aws-sdk-core 3.113.1 → 3.118.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -74,6 +74,7 @@ module Aws::STS
74
74
  roleSessionNameType = Shapes::StringShape.new(name: 'roleSessionNameType')
75
75
  serialNumberType = Shapes::StringShape.new(name: 'serialNumberType')
76
76
  sessionPolicyDocumentType = Shapes::StringShape.new(name: 'sessionPolicyDocumentType')
77
+ sourceIdentityType = Shapes::StringShape.new(name: 'sourceIdentityType')
77
78
  tagKeyListType = Shapes::ListShape.new(name: 'tagKeyListType')
78
79
  tagKeyType = Shapes::StringShape.new(name: 'tagKeyType')
79
80
  tagListType = Shapes::ListShape.new(name: 'tagListType')
@@ -95,11 +96,13 @@ module Aws::STS
95
96
  AssumeRoleRequest.add_member(:external_id, Shapes::ShapeRef.new(shape: externalIdType, location_name: "ExternalId"))
96
97
  AssumeRoleRequest.add_member(:serial_number, Shapes::ShapeRef.new(shape: serialNumberType, location_name: "SerialNumber"))
97
98
  AssumeRoleRequest.add_member(:token_code, Shapes::ShapeRef.new(shape: tokenCodeType, location_name: "TokenCode"))
99
+ AssumeRoleRequest.add_member(:source_identity, Shapes::ShapeRef.new(shape: sourceIdentityType, location_name: "SourceIdentity"))
98
100
  AssumeRoleRequest.struct_class = Types::AssumeRoleRequest
99
101
 
100
102
  AssumeRoleResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
101
103
  AssumeRoleResponse.add_member(:assumed_role_user, Shapes::ShapeRef.new(shape: AssumedRoleUser, location_name: "AssumedRoleUser"))
102
104
  AssumeRoleResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
105
+ AssumeRoleResponse.add_member(:source_identity, Shapes::ShapeRef.new(shape: sourceIdentityType, location_name: "SourceIdentity"))
103
106
  AssumeRoleResponse.struct_class = Types::AssumeRoleResponse
104
107
 
105
108
  AssumeRoleWithSAMLRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "RoleArn"))
@@ -118,6 +121,7 @@ module Aws::STS
118
121
  AssumeRoleWithSAMLResponse.add_member(:issuer, Shapes::ShapeRef.new(shape: Issuer, location_name: "Issuer"))
119
122
  AssumeRoleWithSAMLResponse.add_member(:audience, Shapes::ShapeRef.new(shape: Audience, location_name: "Audience"))
120
123
  AssumeRoleWithSAMLResponse.add_member(:name_qualifier, Shapes::ShapeRef.new(shape: NameQualifier, location_name: "NameQualifier"))
124
+ AssumeRoleWithSAMLResponse.add_member(:source_identity, Shapes::ShapeRef.new(shape: sourceIdentityType, location_name: "SourceIdentity"))
121
125
  AssumeRoleWithSAMLResponse.struct_class = Types::AssumeRoleWithSAMLResponse
122
126
 
123
127
  AssumeRoleWithWebIdentityRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "RoleArn"))
@@ -135,6 +139,7 @@ module Aws::STS
135
139
  AssumeRoleWithWebIdentityResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
136
140
  AssumeRoleWithWebIdentityResponse.add_member(:provider, Shapes::ShapeRef.new(shape: Issuer, location_name: "Provider"))
137
141
  AssumeRoleWithWebIdentityResponse.add_member(:audience, Shapes::ShapeRef.new(shape: Audience, location_name: "Audience"))
142
+ AssumeRoleWithWebIdentityResponse.add_member(:source_identity, Shapes::ShapeRef.new(shape: sourceIdentityType, location_name: "SourceIdentity"))
138
143
  AssumeRoleWithWebIdentityResponse.struct_class = Types::AssumeRoleWithWebIdentityResponse
139
144
 
140
145
  AssumedRoleUser.add_member(:assumed_role_id, Shapes::ShapeRef.new(shape: assumedRoleIdType, required: true, location_name: "AssumedRoleId"))
@@ -33,6 +33,7 @@ module Aws::STS
33
33
  # external_id: "externalIdType",
34
34
  # serial_number: "serialNumberType",
35
35
  # token_code: "tokenCodeType",
36
+ # source_identity: "sourceIdentityType",
36
37
  # }
37
38
  #
38
39
  # @!attribute [rw] role_arn
@@ -49,7 +50,7 @@ module Aws::STS
49
50
  # role session name is also used in the ARN of the assumed role
50
51
  # principal. This means that subsequent cross-account API requests
51
52
  # that use the temporary security credentials will expose the role
52
- # session name to the external account in their AWS CloudTrail logs.
53
+ # session name to the external account in their CloudTrail logs.
53
54
  #
54
55
  # The regex used to validate this parameter is a string of characters
55
56
  # consisting of upper- and lower-case alphanumeric characters with no
@@ -63,17 +64,18 @@ module Aws::STS
63
64
  # in the same account as the role.
64
65
  #
65
66
  # This parameter is optional. You can provide up to 10 managed policy
66
- # ARNs. However, the plain text that you use for both inline and
67
+ # ARNs. However, the plaintext that you use for both inline and
67
68
  # managed session policies can't exceed 2,048 characters. For more
68
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
69
- # Service Namespaces][1] in the AWS General Reference.
69
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
70
+ # Web Services Service Namespaces][1] in the Amazon Web Services
71
+ # General Reference.
70
72
  #
71
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
72
- # tags into a packed binary format that has a separate limit. Your
73
- # request can fail for this limit even if your plain text meets the
74
- # other requirements. The `PackedPolicySize` response element
75
- # indicates by percentage how close the policies and tags for your
76
- # request are to the upper size limit.
