|
519
|
+
"refs": {
|
520
|
+
}
|
521
|
+
},
|
522
|
+
"GetPolicyResponse": {
|
523
|
+
"base": "<p>Contains the response to a successful <a>GetPolicy</a> request. </p>",
|
524
|
+
"refs": {
|
525
|
+
}
|
526
|
+
},
|
527
|
+
"GetPolicyVersionRequest": {
|
528
|
+
"base": null,
|
529
|
+
"refs": {
|
530
|
+
}
|
531
|
+
},
|
532
|
+
"GetPolicyVersionResponse": {
|
533
|
+
"base": "<p>Contains the response to a successful <a>GetPolicyVersion</a> request. </p>",
|
534
|
+
"refs": {
|
535
|
+
}
|
536
|
+
},
|
537
|
+
"GetRolePolicyRequest": {
|
538
|
+
"base": null,
|
539
|
+
"refs": {
|
540
|
+
}
|
541
|
+
},
|
542
|
+
"GetRolePolicyResponse": {
|
543
|
+
"base": "<p>Contains the response to a successful <a>GetRolePolicy</a> request. </p>",
|
544
|
+
"refs": {
|
545
|
+
}
|
546
|
+
},
|
547
|
+
"GetRoleRequest": {
|
548
|
+
"base": null,
|
549
|
+
"refs": {
|
550
|
+
}
|
551
|
+
},
|
552
|
+
"GetRoleResponse": {
|
553
|
+
"base": "<p>Contains the response to a successful <a>GetRole</a> request. </p>",
|
554
|
+
"refs": {
|
555
|
+
}
|
556
|
+
},
|
557
|
+
"GetSAMLProviderRequest": {
|
558
|
+
"base": null,
|
559
|
+
"refs": {
|
560
|
+
}
|
561
|
+
},
|
562
|
+
"GetSAMLProviderResponse": {
|
563
|
+
"base": "<p>Contains the response to a successful <a>GetSAMLProvider</a> request. </p>",
|
564
|
+
"refs": {
|
565
|
+
}
|
566
|
+
},
|
567
|
+
"GetServerCertificateRequest": {
|
568
|
+
"base": null,
|
569
|
+
"refs": {
|
570
|
+
}
|
571
|
+
},
|
572
|
+
"GetServerCertificateResponse": {
|
573
|
+
"base": "<p>Contains the response to a successful <a>GetServerCertificate</a> request. </p>",
|
574
|
+
"refs": {
|
575
|
+
}
|
576
|
+
},
|
577
|
+
"GetUserPolicyRequest": {
|
578
|
+
"base": null,
|
579
|
+
"refs": {
|
580
|
+
}
|
581
|
+
},
|
582
|
+
"GetUserPolicyResponse": {
|
583
|
+
"base": "<p>Contains the response to a successful <a>GetUserPolicy</a> request. </p>",
|
584
|
+
"refs": {
|
585
|
+
}
|
586
|
+
},
|
587
|
+
"GetUserRequest": {
|
588
|
+
"base": null,
|
589
|
+
"refs": {
|
590
|
+
}
|
591
|
+
},
|
592
|
+
"GetUserResponse": {
|
593
|
+
"base": "<p>Contains the response to a successful <a>GetUser</a> request. </p>",
|
594
|
+
"refs": {
|
595
|
+
}
|
596
|
+
},
|
597
|
+
"Group": {
|
598
|
+
"base": "<p>Contains information about an IAM group entity.</p> <p> This data type is used as a response element in the following actions:</p> <ul> <li> <a>CreateGroup</a> </li> <li> <a>GetGroup</a> </li> <li> <a>ListGroups</a> </li> </ul>",
|
599
|
+
"refs": {
|
600
|
+
"CreateGroupResponse$Group": "<p>Information about the group.</p>",
|
601
|
+
"GetGroupResponse$Group": "<p>Information about the group.</p>",
|
602
|
+
"groupListType$member": null
|
603
|
+
}
|
604
|
+
},
|
605
|
+
"GroupDetail": {
|
606
|
+
"base": "<p>Contains information about an IAM group, including all of the group's policies. </p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> action.</p>",
|
607
|
+
"refs": {
|
608
|
+
"groupDetailListType$member": null
|
609
|
+
}
|
610
|
+
},
|
611
|
+
"InstanceProfile": {
|
612
|
+
"base": "<p>Contains information about an instance profile.</p> <p>This data type is used as a response element in the following actions:</p> <ul> <li> <p> <a>CreateInstanceProfile</a> </p> </li> <li> <p> <a>GetInstanceProfile</a> </p> </li> <li> <p> <a>ListInstanceProfiles</a> </p> </li> <li> <p> <a>ListInstanceProfilesForRole</a> </p> </li> </ul>",
|
613
|
+
"refs": {
|
614
|
+
"CreateInstanceProfileResponse$InstanceProfile": "<p>Information about the instance profile.</p>",
|
615
|
+
"GetInstanceProfileResponse$InstanceProfile": "<p>Information about the instance profile.</p>",
|
616
|
+
"instanceProfileListType$member": null
|
617
|
+
}
|
618
|
+
},
|
619
|
+
"InvalidAuthenticationCodeException": {
|
620
|
+
"base": "<p> The request was rejected because the authentication code was not recognized. The error message describes the specific error. </p>",
|
621
|
+
"refs": {
|
622
|
+
}
|
623
|
+
},
|
624
|
+
"InvalidCertificateException": {
|
625
|
+
"base": "<p>The request was rejected because the certificate is invalid.</p>",
|
626
|
+
"refs": {
|
627
|
+
}
|
628
|
+
},
|
629
|
+
"InvalidInputException": {
|
630
|
+
"base": "<p>The request was rejected because an invalid or out-of-range value was supplied for an input parameter.</p>",
|
631
|
+
"refs": {
|
632
|
+
}
|
633
|
+
},
|
634
|
+
"InvalidUserTypeException": {
|
635
|
+
"base": "<p>The request was rejected because the type of user for the transaction was incorrect.</p>",
|
636
|
+
"refs": {
|
637
|
+
}
|
638
|
+
},
|
639
|
+
"KeyPairMismatchException": {
|
640
|
+
"base": "<p>The request was rejected because the public key certificate and the private key do not match.</p>",
|
641
|
+
"refs": {
|
642
|
+
}
|
643
|
+
},
|
644
|
+
"LimitExceededException": {
|
645
|
+
"base": "<p> The request was rejected because it attempted to create resources beyond the current AWS account limits. The error message describes the limit exceeded. </p>",
|
646
|
+
"refs": {
|
647
|
+
}
|
648
|
+
},
|
649
|
+
"ListAccessKeysRequest": {
|
650
|
+
"base": null,
|
651
|
+
"refs": {
|
652
|
+
}
|
653
|
+
},
|
654
|
+
"ListAccessKeysResponse": {
|
655
|
+
"base": "<p>Contains the response to a successful <a>ListAccessKeys</a> request. </p>",
|
656
|
+
"refs": {
|
657
|
+
}
|
658
|
+
},
|
659
|
+
"ListAccountAliasesRequest": {
|
660
|
+
"base": null,
|
661
|
+
"refs": {
|
662
|
+
}
|
663
|
+
},
|
664
|
+
"ListAccountAliasesResponse": {
|
665
|
+
"base": "<p>Contains the response to a successful <a>ListAccountAliases</a> request. </p>",
|
666
|
+
"refs": {
|
667
|
+
}
|
668
|
+
},
|
669
|
+
"ListAttachedGroupPoliciesRequest": {
|
670
|
+
"base": null,
|
671
|
+
"refs": {
|
672
|
+
}
|
673
|
+
},
|
674
|
+
"ListAttachedGroupPoliciesResponse": {
|
675
|
+
"base": "<p>Contains the response to a successful <a>ListAttachedGroupPolicies</a> request. </p>",
|
676
|
+
"refs": {
|
677
|
+
}
|
678
|
+
},
|
679
|
+
"ListAttachedRolePoliciesRequest": {
|
680
|
+
"base": null,
|
681
|
+
"refs": {
|
682
|
+
}
|
683
|
+
},
|
684
|
+
"ListAttachedRolePoliciesResponse": {
|
685
|
+
"base": "<p>Contains the response to a successful <a>ListAttachedRolePolicies</a> request. </p>",
|
686
|
+
"refs": {
|
687
|
+
}
|
688
|
+
},
|
689
|
+
"ListAttachedUserPoliciesRequest": {
|
690
|
+
"base": null,
|
691
|
+
"refs": {
|
692
|
+
}
|
693
|
+
},
|
694
|
+
"ListAttachedUserPoliciesResponse": {
|
695
|
+
"base": "<p>Contains the response to a successful <a>ListAttachedUserPolicies</a> request. </p>",
|
696
|
+
"refs": {
|
697
|
+
}
|
698
|
+
},
|
699
|
+
"ListEntitiesForPolicyRequest": {
|
700
|
+
"base": null,
|
701
|
+
"refs": {
|
702
|
+
}
|
703
|
+
},
|
704
|
+
"ListEntitiesForPolicyResponse": {
|
705
|
+
"base": "<p>Contains the response to a successful <a>ListEntitiesForPolicy</a> request. </p>",
|
706
|
+
"refs": {
|
707
|
+
}
|
708
|
+
},
|
709
|
+
"ListGroupPoliciesRequest": {
|
710
|
+
"base": null,
|
711
|
+
"refs": {
|
712
|
+
}
|
713
|
+
},
|
714
|
+
"ListGroupPoliciesResponse": {
|
715
|
+
"base": "<p>Contains the response to a successful <a>ListGroupPolicies</a> request. </p>",
|
716
|
+
"refs": {
|
717
|
+
}
|
718
|
+
},
|
719
|
+
"ListGroupsForUserRequest": {
|
720
|
+
"base": null,
|
721
|
+
"refs": {
|
722
|
+
}
|
723
|
+
},
|
724
|
+
"ListGroupsForUserResponse": {
|
725
|
+
"base": "<p>Contains the response to a successful <a>ListGroupsForUser</a> request. </p>",
|
726
|
+
"refs": {
|
727
|
+
}
|
728
|
+
},
|
729
|
+
"ListGroupsRequest": {
|
730
|
+
"base": null,
|
731
|
+
"refs": {
|
732
|
+
}
|
733
|
+
},
|
734
|
+
"ListGroupsResponse": {
|
735
|
+
"base": "<p>Contains the response to a successful <a>ListGroups</a> request. </p>",
|
736
|
+
"refs": {
|
737
|
+
}
|
738
|
+
},
|
739
|
+
"ListInstanceProfilesForRoleRequest": {
|
740
|
+
"base": null,
|
741
|
+
"refs": {
|
742
|
+
}
|
743
|
+
},
|
744
|
+
"ListInstanceProfilesForRoleResponse": {
|
745
|
+
"base": "<p>Contains the response to a successful <a>ListInstanceProfilesForRole</a> request. </p>",
|
746
|
+
"refs": {
|
747
|
+
}
|
748
|
+
},
|
749
|
+
"ListInstanceProfilesRequest": {
|
750
|
+
"base": null,
|
751
|
+
"refs": {
|
752
|
+
}
|
753
|
+
},
|
754
|
+
"ListInstanceProfilesResponse": {
|
755
|
+
"base": "<p>Contains the response to a successful <a>ListInstanceProfiles</a> request. </p>",
|
756
|
+
"refs": {
|
757
|
+
}
|
758
|
+
},
|
759
|
+
"ListMFADevicesRequest": {
|
760
|
+
"base": null,
|
761
|
+
"refs": {
|
762
|
+
}
|
763
|
+
},
|
764
|
+
"ListMFADevicesResponse": {
|
765
|
+
"base": "<p>Contains the response to a successful <a>ListMFADevices</a> request. </p>",
|
766
|
+
"refs": {
|
767
|
+
}
|
768
|
+
},
|
769
|
+
"ListOpenIDConnectProvidersRequest": {
|
770
|
+
"base": null,
|
771
|
+
"refs": {
|
772
|
+
}
|
773
|
+
},
|
774
|
+
"ListOpenIDConnectProvidersResponse": {
|
775
|
+
"base": "<p>Contains the response to a successful <a>ListOpenIDConnectProviders</a> request. </p>",
|
776
|
+
"refs": {
|
777
|
+
}
|
778
|
+
},
|
779
|
+
"ListPoliciesRequest": {
|
780
|
+
"base": null,
|
781
|
+
"refs": {
|
782
|
+
}
|
783
|
+
},
|
784
|
+
"ListPoliciesResponse": {
|
785
|
+
"base": "<p>Contains the response to a successful <a>ListPolicies</a> request. </p>",
|
786
|
+
"refs": {
|
787
|
+
}
|
788
|
+
},
|
789
|
+
"ListPolicyVersionsRequest": {
|
790
|
+
"base": null,
|
791
|
+
"refs": {
|
792
|
+
}
|
793
|
+
},
|
794
|
+
"ListPolicyVersionsResponse": {
|
795
|
+
"base": "<p>Contains the response to a successful <a>ListPolicyVersions</a> request. </p>",
|
796
|
+
"refs": {
|
797
|
+
}
|
798
|
+
},
|
799
|
+
"ListRolePoliciesRequest": {
|
800
|
+
"base": null,
|
801
|
+
"refs": {
|
802
|
+
}
|
803
|
+
},
|
804
|
+
"ListRolePoliciesResponse": {
|
805
|
+
"base": "<p>Contains the response to a successful <a>ListRolePolicies</a> request. </p>",
|
806
|
+
"refs": {
|
807
|
+
}
|
808
|
+
},
|
809
|
+
"ListRolesRequest": {
|
810
|
+
"base": null,
|
811
|
+
"refs": {
|
812
|
+
}
|
813
|
+
},
|
814
|
+
"ListRolesResponse": {
|
815
|
+
"base": "<p>Contains the response to a successful <a>ListRoles</a> request. </p>",
|
816
|
+
"refs": {
|
817
|
+
}
|
818
|
+
},
|
819
|
+
"ListSAMLProvidersRequest": {
|
820
|
+
"base": null,
|
821
|
+
"refs": {
|
822
|
+
}
|
823
|
+
},
|
824
|
+
"ListSAMLProvidersResponse": {
|
825
|
+
"base": "<p>Contains the response to a successful <a>ListSAMLProviders</a> request. </p>",
|
826
|
+
"refs": {
|
827
|
+
}
|
828
|
+
},
|
829
|
+
"ListServerCertificatesRequest": {
|
830
|
+
"base": null,
|
831
|
+
"refs": {
|
832
|
+
}
|
833
|
+
},
|
834
|
+
"ListServerCertificatesResponse": {
|
835
|
+
"base": "<p>Contains the response to a successful <a>ListServerCertificates</a> request. </p>",
|
836
|
+
"refs": {
|
837
|
+
}
|
838
|
+
},
|
839
|
+
"ListSigningCertificatesRequest": {
|
840
|
+
"base": null,
|
841
|
+
"refs": {
|
842
|
+
}
|
843
|
+
},
|
844
|
+
"ListSigningCertificatesResponse": {
|
845
|
+
"base": "<p>Contains the response to a successful <a>ListSigningCertificates</a> request. </p>",
|
846
|
+
"refs": {
|
847
|
+
}
|
848
|
+
},
|
849
|
+
"ListUserPoliciesRequest": {
|
850
|
+
"base": null,
|
851
|
+
"refs": {
|
852
|
+
}
|
853
|
+
},
|
854
|
+
"ListUserPoliciesResponse": {
|
855
|
+
"base": "<p>Contains the response to a successful <a>ListUserPolicies</a> request. </p>",
|
856
|
+
"refs": {
|
857
|
+
}
|
858
|
+
},
|
859
|
+
"ListUsersRequest": {
|
860
|
+
"base": null,
|
861
|
+
"refs": {
|
862
|
+
}
|
863
|
+
},
|
864
|
+
"ListUsersResponse": {
|
865
|
+
"base": "<p>Contains the response to a successful <a>ListUsers</a> request. </p>",
|
866
|
+
"refs": {
|
867
|
+
}
|
868
|
+
},
|
869
|
+
"ListVirtualMFADevicesRequest": {
|
870
|
+
"base": null,
|
871
|
+
"refs": {
|
872
|
+
}
|
873
|
+
},
|
874
|
+
"ListVirtualMFADevicesResponse": {
|
875
|
+
"base": "<p>Contains the response to a successful <a>ListVirtualMFADevices</a> request. </p>",
|
876
|
+
"refs": {
|
877
|
+
}
|
878
|
+
},
|
879
|
+
"LoginProfile": {
|
880
|
+
"base": "<p>Contains the user name and password create date for a user.</p> <p> This data type is used as a response element in the <a>CreateLoginProfile</a> and <a>GetLoginProfile</a> actions. </p>",
|
881
|
+
"refs": {
|
882
|
+
"CreateLoginProfileResponse$LoginProfile": "<p>The user name and password create date.</p>",
|
883
|
+
"GetLoginProfileResponse$LoginProfile": "<p>The user name and password create date for the user.</p>"
|
884
|
+
}
|
885
|
+
},
|
886
|
+
"MFADevice": {
|
887
|
+
"base": "<p>Contains information about an MFA device.</p> <p>This data type is used as a response element in the <a>ListMFADevices</a> action.</p>",
|
888
|
+
"refs": {
|
889
|
+
"mfaDeviceListType$member": null
|
890
|
+
}
|
891
|
+
},
|
892
|
+
"MalformedCertificateException": {
|
893
|
+
"base": "<p> The request was rejected because the certificate was malformed or expired. The error message describes the specific error. </p>",
|
894
|
+
"refs": {
|
895
|
+
}
|
896
|
+
},
|
897
|
+
"MalformedPolicyDocumentException": {
|
898
|
+
"base": "<p> The request was rejected because the policy document was malformed. The error message describes the specific error. </p>",
|
899
|
+
"refs": {
|
900
|
+
}
|
901
|
+
},
|
902
|
+
"ManagedPolicyDetail": {
|
903
|
+
"base": "<p>Contains information about a managed policy, including the policy's ARN, versions, and the number of principal entities (users, groups, and roles) that the policy is attached to.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> action.</p> <p>For more information about managed policies, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
904
|
+
"refs": {
|
905
|
+
"ManagedPolicyDetailListType$member": null
