aws-sdk-core 3.165.0 → 3.174.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +105 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-core/credential_provider_chain.rb +8 -5
- data/lib/aws-sdk-core/ecs_credentials.rb +111 -53
- data/lib/aws-sdk-core/endpoints/condition.rb +5 -0
- data/lib/aws-sdk-core/endpoints/endpoint_rule.rb +5 -1
- data/lib/aws-sdk-core/endpoints/error_rule.rb +5 -0
- data/lib/aws-sdk-core/endpoints/function.rb +5 -0
- data/lib/aws-sdk-core/endpoints/reference.rb +5 -0
- data/lib/aws-sdk-core/endpoints/rule.rb +5 -0
- data/lib/aws-sdk-core/endpoints/rule_set.rb +5 -0
- data/lib/aws-sdk-core/endpoints/rules_provider.rb +5 -0
- data/lib/aws-sdk-core/endpoints/templater.rb +6 -0
- data/lib/aws-sdk-core/endpoints/tree_rule.rb +5 -0
- data/lib/aws-sdk-core/endpoints/url.rb +1 -0
- data/lib/aws-sdk-core/json/error_handler.rb +15 -5
- data/lib/aws-sdk-core/log/formatter.rb +6 -0
- data/lib/aws-sdk-core/pageable_response.rb +3 -1
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +1 -1
- data/lib/aws-sdk-core/plugins/retries/error_inspector.rb +2 -1
- data/lib/aws-sdk-core/plugins/sign.rb +17 -7
- data/lib/aws-sdk-core/plugins/user_agent.rb +117 -14
- data/lib/aws-sdk-core/shared_config.rb +38 -9
- data/lib/aws-sdk-core/sso_credentials.rb +79 -44
- data/lib/aws-sdk-core/sso_token_provider.rb +3 -2
- data/lib/aws-sdk-core/waiters/poller.rb +3 -1
- data/lib/aws-sdk-core/xml/parser/engines/oga.rb +2 -0
- data/lib/aws-sdk-core.rb +1 -0
- data/lib/aws-sdk-sso/client.rb +6 -1
- data/lib/aws-sdk-sso/endpoint_provider.rb +35 -96
- data/lib/aws-sdk-sso/types.rb +0 -35
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-ssooidc/client.rb +6 -1
- data/lib/aws-sdk-ssooidc/endpoint_provider.rb +35 -95
- data/lib/aws-sdk-ssooidc/types.rb +0 -32
- data/lib/aws-sdk-ssooidc.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +244 -241
- data/lib/aws-sdk-sts/endpoint_provider.rb +96 -213
- data/lib/aws-sdk-sts/types.rb +87 -195
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/seahorse/client/h2/connection.rb +12 -11
- metadata +4 -4
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -277,6 +277,11 @@ module Aws::STS
