aws-sdk-core 2.6.43 → 2.6.44

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 75214091629b837f61ffb8d9595af6c87f475a71
4
- data.tar.gz: 1da98b2fc9bd2299552553147259833dc5c40ede
3
+ metadata.gz: 35325de139b8f3e95204b4cbe99bbcd4ffc6fe9e
4
+ data.tar.gz: fe22fa3322e1079511a114b70d7c7ba107a463e4
5
5
  SHA512:
6
- metadata.gz: 8b3162848c83d2c29abc2309c385fc7cb40583b0a84a190010fb4b8df0ea0892675204e1205ae92f13585225ffd7930d69b308d6e11b45873d8477d0c938c3eb
7
- data.tar.gz: 0155d84986e39e0031dcc5848611665530cfe49e2ea744df185a610e34c5b7dce7a8077a860e762fbb892b8b24d73098ae4363bbafbb700c280a9387e6fe5fdd
6
+ metadata.gz: 8e4e0958e736988836ce88e5674efd85332aaf782a204257ddd7c87305ef3ddcc65e6718e79bec5edac39797f907e2446d6c0720f354f917c69590d9afa3a791
7
+ data.tar.gz: 3b8075575062e27d27511cd599c9c368c446d8c5296806a5a5c144b242c61b2f116e32c5ffa61012456be12026fe6ab81f8c0e8cb2bac26de761a4bb5ef0e04a
@@ -1084,7 +1084,8 @@
1084
1084
  "enum":[
1085
1085
  "ConfigurationItemChangeNotification",
1086
1086
  "ConfigurationSnapshotDeliveryCompleted",
1087
- "ScheduledNotification"
1087
+ "ScheduledNotification",
1088
+ "OversizedConfigurationItemChangeNotification"
1088
1089
  ]
1089
1090
  },
1090
1091
  "Name":{"type":"string"},
@@ -1,13 +1,13 @@
1
1
  {
2
2
  "version":"2.0",
3
3
  "metadata":{
4
- "uid":"elasticfilesystem-2015-02-01",
5
4
  "apiVersion":"2015-02-01",
6
5
  "endpointPrefix":"elasticfilesystem",
7
6
  "protocol":"rest-json",
8
7
  "serviceAbbreviation":"EFS",
9
8
  "serviceFullName":"Amazon Elastic File System",
10
- "signatureVersion":"v4"
9
+ "signatureVersion":"v4",
10
+ "uid":"elasticfilesystem-2015-02-01"
11
11
  },
12
12
  "operations":{
13
13
  "CreateFileSystem":{
@@ -1,5 +1,222 @@
1
1
  {
2
2
  "version": "1.0",
3
3
  "examples": {
4
+ "CreateFileSystem": [
5
+ {
6
+ "input": {
7
+ "CreationToken": "tokenstring",
8
+ "PerformanceMode": "generalPurpose"
9
+ },
10
+ "output": {
11
+ "CreationTime": "1481841524.0",
12
+ "CreationToken": "tokenstring",
13
+ "FileSystemId": "fs-01234567",
14
+ "LifeCycleState": "creating",
15
+ "NumberOfMountTargets": 0,
16
+ "OwnerId": "012345678912",
17
+ "PerformanceMode": "generalPurpose",
18
+ "SizeInBytes": {
19
+ "Value": 0
20
+ }
21
+ },
22
+ "comments": {
23
+ "input": {
24
+ },
25
+ "output": {
26
+ }
27
+ },
28
+ "description": "This operation creates a new file system with the default generalpurpose performance mode.",
29
+ "id": "to-create-a-new-file-system-1481840798547",
30
+ "title": "To create a new file system"
31
+ }
32
+ ],
33
+ "CreateMountTarget": [
34
+ {
35
+ "input": {
36
+ "FileSystemId": "fs-01234567",
37
+ "SubnetId": "subnet-1234abcd"
38
+ },
39
+ "output": {
40
+ "FileSystemId": "fs-01234567",
41
+ "IpAddress": "192.0.0.2",
42
+ "LifeCycleState": "creating",
43
+ "MountTargetId": "fsmt-12340abc",
44
+ "NetworkInterfaceId": "eni-cedf6789",
45
+ "OwnerId": "012345678912",
46
+ "SubnetId": "subnet-1234abcd"
47
+ },
48
+ "comments": {
49
+ "input": {
50
+ },
51
+ "output": {
52
+ }
53
+ },
54
+ "description": "This operation creates a new mount target for an EFS file system.",
55
+ "id": "to-create-a-new-mount-target-1481842289329",
56
+ "title": "To create a new mount target"
57
+ }
58
+ ],
59
+ "CreateTags": [
60
+ {
61
+ "input": {
62
+ "FileSystemId": "fs-01234567",
63
+ "Tags": [
64
+ {
65
+ "Key": "Name",
66
+ "Value": "MyFileSystem"
67
+ }
68
+ ]
69
+ },
70
+ "comments": {
71
+ },
72
+ "description": "This operation creates a new tag for an EFS file system.",
73
+ "id": "to-create-a-new-tag-1481843409357",
74
+ "title": "To create a new tag"
75
+ }
76
+ ],
77
+ "DeleteFileSystem": [
78
+ {
79
+ "input": {
80
+ "FileSystemId": "fs-01234567"
81
+ },
82
+ "comments": {
83
+ },
84
+ "description": "This operation deletes an EFS file system.",
85
+ "id": "to-delete-a-file-system-1481847318348",
86
+ "title": "To delete a file system"
87
+ }
88
+ ],
89
+ "DeleteMountTarget": [
90
+ {
91
+ "input": {
92
+ "MountTargetId": "fsmt-12340abc"
93
+ },
94
+ "comments": {
95
+ },
96
+ "description": "This operation deletes a mount target.",
97
+ "id": "to-delete-a-mount-target-1481847635607",
98
+ "title": "To delete a mount target"
99
+ }
100
+ ],
101
+ "DeleteTags": [
102
+ {
103
+ "input": {
104
+ "FileSystemId": "fs-01234567",
105
+ "TagKeys": [
106
+ "Name"
107
+ ]
108
+ },
109
+ "comments": {
110
+ },
111
+ "description": "This operation deletes tags for an EFS file system.",
112
+ "id": "to-delete-tags-for-an-efs-file-system-1481848189061",
113
+ "title": "To delete tags for an EFS file system"
114
+ }
115
+ ],
116
+ "DescribeFileSystems": [
117
+ {
118
+ "input": {
119
+ },
120
+ "output": {
121
+ "FileSystems": [
122
+ {
123
+ "CreationTime": "1481841524.0",
124
+ "CreationToken": "tokenstring",
125
+ "FileSystemId": "fs-01234567",
126
+ "LifeCycleState": "available",
127
+ "Name": "MyFileSystem",
128
+ "NumberOfMountTargets": 1,
129
+ "OwnerId": "012345678912",
130
+ "PerformanceMode": "generalPurpose",
131
+ "SizeInBytes": {
132
+ "Value": 6144
133
+ }
134
+ }
135
+ ]
136