73
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
74
+ # policies and session tags into a packed binary format that has a
75
+ # separate limit. Your request can fail for this limit even if your
76
+ # plaintext meets the other requirements. The `PackedPolicySize`
77
+ # response element indicates by percentage how close the policies and
78
+ # tags for your request are to the upper size limit.
77
79
  #
78
80
  # </note>
79
81
  #
@@ -81,10 +83,10 @@ module Aws::STS
81
83
  # credentials. The resulting session's permissions are the
82
84
  # intersection of the role's identity-based policy and the session
83
85
  # policies. You can use the role's temporary credentials in
84
- # subsequent AWS API calls to access resources in the account that
85
- # owns the role. You cannot use session policies to grant more
86
- # permissions than those allowed by the identity-based policy of the
87
- # role that is being assumed. For more information, see [Session
86
+ # subsequent Amazon Web Services API calls to access resources in the
87
+ # account that owns the role. You cannot use session policies to grant
88
+ # more permissions than those allowed by the identity-based policy of
89
+ # the role that is being assumed. For more information, see [Session
88
90
  # Policies][2] in the *IAM User Guide*.
89
91
  #
90
92
  #
@@ -101,25 +103,25 @@ module Aws::STS
101
103
  # returns new temporary credentials. The resulting session's
102
104
  # permissions are the intersection of the role's identity-based
103
105
  # policy and the session policies. You can use the role's temporary
104
- # credentials in subsequent AWS API calls to access resources in the
105
- # account that owns the role. You cannot use session policies to grant
106
- # more permissions than those allowed by the identity-based policy of
107
- # the role that is being assumed. For more information, see [Session
108
- # Policies][1] in the *IAM User Guide*.
106
+ # credentials in subsequent Amazon Web Services API calls to access
107
+ # resources in the account that owns the role. You cannot use session
108
+ # policies to grant more permissions than those allowed by the
109
+ # identity-based policy of the role that is being assumed. For more
110
+ # information, see [Session Policies][1] in the *IAM User Guide*.
109
111
  #
110
- # The plain text that you use for both inline and managed session
112
+ # The plaintext that you use for both inline and managed session
111
113
  # policies can't exceed 2,048 characters. The JSON policy characters
112
114
  # can be any ASCII character from the space character to the end of
113
115
  # the valid character list (\\u0020 through \\u00FF). It can also
114
116
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
115
117
  # (\\u000D) characters.
116
118
  #
117
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
118
- # tags into a packed binary format that has a separate limit. Your
119
- # request can fail for this limit even if your plain text meets the
120
- # other requirements. The `PackedPolicySize` response element
121
- # indicates by percentage how close the policies and tags for your
122
- # request are to the upper size limit.
119
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
120
+ # policies and session tags into a packed binary format that has a
121
+ # separate limit. Your request can fail for this limit even if your
122
+ # plaintext meets the other requirements. The `PackedPolicySize`
123
+ # response element indicates by percentage how close the policies and
124
+ # tags for your request are to the upper size limit.
123
125
  #
124
126
  # </note>
125
127
  #
@@ -129,15 +131,17 @@ module Aws::STS
129
131
  # @return [String]
130
132
  #
131
133
  # @!attribute [rw] duration_seconds
132
- # The duration, in seconds, of the role session. The value can range
133
- # from 900 seconds (15 minutes) up to the maximum session duration
134
- # setting for the role. This setting can have a value from 1 hour to
135
- # 12 hours. If you specify a value higher than this setting, the
136
- # operation fails. For example, if you specify a session duration of
137
- # 12 hours, but your administrator set the maximum session duration to
138
- # 6 hours, your operation fails. To learn how to view the maximum
139
- # value for your role, see [View the Maximum Session Duration Setting
140
- # for a Role][1] in the *IAM User Guide*.
134
+ # The duration, in seconds, of the role session. The value specified
135
+ # can can range from 900 seconds (15 minutes) up to the maximum
136
+ # session duration that is set for the role. The maximum session
137
+ # duration setting can have a value from 1 hour to 12 hours. If you
138
+ # specify a value higher than this setting or the administrator
139
+ # setting (whichever is lower), the operation fails. For example, if
140
+ # you specify a session duration of 12 hours, but your administrator
141
+ # set the maximum session duration to 6 hours, your operation fails.
142
+ # To learn how to view the maximum value for your role, see [View the
143
+ # Maximum Session Duration Setting for a Role][1] in the *IAM User
144
+ # Guide*.
141
145
  #
142
146
  # By default, the value is set to `3600` seconds.
143
147
  #
@@ -146,7 +150,7 @@ module Aws::STS
146
150
  # credentials. The request to the federation endpoint for a console
147
151
  # sign-in token takes a `SessionDuration` parameter that specifies the
148
152
  # maximum length of the console session. For more information, see
149
- # [Creating a URL that Enables Federated Users to Access the AWS
153
+ # [Creating a URL that Enables Federated Users to Access the
150
154
  # Management Console][2] in the *IAM User Guide*.
151
155
  #
152
156
  # </note>
@@ -160,20 +164,20 @@ module Aws::STS
160
164
  # @!attribute [rw] tags
161
165
  # A list of session tags that you want to pass. Each session tag
162
166
  # consists of a key name and an associated value. For more information
163
- # about session tags, see [Tagging AWS STS Sessions][1] in the *IAM
164
- # User Guide*.
167
+ # about session tags, see [Tagging STS Sessions][1] in the *IAM User
168
+ # Guide*.
165
169
  #
166
170
  # This parameter is optional. You can pass up to 50 session tags. The
167
- # plain text session tag keys can’t exceed 128 characters, and the
171
+ # plaintext session tag keys can’t exceed 128 characters, and the
168
172
  # values can’t exceed 256 characters. For these and additional limits,
169
173
  # see [IAM and STS Character Limits][2] in the *IAM User Guide*.
170
174
  #
171
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
172
- # tags into a packed binary format that has a separate limit. Your
173
- # request can fail for this limit even if your plain text meets the
174
- # other requirements. The `PackedPolicySize` response element
175
- # indicates by percentage how close the policies and tags for your
176
- # request are to the upper size limit.