|
|
277
277
|
# in the future.
|
278
278
|
#
|
279
279
|
#
|
280
|
+
# @option options [String] :sdk_ua_app_id
|
281
|
+
# A unique and opaque application ID that is appended to the
|
282
|
+
# User-Agent header as app/<sdk_ua_app_id>. It should have a
|
283
|
+
# maximum length of 50.
|
284
|
+
#
|
280
285
|
# @option options [String] :secret_access_key
|
281
286
|
#
|
282
287
|
# @option options [String] :session_token
|
@@ -376,14 +381,13 @@ module Aws::STS
|
|
376
381
|
# @!group API Operations
|
377
382
|
|
378
383
|
# Returns a set of temporary security credentials that you can use to
|
379
|
-
# access Amazon Web Services resources
|
380
|
-
#
|
381
|
-
#
|
382
|
-
#
|
383
|
-
#
|
384
|
-
#
|
385
|
-
#
|
386
|
-
# operations][2] in the *IAM User Guide*.
|
384
|
+
# access Amazon Web Services resources. These temporary credentials
|
385
|
+
# consist of an access key ID, a secret access key, and a security
|
386
|
+
# token. Typically, you use `AssumeRole` within your account or for
|
387
|
+
# cross-account access. For a comparison of `AssumeRole` with other API
|
388
|
+
# operations that produce temporary credentials, see [Requesting
|
389
|
+
# Temporary Security Credentials][1] and [Comparing the Amazon Web
|
390
|
+
# Services STS API operations][2] in the *IAM User Guide*.
|
387
391
|
#
|
388
392
|
# **Permissions**
|
389
393
|
#
|
@@ -394,23 +398,24 @@ module Aws::STS
|
|
394
398
|
#
|
395
399
|
# (Optional) You can pass inline or managed [session policies][3] to
|
396
400
|
# this operation. You can pass a single JSON policy document to use as
|
397
|
-
# an inline session policy. You can also specify up to 10 managed
|
398
|
-
#
|
399
|
-
# use for both inline and managed session policies
|
400
|
-
# characters. Passing policies to this operation
|
401
|
-
# credentials. The resulting session's
|
402
|
-
# of the role's identity-based policy
|
403
|
-
# use the role's temporary
|
404
|
-
# Services API calls to access
|
405
|
-
# role. You cannot use session
|
406
|
-
#
|
407
|
-
#
|
408
|
-
# User Guide*.
|
409
|
-
#
|
410
|
-
# When you create a role, you create two policies:
|
411
|
-
# that specifies *who* can assume the role and a permissions policy
|
412
|
-
# specifies *what* can be done with the role. You specify the
|
413
|
-
# principal
|
401
|
+
# an inline session policy. You can also specify up to 10 managed policy
|
402
|
+
# Amazon Resource Names (ARNs) to use as managed session policies. The
|
403
|
+
# plaintext that you use for both inline and managed session policies
|
404
|
+
# can't exceed 2,048 characters. Passing policies to this operation
|
405
|
+
# returns new temporary credentials. The resulting session's
|
406
|
+
# permissions are the intersection of the role's identity-based policy
|
407
|
+
# and the session policies. You can use the role's temporary
|
408
|
+
# credentials in subsequent Amazon Web Services API calls to access
|
409
|
+
# resources in the account that owns the role. You cannot use session
|
410
|
+
# policies to grant more permissions than those allowed by the
|
411
|
+
# identity-based policy of the role that is being assumed. For more
|
412
|
+
# information, see [Session Policies][3] in the *IAM User Guide*.
|
413
|
+
#
|
414
|
+
# When you create a role, you create two policies: a role trust policy
|
415
|
+
# that specifies *who* can assume the role, and a permissions policy
|
416
|
+
# that specifies *what* can be done with the role. You specify the
|
417
|
+
# trusted principal that is allowed to assume the role in the role trust
|
418
|
+
# policy.
|
414
419
|
#
|
415
420
|
# To assume a role from a different account, your Amazon Web Services
|
416
421
|
# account must be trusted by the role. The trust relationship is defined
|
@@ -419,10 +424,9 @@ module Aws::STS
|
|
419
424
|
# users in the account.
|
420
425
|
#
|
421
426
|
# A user who wants to access a role in a different account must also
|
422
|
-
# have permissions that are delegated from the
|
423
|
-
#
|
424
|
-
#
|
425
|
-
# account.
|
427
|
+
# have permissions that are delegated from the account administrator.
|
428
|
+
# The administrator must attach a policy that allows the user to call
|
429
|
+
# `AssumeRole` for the ARN of the role in the other account.
|
426
430
|
#
|
427
431
|
# To allow a user to assume a role in the same account, you can do
|
428
432
|
# either of the following:
|
@@ -519,12 +523,12 @@ module Aws::STS
|
|
519
523
|
# about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
|