|
906
|
+
}
|
907
|
+
},
|
908
|
+
"ManagedPolicyDetailListType": {
|
909
|
+
"base": null,
|
910
|
+
"refs": {
|
911
|
+
"GetAccountAuthorizationDetailsResponse$Policies": "<p>A list containing information about managed policies.</p>"
|
912
|
+
}
|
913
|
+
},
|
914
|
+
"NoSuchEntityException": {
|
915
|
+
"base": "<p> The request was rejected because it referenced an entity that does not exist. The error message describes the entity. </p>",
|
916
|
+
"refs": {
|
917
|
+
}
|
918
|
+
},
|
919
|
+
"OpenIDConnectProviderListEntry": {
|
920
|
+
"base": "<p>Contains the Amazon Resource Name (ARN) for an IAM OpenID Connect provider.</p>",
|
921
|
+
"refs": {
|
922
|
+
"OpenIDConnectProviderListType$member": null
|
923
|
+
}
|
924
|
+
},
|
925
|
+
"OpenIDConnectProviderListType": {
|
926
|
+
"base": "<p>Contains a list of IAM OpenID Connect providers.</p>",
|
927
|
+
"refs": {
|
928
|
+
"ListOpenIDConnectProvidersResponse$OpenIDConnectProviderList": "<p>The list of IAM OpenID Connect providers in the AWS account.</p>"
|
929
|
+
}
|
930
|
+
},
|
931
|
+
"OpenIDConnectProviderUrlType": {
|
932
|
+
"base": "<p>Contains a URL that specifies the endpoint for an OpenID Connect provider.</p>",
|
933
|
+
"refs": {
|
934
|
+
"CreateOpenIDConnectProviderRequest$Url": "<p>The URL of the identity provider. The URL must begin with \"https://\" and should correspond to the <code>iss</code> claim in the provider's OpenID Connect ID tokens. Per the OIDC standard, path components are allowed but query parameters are not. Typically the URL consists of only a host name, like \"https://server.example.org\" or \"https://example.com\". </p> <p>You cannot register the same provider multiple times in a single AWS account. If you try to submit a URL that has already been used for an OpenID Connect provider in the AWS account, you will get an error. </p>",
|
935
|
+
"GetOpenIDConnectProviderResponse$Url": "<p>The URL that the IAM OpenID Connect provider is associated with. For more information, see <a>CreateOpenIDConnectProvider</a>. </p>"
|
936
|
+
}
|
937
|
+
},
|
938
|
+
"PasswordPolicy": {
|
939
|
+
"base": "<p>Contains information about the account password policy.</p> <p> This data type is used as a response element in the <a>GetAccountPasswordPolicy</a> action. </p>",
|
940
|
+
"refs": {
|
941
|
+
"GetAccountPasswordPolicyResponse$PasswordPolicy": null
|
942
|
+
}
|
943
|
+
},
|
944
|
+
"PasswordPolicyViolationException": {
|
945
|
+
"base": "<p> The request was rejected because the provided password did not meet the requirements imposed by the account password policy. </p>",
|
946
|
+
"refs": {
|
947
|
+
}
|
948
|
+
},
|
949
|
+
"Policy": {
|
950
|
+
"base": "<p>Contains information about a managed policy.</p> <p>This data type is used as a response element in the <a>CreatePolicy</a>, <a>GetPolicy</a>, and <a>ListPolicies</a> actions. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
951
|
+
"refs": {
|
952
|
+
"CreatePolicyResponse$Policy": "<p>Information about the policy.</p>",
|
953
|
+
"GetPolicyResponse$Policy": "<p>Information about the policy.</p>",
|
954
|
+
"policyListType$member": null
|
955
|
+
}
|
956
|
+
},
|
957
|
+
"PolicyDetail": {
|
958
|
+
"base": "<p>Contains information about an IAM policy, including the policy document.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> action.</p>",
|
959
|
+
"refs": {
|
960
|
+
"policyDetailListType$member": null
|
961
|
+
}
|
962
|
+
},
|
963
|
+
"PolicyGroup": {
|
964
|
+
"base": "<p>Contains information about a group that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> action. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
965
|
+
"refs": {
|
966
|
+
"PolicyGroupListType$member": null
|
967
|
+
}
|
968
|
+
},
|
969
|
+
"PolicyGroupListType": {
|
970
|
+
"base": null,
|
971
|
+
"refs": {
|
972
|
+
"ListEntitiesForPolicyResponse$PolicyGroups": "<p>A list of groups that the policy is attached to.</p>"
|
973
|
+
}
|
974
|
+
},
|
975
|
+
"PolicyRole": {
|
976
|
+
"base": "<p>Contains information about a role that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> action. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
977
|
+
"refs": {
|
978
|
+
"PolicyRoleListType$member": null
|
979
|
+
}
|
980
|
+
},
|
981
|
+
"PolicyRoleListType": {
|
982
|
+
"base": null,
|
983
|
+
"refs": {
|
984
|
+
"ListEntitiesForPolicyResponse$PolicyRoles": "<p>A list of roles that the policy is attached to.</p>"
|
985
|
+
}
|
986
|
+
},
|
987
|
+
"PolicyUser": {
|
988
|
+
"base": "<p>Contains information about a user that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> action. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
989
|
+
"refs": {
|
990
|
+
"PolicyUserListType$member": null
|
991
|
+
}
|
992
|
+
},
|
993
|
+
"PolicyUserListType": {
|
994
|
+
"base": null,
|
995
|
+
"refs": {
|
996
|
+
"ListEntitiesForPolicyResponse$PolicyUsers": "<p>A list of users that the policy is attached to.</p>"
|
997
|
+
}
|
998
|
+
},
|
999
|
+
"PolicyVersion": {
|
1000
|
+
"base": "<p>Contains information about a version of a managed policy.</p> <p>This data type is used as a response element in the <a>CreatePolicyVersion</a>, <a>GetPolicyVersion</a>, <a>ListPolicyVersions</a>, and <a>GetAccountAuthorizationDetails</a> actions. </p> <p>For more information about managed policies, refer to <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html\">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>",
|
1001
|
+
"refs": {
|
1002
|
+
"CreatePolicyVersionResponse$PolicyVersion": "<p>Information about the policy version.</p>",
|
1003
|
+
"GetPolicyVersionResponse$PolicyVersion": "<p>Information about the policy version.</p> <p>For more information about managed policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>",
|
1004
|
+
"policyDocumentVersionListType$member": null
|
1005
|
+
}
|
1006
|
+
},
|
1007
|
+
"PutGroupPolicyRequest": {
|
1008
|
+
"base": null,
|
1009
|
+
"refs": {
|
1010
|
+
}
|
1011
|
+
},
|
1012
|
+
"PutRolePolicyRequest": {
|
1013
|
+
"base": null,
|
1014
|
+
"refs": {
|
1015
|
+
}
|
1016
|
+
},
|
1017
|
+
"PutUserPolicyRequest": {
|
1018
|
+
"base": null,
|
1019
|
+
"refs": {
|
1020
|
+
}
|
1021
|
+
},
|
1022
|
+
"RemoveClientIDFromOpenIDConnectProviderRequest": {
|
1023
|
+
"base": null,
|
1024
|
+
"refs": {
|
1025
|
+
}
|
1026
|
+
},
|
1027
|
+
"RemoveRoleFromInstanceProfileRequest": {
|
1028
|
+
"base": null,
|
1029
|
+
"refs": {
|
1030
|
+
}
|
1031
|
+
},
|
1032
|
+
"RemoveUserFromGroupRequest": {
|
1033
|
+
"base": null,
|
1034
|
+
"refs": {
|
1035
|
+
}
|
1036
|
+
},
|
1037
|
+
"ReportContentType": {
|
1038
|
+
"base": null,
|
1039
|
+
"refs": {
|
1040
|
+
"GetCredentialReportResponse$Content": "<p>Contains the credential report. The report is Base64-encoded.</p>"
|
1041
|
+
}
|
1042
|
+
},
|
1043
|
+
"ReportFormatType": {
|
1044
|
+
"base": null,
|
1045
|
+
"refs": {
|
1046
|
+
"GetCredentialReportResponse$ReportFormat": "<p>The format (MIME type) of the credential report.</p>"
|
1047
|
+
}
|
1048
|
+
},
|
1049
|
+
"ReportStateDescriptionType": {
|
1050
|
+
"base": null,
|
1051
|
+
"refs": {
|
1052
|
+
"GenerateCredentialReportResponse$Description": "<p>Information about the credential report.</p>"
|
1053
|
+
}
|
1054
|
+
},
|
1055
|
+
"ReportStateType": {
|
1056
|
+
"base": null,
|
1057
|
+
"refs": {
|
1058
|
+
"GenerateCredentialReportResponse$State": "<p>Information about the state of the credential report.</p>"
|
1059
|
+
}
|
1060
|
+
},
|
1061
|
+
"ResyncMFADeviceRequest": {
|
1062
|
+
"base": null,
|
1063
|
+
"refs": {
|
1064
|
+
}
|
1065
|
+
},
|
1066
|
+
"Role": {
|
1067
|
+
"base": "<p>Contains information about an IAM role.</p> <p> This data type is used as a response element in the following actions:</p> <ul> <li> <p> <a>CreateRole</a> </p> </li> <li> <p> <a>GetRole</a> </p> </li> <li> <p> <a>ListRoles</a> </p> </li> </ul>",
|
1068
|
+
"refs": {
|
1069
|
+
"CreateRoleResponse$Role": "<p>Information about the role.</p>",
|
1070
|
+
"GetRoleResponse$Role": "<p>Information about the role.</p>",
|
1071
|
+
"roleListType$member": null
|
1072
|
+
}
|
1073
|
+
},
|
1074
|
+
"RoleDetail": {
|
1075
|
+
"base": "<p>Contains information about an IAM role, including all of the role's policies.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> action.</p>",
|
1076
|
+
"refs": {
|
1077
|
+
"roleDetailListType$member": null
|
1078
|
+
}
|
1079
|
+
},
|
1080
|
+
"SAMLMetadataDocumentType": {
|
1081
|
+
"base": null,
|
1082
|
+
"refs": {
|
1083
|
+
"CreateSAMLProviderRequest$SAMLMetadataDocument": "<p> An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP. </p> <p> For more information, see <a href=\"http://docs.aws.amazon.com/STS/latest/UsingSTS/CreatingSAML.html\">Creating Temporary Security Credentials for SAML Federation</a> in the <i>Using Temporary Security Credentials</i> guide. </p>",
|
1084
|
+
"GetSAMLProviderResponse$SAMLMetadataDocument": "<p>The XML metadata document that includes information about an identity provider.</p>",
|
1085
|
+
"UpdateSAMLProviderRequest$SAMLMetadataDocument": "<p> An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP. </p>"
|
1086
|
+
}
|
1087
|
+
},
|
1088
|
+
"SAMLProviderListEntry": {
|
1089
|
+
"base": "<p>Contains the list of SAML providers for this account.</p>",
|
1090
|
+
"refs": {
|
1091
|
+
"SAMLProviderListType$member": null
|
1092
|
+
}
|
1093
|
+
},
|
1094
|
+
"SAMLProviderListType": {
|
1095
|
+
"base": null,
|
1096
|
+
"refs": {
|
1097
|
+
"ListSAMLProvidersResponse$SAMLProviderList": "<p>The list of SAML providers for this account.</p>"
|
1098
|
+
}
|
1099
|
+
},
|
1100
|
+
"SAMLProviderNameType": {
|
1101
|
+
"base": null,
|
1102
|
+
"refs": {
|
1103
|
+
"CreateSAMLProviderRequest$Name": "<p>The name of the provider to create.</p>"
|
1104
|
+
}
|
1105
|
+
},
|
1106
|
+
"ServerCertificate": {
|
1107
|
+
"base": "<p>Contains information about a server certificate.</p> <p> This data type is used as a response element in the <a>GetServerCertificate</a> action. </p>",
|
1108
|
+
"refs": {
|
1109
|
+
"GetServerCertificateResponse$ServerCertificate": "<p>Information about the server certificate.</p>"
|
1110
|
+
}
|
1111
|
+
},
|
1112
|
+
"ServerCertificateMetadata": {
|
1113
|
+
"base": "<p>Contains information about a server certificate without its certificate body, certificate chain, and private key. </p> <p> This data type is used as a response element in the <a>UploadServerCertificate</a> and <a>ListServerCertificates</a> actions. </p>",
|
1114
|
+
"refs": {
|
1115
|
+
"ServerCertificate$ServerCertificateMetadata": "<p>The meta information of the server certificate, such as its name, path, ID, and ARN.</p>",
|
1116
|
+
"UploadServerCertificateResponse$ServerCertificateMetadata": "<p> The meta information of the uploaded server certificate without its certificate body, certificate chain, and private key. </p>",
|
1117
|
+
"serverCertificateMetadataListType$member": null
|
1118
|
+
}
|
1119
|
+
},
|
1120
|
+
"ServiceFailureException": {
|
1121
|
+
"base": "<p> The request processing has failed because of an unknown error, exception or failure. </p>",
|
1122
|
+
"refs": {
|
1123
|
+
}
|
1124
|
+
},
|
1125
|
+
"SetDefaultPolicyVersionRequest": {
|
1126
|
+
"base": null,
|
1127
|
+
"refs": {
|
1128
|
+
}
|
1129
|
+
},
|
1130
|
+
"SigningCertificate": {
|
1131
|
+
"base": "<p>Contains information about an X.509 signing certificate.</p> <p>This data type is used as a response element in the <a>UploadSigningCertificate</a> and <a>ListSigningCertificates</a> actions. </p>",
|
1132
|
+
"refs": {
|
1133
|
+
"UploadSigningCertificateResponse$Certificate": "<p>Information about the certificate.</p>",
|
1134
|
+
"certificateListType$member": null
|
1135
|
+
}
|
1136
|
+
},
|
1137
|
+
"UpdateAccessKeyRequest": {
|
1138
|
+
"base": null,
|
1139
|
+
"refs": {
|
1140
|
+
}
|
1141
|
+
},
|
1142
|
+
"UpdateAccountPasswordPolicyRequest": {
|
1143
|
+
"base": null,
|
1144
|
+
"refs": {
|
1145
|
+
}
|
1146
|
+
},
|
1147
|
+
"UpdateAssumeRolePolicyRequest": {
|
1148
|
+
"base": null,
|
1149
|
+
"refs": {
|
1150
|
+
}
|
1151
|
+
},
|
1152
|
+
"UpdateGroupRequest": {
|
1153
|
+
"base": null,
|
1154
|
+
"refs": {
|
1155
|
+
}
|
1156
|
+
},
|
1157
|
+
"UpdateLoginProfileRequest": {
|
1158
|
+
"base": null,
|
1159
|
+
"refs": {
|
1160
|
+
}
|
1161
|
+
},
|
1162
|
+
"UpdateOpenIDConnectProviderThumbprintRequest": {
|
1163
|
+
"base": null,
|
1164
|
+
"refs": {
|
1165
|
+
}
|
1166
|
+
},
|
1167
|
+
"UpdateSAMLProviderRequest": {
|
1168
|
+
"base": null,
|
1169
|
+
"refs": {
|
1170
|
+
}
|
1171
|
+
},
|
1172
|
+
"UpdateSAMLProviderResponse": {
|
1173
|
+
"base": "<p>Contains the response to a successful <a>UpdateSAMLProvider</a> request. </p>",
|
1174
|
+
"refs": {
|
1175
|
+
}
|
1176
|
+
},
|
1177
|
+
"UpdateServerCertificateRequest": {
|
1178
|
+
"base": null,
|
1179
|
+
"refs": {
|
1180
|
+
}
|
1181
|
+
},
|
1182
|
+
"UpdateSigningCertificateRequest": {
|
1183
|
+
"base": null,
|
1184
|
+
"refs": {
|
1185
|
+
}
|
1186
|
+
},
|
1187
|
+
"UpdateUserRequest": {
|
1188
|
+
"base": null,
|
1189
|
+
"refs": {
|
1190
|
+
}
|
1191
|
+
},
|
1192
|
+
"UploadServerCertificateRequest": {
|
1193
|
+
"base": null,
|
1194
|
+
"refs": {
|
1195
|
+
}
|
1196
|
+
},
|
1197
|
+
"UploadServerCertificateResponse": {
|
1198
|
+
"base": "<p>Contains the response to a successful <a>UploadServerCertificate</a> request. </p>",
|
1199
|
+
"refs": {
|
1200
|
+
}
|
1201
|
+
},
|
1202
|
+
"UploadSigningCertificateRequest": {
|
1203
|
+
"base": null,
|
1204
|
+
"refs": {
|
1205
|
+
}
|
1206
|
+
},
|
1207
|
+
"UploadSigningCertificateResponse": {
|
1208
|
+
"base": "<p>Contains the response to a successful <a>UploadSigningCertificate</a> request. </p>",