+ },
137
+ "comments": {
138
+ },
139
+ "description": "This operation describes all of the EFS file systems in an account.",
140
+ "id": "to-describe-an-efs-file-system-1481848448460",
141
+ "title": "To describe an EFS file system"
142
+ }
143
+ ],
144
+ "DescribeMountTargetSecurityGroups": [
145
+ {
146
+ "input": {
147
+ "MountTargetId": "fsmt-12340abc"
148
+ },
149
+ "output": {
150
+ "SecurityGroups": [
151
+ "sg-fghi4567"
152
+ ]
153
+ },
154
+ "comments": {
155
+ },
156
+ "description": "This operation describes all of the security groups for a file system's mount target.",
157
+ "id": "to-describe-the-security-groups-for-a-mount-target-1481849317823",
158
+ "title": "To describe the security groups for a mount target"
159
+ }
160
+ ],
161
+ "DescribeMountTargets": [
162
+ {
163
+ "input": {
164
+ "FileSystemId": "fs-01234567"
165
+ },
166
+ "output": {
167
+ "MountTargets": [
168
+ {
169
+ "FileSystemId": "fs-01234567",
170
+ "IpAddress": "192.0.0.2",
171
+ "LifeCycleState": "available",
172
+ "MountTargetId": "fsmt-12340abc",
173
+ "NetworkInterfaceId": "eni-cedf6789",
174
+ "OwnerId": "012345678912",
175
+ "SubnetId": "subnet-1234abcd"
176
+ }
177
+ ]
178
+ },
179
+ "comments": {
180
+ },
181
+ "description": "This operation describes all of a file system's mount targets.",
182
+ "id": "to-describe-the-mount-targets-for-a-file-system-1481849958584",
183
+ "title": "To describe the mount targets for a file system"
184
+ }
185
+ ],
186
+ "DescribeTags": [
187
+ {
188
+ "input": {
189
+ "FileSystemId": "fs-01234567"
190
+ },
191
+ "output": {
192
+ "Tags": [
193
+ {
194
+ "Key": "Name",
195
+ "Value": "MyFileSystem"
196
+ }
197
+ ]
198
+ },
199
+ "comments": {
200
+ },
201
+ "description": "This operation describes all of a file system's tags.",
202
+ "id": "to-describe-the-tags-for-a-file-system-1481850497090",
203
+ "title": "To describe the tags for a file system"
204
+ }
205
+ ],
206
+ "ModifyMountTargetSecurityGroups": [
207
+ {
208
+ "input": {
209
+ "MountTargetId": "fsmt-12340abc",
210
+ "SecurityGroups": [
211
+ "sg-abcd1234"
212
+ ]
213
+ },
214
+ "comments": {
215
+ },
216
+ "description": "This operation modifies the security groups associated with a mount target for a file system.",
217
+ "id": "to-modify-the-security-groups-associated-with-a-mount-target-for-a-file-system-1481850772562",
218
+ "title": "To modify the security groups associated with a mount target for a file system"
219
+ }
220
+ ]
4
221
  }
5
222
  }
@@ -1,5 +1,1191 @@
1
1
  {
2
2
  "version": "1.0",
3
3
  "examples": {
4
+ "AddClientIDToOpenIDConnectProvider": [
5
+ {
6
+ "input": {
7
+ "ClientID": "my-application-ID",
8
+ "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
9
+ },
10
+ "comments": {
11
+ "input": {
12
+ },
13
+ "output": {
14
+ }
15
+ },
16
+ "description": "The following add-client-id-to-open-id-connect-provider command adds the client ID my-application-ID to the OIDC provider named server.example.com:",
17
+ "id": "028e91f4-e2a6-4d59-9e3b-4965a3fb19be",
18
+ "title": "To add a client ID (audience) to an Open-ID Connect (OIDC) provider"
19
+ }
20
+ ],
21
+ "AddRoleToInstanceProfile": [
22
+ {
23
+ "input": {
24
+ "InstanceProfileName": "Webserver",
25
+ "RoleName": "S3Access"
26
+ },
27
+ "comments": {
28
+ "input": {
29
+ },
30
+ "output": {
31
+ }
32
+ },
33
+ "description": "The following command adds the role named S3Access to the instance profile named Webserver:",
34
+ "id": "c107fac3-edb6-4827-8a71-8863ec91c81f",
35
+ "title": "To add a role to an instance profile"
36
+ }
37
+ ],
38
+ "AddUserToGroup": [
39
+ {
40
+ "input": {
41
+ "GroupName": "Admins",
42
+ "UserName": "Bob"
43
+ },
44
+ "comments": {
45
+ "input": {
46
+ },
47
+ "output": {
48
+ }
49
+ },
50
+ "description": "The following command adds an IAM user named Bob to the IAM group named Admins:",
51
+ "id": "619c7e6b-09f8-4036-857b-51a6ea5027ca",
52
+ "title": "To add a user to an IAM group"
53
+ }
54
+ ],
55
+ "AttachGroupPolicy": [
56
+ {
57
+ "input": {
58
+ "GroupName": "Finance",
59
+ "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess"
60
+ },
61
+ "comments": {
62
+ "input": {
63
+ },
64
+ "output": {
65
+ }
66
+ },
67
+ "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM group named Finance.",
68
+ "id": "87551489-86f0-45db-9889-759936778f2b",
69
+ "title": "To attach a managed policy to an IAM group"
70
+ }
71
+ ],
72
+ "AttachRolePolicy": [
73
+ {
74
+ "input": {
75
+ "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess",
76
+ "RoleName": "ReadOnlyRole"
77
+ },
78
+ "comments": {
79
+ "input": {
80
+ },
81
+ "output": {
82
+ }
83
+ },
84
+ "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM role named ReadOnlyRole.",
85
+ "id": "3e1b8c7c-99c8-4fc4-a20c-131fe3f22c7e",
86
+ "title": "To attach a managed policy to an IAM role"
87
+ }
88
+ ],
89
+ "AttachUserPolicy": [
90
+ {
91
+ "input": {
92
+ "PolicyArn": "arn:aws:iam::aws:policy/AdministratorAccess",
93
+ "UserName": "Alice"
94
+ },
95
+ "comments": {
96
+ "input": {
97
+ },