520
524
|
# Service Namespaces][1] in the Amazon Web Services General Reference.
|
521
525
|
#
|
522
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
523
|
-
#
|
524
|
-
# separate limit. Your request can fail for this limit
|
525
|
-
# plaintext meets the other requirements. The
|
526
|
-
# response element indicates by percentage how close
|
527
|
-
# tags for your request are to the upper size limit.
|
526
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
527
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
528
|
+
# format that has a separate limit. Your request can fail for this limit
|
529
|
+
# even if your plaintext meets the other requirements. The
|
530
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
531
|
+
# the policies and tags for your request are to the upper size limit.
|
528
532
|
#
|
529
533
|
# </note>
|
530
534
|
#
|
@@ -564,12 +568,12 @@ module Aws::STS
|
|
564
568
|
# the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
|
565
569
|
# characters.
|
566
570
|
#
|
567
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
568
|
-
#
|
569
|
-
# separate limit. Your request can fail for this limit
|
570
|
-
# plaintext meets the other requirements. The
|
571
|
-
# response element indicates by percentage how close
|
572
|
-
# tags for your request are to the upper size limit.
|
571
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
572
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
573
|
+
# format that has a separate limit. Your request can fail for this limit
|
574
|
+
# even if your plaintext meets the other requirements. The
|
575
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
576
|
+
# the policies and tags for your request are to the upper size limit.
|
573
577
|
#
|
574
578
|
# </note>
|
575
579
|
#
|
@@ -627,12 +631,12 @@ module Aws::STS
|
|
627
631
|
# can’t exceed 256 characters. For these and additional limits, see [IAM
|
628
632
|
# and STS Character Limits][2] in the *IAM User Guide*.
|
629
633
|
#
|
630
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
631
|
-
#
|
632
|
-
# separate limit. Your request can fail for this limit
|
633
|
-
# plaintext meets the other requirements. The
|
634
|
-
# response element indicates by percentage how close
|
635
|
-
# tags for your request are to the upper size limit.
|
634
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
635
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
636
|
+
# format that has a separate limit. Your request can fail for this limit
|
637
|
+
# even if your plaintext meets the other requirements. The
|
638
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
639
|
+
# the policies and tags for your request are to the upper size limit.
|
636
640
|
#
|
637
641
|
# </note>
|
638
642
|
#
|
@@ -895,18 +899,18 @@ module Aws::STS
|
|
895
899
|
#
|
896
900
|
# (Optional) You can pass inline or managed [session policies][6] to
|
897
901
|
# this operation. You can pass a single JSON policy document to use as
|
898
|
-
# an inline session policy. You can also specify up to 10 managed
|
899
|
-
#
|
900
|
-
# use for both inline and managed session policies
|
901
|
-
# characters. Passing policies to this operation
|
902
|
-
# credentials. The resulting session's
|
903
|
-
# of the role's identity-based policy
|
904
|
-
# use the role's temporary
|
905
|
-
# Services API calls to access
|
906
|
-
# role. You cannot use session
|
907
|
-
#
|
908
|
-
#
|
909
|
-
# User Guide*.
|
902
|
+
# an inline session policy. You can also specify up to 10 managed policy
|
903
|
+
# Amazon Resource Names (ARNs) to use as managed session policies. The
|
904
|
+
# plaintext that you use for both inline and managed session policies
|
905
|
+
# can't exceed 2,048 characters. Passing policies to this operation
|
906
|
+
# returns new temporary credentials. The resulting session's
|
907
|
+
# permissions are the intersection of the role's identity-based policy
|
908
|
+
# and the session policies. You can use the role's temporary
|
909
|
+
# credentials in subsequent Amazon Web Services API calls to access
|
910
|
+
# resources in the account that owns the role. You cannot use session
|
911
|
+
# policies to grant more permissions than those allowed by the
|
912
|
+
# identity-based policy of the role that is being assumed. For more
|
913
|
+
# information, see [Session Policies][6] in the *IAM User Guide*.
|
910
914
|
#
|
911
915
|
# Calling `AssumeRoleWithSAML` does not require the use of Amazon Web
|