|
1209
|
+
"refs": {
|
1210
|
+
}
|
1211
|
+
},
|
1212
|
+
"User": {
|
1213
|
+
"base": "<p>Contains information about an IAM user entity.</p> <p> This data type is used as a response element in the following actions:</p> <ul> <li> <p> <a>CreateUser</a> </p> </li> <li> <p> <a>GetUser</a> </p> </li> <li> <p> <a>ListUsers</a> </p> </li> </ul>",
|
1214
|
+
"refs": {
|
1215
|
+
"CreateUserResponse$User": "<p>Information about the user.</p>",
|
1216
|
+
"GetUserResponse$User": "<p>Information about the user.</p>",
|
1217
|
+
"VirtualMFADevice$User": null,
|
1218
|
+
"userListType$member": null
|
1219
|
+
}
|
1220
|
+
},
|
1221
|
+
"UserDetail": {
|
1222
|
+
"base": "<p>Contains information about an IAM user, including all the user's policies and all the IAM groups the user is in.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> action.</p>",
|
1223
|
+
"refs": {
|
1224
|
+
"userDetailListType$member": null
|
1225
|
+
}
|
1226
|
+
},
|
1227
|
+
"VirtualMFADevice": {
|
1228
|
+
"base": "<p>Contains information about a virtual MFA device.</p>",
|
1229
|
+
"refs": {
|
1230
|
+
"CreateVirtualMFADeviceResponse$VirtualMFADevice": "<p>A newly created virtual MFA device.</p>",
|
1231
|
+
"virtualMFADeviceListType$member": null
|
1232
|
+
}
|
1233
|
+
},
|
1234
|
+
"accessKeyIdType": {
|
1235
|
+
"base": null,
|
1236
|
+
"refs": {
|
1237
|
+
"AccessKey$AccessKeyId": "<p>The ID for this access key.</p>",
|
1238
|
+
"AccessKeyMetadata$AccessKeyId": "<p>The ID for this access key.</p>",
|
1239
|
+
"DeleteAccessKeyRequest$AccessKeyId": "<p>The access key ID for the access key ID and secret access key you want to delete.</p>",
|
1240
|
+
"UpdateAccessKeyRequest$AccessKeyId": "<p>The access key ID of the secret access key you want to update.</p>"
|
1241
|
+
}
|
1242
|
+
},
|
1243
|
+
"accessKeyMetadataListType": {
|
1244
|
+
"base": "<p>Contains a list of access key metadata.</p> <p>This data type is used as a response element in the <a>ListAccessKeys</a> action.</p>",
|
1245
|
+
"refs": {
|
1246
|
+
"ListAccessKeysResponse$AccessKeyMetadata": "<p>A list of access key metadata.</p>"
|
1247
|
+
}
|
1248
|
+
},
|
1249
|
+
"accessKeySecretType": {
|
1250
|
+
"base": null,
|
1251
|
+
"refs": {
|
1252
|
+
"AccessKey$SecretAccessKey": "<p>The secret key used to sign requests.</p>"
|
1253
|
+
}
|
1254
|
+
},
|
1255
|
+
"accountAliasListType": {
|
1256
|
+
"base": null,
|
1257
|
+
"refs": {
|
1258
|
+
"ListAccountAliasesResponse$AccountAliases": "<p>A list of aliases associated with the account.</p>"
|
1259
|
+
}
|
1260
|
+
},
|
1261
|
+
"accountAliasType": {
|
1262
|
+
"base": null,
|
1263
|
+
"refs": {
|
1264
|
+
"CreateAccountAliasRequest$AccountAlias": "<p>The account alias to create.</p>",
|
1265
|
+
"DeleteAccountAliasRequest$AccountAlias": "<p>The name of the account alias to delete.</p>",
|
1266
|
+
"accountAliasListType$member": null
|
1267
|
+
}
|
1268
|
+
},
|
1269
|
+
"arnType": {
|
1270
|
+
"base": "<p>The Amazon Resource Name (ARN). ARNs are unique identifiers for AWS resources. </p> <p>For more information about ARNs, go to <a href=\"http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html\">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>. </p>",
|
1271
|
+
"refs": {
|
1272
|
+
"AddClientIDToOpenIDConnectProviderRequest$OpenIDConnectProviderArn": "<p>The Amazon Resource Name (ARN) of the IAM OpenID Connect (OIDC) provider to add the client ID to. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> action. </p>",
|
1273
|
+
"AttachGroupPolicyRequest$PolicyArn": null,
|
1274
|
+
"AttachRolePolicyRequest$PolicyArn": null,
|
1275
|
+
"AttachUserPolicyRequest$PolicyArn": null,
|
1276
|
+
"AttachedPolicy$PolicyArn": null,
|
1277
|
+
"CreateOpenIDConnectProviderResponse$OpenIDConnectProviderArn": "<p>The Amazon Resource Name (ARN) of the IAM OpenID Connect provider that was created. For more information, see <a>OpenIDConnectProviderListEntry</a>. </p>",
|
1278
|
+
"CreatePolicyVersionRequest$PolicyArn": null,
|
1279
|
+
"CreateSAMLProviderResponse$SAMLProviderArn": "<p>The Amazon Resource Name (ARN) of the SAML provider.</p>",
|
1280
|
+
"DeleteOpenIDConnectProviderRequest$OpenIDConnectProviderArn": "<p>The Amazon Resource Name (ARN) of the IAM OpenID Connect provider to delete. You can get a list of OpenID Connect provider ARNs by using the <a>ListOpenIDConnectProviders</a> action.</p>",
|
1281
|
+
"DeletePolicyRequest$PolicyArn": null,
|
1282
|
+
"DeletePolicyVersionRequest$PolicyArn": null,
|
1283
|
+
"DeleteSAMLProviderRequest$SAMLProviderArn": "<p>The Amazon Resource Name (ARN) of the SAML provider to delete.</p>",
|
1284
|
+
"DetachGroupPolicyRequest$PolicyArn": null,
|
1285
|
+
"DetachRolePolicyRequest$PolicyArn": null,
|
1286
|
+
"DetachUserPolicyRequest$PolicyArn": null,
|
1287
|
+
"GetOpenIDConnectProviderRequest$OpenIDConnectProviderArn": "<p>The Amazon Resource Name (ARN) of the IAM OpenID Connect (OIDC) provider to get information for. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> action.</p>",
|
1288
|
+
"GetPolicyRequest$PolicyArn": null,
|
1289
|
+
"GetPolicyVersionRequest$PolicyArn": null,
|
1290
|
+
"GetSAMLProviderRequest$SAMLProviderArn": "<p>The Amazon Resource Name (ARN) of the SAML provider to get information about.</p>",
|
1291
|
+
"Group$Arn": "<p> The Amazon Resource Name (ARN) specifying the group. For more information about ARNs and how to use them in policies, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1292
|
+
"GroupDetail$Arn": null,
|
1293
|
+
"InstanceProfile$Arn": "<p> The Amazon Resource Name (ARN) specifying the instance profile. For more information about ARNs and how to use them in policies, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1294
|
+
"ListEntitiesForPolicyRequest$PolicyArn": null,
|
1295
|
+
"ListPolicyVersionsRequest$PolicyArn": null,
|
1296
|
+
"ManagedPolicyDetail$Arn": null,
|
1297
|
+
"OpenIDConnectProviderListEntry$Arn": null,
|
1298
|
+
"Policy$Arn": null,
|
1299
|
+
"RemoveClientIDFromOpenIDConnectProviderRequest$OpenIDConnectProviderArn": "<p>The Amazon Resource Name (ARN) of the IAM OpenID Connect (OIDC) provider to remove the client ID from. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> action.</p>",
|
1300
|
+
"Role$Arn": "<p> The Amazon Resource Name (ARN) specifying the role. For more information about ARNs and how to use them in policies, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1301
|
+
"RoleDetail$Arn": null,
|
1302
|
+
"SAMLProviderListEntry$Arn": "<p>The Amazon Resource Name (ARN) of the SAML provider.</p>",
|
1303
|
+
"ServerCertificateMetadata$Arn": "<p> The Amazon Resource Name (ARN) specifying the server certificate. For more information about ARNs and how to use them in policies, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1304
|
+
"SetDefaultPolicyVersionRequest$PolicyArn": null,
|
1305
|
+
"UpdateOpenIDConnectProviderThumbprintRequest$OpenIDConnectProviderArn": "<p>The Amazon Resource Name (ARN) of the IAM OpenID Connect (OIDC) provider to update the thumbprint for. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> action. </p>",
|
1306
|
+
"UpdateSAMLProviderRequest$SAMLProviderArn": "<p>The Amazon Resource Name (ARN) of the SAML provider to update.</p>",
|
1307
|
+
"UpdateSAMLProviderResponse$SAMLProviderArn": "<p>The Amazon Resource Name (ARN) of the SAML provider that was updated.</p>",
|
1308
|
+
"User$Arn": "<p>The Amazon Resource Name (ARN) that identifies the user. For more information about ARNs and how to use ARNs in policies, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1309
|
+
"UserDetail$Arn": null
|
1310
|
+
}
|
1311
|
+
},
|
1312
|
+
"assignmentStatusType": {
|
1313
|
+
"base": null,
|
1314
|
+
"refs": {
|
1315
|
+
"ListVirtualMFADevicesRequest$AssignmentStatus": "<p> The status (unassigned or assigned) of the devices to list. If you do not specify an <code>AssignmentStatus</code>, the action defaults to <code>Any</code> which lists both assigned and unassigned virtual MFA devices. </p>"
|
1316
|
+
}
|
1317
|
+
},
|
1318
|
+
"attachedPoliciesListType": {
|
1319
|
+
"base": null,
|
1320
|
+
"refs": {
|
1321
|
+
"GroupDetail$AttachedManagedPolicies": "<p>A list of the managed policies attached to the group.</p>",
|
1322
|
+
"ListAttachedGroupPoliciesResponse$AttachedPolicies": "<p>A list of the attached policies.</p>",
|
1323
|
+
"ListAttachedRolePoliciesResponse$AttachedPolicies": "<p>A list of the attached policies.</p>",
|
1324
|
+
"ListAttachedUserPoliciesResponse$AttachedPolicies": "<p>A list of the attached policies.</p>",
|
1325
|
+
"RoleDetail$AttachedManagedPolicies": "<p>A list of managed policies attached to the role. These policies are the role's access (permissions) policies.</p>",
|
1326
|
+
"UserDetail$AttachedManagedPolicies": "<p>A list of the managed policies attached to the user.</p>"
|
1327
|
+
}
|
1328
|
+
},
|
1329
|
+
"attachmentCountType": {
|
1330
|
+
"base": null,
|
1331
|
+
"refs": {
|
1332
|
+
"ManagedPolicyDetail$AttachmentCount": "<p>The number of principal entities (users, groups, and roles) that the policy is attached to.</p>",
|
1333
|
+
"Policy$AttachmentCount": "<p>The number of entities (users, groups, and roles) that the policy is attached to.</p>"
|
1334
|
+
}
|
1335
|
+
},
|
1336
|
+
"authenticationCodeType": {
|
1337
|
+
"base": null,
|
1338
|
+
"refs": {
|
1339
|
+
"EnableMFADeviceRequest$AuthenticationCode1": "<p>An authentication code emitted by the device.</p>",
|
1340
|
+
"EnableMFADeviceRequest$AuthenticationCode2": "<p>A subsequent authentication code emitted by the device.</p>",
|
1341
|
+
"ResyncMFADeviceRequest$AuthenticationCode1": "<p>An authentication code emitted by the device.</p>",
|
1342
|
+
"ResyncMFADeviceRequest$AuthenticationCode2": "<p>A subsequent authentication code emitted by the device.</p>"
|
1343
|
+
}
|
1344
|
+
},
|
1345
|
+
"booleanObjectType": {
|
1346
|
+
"base": null,
|
1347
|
+
"refs": {
|
1348
|
+
"PasswordPolicy$HardExpiry": "<p>Specifies whether IAM users are prevented from setting a new password after their password has expired.</p>",
|
1349
|
+
"UpdateAccountPasswordPolicyRequest$HardExpiry": "<p>Prevents IAM users from setting a new password after their password has expired.</p> <p>Default value: false</p>",
|
1350
|
+
"UpdateLoginProfileRequest$PasswordResetRequired": "<p>Require the specified user to set a new password on next sign-in.</p>"
|
1351
|
+
}
|
1352
|
+
},
|
1353
|
+
"booleanType": {
|
1354
|
+
"base": null,
|
1355
|
+
"refs": {
|
1356
|
+
"CreateLoginProfileRequest$PasswordResetRequired": "<p> Specifies whether the user is required to set a new password on next sign-in. </p>",
|
1357
|
+
"CreatePolicyVersionRequest$SetAsDefault": "<p>Specifies whether to set this version as the policy's default version.</p> <p>When this parameter is <code>true</code>, the new policy version becomes the operative version; that is, the version that is in effect for the IAM users, groups, and roles that the policy is attached to.</p> <p>For more information about managed policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>",
|
1358
|
+
"GetAccountAuthorizationDetailsResponse$IsTruncated": "<p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items.</p>",
|
1359
|
+
"GetGroupResponse$IsTruncated": "<p> A flag that indicates whether there are more user names to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more user names in the list. </p>",
|
1360
|
+
"ListAccessKeysResponse$IsTruncated": "<p> A flag that indicates whether there are more keys to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more keys in the list. </p>",
|
1361
|
+
"ListAccountAliasesResponse$IsTruncated": "<p> A flag that indicates whether there are more account aliases to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more account aliases in the list. </p>",
|
1362
|
+
"ListAttachedGroupPoliciesResponse$IsTruncated": "<p>A flag that indicates whether there are more policies to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policies in the list.</p>",
|
1363
|
+
"ListAttachedRolePoliciesResponse$IsTruncated": "<p>A flag that indicates whether there are more policies to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policies in the list.</p>",
|
1364
|
+
"ListAttachedUserPoliciesResponse$IsTruncated": "<p>A flag that indicates whether there are more policies to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policies in the list.</p>",
|
1365
|
+
"ListEntitiesForPolicyResponse$IsTruncated": "<p>A flag that indicates whether there are more entities to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more entities in the list.</p>",
|
1366
|
+
"ListGroupPoliciesResponse$IsTruncated": "<p> A flag that indicates whether there are more policy names to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policy names in the list. </p>",
|
1367
|
+
"ListGroupsForUserResponse$IsTruncated": "<p> A flag that indicates whether there are more groups to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more groups in the list. </p>",
|
1368
|
+
"ListGroupsResponse$IsTruncated": "<p> A flag that indicates whether there are more groups to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more groups in the list. </p>",
|
1369
|
+
"ListInstanceProfilesForRoleResponse$IsTruncated": "<p> A flag that indicates whether there are more instance profiles to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more instance profiles in the list. </p>",
|
1370
|
+
"ListInstanceProfilesResponse$IsTruncated": "<p> A flag that indicates whether there are more instance profiles to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more instance profiles in the list. </p>",