98
+ "output": {
99
+ }
100
+ },
101
+ "description": "The following command attaches the AWS managed policy named AdministratorAccess to the IAM user named Alice.",
102
+ "id": "1372ebd8-9475-4b1a-a479-23b6fd4b8b3e",
103
+ "title": "To attach a managed policy to an IAM user"
104
+ }
105
+ ],
106
+ "ChangePassword": [
107
+ {
108
+ "input": {
109
+ "NewPassword": "]35d/{pB9Fo9wJ",
110
+ "OldPassword": "3s0K_;xh4~8XXI"
111
+ },
112
+ "comments": {
113
+ "input": {
114
+ },
115
+ "output": {
116
+ }
117
+ },
118
+ "description": "The following command changes the password for the current IAM user.",
119
+ "id": "3a80c66f-bffb-46df-947c-1e8fa583b470",
120
+ "title": "To change the password for your IAM user"
121
+ }
122
+ ],
123
+ "CreateAccessKey": [
124
+ {
125
+ "input": {
126
+ "UserName": "Bob"
127
+ },
128
+ "output": {
129
+ "AccessKey": {
130
+ "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
131
+ "CreateDate": "2015-03-09T18:39:23.411Z",
132
+ "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
133
+ "Status": "Active",
134
+ "UserName": "Bob"
135
+ }
136
+ },
137
+ "comments": {
138
+ "input": {
139
+ },
140
+ "output": {
141
+ }
142
+ },
143
+ "description": "The following command creates an access key (access key ID and secret access key) for the IAM user named Bob.",
144
+ "id": "1fbb3211-4cf2-41db-8c20-ba58d9f5802d",
145
+ "title": "To create an access key for an IAM user"
146
+ }
147
+ ],
148
+ "CreateAccountAlias": [
149
+ {
150
+ "input": {
151
+ "AccountAlias": "examplecorp"
152
+ },
153
+ "comments": {
154
+ "input": {
155
+ },
156
+ "output": {
157
+ }
158
+ },
159
+ "description": "The following command associates the alias examplecorp to your AWS account.",
160
+ "id": "5adaf6fb-94fc-4ca2-b825-2fbc2062add1",
161
+ "title": "To create an account alias"
162
+ }
163
+ ],
164
+ "CreateGroup": [
165
+ {
166
+ "input": {
167
+ "GroupName": "Admins"
168
+ },
169
+ "output": {
170
+ "Group": {
171
+ "Arn": "arn:aws:iam::123456789012:group/Admins",
172
+ "CreateDate": "2015-03-09T20:30:24.940Z",
173
+ "GroupId": "AIDGPMS9RO4H3FEXAMPLE",
174
+ "GroupName": "Admins",
175
+ "Path": "/"
176
+ }
177
+ },
178
+ "comments": {
179
+ "input": {
180
+ },
181
+ "output": {
182
+ }
183
+ },
184
+ "description": "The following command creates an IAM group named Admins.",
185
+ "id": "d5da2a90-5e69-4ef7-8ae8-4c33dc21fd21",
186
+ "title": "To create an IAM group"
187
+ }
188
+ ],
189
+ "CreateInstanceProfile": [
190
+ {
191
+ "input": {
192
+ "InstanceProfileName": "Webserver"
193
+ },
194
+ "output": {
195
+ "InstanceProfile": {
196
+ "Arn": "arn:aws:iam::123456789012:instance-profile/Webserver",
197
+ "CreateDate": "2015-03-09T20:33:19.626Z",
198
+ "InstanceProfileId": "AIPAJMBYC7DLSPEXAMPLE",
199
+ "InstanceProfileName": "Webserver",
200
+ "Path": "/",
201
+ "Roles": [
202
+
203
+ ]
204
+ }
205
+ },
206
+ "comments": {
207
+ "input": {
208
+ },
209
+ "output": {
210
+ }
211
+ },
212
+ "description": "The following command creates an instance profile named Webserver that is ready to have a role attached and then be associated with an EC2 instance.",
213
+ "id": "5d84e6ae-5921-4e39-8454-10232cd9ff9a",
214
+ "title": "To create an instance profile"
215
+ }
216
+ ],
217
+ "CreateLoginProfile": [
218
+ {
219
+ "input": {
220
+ "Password": "h]6EszR}vJ*m",
221
+ "PasswordResetRequired": true,
222
+ "UserName": "Bob"
223
+ },
224
+ "output": {
225
+ "LoginProfile": {
226
+ "CreateDate": "2015-03-10T20:55:40.274Z",
227
+ "PasswordResetRequired": true,
228
+ "UserName": "Bob"
229
+ }
230
+ },
231
+ "comments": {
232
+ "input": {
233
+ },
234
+ "output": {
235
+ }
236
+ },
237
+ "description": "The following command changes IAM user Bob's password and sets the flag that required Bob to change the password the next time he signs in.",
238
+ "id": "c63795bc-3444-40b3-89df-83c474ef88be",
239
+ "title": "To create an instance profile"
240
+ }
241
+ ],
242
+ "CreateOpenIDConnectProvider": [
243
+ {
244
+ "input": {
245
+ "ClientIDList": [
246
+ "my-application-id"
247
+ ],
248
+ "ThumbprintList": [
249
+ "3768084dfb3d2b68b7897bf5f565da8efEXAMPLE"
250
+ ],
251
+ "Url": "https://server.example.com"
252
+ },
253
+ "output": {
254
+ "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
255
+ },
256
+ "comments": {
257
+ "input": {
258
+ },
259
+ "output": {
260
+ }
261
+ },
262
+ "description": "The following example defines a new OIDC provider in IAM with a client ID of my-application-id and pointing at the server with a URL of https://server.example.com.",
263
+ "id": "4e4a6bff-cc97-4406-922e-0ab4a82cdb63",
264
+ "title": "To create an instance profile"
265
+ }
266
+ ],
267
+ "CreateRole": [
268
+ {
269
+ "input": {
270
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
271
+ "Path": "/",
272
+ "RoleName": "Test-Role"
273
+ },
274
+ "output": {
275
+ "Role": {
276
+ "Arn": "arn:aws:iam::123456789012:role/Test-Role",
277
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
278
+ "CreateDate": "2013-06-07T20:43:32.821Z",
279
+ "Path": "/",