175
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
176
+ # policies and session tags into a packed binary format that has a
177
+ # separate limit. Your request can fail for this limit even if your
178
+ # plaintext meets the other requirements. The `PackedPolicySize`
179
+ # response element indicates by percentage how close the policies and
180
+ # tags for your request are to the upper size limit.
177
181
  #
178
182
  # </note>
179
183
  #
@@ -193,8 +197,8 @@ module Aws::STS
193
197
  # operation, the new session inherits any transitive session tags from
194
198
  # the calling session. If you pass a session tag with the same key as
195
199
  # an inherited tag, the operation fails. To view the inherited tags
196
- # for a session, see the AWS CloudTrail logs. For more information,
197
- # see [Viewing Session Tags in CloudTrail][3] in the *IAM User Guide*.
200
+ # for a session, see the CloudTrail logs. For more information, see
201
+ # [Viewing Session Tags in CloudTrail][3] in the *IAM User Guide*.
198
202
  #
199
203
  #
200
204
  #
@@ -232,8 +236,8 @@ module Aws::STS
232
236
  # the administrator of the trusted account. That way, only someone
233
237
  # with the ID can assume the role, rather than everyone in the
234
238
  # account. For more information about the external ID, see [How to Use
235
- # an External ID When Granting Access to Your AWS Resources to a Third
236
- # Party][1] in the *IAM User Guide*.
239
+ # an External ID When Granting Access to Your Amazon Web Services
240
+ # Resources to a Third Party][1] in the *IAM User Guide*.
237
241
  #
238
242
  # The regex used to validate this parameter is a string of characters
239
243
  # consisting of upper- and lower-case alphanumeric characters with no
@@ -262,15 +266,41 @@ module Aws::STS
262
266
  #
263
267
  # @!attribute [rw] token_code
264
268
  # The value provided by the MFA device, if the trust policy of the
265
- # role being assumed requires MFA (that is, if the policy includes a
266
- # condition that tests for MFA). If the role being assumed requires
267
- # MFA and if the `TokenCode` value is missing or expired, the
269
+ # role being assumed requires MFA. (In other words, if the policy
270
+ # includes a condition that tests for MFA). If the role being assumed
271
+ # requires MFA and if the `TokenCode` value is missing or expired, the
268
272
  # `AssumeRole` call returns an "access denied" error.
269
273
  #
270
274
  # The format for this parameter, as described by its regex pattern, is
271
275
  # a sequence of six numeric digits.
272
276
  # @return [String]
273
277
  #
278
+ # @!attribute [rw] source_identity
279
+ # The source identity specified by the principal that is calling the
280
+ # `AssumeRole` operation.
281
+ #
282
+ # You can require users to specify a source identity when they assume
283
+ # a role. You do this by using the `sts:SourceIdentity` condition key
284
+ # in a role trust policy. You can use source identity information in
285
+ # CloudTrail logs to determine who took actions with a role. You can
286
+ # use the `aws:SourceIdentity` condition key to further control access
287
+ # to Amazon Web Services resources based on the value of source
288
+ # identity. For more information about using source identity, see
289
+ # [Monitor and control actions taken with assumed roles][1] in the
290
+ # *IAM User Guide*.
291
+ #
292
+ # The regex used to validate this parameter is a string of characters
293
+ # consisting of upper- and lower-case alphanumeric characters with no
294
+ # spaces. You can also include underscores or any of the following
295
+ # characters: =,.@-. You cannot use a value that begins with the text
296
+ # `aws:`. This prefix is reserved for Amazon Web Services internal
297
+ # use.
298
+ #
299
+ #
300
+ #
301
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
302
+ # @return [String]
303
+ #
274
304
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleRequest AWS API Documentation
275
305
  #
276
306
  class AssumeRoleRequest < Struct.new(
@@ -283,13 +313,15 @@ module Aws::STS
283
313
  :transitive_tag_keys,
284
314
  :external_id,
285
315
  :serial_number,
286
- :token_code)
316
+ :token_code,
317
+ :source_identity)
287
318
  SENSITIVE = []
288
319
  include Aws::Structure
289
320
  end
290
321
 
291
322
  # Contains the response to a successful AssumeRole request, including
292
- # temporary AWS credentials that can be used to make AWS requests.
323
+ # temporary Amazon Web Services credentials that can be used to make
324
+ # Amazon Web Services requests.
293
325
  #
294
326
  # @!attribute [rw] credentials
295
327
  # The temporary security credentials, which include an access key ID,
@@ -318,12 +350,37 @@ module Aws::STS
318
350
  # means the policies and tags exceeded the allowed space.
319
351
  # @return [Integer]
320
352
  #
353
+ # @!attribute [rw] source_identity
354
+ # The source identity specified by the principal that is calling the
355
+ # `AssumeRole` operation.
356
+ #
357
+ # You can require users to specify a source identity when they assume
358
+ # a role. You do this by using the `sts:SourceIdentity` condition key
359
+ # in a role trust policy. You can use source identity information in
360
+ # CloudTrail logs to determine who took actions with a role. You can
361
+ # use the `aws:SourceIdentity` condition key to further control access
362
+ # to Amazon Web Services resources based on the value of source
363
+ # identity. For more information about using source identity, see
364
+ # [Monitor and control actions taken with assumed roles][1] in the
365
+ # *IAM User Guide*.