|
1371
|
+
"ListMFADevicesResponse$IsTruncated": "<p> A flag that indicates whether there are more MFA devices to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more MFA devices in the list. </p>",
|
1372
|
+
"ListPoliciesRequest$OnlyAttached": "<p>A flag to filter the results to only the attached policies. </p> <p>When <code>OnlyAttached</code> is <code>true</code>, the returned list contains only the policies that are attached to a user, group, or role. When <code>OnlyAttached</code> is <code>false</code>, or when the parameter is not included, all policies are returned.</p>",
|
1373
|
+
"ListPoliciesResponse$IsTruncated": "<p>A flag that indicates whether there are more policies to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policies in the list.</p>",
|
1374
|
+
"ListPolicyVersionsResponse$IsTruncated": "<p>A flag that indicates whether there are more policy versions to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policy versions in the list.</p>",
|
1375
|
+
"ListRolePoliciesResponse$IsTruncated": "<p> A flag that indicates whether there are more policy names to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policy names in the list. </p>",
|
1376
|
+
"ListRolesResponse$IsTruncated": "<p> A flag that indicates whether there are more roles to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more roles in the list. </p>",
|
1377
|
+
"ListServerCertificatesResponse$IsTruncated": "<p> A flag that indicates whether there are more server certificates to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more server certificates in the list. </p>",
|
1378
|
+
"ListSigningCertificatesResponse$IsTruncated": "<p> A flag that indicates whether there are more certificate IDs to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more certificates in the list. </p>",
|
1379
|
+
"ListUserPoliciesResponse$IsTruncated": "<p> A flag that indicates whether there are more policy names to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more policy names in the list. </p>",
|
1380
|
+
"ListUsersResponse$IsTruncated": "<p> A flag that indicates whether there are more user names to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more users in the list. </p>",
|
1381
|
+
"ListVirtualMFADevicesResponse$IsTruncated": "<p> A flag that indicates whether there are more items to list. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items the list. </p>",
|
1382
|
+
"LoginProfile$PasswordResetRequired": "<p>Specifies whether the user is required to set a new password on next sign-in.</p>",
|
1383
|
+
"ManagedPolicyDetail$IsAttachable": "<p>Specifies whether the policy can be attached to an IAM user, group, or role. </p>",
|
1384
|
+
"PasswordPolicy$RequireSymbols": "<p>Specifies whether to require symbols for IAM user passwords.</p>",
|
1385
|
+
"PasswordPolicy$RequireNumbers": "<p>Specifies whether to require numbers for IAM user passwords.</p>",
|
1386
|
+
"PasswordPolicy$RequireUppercaseCharacters": "<p>Specifies whether to require uppercase characters for IAM user passwords.</p>",
|
1387
|
+
"PasswordPolicy$RequireLowercaseCharacters": "<p>Specifies whether to require lowercase characters for IAM user passwords.</p>",
|
1388
|
+
"PasswordPolicy$AllowUsersToChangePassword": "<p>Specifies whether IAM users are allowed to change their own password.</p>",
|
1389
|
+
"PasswordPolicy$ExpirePasswords": "<p>Specifies whether IAM users are required to change their password after a specified number of days.</p>",
|
1390
|
+
"Policy$IsAttachable": "<p>Specifies whether the policy can be attached to an IAM user, group, or role. </p>",
|
1391
|
+
"PolicyVersion$IsDefaultVersion": "<p>Specifies whether the policy version is set as the policy's default version.</p>",
|
1392
|
+
"UpdateAccountPasswordPolicyRequest$RequireSymbols": "<p>Specifies whether IAM user passwords must contain at least one of the following non-alphanumeric characters:</p> <p>! @ # $ % ^ &amp; * ( ) _ + - = [ ] { } | '</p> <p>Default value: false</p>",
|
1393
|
+
"UpdateAccountPasswordPolicyRequest$RequireNumbers": "<p>Specifies whether IAM user passwords must contain at least one numeric character (0 to 9).</p> <p>Default value: false</p>",
|
1394
|
+
"UpdateAccountPasswordPolicyRequest$RequireUppercaseCharacters": "<p>Specifies whether IAM user passwords must contain at least one uppercase character from the ISO basic Latin alphabet (A to Z).</p> <p>Default value: false</p>",
|
1395
|
+
"UpdateAccountPasswordPolicyRequest$RequireLowercaseCharacters": "<p>Specifies whether IAM user passwords must contain at least one lowercase character from the ISO basic Latin alphabet (a to z).</p> <p>Default value: false</p>",
|
1396
|
+
"UpdateAccountPasswordPolicyRequest$AllowUsersToChangePassword": "<p> Allows all IAM users in your account to use the AWS Management Console to change their own passwords. For more information, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html\">Letting IAM Users Change Their Own Passwords</a> in the <i>Using IAM</i> guide. </p> <p>Default value: false</p>"
|
1397
|
+
}
|
1398
|
+
},
|
1399
|
+
"certificateBodyType": {
|
1400
|
+
"base": null,
|
1401
|
+
"refs": {
|
1402
|
+
"ServerCertificate$CertificateBody": "<p>The contents of the public key certificate.</p>",
|
1403
|
+
"SigningCertificate$CertificateBody": "<p>The contents of the signing certificate.</p>",
|
1404
|
+
"UploadServerCertificateRequest$CertificateBody": "<p>The contents of the public key certificate in PEM-encoded format.</p>",
|
1405
|
+
"UploadSigningCertificateRequest$CertificateBody": "<p>The contents of the signing certificate.</p>"
|
1406
|
+
}
|
1407
|
+
},
|
1408
|
+
"certificateChainType": {
|
1409
|
+
"base": null,
|
1410
|
+
"refs": {
|
1411
|
+
"ServerCertificate$CertificateChain": "<p>The contents of the public key certificate chain.</p>",
|
1412
|
+
"UploadServerCertificateRequest$CertificateChain": "<p> The contents of the certificate chain. This is typically a concatenation of the PEM-encoded public key certificates of the chain. </p>"
|
1413
|
+
}
|
1414
|
+
},
|
1415
|
+
"certificateIdType": {
|
1416
|
+
"base": null,
|
1417
|
+
"refs": {
|
1418
|
+
"DeleteSigningCertificateRequest$CertificateId": "<p>The ID of the signing certificate to delete.</p>",
|
1419
|
+
"SigningCertificate$CertificateId": "<p>The ID for the signing certificate.</p>",
|
1420
|
+
"UpdateSigningCertificateRequest$CertificateId": "<p>The ID of the signing certificate you want to update.</p>"
|
1421
|
+
}
|
1422
|
+
},
|
1423
|
+
"certificateListType": {
|
1424
|
+
"base": "<p>Contains a list of signing certificates.</p> <p>This data type is used as a response element in the <a>ListSigningCertificates</a> action.</p>",
|
1425
|
+
"refs": {
|
1426
|
+
"ListSigningCertificatesResponse$Certificates": "<p>A list of the user's signing certificate information.</p>"
|
1427
|
+
}
|
1428
|
+
},
|
1429
|
+
"clientIDListType": {
|
1430
|
+
"base": null,
|
1431
|
+
"refs": {
|
1432
|
+
"CreateOpenIDConnectProviderRequest$ClientIDList": "<p>A list of client IDs (also known as audiences). When a mobile or web app registers with an OpenID Connect provider, they establish a value that identifies the application. (This is the value that's sent as the <code>client_id</code> parameter on OAuth requests.) </p> <p>You can register multiple client IDs with the same provider. For example, you might have multiple applications that use the same OIDC provider. You cannot register more than 100 client IDs with a single IAM OIDC provider. </p> <p>There is no defined format for a client ID. The <code>CreateOpenIDConnectProviderRequest</code> action accepts client IDs up to 255 characters long. </p>",
|
1433
|
+
"GetOpenIDConnectProviderResponse$ClientIDList": "<p>A list of client IDs (also known as audiences) that are associated with the specified IAM OpenID Connect provider. For more information, see <a>CreateOpenIDConnectProvider</a>. </p>"
|
1434
|
+
}
|
1435
|
+
},
|
1436
|
+
"clientIDType": {
|
1437
|
+
"base": null,
|
1438
|
+
"refs": {
|
1439
|
+
"AddClientIDToOpenIDConnectProviderRequest$ClientID": "<p>The client ID (also known as audience) to add to the IAM OpenID Connect provider.</p>",
|
1440
|
+
"RemoveClientIDFromOpenIDConnectProviderRequest$ClientID": "<p>The client ID (also known as audience) to remove from the IAM OpenID Connect provider. For more information about client IDs, see <a>CreateOpenIDConnectProvider</a>.</p>",
|
1441
|
+
"clientIDListType$member": null
|
1442
|
+
}
|
1443
|
+
},
|
1444
|
+
"credentialReportExpiredExceptionMessage": {
|
1445
|
+
"base": null,
|
1446
|
+
"refs": {
|
1447
|
+
"CredentialReportExpiredException$message": null
|
1448
|
+
}
|
1449
|
+
},
|
1450
|
+
"credentialReportNotPresentExceptionMessage": {
|
1451
|
+
"base": null,
|
1452
|
+
"refs": {
|
1453
|
+
"CredentialReportNotPresentException$message": null
|
1454
|
+
}
|
1455
|
+
},
|
1456
|
+
"credentialReportNotReadyExceptionMessage": {
|
1457
|
+
"base": null,
|
1458
|
+
"refs": {
|
1459
|
+
"CredentialReportNotReadyException$message": null
|
1460
|
+
}
|
1461
|
+
},
|
1462
|
+
"dateType": {
|
1463
|
+
"base": null,
|
1464
|
+
"refs": {
|
1465
|
+
"AccessKey$CreateDate": "<p>The date when the access key was created.</p>",
|
1466
|
+
"AccessKeyMetadata$CreateDate": "<p>The date when the access key was created.</p>",
|
1467
|
+
"GetCredentialReportResponse$GeneratedTime": "<p> The date and time when the credential report was created, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>. </p>",
|
1468
|
+
"GetOpenIDConnectProviderResponse$CreateDate": "<p>The date and time when the IAM OpenID Connect provider entity was created in the AWS account. </p>",
|
1469
|
+
"GetSAMLProviderResponse$CreateDate": "<p>The date and time when the SAML provider was created.</p>",
|
1470
|
+
"GetSAMLProviderResponse$ValidUntil": "<p>The expiration date and time for the SAML provider.</p>",
|
1471
|
+
"Group$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the group was created.</p>",
|
1472
|
+
"GroupDetail$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the group was created.</p>",
|
1473
|
+
"InstanceProfile$CreateDate": "<p>The date when the instance profile was created.</p>",
|
1474
|
+
"LoginProfile$CreateDate": "<p>The date when the password for the user was created.</p>",
|
1475
|
+
"MFADevice$EnableDate": "<p>The date when the MFA device was enabled for the user.</p>",
|
1476
|
+
"ManagedPolicyDetail$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the policy was created.</p>",
|
1477
|
+
"ManagedPolicyDetail$UpdateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the policy was last updated.</p> <p>When a policy has only one version, this field contains the date and time when the policy was created. When a policy has more than one version, this field contains the date and time when the most recent policy version was created. </p>",
|
1478
|
+
"Policy$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the policy was created.</p>",
|
1479
|
+
"Policy$UpdateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the policy was last updated.</p> <p>When a policy has only one version, this field contains the date and time when the policy was created. When a policy has more than one version, this field contains the date and time when the most recent policy version was created. </p>",
|
1480
|
+
"PolicyVersion$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the policy version was created.</p>",
|
1481
|
+
"Role$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the role was created.</p>",
|
1482
|
+
"RoleDetail$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the role was created.</p>",
|
1483
|
+
"SAMLProviderListEntry$ValidUntil": "<p>The expiration date and time for the SAML provider.</p>",
|
1484
|
+
"SAMLProviderListEntry$CreateDate": "<p>The date and time when the SAML provider was created.</p>",
|
1485
|
+
"ServerCertificateMetadata$UploadDate": "<p>The date when the server certificate was uploaded.</p>",
|
1486
|
+
"ServerCertificateMetadata$Expiration": "<p>The date on which the certificate is set to expire.</p>",
|
1487
|
+
"SigningCertificate$UploadDate": "<p>The date when the signing certificate was uploaded.</p>",
|
1488
|
+
"User$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the user was created.</p>",
|
1489
|
+
"User$PasswordLastUsed": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the user's password was last used to sign in to an AWS website. For a list of AWS websites that capture a user's last sign-in time, see the <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html\">Credential Reports</a> topic in the <i>Using IAM</i> guide. If a password is used more than once in a five-minute span, only the first use is returned in this field. When the user does not have a password, this field is null (not present). When a user's password exists but has never been used, or when there is no sign-in data associated with the user, this field is null (not present). </p> <p>This value is returned only in the <a>GetUser</a> and <a>ListUsers</a> actions. </p>",
|
1490
|
+
"UserDetail$CreateDate": "<p>The date and time, in <a href=\"http://www.iso.org/iso/iso8601\">ISO 8601 date-time format</a>, when the user was created.</p>",
|
1491
|
+
"VirtualMFADevice$EnableDate": "<p>The date and time on which the virtual MFA device was enabled.</p>"
|
1492
|
+
}
|
1493
|
+
},
|
1494
|
+
"deleteConflictMessage": {
|
1495
|
+
"base": null,
|
1496
|
+
"refs": {
|
1497
|
+
"DeleteConflictException$message": null
|
1498
|
+
}
|
1499
|
+
},
|
1500
|
+
"duplicateCertificateMessage": {