912
916
|
# Services security credentials. The identity of the caller is validated
|
@@ -932,12 +936,12 @@ module Aws::STS
|
|
932
936
|
# characters. For these and additional limits, see [IAM and STS
|
933
937
|
# Character Limits][8] in the *IAM User Guide*.
|
934
938
|
#
|
935
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
936
|
-
#
|
937
|
-
# separate limit. Your request can fail for this limit
|
938
|
-
# plaintext meets the other requirements. The
|
939
|
-
# response element indicates by percentage how close
|
940
|
-
# tags for your request are to the upper size limit.
|
939
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
940
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
941
|
+
# format that has a separate limit. Your request can fail for this limit
|
942
|
+
# even if your plaintext meets the other requirements. The
|
943
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
944
|
+
# the policies and tags for your request are to the upper size limit.
|
941
945
|
#
|
942
946
|
# </note>
|
943
947
|
#
|
@@ -1023,12 +1027,12 @@ module Aws::STS
|
|
1023
1027
|
# about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
|
1024
1028
|
# Service Namespaces][1] in the Amazon Web Services General Reference.
|
1025
1029
|
#
|
1026
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1027
|
-
#
|
1028
|
-
# separate limit. Your request can fail for this limit
|
1029
|
-
# plaintext meets the other requirements. The
|
1030
|
-
# response element indicates by percentage how close
|
1031
|
-
# tags for your request are to the upper size limit.
|
1030
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1031
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
1032
|
+
# format that has a separate limit. Your request can fail for this limit
|
1033
|
+
# even if your plaintext meets the other requirements. The
|
1034
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
1035
|
+
# the policies and tags for your request are to the upper size limit.
|
1032
1036
|
#
|
1033
1037
|
# </note>
|
1034
1038
|
#
|
@@ -1068,12 +1072,12 @@ module Aws::STS
|
|
1068
1072
|
# the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
|
1069
1073
|
# characters.
|
1070
1074
|
#
|
1071
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1072
|
-
#
|
1073
|
-
# separate limit. Your request can fail for this limit
|
1074
|
-
# plaintext meets the other requirements. The
|
1075
|
-
# response element indicates by percentage how close
|
1076
|
-
# tags for your request are to the upper size limit.
|
1075
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1076
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
1077
|
+
# format that has a separate limit. Your request can fail for this limit
|
1078
|
+
# even if your plaintext meets the other requirements. The
|
1079
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
1080
|
+
# the policies and tags for your request are to the upper size limit.
|
1077
1081
|
#
|
1078
1082
|
# </note>
|
1079
1083
|
#
|
@@ -1207,10 +1211,8 @@ module Aws::STS
|
|
1207
1211
|
# the user with a consistent identity throughout the lifetime of an
|
1208
1212
|
# application.
|
1209
1213
|
#
|
1210
|
-
# To learn more about Amazon Cognito, see [Amazon Cognito
|
1211
|
-
# in *Amazon
|
1212
|
-
# Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
|
1213
|
-
# Guide*.
|
1214
|
+
# To learn more about Amazon Cognito, see [Amazon Cognito identity
|
1215
|
+
# pools][1] in *Amazon Cognito Developer Guide*.
|
1214
1216
|
#
|
1215
1217
|
# </note>
|
1216
1218
|
#
|
@@ -1224,8 +1226,8 @@ module Aws::STS
|
|
1224
1226
|
# a token from the web identity provider. For a comparison of
|
1225
1227
|
# `AssumeRoleWithWebIdentity` with the other API operations that produce
|
1226
1228
|
# temporary credentials, see [Requesting Temporary Security
|
1227
|
-
# Credentials][
|
1228
|
-
# operations][
|
1229
|
+
# Credentials][4] and [Comparing the Amazon Web Services STS API
|
1230
|
+
# operations][5] in the *IAM User Guide*.
|
1229
1231
|
#
|
1230
1232
|
# The temporary security credentials returned by this API consist of an
|
1231
1233
|
# access key ID, a secret access key, and a security token. Applications
|
@@ -1241,11 +1243,11 @@ module Aws::STS
|
|
1241
1243
|
# to the maximum session duration setting for the role. This setting can
|
1242
1244
|
# have a value from 1 hour to 12 hours. To learn how to view the maximum
|
1243
1245
|
# value for your role, see [View the Maximum Session Duration Setting
|