366
+ #
367
+ # The regex used to validate this parameter is a string of characters
368
+ # consisting of upper- and lower-case alphanumeric characters with no
369
+ # spaces. You can also include underscores or any of the following
370
+ # characters: =,.@-
371
+ #
372
+ #
373
+ #
374
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
375
+ # @return [String]
376
+ #
321
377
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleResponse AWS API Documentation
322
378
  #
323
379
  class AssumeRoleResponse < Struct.new(
324
380
  :credentials,
325
381
  :assumed_role_user,
326
- :packed_policy_size)
382
+ :packed_policy_size,
383
+ :source_identity)
327
384
  SENSITIVE = []
328
385
  include Aws::Structure
329
386
  end
@@ -355,8 +412,7 @@ module Aws::STS
355
412
  # @return [String]
356
413
  #
357
414
  # @!attribute [rw] saml_assertion
358
- # The base-64 encoded SAML authentication response provided by the
359
- # IdP.
415
+ # The base64 encoded SAML authentication response provided by the IdP.
360
416
  #
361
417
  # For more information, see [Configuring a Relying Party and Adding
362
418
  # Claims][1] in the *IAM User Guide*.
@@ -372,17 +428,18 @@ module Aws::STS
372
428
  # in the same account as the role.
373
429
  #
374
430
  # This parameter is optional. You can provide up to 10 managed policy
375
- # ARNs. However, the plain text that you use for both inline and
431
+ # ARNs. However, the plaintext that you use for both inline and
376
432
  # managed session policies can't exceed 2,048 characters. For more
377
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
378
- # Service Namespaces][1] in the AWS General Reference.
433
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
434
+ # Web Services Service Namespaces][1] in the Amazon Web Services
435
+ # General Reference.
379
436
  #
380
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
381
- # tags into a packed binary format that has a separate limit. Your
382
- # request can fail for this limit even if your plain text meets the
383
- # other requirements. The `PackedPolicySize` response element
384
- # indicates by percentage how close the policies and tags for your
385
- # request are to the upper size limit.
437
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
438
+ # policies and session tags into a packed binary format that has a
439
+ # separate limit. Your request can fail for this limit even if your
440
+ # plaintext meets the other requirements. The `PackedPolicySize`
441
+ # response element indicates by percentage how close the policies and
442
+ # tags for your request are to the upper size limit.
386
443
  #
387
444
  # </note>
388
445
  #
@@ -390,10 +447,10 @@ module Aws::STS
390
447
  # credentials. The resulting session's permissions are the
391
448
  # intersection of the role's identity-based policy and the session
392
449
  # policies. You can use the role's temporary credentials in
393
- # subsequent AWS API calls to access resources in the account that
394
- # owns the role. You cannot use session policies to grant more
395
- # permissions than those allowed by the identity-based policy of the
396
- # role that is being assumed. For more information, see [Session
450
+ # subsequent Amazon Web Services API calls to access resources in the
451
+ # account that owns the role. You cannot use session policies to grant
452
+ # more permissions than those allowed by the identity-based policy of
453
+ # the role that is being assumed. For more information, see [Session
397
454
  # Policies][2] in the *IAM User Guide*.
398
455
  #
399
456
  #
@@ -410,25 +467,25 @@ module Aws::STS
410
467
  # returns new temporary credentials. The resulting session's
411
468
  # permissions are the intersection of the role's identity-based
412
469
  # policy and the session policies. You can use the role's temporary
413
- # credentials in subsequent AWS API calls to access resources in the
414
- # account that owns the role. You cannot use session policies to grant
415
- # more permissions than those allowed by the identity-based policy of
416
- # the role that is being assumed. For more information, see [Session
417
- # Policies][1] in the *IAM User Guide*.
470
+ # credentials in subsequent Amazon Web Services API calls to access
471
+ # resources in the account that owns the role. You cannot use session
472
+ # policies to grant more permissions than those allowed by the
473
+ # identity-based policy of the role that is being assumed. For more
474
+ # information, see [Session Policies][1] in the *IAM User Guide*.
418
475
  #
419
- # The plain text that you use for both inline and managed session
476
+ # The plaintext that you use for both inline and managed session
420
477
  # policies can't exceed 2,048 characters. The JSON policy characters
421
478
  # can be any ASCII character from the space character to the end of
422
479
  # the valid character list (\\u0020 through \\u00FF). It can also
423
480
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
424
481
  # (\\u000D) characters.
425
482
  #
426
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
427
- # tags into a packed binary format that has a separate limit. Your
428
- # request can fail for this limit even if your plain text meets the
429
- # other requirements. The `PackedPolicySize` response element
430
- # indicates by percentage how close the policies and tags for your
431
- # request are to the upper size limit.
483
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
484
+ # policies and session tags into a packed binary format that has a
485
+ # separate limit. Your request can fail for this limit even if your
486
+ # plaintext meets the other requirements. The `PackedPolicySize`
487
+ # response element indicates by percentage how close the policies and
488
+ # tags for your request are to the upper size limit.
432
489
  #
433
490
  # </note>
434
491
  #
@@ -459,7 +516,7 @@ module Aws::STS
459
516
  # credentials. The request to the federation endpoint for a console
460
517
  # sign-in token takes a `SessionDuration` parameter that specifies the
461
518
  # maximum length of the console session. For more information, see
462
- # [Creating a URL that Enables Federated Users to Access the AWS
519
+ # [Creating a URL that Enables Federated Users to Access the
463
520
  # Management Console][2] in the *IAM User Guide*.
464
521
  #
465
522
  # </note>
@@ -484,8 +541,8 @@ module Aws::STS
484
541
  end
485
542
 
486
543
  # Contains the response to a successful AssumeRoleWithSAML request,
487
- # including temporary AWS credentials that can be used to make AWS
488
- # requests.
544
+ # including temporary Amazon Web Services credentials that can be used
545
+ # to make Amazon Web Services requests.