280
+ "RoleId": "AKIAIOSFODNN7EXAMPLE",
281
+ "RoleName": "Test-Role"
282
+ }
283
+ },
284
+ "comments": {
285
+ "input": {
286
+ },
287
+ "output": {
288
+ }
289
+ },
290
+ "description": "The following command creates a role named Test-Role and attaches a trust policy to it that is provided as a URL-encoded JSON string.",
291
+ "id": "eaaa4b5f-51f1-4f73-b0d3-30127040eff8",
292
+ "title": "To create an IAM role"
293
+ }
294
+ ],
295
+ "CreateUser": [
296
+ {
297
+ "input": {
298
+ "UserName": "Bob"
299
+ },
300
+ "output": {
301
+ "User": {
302
+ "Arn": "arn:aws:iam::123456789012:user/Bob",
303
+ "CreateDate": "2013-06-08T03:20:41.270Z",
304
+ "Path": "/",
305
+ "UserId": "AKIAIOSFODNN7EXAMPLE",
306
+ "UserName": "Bob"
307
+ }
308
+ },
309
+ "comments": {
310
+ "input": {
311
+ },
312
+ "output": {
313
+ }
314
+ },
315
+ "description": "The following create-user command creates an IAM user named Bob in the current account.",
316
+ "id": "eb15f90b-e5f5-4af8-a594-e4e82b181a62",
317
+ "title": "To create an IAM user"
318
+ }
319
+ ],
320
+ "DeleteAccessKey": [
321
+ {
322
+ "input": {
323
+ "AccessKeyId": "AKIDPMS9RO4H3FEXAMPLE",
324
+ "UserName": "Bob"
325
+ },
326
+ "comments": {
327
+ "input": {
328
+ },
329
+ "output": {
330
+ }
331
+ },
332
+ "description": "The following command deletes one access key (access key ID and secret access key) assigned to the IAM user named Bob.",
333
+ "id": "61a785a7-d30a-415a-ae18-ab9236e56871",
334
+ "title": "To delete an access key for an IAM user"
335
+ }
336
+ ],
337
+ "DeleteAccountAlias": [
338
+ {
339
+ "input": {
340
+ "AccountAlias": "mycompany"
341
+ },
342
+ "comments": {
343
+ "input": {
344
+ },
345
+ "output": {
346
+ }
347
+ },
348
+ "description": "The following command removes the alias mycompany from the current AWS account:",
349
+ "id": "7abeca65-04a8-4500-a890-47f1092bf766",
350
+ "title": "To delete an account alias"
351
+ }
352
+ ],
353
+ "DeleteAccountPasswordPolicy": [
354
+ {
355
+ "comments": {
356
+ "input": {
357
+ },
358
+ "output": {
359
+ }
360
+ },
361
+ "description": "The following command removes the password policy from the current AWS account:",
362
+ "id": "9ddf755e-495c-49bc-ae3b-ea6cc9b8ebcf",
363
+ "title": "To delete the current account password policy"
364
+ }
365
+ ],
366
+ "DeleteGroupPolicy": [
367
+ {
368
+ "input": {
369
+ "GroupName": "Admins",
370
+ "PolicyName": "ExamplePolicy"
371
+ },
372
+ "comments": {
373
+ "input": {
374
+ },
375
+ "output": {
376
+ }
377
+ },
378
+ "description": "The following command deletes the policy named ExamplePolicy from the group named Admins:",
379
+ "id": "e683f2bd-98a4-4fe0-bb66-33169c692d4a",
380
+ "title": "To delete a policy from an IAM group"
381
+ }
382
+ ],
383
+ "DeleteInstanceProfile": [
384
+ {
385
+ "input": {
386
+ "InstanceProfileName": "ExampleInstanceProfile"
387
+ },
388
+ "comments": {
389
+ "input": {
390
+ },
391
+ "output": {
392
+ }
393
+ },
394
+ "description": "The following command deletes the instance profile named ExampleInstanceProfile",
395
+ "id": "12d74fb8-3433-49db-8171-a1fc764e354d",
396
+ "title": "To delete an instance profile"
397
+ }
398
+ ],
399
+ "DeleteLoginProfile": [
400
+ {
401
+ "input": {
402
+ "UserName": "Bob"
403
+ },
404
+ "comments": {
405
+ "input": {
406
+ },
407
+ "output": {
408
+ }
409
+ },
410
+ "description": "The following command deletes the password for the IAM user named Bob.",
411
+ "id": "1fe57059-fc73-42e2-b992-517b7d573b5c",
412
+ "title": "To delete a password for an IAM user"
413
+ }
414
+ ],
415
+ "DeleteRole": [
416
+ {
417
+ "input": {
418
+ "RoleName": "Test-Role"
419
+ },
420
+ "comments": {
421
+ "input": {
422
+ },
423
+ "output": {
424
+ }
425
+ },
426
+ "description": "The following command removes the role named Test-Role.",
427
+ "id": "053cdf74-9bda-44b8-bdbb-140fd5a32603",
428
+ "title": "To delete an IAM role"
429
+ }
430
+ ],
431
+ "DeleteRolePolicy": [
432
+ {
433
+ "input": {
434
+ "PolicyName": "ExamplePolicy",
435
+ "RoleName": "Test-Role"
436
+ },
437
+ "comments": {
438
+ "input": {
439
+ },
440
+ "output": {
441
+ }
442
+ },
443
+ "description": "The following command removes the policy named ExamplePolicy from the role named Test-Role.",
444
+ "id": "9c667336-fde3-462c-b8f3-950800821e27",
445
+ "title": "To remove a policy from an IAM role"
446
+ }
447
+ ],
448
+ "DeleteSigningCertificate": [
449
+ {
450
+ "input": {
451
+ "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
452
+ "UserName": "Anika"
453
+ },
454
+ "comments": {
455
+ "input": {
456
+ },
457
+ "output": {
458
+ }
459
+ },
460
+ "description": "The following command deletes the specified signing certificate for the IAM user named Anika.",
461
+ "id": "e3357586-ba9c-4070-b35b-d1a899b71987",
462
+ "title": "To delete a signing certificate for an IAM user"
463
+ }
464
+ ],
465
+ "DeleteUser": [
466
+ {
467
+ "input": {
468
+ "UserName": "Bob"
469
+ },
470
+ "comments": {
471
+ "input": {
472
+ },
473
+ "output": {
474
+ }
475
+ },
476