1244
|
-
# for a Role][
|
1246
|
+
# for a Role][6] in the *IAM User Guide*. The maximum session duration
|
1245
1247
|
# limit applies when you use the `AssumeRole*` API operations or the
|
1246
1248
|
# `assume-role*` CLI commands. However the limit does not apply when you
|
1247
1249
|
# use those operations to create a console URL. For more information,
|
1248
|
-
# see [Using IAM Roles][
|
1250
|
+
# see [Using IAM Roles][7] in the *IAM User Guide*.
|
1249
1251
|
#
|
1250
1252
|
# **Permissions**
|
1251
1253
|
#
|
@@ -1254,39 +1256,39 @@ module Aws::STS
|
|
1254
1256
|
# Amazon Web Services service with the following exception: you cannot
|
1255
1257
|
# call the STS `GetFederationToken` or `GetSessionToken` API operations.
|
1256
1258
|
#
|
1257
|
-
# (Optional) You can pass inline or managed [session policies][
|
1259
|
+
# (Optional) You can pass inline or managed [session policies][8] to
|
1258
1260
|
# this operation. You can pass a single JSON policy document to use as
|
1259
|
-
# an inline session policy. You can also specify up to 10 managed
|
1260
|
-
#
|
1261
|
-
# use for both inline and managed session policies
|
1262
|
-
# characters. Passing policies to this operation
|
1263
|
-
# credentials. The resulting session's
|
1264
|
-
# of the role's identity-based policy
|
1265
|
-
# use the role's temporary
|
1266
|
-
# Services API calls to access
|
1267
|
-
# role. You cannot use session
|
1268
|
-
#
|
1269
|
-
#
|
1270
|
-
# User Guide*.
|
1261
|
+
# an inline session policy. You can also specify up to 10 managed policy
|
1262
|
+
# Amazon Resource Names (ARNs) to use as managed session policies. The
|
1263
|
+
# plaintext that you use for both inline and managed session policies
|
1264
|
+
# can't exceed 2,048 characters. Passing policies to this operation
|
1265
|
+
# returns new temporary credentials. The resulting session's
|
1266
|
+
# permissions are the intersection of the role's identity-based policy
|
1267
|
+
# and the session policies. You can use the role's temporary
|
1268
|
+
# credentials in subsequent Amazon Web Services API calls to access
|
1269
|
+
# resources in the account that owns the role. You cannot use session
|
1270
|
+
# policies to grant more permissions than those allowed by the
|
1271
|
+
# identity-based policy of the role that is being assumed. For more
|
1272
|
+
# information, see [Session Policies][8] in the *IAM User Guide*.
|
1271
1273
|
#
|
1272
1274
|
# **Tags**
|
1273
1275
|
#
|
1274
1276
|
# (Optional) You can configure your IdP to pass attributes into your web
|
1275
1277
|
# identity token as session tags. Each session tag consists of a key
|
1276
1278
|
# name and an associated value. For more information about session tags,
|
1277
|
-
# see [Passing Session Tags in STS][
|
1279
|
+
# see [Passing Session Tags in STS][9] in the *IAM User Guide*.
|
1278
1280
|
#
|
1279
1281
|
# You can pass up to 50 session tags. The plaintext session tag keys
|
1280
1282
|
# can’t exceed 128 characters and the values can’t exceed 256
|
1281
1283
|
# characters. For these and additional limits, see [IAM and STS
|
1282
|
-
# Character Limits][
|
1284
|
+
# Character Limits][10] in the *IAM User Guide*.
|
1283
1285
|
#
|
1284
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1285
|
-
#
|
1286
|
-
# separate limit. Your request can fail for this limit
|
1287
|
-
# plaintext meets the other requirements. The
|
1288
|
-
# response element indicates by percentage how close
|
1289
|
-
# tags for your request are to the upper size limit.
|
1286
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1287
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
1288
|
+
# format that has a separate limit. Your request can fail for this limit
|
1289
|
+
# even if your plaintext meets the other requirements. The
|
1290
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
1291
|
+
# the policies and tags for your request are to the upper size limit.
|
1290
1292
|
#
|
1291
1293
|
# </note>
|
1292
1294
|
#
|
@@ -1297,12 +1299,12 @@ module Aws::STS
|
|
1297
1299
|
# An administrator must grant you the permissions necessary to pass
|
1298
1300
|
# session tags. The administrator can also create granular permissions
|
1299
1301
|
# to allow you to pass only specific session tags. For more information,
|
1300
|
-
# see [Tutorial: Using Tags for Attribute-Based Access Control][
|
1302
|
+
# see [Tutorial: Using Tags for Attribute-Based Access Control][11] in
|
1301
1303
|