489
546
  #
490
547
  # @!attribute [rw] credentials
491
548
  # The temporary security credentials, which include an access key ID,
@@ -537,11 +594,17 @@ module Aws::STS
537
594
  # @return [String]
538
595
  #
539
596
  # @!attribute [rw] name_qualifier
540
- # A hash value based on the concatenation of the `Issuer` response
541
- # value, the AWS account ID, and the friendly name (the last part of
542
- # the ARN) of the SAML provider in IAM. The combination of
543
- # `NameQualifier` and `Subject` can be used to uniquely identify a
544
- # federated user.
597
+ # A hash value based on the concatenation of the following:
598
+ #
599
+ # * The `Issuer` response value.
600
+ #
601
+ # * The Amazon Web Services account ID.
602
+ #
603
+ # * The friendly name (the last part of the ARN) of the SAML provider
604
+ # in IAM.
605
+ #
606
+ # The combination of `NameQualifier` and `Subject` can be used to
607
+ # uniquely identify a federated user.
545
608
  #
546
609
  # The following pseudocode shows how the hash value is calculated:
547
610
  #
@@ -549,6 +612,34 @@ module Aws::STS
549
612
  # "/MySAMLIdP" ) )`
550
613
  # @return [String]
551
614
  #
615
+ # @!attribute [rw] source_identity
616
+ # The value in the `SourceIdentity` attribute in the SAML assertion.
617
+ #
618
+ # You can require users to set a source identity value when they
619
+ # assume a role. You do this by using the `sts:SourceIdentity`
620
+ # condition key in a role trust policy. That way, actions that are
621
+ # taken with the role are associated with that user. After the source
622
+ # identity is set, the value cannot be changed. It is present in the
623
+ # request for all actions that are taken by the role and persists
624
+ # across [chained role][1] sessions. You can configure your SAML
625
+ # identity provider to use an attribute associated with your users,
626
+ # like user name or email, as the source identity when calling
627
+ # `AssumeRoleWithSAML`. You do this by adding an attribute to the SAML
628
+ # assertion. For more information about using source identity, see
629
+ # [Monitor and control actions taken with assumed roles][2] in the
630
+ # *IAM User Guide*.
631
+ #
632
+ # The regex used to validate this parameter is a string of characters
633
+ # consisting of upper- and lower-case alphanumeric characters with no
634
+ # spaces. You can also include underscores or any of the following
635
+ # characters: =,.@-
636
+ #
637
+ #
638
+ #
639
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining
640
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
641
+ # @return [String]
642
+ #
552
643
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithSAMLResponse AWS API Documentation
553
644
  #
554
645
  class AssumeRoleWithSAMLResponse < Struct.new(
@@ -559,7 +650,8 @@ module Aws::STS
559
650
  :subject_type,
560
651
  :issuer,
561
652
  :audience,
562
- :name_qualifier)
653
+ :name_qualifier,
654
+ :source_identity)
563
655
  SENSITIVE = []
564
656
  include Aws::Structure
565
657
  end
@@ -626,17 +718,18 @@ module Aws::STS
626
718
  # in the same account as the role.
627
719
  #
628
720
  # This parameter is optional. You can provide up to 10 managed policy
629
- # ARNs. However, the plain text that you use for both inline and
721
+ # ARNs. However, the plaintext that you use for both inline and
630
722
  # managed session policies can't exceed 2,048 characters. For more
631
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
632
- # Service Namespaces][1] in the AWS General Reference.
723
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
724
+ # Web Services Service Namespaces][1] in the Amazon Web Services
725
+ # General Reference.
633
726
  #
634
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
635
- # tags into a packed binary format that has a separate limit. Your
636
- # request can fail for this limit even if your plain text meets the
637
- # other requirements. The `PackedPolicySize` response element
638
- # indicates by percentage how close the policies and tags for your
639
- # request are to the upper size limit.
727
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
728
+ # policies and session tags into a packed binary format that has a
729
+ # separate limit. Your request can fail for this limit even if your
730
+ # plaintext meets the other requirements. The `PackedPolicySize`
731
+ # response element indicates by percentage how close the policies and
732
+ # tags for your request are to the upper size limit.
640
733
  #
641
734
  # </note>
642
735
  #
@@ -644,10 +737,10 @@ module Aws::STS
644
737
  # credentials. The resulting session's permissions are the
645
738
  # intersection of the role's identity-based policy and the session
646
739
  # policies. You can use the role's temporary credentials in
647
- # subsequent AWS API calls to access resources in the account that
648
- # owns the role. You cannot use session policies to grant more
649
- # permissions than those allowed by the identity-based policy of the
650
- # role that is being assumed. For more information, see [Session
740
+ # subsequent Amazon Web Services API calls to access resources in the
741
+ # account that owns the role. You cannot use session policies to grant
742
+ # more permissions than those allowed by the identity-based policy of
743
+ # the role that is being assumed. For more information, see [Session
651
744
  # Policies][2] in the *IAM User Guide*.
652
745
  #
653
746
  #
@@ -664,25 +757,25 @@ module Aws::STS
664
757
  # returns new temporary credentials. The resulting session's
665
758
  # permissions are the intersection of the role's identity-based
666
759
  # policy and the session policies. You can use the role's temporary
667
- # credentials in subsequent AWS API calls to access resources in the
668
- # account that owns the role. You cannot use session policies to grant
669
- # more permissions than those allowed by the identity-based policy of
670
- # the role that is being assumed. For more information, see [Session
671
- # Policies][1] in the *IAM User Guide*.
760
+ # credentials in subsequent Amazon Web Services API calls to access
761
+ # resources in the account that owns the role. You cannot use session
762
+ # policies to grant more permissions than those allowed by the
763
+ # identity-based policy of the role that is being assumed. For more
764
+ # information, see [Session Policies][1] in the *IAM User Guide*.