+ "description": "The following command removes the IAM user named Bob from the current account.",
477
+ "id": "a13dc3f9-59fe-42d9-abbb-fb98b204fdf0",
478
+ "title": "To delete an IAM user"
479
+ }
480
+ ],
481
+ "DeleteUserPolicy": [
482
+ {
483
+ "input": {
484
+ "PolicyName": "ExamplePolicy",
485
+ "UserName": "Juan"
486
+ },
487
+ "comments": {
488
+ "input": {
489
+ },
490
+ "output": {
491
+ }
492
+ },
493
+ "description": "The following delete-user-policy command removes the specified policy from the IAM user named Juan:",
494
+ "id": "34f07ddc-9bc1-4f52-bc59-cd0a3ccd06c8",
495
+ "title": "To remove a policy from an IAM user"
496
+ }
497
+ ],
498
+ "DeleteVirtualMFADevice": [
499
+ {
500
+ "input": {
501
+ "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleName"
502
+ },
503
+ "comments": {
504
+ "input": {
505
+ },
506
+ "output": {
507
+ }
508
+ },
509
+ "description": "The following delete-virtual-mfa-device command removes the specified MFA device from the current AWS account.",
510
+ "id": "2933b08b-dbe7-4b89-b8c1-fdf75feea1ee",
511
+ "title": "To remove a virtual MFA device"
512
+ }
513
+ ],
514
+ "GetAccountPasswordPolicy": [
515
+ {
516
+ "output": {
517
+ "PasswordPolicy": {
518
+ "AllowUsersToChangePassword": false,
519
+ "ExpirePasswords": false,
520
+ "HardExpiry": false,
521
+ "MaxPasswordAge": 90,
522
+ "MinimumPasswordLength": 8,
523
+ "PasswordReusePrevention": 12,
524
+ "RequireLowercaseCharacters": false,
525
+ "RequireNumbers": true,
526
+ "RequireSymbols": true,
527
+ "RequireUppercaseCharacters": false
528
+ }
529
+ },
530
+ "comments": {
531
+ "input": {
532
+ },
533
+ "output": {
534
+ }
535
+ },
536
+ "description": "The following command displays details about the password policy for the current AWS account.",
537
+ "id": "5e4598c7-c425-431f-8af1-19073b3c4a5f",
538
+ "title": "To see the current account password policy"
539
+ }
540
+ ],
541
+ "GetAccountSummary": [
542
+ {
543
+ "output": {
544
+ "SummaryMap": {
545
+ "AccessKeysPerUserQuota": 2,
546
+ "AccountAccessKeysPresent": 1,
547
+ "AccountMFAEnabled": 0,
548
+ "AccountSigningCertificatesPresent": 0,
549
+ "AttachedPoliciesPerGroupQuota": 10,
550
+ "AttachedPoliciesPerRoleQuota": 10,
551
+ "AttachedPoliciesPerUserQuota": 10,
552
+ "GroupPolicySizeQuota": 5120,
553
+ "Groups": 15,
554
+ "GroupsPerUserQuota": 10,
555
+ "GroupsQuota": 100,
556
+ "MFADevices": 6,
557
+ "MFADevicesInUse": 3,
558
+ "Policies": 8,
559
+ "PoliciesQuota": 1000,
560
+ "PolicySizeQuota": 5120,
561
+ "PolicyVersionsInUse": 22,
562
+ "PolicyVersionsInUseQuota": 10000,
563
+ "ServerCertificates": 1,
564
+ "ServerCertificatesQuota": 20,
565
+ "SigningCertificatesPerUserQuota": 2,
566
+ "UserPolicySizeQuota": 2048,
567
+ "Users": 27,
568
+ "UsersQuota": 5000,
569
+ "VersionsPerPolicyQuota": 5
570
+ }
571
+ },
572
+ "comments": {
573
+ "input": {
574
+ },
575
+ "output": {
576
+ }
577
+ },
578
+ "description": "The following command returns information about the IAM entity quotas and usage in the current AWS account.",
579
+ "id": "9d8447af-f344-45de-8219-2cebc3cce7f2",
580
+ "title": "To get information about IAM entity quotas and usage in the current account"
581
+ }
582
+ ],
583
+ "GetInstanceProfile": [
584
+ {
585
+ "input": {
586
+ "InstanceProfileName": "ExampleInstanceProfile"
587
+ },
588
+ "output": {
589
+ "InstanceProfile": {
590
+ "Arn": "arn:aws:iam::336924118301:instance-profile/ExampleInstanceProfile",
591
+ "CreateDate": "2013-06-12T23:52:02Z",
592
+ "InstanceProfileId": "AID2MAB8DPLSRHEXAMPLE",
593
+ "InstanceProfileName": "ExampleInstanceProfile",
594
+ "Path": "/",
595
+ "Roles": [
596
+ {
597
+ "Arn": "arn:aws:iam::336924118301:role/Test-Role",
598
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
599
+ "CreateDate": "2013-01-09T06:33:26Z",
600
+ "Path": "/",
601
+ "RoleId": "AIDGPMS9RO4H3FEXAMPLE",
602
+ "RoleName": "Test-Role"
603
+ }
604
+ ]
605
+ }
606
+ },
607
+ "comments": {
608
+ "input": {
609
+ },
610
+ "output": {
611
+ }
612
+ },
613
+ "description": "The following command gets information about the instance profile named ExampleInstanceProfile.",
614
+ "id": "463b9ba5-18cc-4608-9ccb-5a7c6b6e5fe7",
615
+ "title": "To get information about an instance profile"
616
+ }
617
+ ],
618
+ "GetLoginProfile": [
619
+ {
620
+ "input": {
621
+ "UserName": "Anika"
622
+ },
623
+ "output": {
624
+ "LoginProfile": {
625
+ "CreateDate": "2012-09-21T23:03:39Z",
626
+ "UserName": "Anika"
627
+ }
628
+ },
629
+ "comments": {
630
+ "input": {
631
+ },
632
+ "output": {
633
+ }
634
+ },
635
+ "description": "The following command gets information about the password for the IAM user named Anika.",
636
+ "id": "d6b580cc-909f-4925-9caa-d425cbc1ad47",
637
+ "title": "To get password information for an IAM user"
638
+ }
639
+ ],
640
+ "GetRole": [
641
+ {
642
+ "input": {
643
+ "RoleName": "Test-Role"
644
+ },
645
+ "output": {
646
+ "Role": {
647
+ "Arn": "arn:aws:iam::123456789012:role/Test-Role",
648
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
649
+ "CreateDate": "2013-04-18T05:01:58Z",