# the *IAM User Guide*.
|
1302
1304
|
#
|
1303
1305
|
# You can set the session tags as transitive. Transitive tags persist
|
1304
1306
|
# during role chaining. For more information, see [Chaining Roles with
|
1305
|
-
# Session Tags][
|
1307
|
+
# Session Tags][12] in the *IAM User Guide*.
|
1306
1308
|
#
|
1307
1309
|
# **Identities**
|
1308
1310
|
#
|
@@ -1314,19 +1316,19 @@ module Aws::STS
|
|
1314
1316
|
# specified in the role's trust policy.
|
1315
1317
|
#
|
1316
1318
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your
|
1317
|
-
# CloudTrail logs. The entry includes the [Subject][
|
1319
|
+
# CloudTrail logs. The entry includes the [Subject][13] of the provided
|
1318
1320
|
# web identity token. We recommend that you avoid using any personally
|
1319
1321
|
# identifiable information (PII) in this field. For example, you could
|
1320
1322
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
1321
|
-
# specification][
|
1323
|
+
# specification][14].
|
1322
1324
|
#
|
1323
1325
|
# For more information about how to use web identity federation and the
|
1324
1326
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
1325
1327
|
#
|
1326
|
-
# * [Using Web Identity Federation API Operations for Mobile Apps][
|
1327
|
-
# and [Federation Through a Web-based Identity Provider][
|
1328
|
+
# * [Using Web Identity Federation API Operations for Mobile Apps][15]
|
1329
|
+
# and [Federation Through a Web-based Identity Provider][16].
|
1328
1330
|
#
|
1329
|
-
# * [ Web Identity Federation Playground][
|
1331
|
+
# * [ Web Identity Federation Playground][17]. Walk through the process
|
1330
1332
|
# of authenticating through Login with Amazon, Facebook, or Google,
|
1331
1333
|
# getting temporary security credentials, and then using those
|
1332
1334
|
# credentials to make a request to Amazon Web Services.
|
@@ -1337,7 +1339,7 @@ module Aws::STS
|
|
1337
1339
|
# toolkits then show how to use the information from these providers
|
1338
1340
|
# to get and use temporary security credentials.
|
1339
1341
|
#
|
1340
|
-
# * [Web Identity Federation with Mobile Applications][
|
1342
|
+
# * [Web Identity Federation with Mobile Applications][18]. This article
|
1341
1343
|
# discusses web identity federation and shows an example of how to use
|
1342
1344
|
# web identity federation to get access to content in Amazon S3.
|
1343
1345
|
#
|
@@ -1346,23 +1348,21 @@ module Aws::STS
|
|
1346
1348
|
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
|
1347
1349
|
# [2]: http://aws.amazon.com/sdkforios/
|
1348
1350
|
# [3]: http://aws.amazon.com/sdkforandroid/
|
1349
|
-
# [4]: https://docs.aws.amazon.com/
|
1350
|
-
# [5]: https://docs.aws.amazon.com/
|
1351
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1352
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1353
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1354
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1355
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1356
|
-
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1357
|
-
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1358
|
-
# [13]:
|
1359
|
-
# [14]:
|
1360
|
-
# [15]:
|
1361
|
-
# [16]:
|
1362
|
-
# [17]: https://
|
1363
|
-
# [18]:
|
1364
|
-
# [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
|
1365
|
-
# [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
1351
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1352
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
1353
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
1354
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1355
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1356
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
1357
|
+
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
1358
|
+
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
1359
|
+
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
1360
|
+
# [13]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
|
1361
|
+
# [14]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
1362
|
+
# [15]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
1363
|
+
# [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
1364
|
+
# [17]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
|
1365
|
+
# [18]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
1366
1366
|
#
|
1367
1367
|
# @option params [required, String] :role_arn
|
1368
1368
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -1410,12 +1410,12 @@ module Aws::STS