672
765
  #
673
- # The plain text that you use for both inline and managed session
766
+ # The plaintext that you use for both inline and managed session
674
767
  # policies can't exceed 2,048 characters. The JSON policy characters
675
768
  # can be any ASCII character from the space character to the end of
676
769
  # the valid character list (\\u0020 through \\u00FF). It can also
677
770
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
678
771
  # (\\u000D) characters.
679
772
  #
680
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
681
- # tags into a packed binary format that has a separate limit. Your
682
- # request can fail for this limit even if your plain text meets the
683
- # other requirements. The `PackedPolicySize` response element
684
- # indicates by percentage how close the policies and tags for your
685
- # request are to the upper size limit.
773
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
774
+ # policies and session tags into a packed binary format that has a
775
+ # separate limit. Your request can fail for this limit even if your
776
+ # plaintext meets the other requirements. The `PackedPolicySize`
777
+ # response element indicates by percentage how close the policies and
778
+ # tags for your request are to the upper size limit.
686
779
  #
687
780
  # </note>
688
781
  #
@@ -709,7 +802,7 @@ module Aws::STS
709
802
  # credentials. The request to the federation endpoint for a console
710
803
  # sign-in token takes a `SessionDuration` parameter that specifies the
711
804
  # maximum length of the console session. For more information, see
712
- # [Creating a URL that Enables Federated Users to Access the AWS
805
+ # [Creating a URL that Enables Federated Users to Access the
713
806
  # Management Console][2] in the *IAM User Guide*.
714
807
  #
715
808
  # </note>
@@ -735,8 +828,8 @@ module Aws::STS
735
828
  end
736
829
 
737
830
  # Contains the response to a successful AssumeRoleWithWebIdentity
738
- # request, including temporary AWS credentials that can be used to make
739
- # AWS requests.
831
+ # request, including temporary Amazon Web Services credentials that can
832
+ # be used to make Amazon Web Services requests.
740
833
  #
741
834
  # @!attribute [rw] credentials
742
835
  # The temporary security credentials, which include an access key ID,
@@ -789,6 +882,38 @@ module Aws::STS
789
882
  # application that requested the web identity token.
790
883
  # @return [String]
791
884
  #
885
+ # @!attribute [rw] source_identity
886
+ # The value of the source identity that is returned in the JSON web
887
+ # token (JWT) from the identity provider.
888
+ #
889
+ # You can require users to set a source identity value when they
890
+ # assume a role. You do this by using the `sts:SourceIdentity`
891
+ # condition key in a role trust policy. That way, actions that are
892
+ # taken with the role are associated with that user. After the source
893
+ # identity is set, the value cannot be changed. It is present in the
894
+ # request for all actions that are taken by the role and persists
895
+ # across [chained role][1] sessions. You can configure your identity
896
+ # provider to use an attribute associated with your users, like user
897
+ # name or email, as the source identity when calling
898
+ # `AssumeRoleWithWebIdentity`. You do this by adding a claim to the
899
+ # JSON web token. To learn more about OIDC tokens and claims, see
900
+ # [Using Tokens with User Pools][2] in the *Amazon Cognito Developer
901
+ # Guide*. For more information about using source identity, see
902
+ # [Monitor and control actions taken with assumed roles][3] in the
903
+ # *IAM User Guide*.
904
+ #
905
+ # The regex used to validate this parameter is a string of characters
906
+ # consisting of upper- and lower-case alphanumeric characters with no
907
+ # spaces. You can also include underscores or any of the following
908
+ # characters: =,.@-
909
+ #
910
+ #
911
+ #
912
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining
913
+ # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html
914
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
915
+ # @return [String]
916
+ #
792
917
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithWebIdentityResponse AWS API Documentation
793
918
  #
794
919
  class AssumeRoleWithWebIdentityResponse < Struct.new(
@@ -797,7 +922,8 @@ module Aws::STS
797
922
  :assumed_role_user,
798
923
  :packed_policy_size,
799
924
  :provider,
800
- :audience)
925
+ :audience,
926
+ :source_identity)
801
927
  SENSITIVE = []
802
928
  include Aws::Structure
803
929
  end
@@ -808,7 +934,7 @@ module Aws::STS
808
934
  # @!attribute [rw] assumed_role_id
809
935
  # A unique identifier that contains the role ID and the role session
810
936
  # name of the role that is being assumed. The role ID is generated by
811
- # AWS when the role is created.
937
+ # Amazon Web Services when the role is created.
812
938
  # @return [String]
813
939
  #
814
940
  # @!attribute [rw] arn
@@ -831,7 +957,7 @@ module Aws::STS
831
957
  include Aws::Structure
832
958
  end
833
959
 
834
- # AWS credentials for API authentication.
960
+ # Amazon Web Services credentials for API authentication.
835
961
  #
836
962
  # @!attribute [rw] access_key_id
837
963
  # The access key ID that identifies the temporary security
@@ -883,7 +1009,7 @@ module Aws::STS
883
1009
 
884
1010
  # A document that contains additional information about the
885
1011
  # authorization status of a request from an encoded message that is
886
- # returned in response to an AWS request.
1012
+ # returned in response to an Amazon Web Services request.
887
1013
  #
888
1014
  # @!attribute [rw] decoded_message
889
1015
  # An XML document that contains the decoded message.
@@ -963,7 +1089,7 @@ module Aws::STS
963
1089
  end
964
1090
 
965
1091
  # @!attribute [rw] account
966
- # The number used to identify the AWS account.
1092
+ # The number used to identify the Amazon Web Services account.
967
1093
  # @return [String]
968
1094
  #
969
1095
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoResponse AWS API Documentation
@@ -996,12 +1122,12 @@ module Aws::STS
996
1122
  # @return [String]
997
1123
  #
998
1124
  # @!attribute [rw] account
999
- # The AWS account ID number of the account that owns or contains the
1000
- # calling entity.
1125
+ # The Amazon Web Services account ID number of the account that owns
1126
+ # or contains the calling entity.