|
1501
|
+
"base": null,
|
1502
|
+
"refs": {
|
1503
|
+
"DuplicateCertificateException$message": null
|
1504
|
+
}
|
1505
|
+
},
|
1506
|
+
"entityAlreadyExistsMessage": {
|
1507
|
+
"base": null,
|
1508
|
+
"refs": {
|
1509
|
+
"EntityAlreadyExistsException$message": null
|
1510
|
+
}
|
1511
|
+
},
|
1512
|
+
"entityListType": {
|
1513
|
+
"base": null,
|
1514
|
+
"refs": {
|
1515
|
+
"GetAccountAuthorizationDetailsRequest$Filter": "<p>A list of entity types (user, group, role, local managed policy, or AWS managed policy) for filtering the results.</p>"
|
1516
|
+
}
|
1517
|
+
},
|
1518
|
+
"entityTemporarilyUnmodifiableMessage": {
|
1519
|
+
"base": null,
|
1520
|
+
"refs": {
|
1521
|
+
"EntityTemporarilyUnmodifiableException$message": null
|
1522
|
+
}
|
1523
|
+
},
|
1524
|
+
"existingUserNameType": {
|
1525
|
+
"base": null,
|
1526
|
+
"refs": {
|
1527
|
+
"AddUserToGroupRequest$UserName": "<p>The name of the user to add.</p>",
|
1528
|
+
"CreateAccessKeyRequest$UserName": "<p>The user name that the new key will belong to.</p>",
|
1529
|
+
"DeactivateMFADeviceRequest$UserName": "<p>The name of the user whose MFA device you want to deactivate.</p>",
|
1530
|
+
"DeleteAccessKeyRequest$UserName": "<p>The name of the user whose key you want to delete.</p>",
|
1531
|
+
"DeleteSigningCertificateRequest$UserName": "<p>The name of the user the signing certificate belongs to.</p>",
|
1532
|
+
"DeleteUserPolicyRequest$UserName": "<p>The name (friendly name, not ARN) identifying the user that the policy is embedded in.</p>",
|
1533
|
+
"DeleteUserRequest$UserName": "<p>The name of the user to delete.</p>",
|
1534
|
+
"EnableMFADeviceRequest$UserName": "<p>The name of the user for whom you want to enable the MFA device.</p>",
|
1535
|
+
"GetUserPolicyRequest$UserName": "<p>The name of the user who the policy is associated with.</p>",
|
1536
|
+
"GetUserPolicyResponse$UserName": "<p>The user the policy is associated with.</p>",
|
1537
|
+
"GetUserRequest$UserName": "<p>The name of the user to get information about.</p> <p>This parameter is optional. If it is not included, it defaults to the user making the request.</p>",
|
1538
|
+
"ListAccessKeysRequest$UserName": "<p>The name of the user.</p>",
|
1539
|
+
"ListGroupsForUserRequest$UserName": "<p>The name of the user to list groups for.</p>",
|
1540
|
+
"ListMFADevicesRequest$UserName": "<p>The name of the user whose MFA devices you want to list.</p>",
|
1541
|
+
"ListSigningCertificatesRequest$UserName": "<p>The name of the user.</p>",
|
1542
|
+
"ListUserPoliciesRequest$UserName": "<p>The name of the user to list policies for.</p>",
|
1543
|
+
"PutUserPolicyRequest$UserName": "<p>The name of the user to associate the policy with.</p>",
|
1544
|
+
"RemoveUserFromGroupRequest$UserName": "<p>The name of the user to remove.</p>",
|
1545
|
+
"ResyncMFADeviceRequest$UserName": "<p>The name of the user whose MFA device you want to resynchronize.</p>",
|
1546
|
+
"UpdateAccessKeyRequest$UserName": "<p>The name of the user whose key you want to update.</p>",
|
1547
|
+
"UpdateSigningCertificateRequest$UserName": "<p>The name of the user the signing certificate belongs to.</p>",
|
1548
|
+
"UpdateUserRequest$UserName": "<p> Name of the user to update. If you're changing the name of the user, this is the original user name. </p>",
|
1549
|
+
"UploadSigningCertificateRequest$UserName": "<p>The name of the user the signing certificate is for.</p>"
|
1550
|
+
}
|
1551
|
+
},
|
1552
|
+
"groupDetailListType": {
|
1553
|
+
"base": null,
|
1554
|
+
"refs": {
|
1555
|
+
"GetAccountAuthorizationDetailsResponse$GroupDetailList": "<p>A list containing information about IAM groups.</p>"
|
1556
|
+
}
|
1557
|
+
},
|
1558
|
+
"groupListType": {
|
1559
|
+
"base": "<p>Contains a list of IAM groups.</p> <p>This data type is used as a response element in the <a>ListGroups</a> action.</p>",
|
1560
|
+
"refs": {
|
1561
|
+
"ListGroupsForUserResponse$Groups": "<p>A list of groups.</p>",
|
1562
|
+
"ListGroupsResponse$Groups": "<p>A list of groups.</p>"
|
1563
|
+
}
|
1564
|
+
},
|
1565
|
+
"groupNameListType": {
|
1566
|
+
"base": null,
|
1567
|
+
"refs": {
|
1568
|
+
"UserDetail$GroupList": "<p>A list of IAM groups that the user is in.</p>"
|
1569
|
+
}
|
1570
|
+
},
|
1571
|
+
"groupNameType": {
|
1572
|
+
"base": null,
|
1573
|
+
"refs": {
|
1574
|
+
"AddUserToGroupRequest$GroupName": "<p>The name of the group to update.</p>",
|
1575
|
+
"AttachGroupPolicyRequest$GroupName": "<p>The name (friendly name, not ARN) of the group to attach the policy to.</p>",
|
1576
|
+
"CreateGroupRequest$GroupName": "<p>The name of the group to create. Do not include the path in this value.</p>",
|
1577
|
+
"DeleteGroupPolicyRequest$GroupName": "<p>The name (friendly name, not ARN) identifying the group that the policy is embedded in.</p>",
|
1578
|
+
"DeleteGroupRequest$GroupName": "<p>The name of the group to delete.</p>",
|
1579
|
+
"DetachGroupPolicyRequest$GroupName": "<p>The name (friendly name, not ARN) of the group to detach the policy from.</p>",
|
1580
|
+
"GetGroupPolicyRequest$GroupName": "<p>The name of the group the policy is associated with.</p>",
|
1581
|
+
"GetGroupPolicyResponse$GroupName": "<p>The group the policy is associated with.</p>",
|
1582
|
+
"GetGroupRequest$GroupName": "<p>The name of the group.</p>",
|
1583
|
+
"Group$GroupName": "<p>The friendly name that identifies the group.</p>",
|
1584
|
+
"GroupDetail$GroupName": "<p>The friendly name that identifies the group.</p>",
|
1585
|
+
"ListAttachedGroupPoliciesRequest$GroupName": "<p>The name (friendly name, not ARN) of the group to list attached policies for.</p>",
|
1586
|
+
"ListGroupPoliciesRequest$GroupName": "<p>The name of the group to list policies for.</p>",
|
1587
|
+
"PolicyGroup$GroupName": "<p>The name (friendly name, not ARN) identifying the group.</p>",
|
1588
|
+
"PutGroupPolicyRequest$GroupName": "<p>The name of the group to associate the policy with.</p>",
|
1589
|
+
"RemoveUserFromGroupRequest$GroupName": "<p>The name of the group to update.</p>",
|
1590
|
+
"UpdateGroupRequest$GroupName": "<p> Name of the group to update. If you're changing the name of the group, this is the original name. </p>",
|
1591
|
+
"UpdateGroupRequest$NewGroupName": "<p>New name for the group. Only include this if changing the group's name.</p>",
|
1592
|
+
"groupNameListType$member": null
|
1593
|
+
}
|
1594
|
+
},
|
1595
|
+
"idType": {
|
1596
|
+
"base": null,
|
1597
|
+
"refs": {
|
1598
|
+
"Group$GroupId": "<p> The stable and unique string identifying the group. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1599
|
+
"GroupDetail$GroupId": "<p>The stable and unique string identifying the group. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1600
|
+
"InstanceProfile$InstanceProfileId": "<p> The stable and unique string identifying the instance profile. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1601
|
+
"ManagedPolicyDetail$PolicyId": "<p>The stable and unique string identifying the policy. </p> <p>For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1602
|
+
"Policy$PolicyId": "<p>The stable and unique string identifying the policy. </p> <p>For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1603
|
+
"Role$RoleId": "<p> The stable and unique string identifying the role. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1604
|
+
"RoleDetail$RoleId": "<p>The stable and unique string identifying the role. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1605
|
+
"ServerCertificateMetadata$ServerCertificateId": "<p> The stable and unique string identifying the server certificate. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1606
|
+
"User$UserId": "<p>The stable and unique string identifying the user. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1607
|
+
"UserDetail$UserId": "<p>The stable and unique string identifying the user. For more information about IDs, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>"
|
1608
|
+
}
|
1609
|
+
},
|
1610
|
+
"instanceProfileListType": {
|
1611
|
+
"base": "<p>Contains a list of instance profiles.</p>",
|
1612
|
+
"refs": {
|
1613
|
+
"ListInstanceProfilesForRoleResponse$InstanceProfiles": "<p>A list of instance profiles.</p>",
|
1614
|
+
"ListInstanceProfilesResponse$InstanceProfiles": "<p>A list of instance profiles.</p>",
|
1615
|
+
"RoleDetail$InstanceProfileList": null
|
1616
|
+
}
|
1617
|
+
},
|
1618
|
+
"instanceProfileNameType": {
|
1619
|
+
"base": null,
|
1620
|
+
"refs": {
|
1621
|
+
"AddRoleToInstanceProfileRequest$InstanceProfileName": "<p>The name of the instance profile to update.</p>",
|
1622
|
+
"CreateInstanceProfileRequest$InstanceProfileName": "<p>The name of the instance profile to create.</p>",
|
1623
|
+
"DeleteInstanceProfileRequest$InstanceProfileName": "<p>The name of the instance profile to delete.</p>",
|
1624
|
+
"GetInstanceProfileRequest$InstanceProfileName": "<p>The name of the instance profile to get information about.</p>",
|
1625
|
+
"InstanceProfile$InstanceProfileName": "<p>The name identifying the instance profile.</p>",
|
1626
|
+
"RemoveRoleFromInstanceProfileRequest$InstanceProfileName": "<p>The name of the instance profile to update.</p>"
|
1627
|
+
}
|
1628
|
+
},
|
1629
|
+
"invalidAuthenticationCodeMessage": {
|
1630
|
+
"base": null,
|
1631
|
+
"refs": {
|
1632
|
+
"InvalidAuthenticationCodeException$message": null
|
1633
|
+
}
|
1634
|
+
},
|
1635
|
+
"invalidCertificateMessage": {
|
1636
|
+
"base": null,
|
1637
|
+
"refs": {
|
1638
|
+
"InvalidCertificateException$message": null
|
1639
|
+
}
|
1640
|
+
},
|
1641
|
+
"invalidInputMessage": {
|
1642
|
+
"base": null,
|
1643
|
+
"refs": {
|
1644
|
+
"InvalidInputException$message": null
|
1645
|
+
}
|
1646
|
+
},
|
1647
|
+
"invalidUserTypeMessage": {
|
1648
|
+
"base": null,
|
1649
|
+
"refs": {
|
1650
|
+
"InvalidUserTypeException$message": null
|
1651
|
+
}
|
1652
|
+
},
|
1653
|
+
"keyPairMismatchMessage": {
|
1654
|
+
"base": null,
|
1655
|
+
"refs": {
|
1656
|
+
"KeyPairMismatchException$message": null
|
1657
|
+
}
|
1658
|
+
},
|
1659
|
+
"limitExceededMessage": {
|
1660
|
+
"base": null,
|
1661
|
+
"refs": {
|
1662
|
+
"LimitExceededException$message": null
|
1663
|
+
}
|
1664
|
+
},
|
1665
|
+
"malformedCertificateMessage": {
|
1666
|
+
"base": null,
|
1667
|
+
"refs": {
|
1668
|
+
"MalformedCertificateException$message": null
|
1669
|
+
}
|
1670
|
+
},
|
1671
|
+
"malformedPolicyDocumentMessage": {
|
1672
|
+
"base": null,
|
1673
|
+
"refs": {
|
1674
|
+
"MalformedPolicyDocumentException$message": null
|
1675
|
+
}
|
1676
|
+
},
|
1677
|
+
"markerType": {
|
1678
|
+
"base": null,
|
1679
|
+
"refs": {
|
1680
|
+
"GetAccountAuthorizationDetailsRequest$Marker": "<p>Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received.</p>",
|
1681
|
+
"GetAccountAuthorizationDetailsResponse$Marker": "<p>If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>",
|
1682
|
+
"GetGroupRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1683
|
+
"GetGroupResponse$Marker": "<p> If IsTruncated is <code>true</code>, then this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1684
|
+
"ListAccessKeysRequest$Marker": "<p> Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1685
|
+
"ListAccessKeysResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1686
|
+
"ListAccountAliasesRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1687
|
+
"ListAccountAliasesResponse$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1688
|
+
"ListAttachedGroupPoliciesRequest$Marker": "<p>Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received.</p>",
|
1689
|
+
"ListAttachedGroupPoliciesResponse$Marker": "<p>If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>",
|
1690
|
+
"ListAttachedRolePoliciesRequest$Marker": "<p>Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received.</p>",
|
1691
|
+
"ListAttachedRolePoliciesResponse$Marker": "<p>If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>",
|
1692
|
+
"ListAttachedUserPoliciesRequest$Marker": "<p>Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received.</p>",
|
1693
|
+
"ListAttachedUserPoliciesResponse$Marker": "<p>If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>",
|
1694
|
+
"ListEntitiesForPolicyRequest$Marker": "<p>Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received.</p>",
|
1695
|
+
"ListEntitiesForPolicyResponse$Marker": "<p>If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>",
|
1696
|
+
"ListGroupPoliciesRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1697
|
+
"ListGroupPoliciesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1698
|
+
"ListGroupsForUserRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1699
|
+
"ListGroupsForUserResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1700
|
+
"ListGroupsRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1701
|
+
"ListGroupsResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1702
|
+
"ListInstanceProfilesForRoleRequest$Marker": "<p> Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1703
|
+
"ListInstanceProfilesForRoleResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1704
|
+
"ListInstanceProfilesRequest$Marker": "<p> Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1705
|
+
"ListInstanceProfilesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1706
|
+
"ListMFADevicesRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1707
|
+
"ListMFADevicesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1708
|
+
"ListPoliciesRequest$Marker": "<p>Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received.</p>",
|
1709
|
+