|
|
1410
1410
|
# about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
|
1411
1411
|
# Service Namespaces][1] in the Amazon Web Services General Reference.
|
1412
1412
|
#
|
1413
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1414
|
-
#
|
1415
|
-
# separate limit. Your request can fail for this limit
|
1416
|
-
# plaintext meets the other requirements. The
|
1417
|
-
# response element indicates by percentage how close
|
1418
|
-
# tags for your request are to the upper size limit.
|
1413
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1414
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
1415
|
+
# format that has a separate limit. Your request can fail for this limit
|
1416
|
+
# even if your plaintext meets the other requirements. The
|
1417
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
1418
|
+
# the policies and tags for your request are to the upper size limit.
|
1419
1419
|
#
|
1420
1420
|
# </note>
|
1421
1421
|
#
|
@@ -1455,12 +1455,12 @@ module Aws::STS
|
|
1455
1455
|
# the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
|
1456
1456
|
# characters.
|
1457
1457
|
#
|
1458
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1459
|
-
#
|
1460
|
-
# separate limit. Your request can fail for this limit
|
1461
|
-
# plaintext meets the other requirements. The
|
1462
|
-
# response element indicates by percentage how close
|
1463
|
-
# tags for your request are to the upper size limit.
|
1458
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1459
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
1460
|
+
# format that has a separate limit. Your request can fail for this limit
|
1461
|
+
# even if your plaintext meets the other requirements. The
|
1462
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
1463
|
+
# the policies and tags for your request are to the upper size limit.
|
1464
1464
|
#
|
1465
1465
|
# </note>
|
1466
1466
|
#
|
@@ -1721,11 +1721,11 @@ module Aws::STS
|
|
1721
1721
|
# to call the operation.
|
1722
1722
|
#
|
1723
1723
|
# <note markdown="1"> No permissions are required to perform this operation. If an
|
1724
|
-
# administrator
|
1724
|
+
# administrator attaches a policy to your identity that explicitly
|
1725
1725
|
# denies access to the `sts:GetCallerIdentity` action, you can still
|
1726
1726
|
# perform this operation. Permissions are not required because the same
|
1727
|
-
# information is returned when
|
1728
|
-
#
|
1727
|
+
# information is returned when access is denied. To view an example
|
1728
|
+
# response, see [I Am Not Authorized to Perform:
|
1729
1729
|
# iam:DeleteVirtualMFADevice][1] in the *IAM User Guide*.
|
1730
1730
|
#
|
1731
1731
|
# </note>
|
@@ -1802,60 +1802,63 @@ module Aws::STS
|
|
1802
1802
|
end
|
1803
1803
|
|
1804
1804
|
# Returns a set of temporary security credentials (consisting of an
|
1805
|
-
# access key ID, a secret access key, and a security token) for a
|
1806
|
-
#
|
1807
|
-
#
|
1808
|
-
#
|
1809
|
-
#
|
1810
|
-
#
|
1811
|
-
#
|
1812
|
-
#
|
1813
|
-
#
|
1805
|
+
# access key ID, a secret access key, and a security token) for a user.
|
1806
|
+
# A typical use is in a proxy application that gets temporary security
|
1807
|
+
# credentials on behalf of distributed applications inside a corporate
|
1808
|
+
# network.
|
1809
|
+
#
|
1810
|
+
# You must call the `GetFederationToken` operation using the long-term
|
1811
|
+
# security credentials of an IAM user. As a result, this call is
|
1812
|
+
# appropriate in contexts where those credentials can be safeguarded,
|
1813
|
+
# usually in a server-based application. For a comparison of
|
1814
|
+
# `GetFederationToken` with the other API operations that produce
|
1815
|
+
# temporary credentials, see [Requesting Temporary Security
|
1814
1816
|
# Credentials][1] and [Comparing the Amazon Web Services STS API
|
1815
1817
|
# operations][2] in the *IAM User Guide*.
|
1816
1818
|
#
|
1819
|
+
# Although it is possible to call `GetFederationToken` using the
|
1820
|
+
# security credentials of an Amazon Web Services account root user
|
1821
|
+
# rather than an IAM user that you create for the purpose of a proxy
|
1822
|
+
# application, we do not recommend it. For more information, see
|
1823