1001
1127
  # @return [String]
1002
1128
  #
1003
1129
  # @!attribute [rw] arn
1004
- # The AWS ARN associated with the calling entity.
1130
+ # The Amazon Web Services ARN associated with the calling entity.
1005
1131
  # @return [String]
1006
1132
  #
1007
1133
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetCallerIdentityResponse AWS API Documentation
@@ -1074,19 +1200,19 @@ module Aws::STS
1074
1200
  # are granted in addition to the permissions that are granted by the
1075
1201
  # session policies.
1076
1202
  #
1077
- # The plain text that you use for both inline and managed session
1203
+ # The plaintext that you use for both inline and managed session
1078
1204
  # policies can't exceed 2,048 characters. The JSON policy characters
1079
1205
  # can be any ASCII character from the space character to the end of
1080
1206
  # the valid character list (\\u0020 through \\u00FF). It can also
1081
1207
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
1082
1208
  # (\\u000D) characters.
1083
1209
  #
1084
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
1085
- # tags into a packed binary format that has a separate limit. Your
1086
- # request can fail for this limit even if your plain text meets the
1087
- # other requirements. The `PackedPolicySize` response element
1088
- # indicates by percentage how close the policies and tags for your
1089
- # request are to the upper size limit.
1210
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1211
+ # policies and session tags into a packed binary format that has a
1212
+ # separate limit. Your request can fail for this limit even if your
1213
+ # plaintext meets the other requirements. The `PackedPolicySize`
1214
+ # response element indicates by percentage how close the policies and
1215
+ # tags for your request are to the upper size limit.
1090
1216
  #
1091
1217
  # </note>
1092
1218
  #
@@ -1104,11 +1230,12 @@ module Aws::STS
1104
1230
  # You must pass an inline or managed [session policy][1] to this
1105
1231
  # operation. You can pass a single JSON policy document to use as an
1106
1232
  # inline session policy. You can also specify up to 10 managed
1107
- # policies to use as managed session policies. The plain text that you
1233
+ # policies to use as managed session policies. The plaintext that you
1108
1234
  # use for both inline and managed session policies can't exceed 2,048
1109
1235
  # characters. You can provide up to 10 managed policy ARNs. For more
1110
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
1111
- # Service Namespaces][2] in the AWS General Reference.
1236
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
1237
+ # Web Services Service Namespaces][2] in the Amazon Web Services
1238
+ # General Reference.
1112
1239
  #
1113
1240
  # This parameter is optional. However, if you do not pass any session
1114
1241
  # policies, then the resulting federated user session has no
@@ -1129,12 +1256,12 @@ module Aws::STS
1129
1256
  # are granted in addition to the permissions that are granted by the
1130
1257
  # session policies.
1131
1258
  #
1132
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
1133
- # tags into a packed binary format that has a separate limit. Your
1134
- # request can fail for this limit even if your plain text meets the
1135
- # other requirements. The `PackedPolicySize` response element
1136
- # indicates by percentage how close the policies and tags for your
1137
- # request are to the upper size limit.
1259
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1260
+ # policies and session tags into a packed binary format that has a
1261
+ # separate limit. Your request can fail for this limit even if your
1262
+ # plaintext meets the other requirements. The `PackedPolicySize`
1263
+ # response element indicates by percentage how close the policies and
1264
+ # tags for your request are to the upper size limit.
1138
1265
  #
1139
1266
  # </note>
1140
1267
  #
@@ -1148,10 +1275,11 @@ module Aws::STS
1148
1275
  # The duration, in seconds, that the session should last. Acceptable
1149
1276
  # durations for federation sessions range from 900 seconds (15
1150
1277
  # minutes) to 129,600 seconds (36 hours), with 43,200 seconds (12
1151
- # hours) as the default. Sessions obtained using AWS account root user
1152
- # credentials are restricted to a maximum of 3,600 seconds (one hour).
1153
- # If the specified duration is longer than one hour, the session
1154
- # obtained by using root user credentials defaults to one hour.
1278
+ # hours) as the default. Sessions obtained using Amazon Web Services
1279
+ # account root user credentials are restricted to a maximum of 3,600
1280
+ # seconds (one hour). If the specified duration is longer than one
1281
+ # hour, the session obtained by using root user credentials defaults
1282
+ # to one hour.
1155
1283
  # @return [Integer]
1156
1284
  #
1157
1285
  # @!attribute [rw] tags
@@ -1160,16 +1288,16 @@ module Aws::STS
1160
1288
  # [Passing Session Tags in STS][1] in the *IAM User Guide*.
1161
1289
  #
1162
1290
  # This parameter is optional. You can pass up to 50 session tags. The
1163
- # plain text session tag keys can’t exceed 128 characters and the
1291
+ # plaintext session tag keys can’t exceed 128 characters and the
1164
1292
  # values can’t exceed 256 characters. For these and additional limits,
1165
1293
  # see [IAM and STS Character Limits][2] in the *IAM User Guide*.
1166
1294
  #
1167
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
1168
- # tags into a packed binary format that has a separate limit. Your
1169
- # request can fail for this limit even if your plain text meets the
1170
- # other requirements. The `PackedPolicySize` response element
1171
- # indicates by percentage how close the policies and tags for your
1172
- # request are to the upper size limit.
1295
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1296
+ # policies and session tags into a packed binary format that has a
1297
+ # separate limit. Your request can fail for this limit even if your
1298
+ # plaintext meets the other requirements. The `PackedPolicySize`
1299
+ # response element indicates by percentage how close the policies and
1300
+ # tags for your request are to the upper size limit.
1173
1301
  #
1174
1302
  # </note>
1175
1303
  #
@@ -1204,8 +1332,8 @@ module Aws::STS
1204
1332
  end
1205
1333
 
1206
1334
  # Contains the response to a successful GetFederationToken request,
1207
- # including temporary AWS credentials that can be used to make AWS
1208
- # requests.