"ListPoliciesResponse$Marker": "<p>If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>",
|
1710
|
+
"ListPolicyVersionsRequest$Marker": "<p>Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received.</p>",
|
1711
|
+
"ListPolicyVersionsResponse$Marker": "<p>If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>",
|
1712
|
+
"ListRolePoliciesRequest$Marker": "<p> Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1713
|
+
"ListRolePoliciesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1714
|
+
"ListRolesRequest$Marker": "<p> Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1715
|
+
"ListRolesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1716
|
+
"ListServerCertificatesRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1717
|
+
"ListServerCertificatesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1718
|
+
"ListSigningCertificatesRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1719
|
+
"ListSigningCertificatesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1720
|
+
"ListUserPoliciesRequest$Marker": "<p> Use this only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1721
|
+
"ListUserPoliciesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1722
|
+
"ListUsersRequest$Marker": "<p> Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1723
|
+
"ListUsersResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>",
|
1724
|
+
"ListVirtualMFADevicesRequest$Marker": "<p> Use this parameter only when paginating results, and only in a subsequent request after you've received a response where the results are truncated. Set it to the value of the <code>Marker</code> element in the response you just received. </p>",
|
1725
|
+
"ListVirtualMFADevicesResponse$Marker": "<p> If <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request. </p>"
|
1726
|
+
}
|
1727
|
+
},
|
1728
|
+
"maxItemsType": {
|
1729
|
+
"base": null,
|
1730
|
+
"refs": {
|
1731
|
+
"GetAccountAuthorizationDetailsRequest$MaxItems": "<p>Use this only when paginating results to indicate the maximum number of items you want in the response. If there are additional items beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100.</p>",
|
1732
|
+
"GetGroupRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of groups you want in the response. If there are additional groups beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1733
|
+
"ListAccessKeysRequest$MaxItems": "<p> Use this parameter only when paginating results to indicate the maximum number of keys you want in the response. If there are additional keys beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1734
|
+
"ListAccountAliasesRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of account aliases you want in the response. If there are additional account aliases beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1735
|
+
"ListAttachedGroupPoliciesRequest$MaxItems": "<p>Use this only when paginating results to indicate the maximum number of policies you want in the response. If there are additional policies beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100.</p>",
|
1736
|
+
"ListAttachedRolePoliciesRequest$MaxItems": "<p>Use this only when paginating results to indicate the maximum number of policies you want in the response. If there are additional policies beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100.</p>",
|
1737
|
+
"ListAttachedUserPoliciesRequest$MaxItems": "<p>Use this only when paginating results to indicate the maximum number of policies you want in the response. If there are additional policies beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100.</p>",
|
1738
|
+
"ListEntitiesForPolicyRequest$MaxItems": "<p>Use this only when paginating results to indicate the maximum number of entities you want in the response. If there are additional entities beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100.</p>",
|
1739
|
+
"ListGroupPoliciesRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of policy names you want in the response. If there are additional policy names beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1740
|
+
"ListGroupsForUserRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of groups you want in the response. If there are additional groups beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1741
|
+
"ListGroupsRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of groups you want in the response. If there are additional groups beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1742
|
+
"ListInstanceProfilesForRoleRequest$MaxItems": "<p> Use this parameter only when paginating results to indicate the maximum number of instance profiles you want in the response. If there are additional instance profiles beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1743
|
+
"ListInstanceProfilesRequest$MaxItems": "<p> Use this parameter only when paginating results to indicate the maximum number of instance profiles you want in the response. If there are additional instance profiles beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1744
|
+
"ListMFADevicesRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of MFA devices you want in the response. If there are additional MFA devices beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1745
|
+
"ListPoliciesRequest$MaxItems": "<p>Use this parameter only when paginating results to indicate the maximum number of policies you want in the response. If there are additional policies beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100.</p>",
|
1746
|
+
"ListPolicyVersionsRequest$MaxItems": "<p>Use this parameter only when paginating results to indicate the maximum number of policy versions you want in the response. If there are additional policy versions beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100.</p>",
|
1747
|
+
"ListRolePoliciesRequest$MaxItems": "<p> Use this parameter only when paginating results to indicate the maximum number of role policies you want in the response. If there are additional role policies beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1748
|
+
"ListRolesRequest$MaxItems": "<p> Use this parameter only when paginating results to indicate the maximum number of roles you want in the response. If there are additional roles beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1749
|
+
"ListServerCertificatesRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of server certificates you want in the response. If there are additional server certificates beyond the maximum you specify, the <code>IsTruncated</code> response element will be set to <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1750
|
+
"ListSigningCertificatesRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of certificate IDs you want in the response. If there are additional certificate IDs beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1751
|
+
"ListUserPoliciesRequest$MaxItems": "<p> Use this only when paginating results to indicate the maximum number of policy names you want in the response. If there are additional policy names beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1752
|
+
"ListUsersRequest$MaxItems": "<p> Use this parameter only when paginating results to indicate the maximum number of user names you want in the response. If there are additional user names beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>",
|
1753
|
+
"ListVirtualMFADevicesRequest$MaxItems": "<p> Use this parameter only when paginating results to indicate the maximum number of MFA devices you want in the response. If there are additional MFA devices beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>. This parameter is optional. If you do not include it, it defaults to 100. </p>"
|
1754
|
+
}
|
1755
|
+
},
|
1756
|
+
"maxPasswordAgeType": {
|
1757
|
+
"base": null,
|
1758
|
+
"refs": {
|
1759
|
+
"PasswordPolicy$MaxPasswordAge": "<p>The number of days that an IAM user password is valid.</p>",
|
1760
|
+
"UpdateAccountPasswordPolicyRequest$MaxPasswordAge": "<p>The number of days that an IAM user password is valid. The default value of 0 means IAM user passwords never expire.</p> <p>Default value: 0</p>"
|
1761
|
+
}
|
1762
|
+
},
|
1763
|
+
"mfaDeviceListType": {
|
1764
|
+
"base": "<p>Contains a list of MFA devices.</p> <p>This data type is used as a response element in the <a>ListMFADevices</a> and <a>ListVirtualMFADevices</a> actions. </p>",
|
1765
|
+
"refs": {
|
1766
|
+
"ListMFADevicesResponse$MFADevices": "<p>A list of MFA devices.</p>"
|
1767
|
+
}
|
1768
|
+
},
|
1769
|
+
"minimumPasswordLengthType": {
|
1770
|
+
"base": null,
|
1771
|
+
"refs": {
|
1772
|
+
"PasswordPolicy$MinimumPasswordLength": "<p>Minimum length to require for IAM user passwords.</p>",
|
1773
|
+
"UpdateAccountPasswordPolicyRequest$MinimumPasswordLength": "<p>The minimum number of characters allowed in an IAM user password.</p> <p>Default value: 6</p>"
|
1774
|
+
}
|
1775
|
+
},
|
1776
|
+
"noSuchEntityMessage": {
|
1777
|
+
"base": null,
|
1778
|
+
"refs": {
|
1779
|
+
"NoSuchEntityException$message": null
|
1780
|
+
}
|
1781
|
+
},
|
1782
|
+
"passwordPolicyViolationMessage": {
|
1783
|
+
"base": null,
|
1784
|
+
"refs": {
|
1785
|
+
"PasswordPolicyViolationException$message": null
|
1786
|
+
}
|
1787
|
+
},
|
1788
|
+
"passwordReusePreventionType": {
|
1789
|
+
"base": null,
|
1790
|
+
"refs": {
|
1791
|
+
"PasswordPolicy$PasswordReusePrevention": "<p>Specifies the number of previous passwords that IAM users are prevented from reusing.</p>",
|
1792
|
+
"UpdateAccountPasswordPolicyRequest$PasswordReusePrevention": "<p>Specifies the number of previous passwords that IAM users are prevented from reusing. The default value of 0 means IAM users are not prevented from reusing previous passwords.</p> <p>Default value: 0</p>"
|
1793
|
+
}
|
1794
|
+
},
|
1795
|
+
"passwordType": {
|
1796
|
+
"base": null,
|
1797
|
+
"refs": {
|
1798
|
+
"ChangePasswordRequest$OldPassword": "<p>The IAM user's current password.</p>",
|
1799
|
+
"ChangePasswordRequest$NewPassword": "<p>The new password. The new password must conform to the AWS account's password policy, if one exists.</p>",
|
1800
|
+
"CreateLoginProfileRequest$Password": "<p>The new password for the user.</p>",
|
1801
|
+
"UpdateLoginProfileRequest$Password": "<p>The new password for the specified user.</p>"
|
1802
|
+
}
|
1803
|
+
},
|
1804
|
+
"pathPrefixType": {
|
1805
|
+
"base": null,
|
1806
|
+
"refs": {
|
1807
|
+
"ListGroupsRequest$PathPrefix": "<p> The path prefix for filtering the results. For example, the prefix <code>/division_abc/subdivision_xyz/</code> gets all groups whose path starts with <code>/division_abc/subdivision_xyz/</code>. </p> <p> This parameter is optional. If it is not included, it defaults to a slash (/), listing all groups. </p>",
|
1808
|
+
"ListInstanceProfilesRequest$PathPrefix": "<p> The path prefix for filtering the results. For example, the prefix <code>/application_abc/component_xyz/</code> gets all instance profiles whose path starts with <code>/application_abc/component_xyz/</code>. </p> <p> This parameter is optional. If it is not included, it defaults to a slash (/), listing all instance profiles. </p>",
|
1809
|
+
"ListRolesRequest$PathPrefix": "<p> The path prefix for filtering the results. For example, the prefix <code>/application_abc/component_xyz/</code> gets all roles whose path starts with <code>/application_abc/component_xyz/</code>. </p> <p> This parameter is optional. If it is not included, it defaults to a slash (/), listing all roles. </p>",
|
1810
|
+
"ListServerCertificatesRequest$PathPrefix": "<p> The path prefix for filtering the results. For example: <code>/company/servercerts</code> would get all server certificates for which the path starts with <code>/company/servercerts</code>. </p> <p> This parameter is optional. If it is not included, it defaults to a slash (/), listing all server certificates. </p>",
|
1811
|
+
"ListUsersRequest$PathPrefix": "<p> The path prefix for filtering the results. For example: <code>/division_abc/subdivision_xyz/</code>, which would get all user names whose path starts with <code>/division_abc/subdivision_xyz/</code>. </p> <p> This parameter is optional. If it is not included, it defaults to a slash (/), listing all user names. </p>"
|
1812
|
+
}
|
1813
|
+
},
|
1814
|
+
"pathType": {
|
1815
|
+
"base": null,
|
1816
|
+
"refs": {
|
1817
|
+
"CreateGroupRequest$Path": "<p> The path to the group. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p>",
|
1818
|
+
"CreateInstanceProfileRequest$Path": "<p> The path to the instance profile. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p>",
|
1819
|
+
"CreateRoleRequest$Path": "<p> The path to the role. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p>",
|
1820
|
+
"CreateUserRequest$Path": "<p> The path for the user name. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p>",
|
1821
|
+
"CreateVirtualMFADeviceRequest$Path": "<p> The path for the virtual MFA device. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p>",
|
1822
|
+
"Group$Path": "<p>The path to the group. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1823
|
+
"GroupDetail$Path": "<p>The path to the group. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1824
|
+
"InstanceProfile$Path": "<p> The path to the instance profile. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1825
|
+
"ListEntitiesForPolicyRequest$PathPrefix": "<p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all entities.</p>",
|
1826
|
+
"Role$Path": "<p> The path to the role. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1827
|
+