650
+ "Path": "/",
651
+ "RoleId": "AIDIODR4TAW7CSEXAMPLE",
652
+ "RoleName": "Test-Role"
653
+ }
654
+ },
655
+ "comments": {
656
+ "input": {
657
+ },
658
+ "output": {
659
+ }
660
+ },
661
+ "description": "The following command gets information about the role named Test-Role.",
662
+ "id": "5b7d03a6-340c-472d-aa77-56425950d8b0",
663
+ "title": "To get information about an IAM role"
664
+ }
665
+ ],
666
+ "GetUser": [
667
+ {
668
+ "input": {
669
+ "UserName": "Bob"
670
+ },
671
+ "output": {
672
+ "User": {
673
+ "Arn": "arn:aws:iam::123456789012:user/Bob",
674
+ "CreateDate": "2012-09-21T23:03:13Z",
675
+ "Path": "/",
676
+ "UserId": "AKIAIOSFODNN7EXAMPLE",
677
+ "UserName": "Bob"
678
+ }
679
+ },
680
+ "comments": {
681
+ "input": {
682
+ },
683
+ "output": {
684
+ }
685
+ },
686
+ "description": "The following command gets information about the IAM user named Bob.",
687
+ "id": "ede000a1-9e4c-40db-bd0a-d4f95e41a6ab",
688
+ "title": "To get information about an IAM user"
689
+ }
690
+ ],
691
+ "ListAccessKeys": [
692
+ {
693
+ "input": {
694
+ "UserName": "Alice"
695
+ },
696
+ "output": {
697
+ "AccessKeyMetadata": [
698
+ {
699
+ "AccessKeyId": "AKIA111111111EXAMPLE",
700
+ "CreateDate": "2016-12-01T22:19:58Z",
701
+ "Status": "Active",
702
+ "UserName": "Alice"
703
+ },
704
+ {
705
+ "AccessKeyId": "AKIA222222222EXAMPLE",
706
+ "CreateDate": "2016-12-01T22:20:01Z",
707
+ "Status": "Active",
708
+ "UserName": "Alice"
709
+ }
710
+ ]
711
+ },
712
+ "comments": {
713
+ "input": {
714
+ },
715
+ "output": {
716
+ }
717
+ },
718
+ "description": "The following command lists the access keys IDs for the IAM user named Alice.",
719
+ "id": "15571463-ebea-411a-a021-1c76bd2a3625",
720
+ "title": "To list the access key IDs for an IAM user"
721
+ }
722
+ ],
723
+ "ListAccountAliases": [
724
+ {
725
+ "input": {
726
+ },
727
+ "output": {
728
+ "AccountAliases": [
729
+ "exmaple-corporation"
730
+ ]
731
+ },
732
+ "comments": {
733
+ "input": {
734
+ },
735
+ "output": {
736
+ }
737
+ },
738
+ "description": "The following command lists the aliases for the current account.",
739
+ "id": "e27b457a-16f9-4e05-a006-3df7b3472741",
740
+ "title": "To list account aliases"
741
+ }
742
+ ],
743
+ "ListGroupPolicies": [
744
+ {
745
+ "input": {
746
+ "GroupName": "Admins"
747
+ },
748
+ "output": {
749
+ "PolicyNames": [
750
+ "AdminRoot",
751
+ "KeyPolicy"
752
+ ]
753
+ },
754
+ "comments": {
755
+ "input": {
756
+ },
757
+ "output": {
758
+ }
759
+ },
760
+ "description": "The following command lists the names of in-line policies that are embedded in the IAM group named Admins.",
761
+ "id": "02de5095-2410-4d3a-ac1b-cc40234af68f",
762
+ "title": "To list the in-line policies for an IAM group"
763
+ }
764
+ ],
765
+ "ListGroups": [
766
+ {
767
+ "input": {
768
+ },
769
+ "output": {
770
+ "Groups": [
771
+ {
772
+ "Arn": "arn:aws:iam::123456789012:group/Admins",
773
+ "CreateDate": "2016-12-15T21:40:08.121Z",
774
+ "GroupId": "AGPA1111111111EXAMPLE",
775
+ "GroupName": "Admins",
776
+ "Path": "/division_abc/subdivision_xyz/"
777
+ },
778
+ {
779
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
780
+ "CreateDate": "2016-11-30T14:10:01.156Z",
781
+ "GroupId": "AGP22222222222EXAMPLE",
782
+ "GroupName": "Test",
783
+ "Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
784
+ },
785
+ {
786
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
787
+ "CreateDate": "2016-06-12T20:14:52.032Z",
788
+ "GroupId": "AGPI3333333333EXAMPLE",
789
+ "GroupName": "Managers",
790
+ "Path": "/division_abc/subdivision_xyz/product_1234/"
791
+ }
792
+ ]
793
+ },
794
+ "comments": {
795
+ "input": {
796
+ },
797
+ "output": {
798
+ }
799
+ },
800
+ "description": "The following command lists the IAM groups in the current account:",
801
+ "id": "b3ab1380-2a21-42fb-8e85-503f65512c66",
802
+ "title": "To list the IAM groups for the current account"
803
+ }
804
+ ],
805
+ "ListGroupsForUser": [
806
+ {
807
+ "input": {
808
+ "UserName": "Bob"
809
+ },
810
+ "output": {
811
+ "Groups": [
812
+ {
813
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
814
+ "CreateDate": "2016-11-30T14:10:01.156Z",
815
+ "GroupId": "AGP2111111111EXAMPLE",
816
+ "GroupName": "Test",
817
+ "Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
818
+ },
819
+ {
820
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
821
+ "CreateDate": "2016-06-12T20:14:52.032Z",
822
+ "GroupId": "AGPI222222222SEXAMPLE",
823
+ "GroupName": "Managers",
824
+ "Path": "/division_abc/subdivision_xyz/product_1234/"
825
+ }
826
+ ]
827
+ },
828
+ "comments": {
829
+ "input": {
830
+ },
831
+ "output": {
832
+ }
833
+ },
834
+ "description": "The following command displays the groups that the IAM user named Bob belongs to.",
835
+ "id": "278ec2ee-fc28-4136-83fb-433af0ae46a2",
836
+ "title": "To list the groups that an IAM user belongs to"
837
+ }
838
+ ],
839
+ "ListSigningCertificates": [
840
+ {
841
+ "input": {
842
+ "UserName": "Bob"
843
+ },
844
+ "output": {
845
+ "Certificates": [
846