1335
+ # including temporary Amazon Web Services credentials that can be used
1336
+ # to make Amazon Web Services requests.
1209
1337
  #
1210
1338
  # @!attribute [rw] credentials
1211
1339
  # The temporary security credentials, which include an access key ID,
@@ -1255,10 +1383,10 @@ module Aws::STS
1255
1383
  # The duration, in seconds, that the credentials should remain valid.
1256
1384
  # Acceptable durations for IAM user sessions range from 900 seconds
1257
1385
  # (15 minutes) to 129,600 seconds (36 hours), with 43,200 seconds (12
1258
- # hours) as the default. Sessions for AWS account owners are
1259
- # restricted to a maximum of 3,600 seconds (one hour). If the duration
1260
- # is longer than one hour, the session for AWS account owners defaults
1261
- # to one hour.
1386
+ # hours) as the default. Sessions for Amazon Web Services account
1387
+ # owners are restricted to a maximum of 3,600 seconds (one hour). If
1388
+ # the duration is longer than one hour, the session for Amazon Web
1389
+ # Services account owners defaults to one hour.
1262
1390
  # @return [Integer]
1263
1391
  #
1264
1392
  # @!attribute [rw] serial_number
@@ -1268,8 +1396,8 @@ module Aws::STS
1268
1396
  # The value is either the serial number for a hardware device (such as
1269
1397
  # `GAHT12345678`) or an Amazon Resource Name (ARN) for a virtual
1270
1398
  # device (such as `arn:aws:iam::123456789012:mfa/user`). You can find
1271
- # the device for an IAM user by going to the AWS Management Console
1272
- # and viewing the user's security credentials.
1399
+ # the device for an IAM user by going to the Management Console and
1400
+ # viewing the user's security credentials.
1273
1401
  #
1274
1402
  # The regex used to validate this parameter is a string of characters
1275
1403
  # consisting of upper- and lower-case alphanumeric characters with no
@@ -1300,8 +1428,8 @@ module Aws::STS
1300
1428
  end
1301
1429
 
1302
1430
  # Contains the response to a successful GetSessionToken request,
1303
- # including temporary AWS credentials that can be used to make AWS
1304
- # requests.
1431
+ # including temporary Amazon Web Services credentials that can be used
1432
+ # to make Amazon Web Services requests.
1305
1433
  #
1306
1434
  # @!attribute [rw] credentials
1307
1435
  # The temporary security credentials, which include an access key ID,
@@ -1373,9 +1501,9 @@ module Aws::STS
1373
1501
  include Aws::Structure
1374
1502
  end
1375
1503
 
1376
- # The web identity token that was passed could not be validated by AWS.
1377
- # Get a new identity token from the identity provider and then retry the
1378
- # request.
1504
+ # The web identity token that was passed could not be validated by
1505
+ # Amazon Web Services. Get a new identity token from the identity
1506
+ # provider and then retry the request.
1379
1507
  #
1380
1508
  # @!attribute [rw] message
1381
1509
  # @return [String]
@@ -1403,12 +1531,13 @@ module Aws::STS
1403
1531
  end
1404
1532
 
1405
1533
  # The request was rejected because the total packed size of the session
1406
- # policies and session tags combined was too large. An AWS conversion
1407
- # compresses the session policy document, session policy ARNs, and
1408
- # session tags into a packed binary format that has a separate limit.
1409
- # The error message indicates by percentage how close the policies and
1410
- # tags are to the upper size limit. For more information, see [Passing
1411
- # Session Tags in STS][1] in the *IAM User Guide*.
1534
+ # policies and session tags combined was too large. An Amazon Web
1535
+ # Services conversion compresses the session policy document, session
1536
+ # policy ARNs, and session tags into a packed binary format that has a
1537
+ # separate limit. The error message indicates by percentage how close
1538
+ # the policies and tags are to the upper size limit. For more
1539
+ # information, see [Passing Session Tags in STS][1] in the *IAM User
1540
+ # Guide*.
1412
1541
  #
1413
1542
  # You could receive this error even though you meet other defined
1414
1543
  # session policy and session tag limits. For more information, see [IAM
@@ -1443,8 +1572,8 @@ module Aws::STS
1443
1572
  # @!attribute [rw] arn
1444
1573
  # The Amazon Resource Name (ARN) of the IAM managed policy to use as a
1445
1574
  # session policy for the role. For more information about ARNs, see
1446
- # [Amazon Resource Names (ARNs) and AWS Service Namespaces][1] in the
1447
- # *AWS General Reference*.
1575
+ # [Amazon Resource Names (ARNs) and Amazon Web Services Service
1576
+ # Namespaces][1] in the *Amazon Web Services General Reference*.
1448
1577
  #
1449
1578
  #
1450
1579
  #
@@ -1462,8 +1591,8 @@ module Aws::STS
1462
1591
  # STS is not activated in the requested region for the account that is
1463
1592
  # being asked to generate credentials. The account administrator must
1464
1593
  # use the IAM console to activate STS in that region. For more
1465
- # information, see [Activating and Deactivating AWS STS in an AWS
1466
- # Region][1] in the *IAM User Guide*.
1594
+ # information, see [Activating and Deactivating Amazon Web Services STS
1595
+ # in an Amazon Web Services Region][1] in the *IAM User Guide*.
1467
1596
  #
1468
1597
  #
1469
1598
  #
@@ -1483,7 +1612,7 @@ module Aws::STS
1483
1612
  # You can pass custom key-value pair attributes when you assume a role
1484
1613
  # or federate a user. These are called session tags. You can then use
1485
1614
  # the session tags to control access to resources. For more information,
1486
- # see [Tagging AWS STS Sessions][1] in the *IAM User Guide*.
1615
+ # see [Tagging STS Sessions][1] in the *IAM User Guide*.
1487
1616
  #
1488
1617
  #
1489
1618
  #