"RoleDetail$Path": "<p>The path to the role. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1828
|
+
"ServerCertificateMetadata$Path": "<p> The path to the server certificate. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>",
|
1829
|
+
"UpdateGroupRequest$NewPath": "<p>New path for the group. Only include this if changing the group's path.</p>",
|
1830
|
+
"UpdateServerCertificateRequest$NewPath": "<p> The new path for the server certificate. Include this only if you are updating the server certificate's path. </p>",
|
1831
|
+
"UpdateUserRequest$NewPath": "<p>New path for the user. Include this parameter only if you're changing the user's path.</p>",
|
1832
|
+
"UploadServerCertificateRequest$Path": "<p> The path for the server certificate. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <note> If you are uploading a server certificate specifically for use with Amazon CloudFront distributions, you must specify a path using the <code>--path</code> option. The path must begin with <code>/cloudfront</code> and must include a trailing slash (for example, <code>/cloudfront/test/</code>). </note>",
|
1833
|
+
"User$Path": "<p>The path to the user. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1834
|
+
"UserDetail$Path": "<p>The path to the user. For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>"
|
1835
|
+
}
|
1836
|
+
},
|
1837
|
+
"policyDescriptionType": {
|
1838
|
+
"base": null,
|
1839
|
+
"refs": {
|
1840
|
+
"CreatePolicyRequest$Description": "<p>A friendly description of the policy. </p> <p>Typically used to store information about the permissions defined in the policy. For example, \"Grants access to production DynamoDB tables.\" </p> <p>The policy description is immutable. After a value is assigned, it cannot be changed. </p>",
|
1841
|
+
"ManagedPolicyDetail$Description": "<p>A friendly description of the policy.</p>",
|
1842
|
+
"Policy$Description": "<p>A friendly description of the policy.</p> <p>This element is included in the response to the <a>GetPolicy</a> operation. It is not included in the response to the <a>ListPolicies</a> operation. </p>"
|
1843
|
+
}
|
1844
|
+
},
|
1845
|
+
"policyDetailListType": {
|
1846
|
+
"base": null,
|
1847
|
+
"refs": {
|
1848
|
+
"GroupDetail$GroupPolicyList": "<p>A list of the inline policies embedded in the group.</p>",
|
1849
|
+
"RoleDetail$RolePolicyList": "<p>A list of inline policies embedded in the role. These policies are the role's access (permissions) policies.</p>",
|
1850
|
+
"UserDetail$UserPolicyList": "<p>A list of the inline policies embedded in the user.</p>"
|
1851
|
+
}
|
1852
|
+
},
|
1853
|
+
"policyDocumentType": {
|
1854
|
+
"base": null,
|
1855
|
+
"refs": {
|
1856
|
+
"CreatePolicyRequest$PolicyDocument": "<p>The policy document.</p> <p>The policy must be URL-encoded according to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">RFC 3986</a>. </p>",
|
1857
|
+
"CreatePolicyVersionRequest$PolicyDocument": "<p>The policy document.</p> <p>The policy must be URL-encoded according to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">RFC 3986</a>. </p>",
|
1858
|
+
"CreateRoleRequest$AssumeRolePolicyDocument": "<p>The policy that grants an entity permission to assume the role.</p>",
|
1859
|
+
"GetGroupPolicyResponse$PolicyDocument": "<p>The policy document.</p>",
|
1860
|
+
"GetRolePolicyResponse$PolicyDocument": "<p>The policy document.</p>",
|
1861
|
+
"GetUserPolicyResponse$PolicyDocument": "<p>The policy document.</p>",
|
1862
|
+
"PolicyDetail$PolicyDocument": "<p>The policy document.</p> <p>The returned policy is URL-encoded according to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">RFC 3986</a>. </p>",
|
1863
|
+
"PolicyVersion$Document": "<p>The policy document.</p> <p>The policy document is returned in the response to the <a>GetPolicyVersion</a> operation. It is not included in the response to the <a>ListPolicyVersions</a> or <a>GetAccountAuthorizationDetails</a> operations. </p>",
|
1864
|
+
"PutGroupPolicyRequest$PolicyDocument": "<p>The policy document.</p>",
|
1865
|
+
"PutRolePolicyRequest$PolicyDocument": "<p>The policy document.</p>",
|
1866
|
+
"PutUserPolicyRequest$PolicyDocument": "<p>The policy document.</p>",
|
1867
|
+
"Role$AssumeRolePolicyDocument": "<p>The policy that grants an entity permission to assume the role.</p> <p> The returned policy is URL-encoded according to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">RFC 3986</a>. </p>",
|
1868
|
+
"RoleDetail$AssumeRolePolicyDocument": "<p>The trust policy that grants permission to assume the role.</p> <p> The returned policy is URL-encoded according to <a href=\"http://www.faqs.org/rfcs/rfc3986.html\">RFC 3986</a>. </p>",
|
1869
|
+
"UpdateAssumeRolePolicyRequest$PolicyDocument": "<p>The policy that grants an entity permission to assume the role.</p>"
|
1870
|
+
}
|
1871
|
+
},
|
1872
|
+
"policyDocumentVersionListType": {
|
1873
|
+
"base": null,
|
1874
|
+
"refs": {
|
1875
|
+
"ListPolicyVersionsResponse$Versions": "<p>A list of policy versions.</p> <p>For more information about managed policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>",
|
1876
|
+
"ManagedPolicyDetail$PolicyVersionList": "<p>A list containing information about the versions of the policy.</p>"
|
1877
|
+
}
|
1878
|
+
},
|
1879
|
+
"policyListType": {
|
1880
|
+
"base": null,
|
1881
|
+
"refs": {
|
1882
|
+
"ListPoliciesResponse$Policies": "<p>A list of policies.</p>"
|
1883
|
+
}
|
1884
|
+
},
|
1885
|
+
"policyNameListType": {
|
1886
|
+
"base": "<p>Contains a list of policy names.</p> <p>This data type is used as a response element in the <a>ListPolicies</a> action.</p>",
|
1887
|
+
"refs": {
|
1888
|
+
"ListGroupPoliciesResponse$PolicyNames": "<p>A list of policy names.</p>",
|
1889
|
+
"ListRolePoliciesResponse$PolicyNames": "<p>A list of policy names.</p>",
|
1890
|
+
"ListUserPoliciesResponse$PolicyNames": "<p>A list of policy names.</p>"
|
1891
|
+
}
|
1892
|
+
},
|
1893
|
+
"policyNameType": {
|
1894
|
+
"base": null,
|
1895
|
+
"refs": {
|
1896
|
+
"AttachedPolicy$PolicyName": "<p>The friendly name of the attached policy.</p>",
|
1897
|
+
"CreatePolicyRequest$PolicyName": "<p>The name of the policy document.</p>",
|
1898
|
+
"DeleteGroupPolicyRequest$PolicyName": "<p>The name identifying the policy document to delete.</p>",
|
1899
|
+
"DeleteRolePolicyRequest$PolicyName": "<p>The name identifying the policy document to delete.</p>",
|
1900
|
+
"DeleteUserPolicyRequest$PolicyName": "<p>The name identifying the policy document to delete.</p>",
|
1901
|
+
"GetGroupPolicyRequest$PolicyName": "<p>The name of the policy document to get.</p>",
|
1902
|
+
"GetGroupPolicyResponse$PolicyName": "<p>The name of the policy.</p>",
|
1903
|
+
"GetRolePolicyRequest$PolicyName": "<p>The name of the policy document to get.</p>",
|
1904
|
+
"GetRolePolicyResponse$PolicyName": "<p>The name of the policy.</p>",
|
1905
|
+
"GetUserPolicyRequest$PolicyName": "<p>The name of the policy document to get.</p>",
|
1906
|
+
"GetUserPolicyResponse$PolicyName": "<p>The name of the policy.</p>",
|
1907
|
+
"ManagedPolicyDetail$PolicyName": "<p>The friendly name (not ARN) identifying the policy.</p>",
|
1908
|
+
"Policy$PolicyName": "<p>The friendly name (not ARN) identifying the policy.</p>",
|
1909
|
+
"PolicyDetail$PolicyName": "<p>The name of the policy.</p>",
|
1910
|
+
"PutGroupPolicyRequest$PolicyName": "<p>The name of the policy document.</p>",
|
1911
|
+
"PutRolePolicyRequest$PolicyName": "<p>The name of the policy document.</p>",
|
1912
|
+
"PutUserPolicyRequest$PolicyName": "<p>The name of the policy document.</p>",
|
1913
|
+
"policyNameListType$member": null
|
1914
|
+
}
|
1915
|
+
},
|
1916
|
+
"policyPathType": {
|
1917
|
+
"base": null,
|
1918
|
+
"refs": {
|
1919
|
+
"CreatePolicyRequest$Path": "<p>The path for the policy. </p> <p>For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> <p>This parameter is optional. If it is not included, it defaults to a slash (/). </p>",
|
1920
|
+
"ListAttachedGroupPoliciesRequest$PathPrefix": "<p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p>",
|
1921
|
+
"ListAttachedRolePoliciesRequest$PathPrefix": "<p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p>",
|
1922
|
+
"ListAttachedUserPoliciesRequest$PathPrefix": "<p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p>",
|
1923
|
+
"ListPoliciesRequest$PathPrefix": "<p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p>",
|
1924
|
+
"ManagedPolicyDetail$Path": "<p>The path to the policy.</p> <p>For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>",
|
1925
|
+
"Policy$Path": "<p>The path to the policy.</p> <p>For more information about paths, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html\">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>"
|
1926
|
+
}
|
1927
|
+
},
|
1928
|
+
"policyScopeType": {
|
1929
|
+
"base": null,
|
1930
|
+
"refs": {
|
1931
|
+
"ListPoliciesRequest$Scope": "<p>The scope to use for filtering the results. </p> <p>To list only AWS managed policies, set <code>Scope</code> to <code>AWS</code>. To list only the customer managed policies in your AWS account, set <code>Scope</code> to <code>Local</code>. </p> <p>This parameter is optional. If it is not included, or if it is set to <code>All</code>, all policies are returned.</p>"
|
1932
|
+
}
|
1933
|
+
},
|
1934
|
+
"policyVersionIdType": {
|
1935
|
+
"base": null,
|
1936
|
+
"refs": {
|
1937
|
+
"DeletePolicyVersionRequest$VersionId": "<p>The policy version to delete.</p> <p>For more information about managed policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>",
|
1938
|
+
"GetPolicyVersionRequest$VersionId": "<p>Identifies the policy version to retrieve.</p>",
|
1939
|
+
"ManagedPolicyDetail$DefaultVersionId": "<p>The identifier for the version of the policy that is set as the default (operative) version. </p> <p>For more information about policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>",
|
1940
|
+
"Policy$DefaultVersionId": "<p>The identifier for the version of the policy that is set as the default version. </p>",
|
1941
|
+
"PolicyVersion$VersionId": "<p>The identifier for the policy version.</p> <p>Policy version identifiers always begin with <code>v</code> (always lowercase). When a policy is created, the first policy version is <code>v1</code>. </p>",
|
1942
|
+
"SetDefaultPolicyVersionRequest$VersionId": "<p>The version of the policy to set as the default (operative) version.</p> <p>For more information about managed policy versions, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html\">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>"
|
1943
|
+
}
|
1944
|
+
},
|
1945
|
+
"privateKeyType": {
|
1946
|
+
"base": null,
|
1947
|
+
"refs": {
|
1948
|
+
"UploadServerCertificateRequest$PrivateKey": "<p>The contents of the private key in PEM-encoded format.</p>"
|
1949
|
+
}
|
1950
|
+
},
|
1951
|
+
"roleDetailListType": {
|
1952
|
+
"base": null,
|
1953
|
+
"refs": {
|
1954
|
+
"GetAccountAuthorizationDetailsResponse$RoleDetailList": "<p>A list containing information about IAM roles.</p>"
|
1955
|
+
}
|
1956
|
+
},
|
1957
|
+
"roleListType": {
|
1958
|
+
"base": "<p>Contains a list of IAM roles.</p> <p>This data type is used as a response element in the <a>ListRoles</a> action.</p>",
|
1959
|
+
"refs": {
|
1960
|
+
"InstanceProfile$Roles": "<p>The role associated with the instance profile.</p>",
|
1961
|
+
"ListRolesResponse$Roles": "<p>A list of roles.</p>"
|
1962
|
+
}
|
1963
|
+
},
|
1964
|
+
"roleNameType": {
|
1965
|
+
"base": null,
|
1966
|
+
"refs": {
|
1967
|
+
"AddRoleToInstanceProfileRequest$RoleName": "<p>The name of the role to add.</p>",
|
1968
|
+
"AttachRolePolicyRequest$RoleName": "<p>The name (friendly name, not ARN) of the role to attach the policy to.</p>",
|
1969
|
+
"CreateRoleRequest$RoleName": "<p>The name of the role to create.</p>",
|
1970
|
+
"DeleteRolePolicyRequest$RoleName": "<p>The name (friendly name, not ARN) identifying the role that the policy is embedded in.</p>",
|
1971
|
+
"DeleteRoleRequest$RoleName": "<p>The name of the role to delete.</p>",
|
1972
|
+
"DetachRolePolicyRequest$RoleName": "<p>The name (friendly name, not ARN) of the role to detach the policy from.</p>",
|
1973
|
+
"GetRolePolicyRequest$RoleName": "<p>The name of the role associated with the policy.</p>",
|
1974
|
+
"GetRolePolicyResponse$RoleName": "<p>The role the policy is associated with.</p>",
|
1975
|
+
"GetRoleRequest$RoleName": "<p>The name of the role to get information about.</p>",
|
1976
|
+
"ListAttachedRolePoliciesRequest$RoleName": "<p>The name (friendly name, not ARN) of the role to list attached policies for.</p>",
|
1977
|
+
"ListInstanceProfilesForRoleRequest$RoleName": "<p>The name of the role to list instance profiles for.</p>",
|
1978
|
+
"ListRolePoliciesRequest$RoleName": "<p>The name of the role to list policies for.</p>",
|
1979
|
+
"PolicyRole$RoleName": "<p>The name (friendly name, not ARN) identifying the role.</p>",
|
1980
|
+
"PutRolePolicyRequest$RoleName": "<p>The name of the role to associate the policy with.</p>",
|
1981
|
+
"RemoveRoleFromInstanceProfileRequest$RoleName": "<p>The name of the role to remove.</p>",
|
1982
|
+
"Role$RoleName": "<p>The friendly name that identifies the role.</p>",
|
1983
|
+
"RoleDetail$RoleName": "<p>The friendly name that identifies the role.</p>",
|
1984
|
+
"UpdateAssumeRolePolicyRequest$RoleName": "<p>The name of the role to update.</p>"
|
1985
|
+
}
|
1986
|
+
},
|
1987
|
+
"serialNumberType": {
|
1988
|
+
"base": null,
|
1989
|
+
"refs": {
|
1990
|
+
"DeactivateMFADeviceRequest$SerialNumber": "<p> The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN. </p>",