+ {
847
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
848
+ "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
849
+ "Status": "Active",
850
+ "UploadDate": "2013-06-06T21:40:08Z",
851
+ "UserName": "Bob"
852
+ }
853
+ ]
854
+ },
855
+ "comments": {
856
+ "input": {
857
+ },
858
+ "output": {
859
+ }
860
+ },
861
+ "description": "The following command lists the signing certificates for the IAM user named Bob.",
862
+ "id": "b4c10256-4fc9-457e-b3fd-4a110d4d73dc",
863
+ "title": "To list the signing certificates for an IAM user"
864
+ }
865
+ ],
866
+ "ListUsers": [
867
+ {
868
+ "input": {
869
+ },
870
+ "output": {
871
+ "Users": [
872
+ {
873
+ "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Juan",
874
+ "CreateDate": "2012-09-05T19:38:48Z",
875
+ "PasswordLastUsed": "2016-09-08T21:47:36Z",
876
+ "Path": "/division_abc/subdivision_xyz/engineering/",
877
+ "UserId": "AID2MAB8DPLSRHEXAMPLE",
878
+ "UserName": "Juan"
879
+ },
880
+ {
881
+ "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Anika",
882
+ "CreateDate": "2014-04-09T15:43:45Z",
883
+ "PasswordLastUsed": "2016-09-24T16:18:07Z",
884
+ "Path": "/division_abc/subdivision_xyz/engineering/",
885
+ "UserId": "AIDIODR4TAW7CSEXAMPLE",
886
+ "UserName": "Anika"
887
+ }
888
+ ]
889
+ },
890
+ "comments": {
891
+ "input": {
892
+ },
893
+ "output": {
894
+ }
895
+ },
896
+ "description": "The following command lists the IAM users in the current account.",
897
+ "id": "9edfbd73-03d8-4d8a-9a79-76c85e8c8298",
898
+ "title": "To list IAM users"
899
+ }
900
+ ],
901
+ "ListVirtualMFADevices": [
902
+ {
903
+ "input": {
904
+ },
905
+ "output": {
906
+ "VirtualMFADevices": [
907
+ {
908
+ "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleMFADevice"
909
+ },
910
+ {
911
+ "SerialNumber": "arn:aws:iam::123456789012:mfa/Juan"
912
+ }
913
+ ]
914
+ },
915
+ "comments": {
916
+ "input": {
917
+ },
918
+ "output": {
919
+ }
920
+ },
921
+ "description": "The following command lists the virtual MFA devices that have been configured for the current account.",
922
+ "id": "54f9ac18-5100-4070-bec4-fe5f612710d5",
923
+ "title": "To list virtual MFA devices"
924
+ }
925
+ ],
926
+ "PutGroupPolicy": [
927
+ {
928
+ "input": {
929
+ "GroupName": "Admins",
930
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
931
+ "PolicyName": "AllPerms"
932
+ },
933
+ "comments": {
934
+ "input": {
935
+ },
936
+ "output": {
937
+ }
938
+ },
939
+ "description": "The following command adds a policy named AllPerms to the IAM group named Admins.",
940
+ "id": "4bc17418-758f-4d0f-ab0c-4d00265fec2e",
941
+ "title": "To add a policy to a group"
942
+ }
943
+ ],
944
+ "PutRolePolicy": [
945
+ {
946
+ "input": {
947
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"s3:*\",\"Resource\":\"*\"}}",
948
+ "PolicyName": "S3AccessPolicy",
949
+ "RoleName": "S3Access"
950
+ },
951
+ "comments": {
952
+ "input": {
953
+ },
954
+ "output": {
955
+ }
956
+ },
957
+ "description": "The following command adds a permissions policy to the role named Test-Role.",
958
+ "id": "de62fd00-46c7-4601-9e0d-71d5fbb11ecb",
959
+ "title": "To attach a permissions policy to an IAM role"
960
+ }
961
+ ],
962
+ "PutUserPolicy": [
963
+ {
964
+ "input": {
965
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
966
+ "PolicyName": "AllAccessPolicy",
967
+ "UserName": "Bob"
968
+ },
969
+ "comments": {
970
+ "input": {
971
+ },
972
+ "output": {
973
+ }
974
+ },
975
+ "description": "The following command attaches a policy to the IAM user named Bob.",
976
+ "id": "2551ffc6-3576-4d39-823f-30b60bffc2c7",
977
+ "title": "To attach a policy to an IAM user"
978
+ }
979
+ ],
980
+ "RemoveRoleFromInstanceProfile": [
981
+ {
982
+ "input": {
983
+ "InstanceProfileName": "ExampleInstanceProfile",
984
+ "RoleName": "Test-Role"
985
+ },
986
+ "comments": {
987
+ "input": {
988
+ },
989
+ "output": {
990
+ }
991
+ },
992
+ "description": "The following command removes the role named Test-Role from the instance profile named ExampleInstanceProfile.",
993
+ "id": "6d9f46f1-9f4a-4873-b403-51a85c5c627c",
994
+ "title": "To remove a role from an instance profile"
995
+ }
996
+ ],
997
+ "RemoveUserFromGroup": [
998
+ {
999
+ "input": {
1000
+ "GroupName": "Admins",
1001
+ "UserName": "Bob"
1002
+ },
1003
+ "comments": {
1004
+ "input": {
1005
+ },
1006
+ "output": {
1007
+ }
1008
+ },
1009
+ "description": "The following command removes the user named Bob from the IAM group named Admins.",
1010
+ "id": "fb54d5b4-0caf-41d8-af0e-10a84413f174",
1011
+ "title": "To remove a user from an IAM group"
1012
+ }
1013
+ ],
1014
+ "UpdateAccessKey": [
1015
+ {
1016
+ "input": {
1017
+ "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
1018
+ "Status": "Inactive",
1019
+ "UserName": "Bob"
1020
+ },
1021
+ "comments": {
1022
+ "input": {
1023
+ },
1024
+ "output": {
1025
+ }
1026
+ },
1027
+ "description": "The following command deactivates the specified access key (access key ID and secret access key) for the IAM user named Bob.",
1028