|
1991
|
+
"DeleteVirtualMFADeviceRequest$SerialNumber": "<p> The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the same as the ARN. </p>",
|
1992
|
+
"EnableMFADeviceRequest$SerialNumber": "<p> The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN. </p>",
|
1993
|
+
"MFADevice$SerialNumber": "<p> The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN. </p>",
|
1994
|
+
"ResyncMFADeviceRequest$SerialNumber": "<p>Serial number that uniquely identifies the MFA device.</p>",
|
1995
|
+
"VirtualMFADevice$SerialNumber": "<p>The serial number associated with <code>VirtualMFADevice</code>.</p>"
|
1996
|
+
}
|
1997
|
+
},
|
1998
|
+
"serverCertificateMetadataListType": {
|
1999
|
+
"base": null,
|
2000
|
+
"refs": {
|
2001
|
+
"ListServerCertificatesResponse$ServerCertificateMetadataList": "<p>A list of server certificates.</p>"
|
2002
|
+
}
|
2003
|
+
},
|
2004
|
+
"serverCertificateNameType": {
|
2005
|
+
"base": null,
|
2006
|
+
"refs": {
|
2007
|
+
"DeleteServerCertificateRequest$ServerCertificateName": "<p>The name of the server certificate you want to delete.</p>",
|
2008
|
+
"GetServerCertificateRequest$ServerCertificateName": "<p>The name of the server certificate you want to retrieve information about.</p>",
|
2009
|
+
"ServerCertificateMetadata$ServerCertificateName": "<p>The name that identifies the server certificate.</p>",
|
2010
|
+
"UpdateServerCertificateRequest$ServerCertificateName": "<p>The name of the server certificate that you want to update.</p>",
|
2011
|
+
"UpdateServerCertificateRequest$NewServerCertificateName": "<p> The new name for the server certificate. Include this only if you are updating the server certificate's name. </p>",
|
2012
|
+
"UploadServerCertificateRequest$ServerCertificateName": "<p>The name for the server certificate. Do not include the path in this value.</p>"
|
2013
|
+
}
|
2014
|
+
},
|
2015
|
+
"serviceFailureExceptionMessage": {
|
2016
|
+
"base": null,
|
2017
|
+
"refs": {
|
2018
|
+
"ServiceFailureException$message": null
|
2019
|
+
}
|
2020
|
+
},
|
2021
|
+
"statusType": {
|
2022
|
+
"base": null,
|
2023
|
+
"refs": {
|
2024
|
+
"AccessKey$Status": "<p> The status of the access key. <code>Active</code> means the key is valid for API calls, while <code>Inactive</code> means it is not. </p>",
|
2025
|
+
"AccessKeyMetadata$Status": "<p>The status of the access key. <code>Active</code> means the key is valid for API calls; <code>Inactive</code> means it is not.</p>",
|
2026
|
+
"SigningCertificate$Status": "<p>The status of the signing certificate. <code>Active</code> means the key is valid for API calls, while <code>Inactive</code> means it is not.</p>",
|
2027
|
+
"UpdateAccessKeyRequest$Status": "<p> The status you want to assign to the secret access key. <code>Active</code> means the key can be used for API calls to AWS, while <code>Inactive</code> means the key cannot be used. </p>",
|
2028
|
+
"UpdateSigningCertificateRequest$Status": "<p> The status you want to assign to the certificate. <code>Active</code> means the certificate can be used for API calls to AWS, while <code>Inactive</code> means the certificate cannot be used. </p>"
|
2029
|
+
}
|
2030
|
+
},
|
2031
|
+
"summaryKeyType": {
|
2032
|
+
"base": null,
|
2033
|
+
"refs": {
|
2034
|
+
"summaryMapType$key": null
|
2035
|
+
}
|
2036
|
+
},
|
2037
|
+
"summaryMapType": {
|
2038
|
+
"base": null,
|
2039
|
+
"refs": {
|
2040
|
+
"GetAccountSummaryResponse$SummaryMap": "<p>A set of key value pairs containing information about IAM entity usage and IAM quotas.</p> <p> <code>SummaryMap</code> contains the following keys: <ul> <li> <p><b>AccessKeysPerUserQuota</b></p> <p>The maximum number of active access keys allowed for each IAM user.</p> </li> <li> <p><b>AccountAccessKeysPresent</b></p> <p>This value is 1 if the AWS account (root) has an access key, otherwise it is 0.</p> </li> <li> <p><b>AccountMFAEnabled</b></p> <p>This value is 1 if the AWS account (root) has an MFA device assigned, otherwise it is 0.</p> </li> <li> <p><b>AccountSigningCertificatesPresent</b></p> <p>This value is 1 if the AWS account (root) has a signing certificate, otherwise it is 0.</p> </li> <li> <p><b>AssumeRolePolicySizeQuota</b></p> <p>The maximum allowed size for assume role policy documents (trust policies), in non-whitespace characters.</p> </li> <li> <p><b>AttachedPoliciesPerGroupQuota</b></p> <p>The maximum number of managed policies that can be attached to an IAM group. </p> </li> <li> <p><b>AttachedPoliciesPerRoleQuota</b></p> <p>The maximum number of managed policies that can be attached to an IAM role. </p> </li> <li> <p><b>AttachedPoliciesPerUserQuota</b></p> <p>The maximum number of managed policies that can be attached to an IAM user. </p> </li> <li> <p><b>GroupPolicySizeQuota</b></p> <p>The maximum allowed size for the aggregate of all inline policies embedded in an IAM group, in non-whitespace characters. </p> </li> <li> <p><b>Groups</b></p> <p>The number of IAM groups in the AWS account.</p> </li> <li> <p><b>GroupsPerUserQuota</b></p> <p>The maximum number of IAM groups each IAM user can belong to. </p> </li> <li> <p><b>GroupsQuota</b></p> <p>The maximum number of IAM groups allowed in the AWS account. </p> </li> <li> <p><b>InstanceProfiles</b></p> <p>The number of instance profiles in the AWS account. </p> </li> <li> <p><b>InstanceProfilesQuota</b></p> <p>The maximum number of instance profiles allowed in the AWS account. </p> </li> <li> <p><b>MFADevices</b></p> <p>The number of MFA devices in the AWS account, including those assigned and unassigned. </p> </li> <li> <p><b>MFADevicesInUse</b></p> <p>The number of MFA devices that have been assigned to an IAM user or to the AWS account (root). </p> </li> <li> <p><b>Policies</b></p> <p>The number of customer managed policies in the AWS account. </p> </li> <li> <p><b>PoliciesQuota</b></p> <p>The maximum number of customer managed policies allowed in the AWS account. </p> </li> <li> <p><b>PolicySizeQuota</b></p> <p>The maximum allowed size of a customer managed policy, in non-whitespace characters. </p> </li> <li> <p><b>PolicyVersionsInUse</b></p> <p>The number of managed policies that are attached to IAM users, groups, or roles in the AWS account. </p> </li> <li> <p><b>PolicyVersionsInUseQuota</b></p> <p>The maximum number of managed policies that can be attached to IAM users, groups, or roles in the AWS account. </p> </li> <li> <p><b>Providers</b></p> <p>The number of identity providers in the AWS account. </p> </li> <li> <p><b>RolePolicySizeQuota</b></p> <p>The maximum allowed size for the aggregate of all inline policies (access policies, not the trust policy) embedded in an IAM role, in non-whitespace characters. </p> </li> <li> <p><b>Roles</b></p> <p>The number of IAM roles in the AWS account. </p> </li> <li> <p><b>RolesQuota</b></p> <p>The maximum number of IAM roles allowed in the AWS account. </p> </li> <li> <p><b>ServerCertificates</b></p> <p>The number of server certificates in the AWS account. </p> </li> <li> <p><b>ServerCertificatesQuota</b></p> <p>The maximum number of server certificates allowed in the AWS account. </p> </li> <li> <p><b>SigningCertificatesPerUserQuota</b></p> <p>The maximum number of X.509 signing certificates allowed for each IAM user. </p> </li> <li> <p><b>UserPolicySizeQuota</b></p> <p>The maximum allowed size for the aggregate of all inline policies embedded in an IAM user, in non-whitespace characters. </p> </li> <li> <p><b>Users</b></p> <p>The number of IAM users in the AWS account. </p> </li> <li> <p><b>UsersQuota</b></p> <p>The maximum number of IAM users allowed in the AWS account. </p> </li> <li> <p><b>VersionsPerPolicyQuota</b></p> <p>The maximum number of policy versions allowed for each managed policy. </p> </li> </ul> </p>"
|
2041
|
+
}
|
2042
|
+
},
|
2043
|
+
"summaryValueType": {
|
2044
|
+
"base": null,
|
2045
|
+
"refs": {
|
2046
|
+
"summaryMapType$value": null
|
2047
|
+
}
|
2048
|
+
},
|
2049
|
+
"thumbprintListType": {
|
2050
|
+
"base": "<p>Contains a list of thumbprints of identity provider server certificates.</p>",
|
2051
|
+
"refs": {
|
2052
|
+
"CreateOpenIDConnectProviderRequest$ThumbprintList": "<p>A list of server certificate thumbprints for the OpenID Connect (OIDC) identity provider's server certificate(s). Typically this list includes only one entry. However, IAM lets you have up to five thumbprints for an OIDC provider. This lets you maintain multiple thumbprints if the identity provider is rotating certificates.</p> <p>The server certificate thumbprint is the hex-encoded SHA-1 hash value of the X.509 certificate used by the domain where the OpenID Connect provider makes its keys available. It is always a 40-character string. </p> <p>You must provide at least one thumbprint when creating an IAM OIDC provider. For example, if the OIDC provider is <code>server.example.com</code> and the provider stores its keys at \"https://keys.server.example.com/openid-connect\", the thumbprint string would be the hex-encoded SHA-1 hash value of the certificate used by https://keys.server.example.com. </p> <p>For more information about obtaining the OIDC provider's thumbprint, see <a href=\"http://docs.aws.amazon.com/IAM/latest/UserGuide/identity-providers-oidc-obtain-thumbprint.html\">Obtaining the Thumbprint for an OpenID Connect Provider</a> in the <i>Using IAM</i> guide. </p>",
|
2053
|
+
"GetOpenIDConnectProviderResponse$ThumbprintList": "<p>A list of certificate thumbprints that are associated with the specified IAM OpenID Connect provider. For more information, see <a>CreateOpenIDConnectProvider</a>. </p>",
|
2054
|
+
"UpdateOpenIDConnectProviderThumbprintRequest$ThumbprintList": "<p>A list of certificate thumbprints that are associated with the specified IAM OpenID Connect provider. For more information, see <a>CreateOpenIDConnectProvider</a>. </p>"
|
2055
|
+
}
|
2056
|
+
},
|
2057
|
+
"thumbprintType": {
|
2058
|
+
"base": "<p>Contains a thumbprint for an identity provider's server certificate.</p> <p>The identity provider's server certificate thumbprint is the hex-encoded SHA-1 hash value of the self-signed X.509 certificate used by the domain where the OpenID Connect provider makes its keys available. It is always a 40-character string. </p>",
|
2059
|
+
"refs": {
|
2060
|
+
"thumbprintListType$member": null
|
2061
|
+
}
|
2062
|
+
},
|
2063
|
+
"userDetailListType": {
|
2064
|
+
"base": null,
|
2065
|
+
"refs": {
|
2066
|
+
"GetAccountAuthorizationDetailsResponse$UserDetailList": "<p>A list containing information about IAM users.</p>"
|
2067
|
+
}
|
2068
|
+
},
|
2069
|
+
"userListType": {
|
2070
|
+
"base": "<p>Contains a list of users.</p> <p>This data type is used as a response element in the <a>GetGroup</a> and <a>ListUsers</a> actions. </p>",
|
2071
|
+
"refs": {
|
2072
|
+
"GetGroupResponse$Users": "<p>A list of users in the group.</p>",
|
2073
|
+
"ListUsersResponse$Users": "<p>A list of users.</p>"
|
2074
|
+
}
|
2075
|
+
},
|
2076
|
+
"userNameType": {
|
2077
|
+
"base": null,
|
2078
|
+
"refs": {
|
2079
|
+
"AccessKey$UserName": "<p>The name of the IAM user that the access key is associated with.</p>",
|
2080
|
+
"AccessKeyMetadata$UserName": "<p>The name of the IAM user that the key is associated with.</p>",
|
2081
|
+
"AttachUserPolicyRequest$UserName": "<p>The name (friendly name, not ARN) of the user to attach the policy to.</p>",
|
2082
|
+
"CreateLoginProfileRequest$UserName": "<p>The name of the user to create a password for.</p>",
|
2083
|
+
"CreateUserRequest$UserName": "<p>The name of the user to create.</p>",
|
2084
|
+
"DeleteLoginProfileRequest$UserName": "<p>The name of the user whose password you want to delete.</p>",
|
2085
|
+
"DetachUserPolicyRequest$UserName": "<p>The name (friendly name, not ARN) of the user to detach the policy from.</p>",
|
2086
|
+
"GetLoginProfileRequest$UserName": "<p>The name of the user whose login profile you want to retrieve.</p>",
|
2087
|
+
"ListAttachedUserPoliciesRequest$UserName": "<p>The name (friendly name, not ARN) of the user to list attached policies for.</p>",
|
2088
|
+
"LoginProfile$UserName": "<p>The name of the user, which can be used for signing in to the AWS Management Console.</p>",
|
2089
|
+
"MFADevice$UserName": "<p>The user with whom the MFA device is associated.</p>",
|
2090
|
+
"PolicyUser$UserName": "<p>The name (friendly name, not ARN) identifying the user.</p>",
|
2091
|
+
"SigningCertificate$UserName": "<p>The name of the user the signing certificate is associated with.</p>",
|
2092
|
+
"UpdateLoginProfileRequest$UserName": "<p>The name of the user whose password you want to update.</p>",
|
2093
|
+
"UpdateUserRequest$NewUserName": "<p>New name for the user. Include this parameter only if you're changing the user's name.</p>",
|
2094
|
+
"User$UserName": "<p>The friendly name identifying the user.</p>",
|
2095
|
+
"UserDetail$UserName": "<p>The friendly name identifying the user.</p>"
|
2096
|
+
}
|
2097
|
+
},
|
2098
|
+
"virtualMFADeviceListType": {
|
2099
|
+
"base": null,
|
2100
|
+
"refs": {
|
2101
|
+
"ListVirtualMFADevicesResponse$VirtualMFADevices": "<p> The list of virtual MFA devices in the current account that match the <code>AssignmentStatus</code> value that was passed in the request. </p>"
|
2102
|
+
}
|
2103
|
+
},
|
2104
|
+
"virtualMFADeviceName": {
|
2105
|
+
"base": null,
|
2106
|
+
"refs": {
|
2107
|
+
"CreateVirtualMFADeviceRequest$VirtualMFADeviceName": "<p> The name of the virtual MFA device. Use with path to uniquely identify a virtual MFA device. </p>"
|
2108
|
+
}
|
2109
|
+
}
|
2110
|
+
}
|
2111
|
+
}
|