+ "id": "02b556fd-e673-49b7-ab6b-f2f9035967d0",
1029
+ "title": "To activate or deactivate an access key for an IAM user"
1030
+ }
1031
+ ],
1032
+ "UpdateAccountPasswordPolicy": [
1033
+ {
1034
+ "input": {
1035
+ "MinimumPasswordLength": 8,
1036
+ "RequireNumbers": true
1037
+ },
1038
+ "comments": {
1039
+ "input": {
1040
+ },
1041
+ "output": {
1042
+ }
1043
+ },
1044
+ "description": "The following command sets the password policy to require a minimum length of eight characters and to require one or more numbers in the password:",
1045
+ "id": "c263a1af-37dc-4423-8dba-9790284ef5e0",
1046
+ "title": "To set or change the current account password policy"
1047
+ }
1048
+ ],
1049
+ "UpdateAssumeRolePolicy": [
1050
+ {
1051
+ "input": {
1052
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}",
1053
+ "RoleName": "S3AccessForEC2Instances"
1054
+ },
1055
+ "comments": {
1056
+ "input": {
1057
+ },
1058
+ "output": {
1059
+ }
1060
+ },
1061
+ "description": "The following command updates the role trust policy for the role named Test-Role:",
1062
+ "id": "c9150063-d953-4e99-9576-9685872006c6",
1063
+ "title": "To update the trust policy for an IAM role"
1064
+ }
1065
+ ],
1066
+ "UpdateGroup": [
1067
+ {
1068
+ "input": {
1069
+ "GroupName": "Test",
1070
+ "NewGroupName": "Test-1"
1071
+ },
1072
+ "comments": {
1073
+ "input": {
1074
+ },
1075
+ "output": {
1076
+ }
1077
+ },
1078
+ "description": "The following command changes the name of the IAM group Test to Test-1.",
1079
+ "id": "f0cf1662-91ae-4278-a80e-7db54256ccba",
1080
+ "title": "To rename an IAM group"
1081
+ }
1082
+ ],
1083
+ "UpdateLoginProfile": [
1084
+ {
1085
+ "input": {
1086
+ "Password": "SomeKindOfPassword123!@#",
1087
+ "UserName": "Bob"
1088
+ },
1089
+ "comments": {
1090
+ "input": {
1091
+ },
1092
+ "output": {
1093
+ }
1094
+ },
1095
+ "description": "The following command creates or changes the password for the IAM user named Bob.",
1096
+ "id": "036d9498-ecdb-4ed6-a8d8-366c383d1487",
1097
+ "title": "To change the password for an IAM user"
1098
+ }
1099
+ ],
1100
+ "UpdateSigningCertificate": [
1101
+ {
1102
+ "input": {
1103
+ "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
1104
+ "Status": "Inactive",
1105
+ "UserName": "Bob"
1106
+ },
1107
+ "comments": {
1108
+ "input": {
1109
+ },
1110
+ "output": {
1111
+ }
1112
+ },
1113
+ "description": "The following command changes the status of a signing certificate for a user named Bob to Inactive.",
1114
+ "id": "829aee7b-efc5-4b3b-84a5-7f899b38018d",
1115
+ "title": "To change the active status of a signing certificate for an IAM user"
1116
+ }
1117
+ ],
1118
+ "UpdateUser": [
1119
+ {
1120
+ "input": {
1121
+ "NewUserName": "Robert",
1122
+ "UserName": "Bob"
1123
+ },
1124
+ "comments": {
1125
+ "input": {
1126
+ },
1127
+ "output": {
1128
+ }
1129
+ },
1130
+ "description": "The following command changes the name of the IAM user Bob to Robert. It does not change the user's path.",
1131
+ "id": "275d53ed-347a-44e6-b7d0-a96276154352",
1132
+ "title": "To change an IAM user's name"
1133
+ }
1134
+ ],
1135
+ "UploadServerCertificate": [
1136
+ {
1137
+ "input": {
1138
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<a very long certificate text string>-----END CERTIFICATE-----",
1139
+ "Path": "/company/servercerts/",
1140
+ "PrivateKey": "-----BEGIN DSA PRIVATE KEY-----<a very long private key string>-----END DSA PRIVATE KEY-----",
1141
+ "ServerCertificateName": "ProdServerCert"
1142
+ },
1143
+ "output": {
1144
+ "ServerCertificateMetadata": {
1145
+ "Arn": "arn:aws:iam::123456789012:server-certificate/company/servercerts/ProdServerCert",
1146
+ "Expiration": "2012-05-08T01:02:03.004Z",
1147
+ "Path": "/company/servercerts/",
1148
+ "ServerCertificateId": "ASCA1111111111EXAMPLE",
1149
+ "ServerCertificateName": "ProdServerCert",
1150
+ "UploadDate": "2010-05-08T01:02:03.004Z"
1151
+ }
1152
+ },
1153
+ "comments": {
1154
+ "input": {
1155
+ },
1156
+ "output": {
1157
+ }
1158
+ },
1159
+ "description": "The following upload-server-certificate command uploads a server certificate to your AWS account:",
1160
+ "id": "06eab6d1-ebf2-4bd9-839d-f7508b9a38b6",
1161
+ "title": "To upload a server certificate to your AWS account"
1162
+ }
1163
+ ],
1164
+ "UploadSigningCertificate": [
1165
+ {
1166
+ "input": {
1167
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
1168
+ "UserName": "Bob"
1169
+ },
1170
+ "output": {
1171
+ "Certificate": {
1172
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
1173
+ "CertificateId": "ID123456789012345EXAMPLE",
1174
+ "Status": "Active",
1175
+ "UploadDate": "2015-06-06T21:40:08.121Z",
1176
+ "UserName": "Bob"
1177
+ }
1178
+ },
1179
+ "comments": {
1180
+ "input": {
1181
+ },
1182
+ "output": {
1183
+ }
1184
+ },
1185
+ "description": "The following command uploads a signing certificate for the IAM user named Bob.",
1186
+ "id": "e67489b6-7b73-4e30-9ed3-9a9e0231e458",
1187
+ "title": "To upload a signing certificate for an IAM user"
1188
+ }
1189
+ ]
4
1190
  }
5
1191
  }