|
+
# [Safeguard your root user credentials and don't use them for everyday
|
1824
|
+
# tasks][3] in the *IAM User Guide*.
|
1825
|
+
#
|
1817
1826
|
# <note markdown="1"> You can create a mobile-based or browser-based app that can
|
1818
1827
|
# authenticate users using a web identity provider like Login with
|
1819
1828
|
# Amazon, Facebook, Google, or an OpenID Connect-compatible identity
|
1820
|
-
# provider. In this case, we recommend that you use [Amazon Cognito][
|
1829
|
+
# provider. In this case, we recommend that you use [Amazon Cognito][4]
|
1821
1830
|
# or `AssumeRoleWithWebIdentity`. For more information, see [Federation
|
1822
|
-
# Through a Web-based Identity Provider][
|
1831
|
+
# Through a Web-based Identity Provider][5] in the *IAM User Guide*.
|
1823
1832
|
#
|
1824
1833
|
# </note>
|
1825
1834
|
#
|
1826
|
-
# You can also call `GetFederationToken` using the security credentials
|
1827
|
-
# of an Amazon Web Services account root user, but we do not recommend
|
1828
|
-
# it. Instead, we recommend that you create an IAM user for the purpose
|
1829
|
-
# of the proxy application. Then attach a policy to the IAM user that
|
1830
|
-
# limits federated users to only the actions and resources that they
|
1831
|
-
# need to access. For more information, see [IAM Best Practices][5] in
|
1832
|
-
# the *IAM User Guide*.
|
1833
|
-
#
|
1834
1835
|
# **Session duration**
|
1835
1836
|
#
|
1836
1837
|
# The temporary credentials are valid for the specified duration, from
|
1837
1838
|
# 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36
|
1838
1839
|
# hours). The default session duration is 43,200 seconds (12 hours).
|
1839
|
-
# Temporary credentials obtained by using the
|
1840
|
-
#
|
1841
|
-
# (1 hour).
|
1840
|
+
# Temporary credentials obtained by using the root user credentials have
|
1841
|
+
# a maximum duration of 3,600 seconds (1 hour).
|
1842
1842
|
#
|
1843
1843
|
# **Permissions**
|
1844
1844
|
#
|
1845
1845
|
# You can use the temporary credentials created by `GetFederationToken`
|
1846
|
-
# in any Amazon Web Services service
|
1846
|
+
# in any Amazon Web Services service with the following exceptions:
|
1847
1847
|
#
|
1848
1848
|
# * You cannot call any IAM operations using the CLI or the Amazon Web
|
1849
|
-
# Services API.
|
1849
|
+
# Services API. This limitation does not apply to console sessions.
|
1850
1850
|
#
|
1851
1851
|
# * You cannot call any STS operations except `GetCallerIdentity`.
|
1852
1852
|
#
|
1853
|
+
# You can use temporary credentials for single sign-on (SSO) to the
|
1854
|
+
# console.
|
1855
|
+
#
|
1853
1856
|
# You must pass an inline or managed [session policy][6] to this
|
1854
1857
|
# operation. You can pass a single JSON policy document to use as an
|
1855
|
-
# inline session policy. You can also specify up to 10 managed
|
1856
|
-
# to use as managed session policies. The
|
1857
|
-
# both inline and managed session policies
|
1858
|
-
# characters.
|
1858
|
+
# inline session policy. You can also specify up to 10 managed policy
|
1859
|
+
# Amazon Resource Names (ARNs) to use as managed session policies. The
|
1860
|
+
# plaintext that you use for both inline and managed session policies
|
1861
|
+
# can't exceed 2,048 characters.
|
1859
1862
|
#
|
1860
1863
|
# Though the session policy parameters are optional, if you do not pass
|
1861
1864
|
# a policy, then the resulting federated user session has no
|
@@ -1885,9 +1888,9 @@ module Aws::STS
|
|
1885
1888
|
# <note markdown="1"> You can create a mobile-based or browser-based app that can
|
1886
1889
|
# authenticate users using a web identity provider like Login with
|
1887
1890
|
# Amazon, Facebook, Google, or an OpenID Connect-compatible identity
|
1888
|
-
# provider. In this case, we recommend that you use [Amazon Cognito][
|
1891
|
+
# provider. In this case, we recommend that you use [Amazon Cognito][4]
|
1889
1892
|
# or `AssumeRoleWithWebIdentity`. For more information, see [Federation
|
1890
|
-
# Through a Web-based Identity Provider][
|
1893
|
+
# Through a Web-based Identity Provider][5] in the *IAM User Guide*.
|
1891
1894
|
#
|
1892
1895
|
# </note>
|
1893
1896
|
#
|
@@ -1909,9 +1912,9 @@ module Aws::STS
|
|
1909
1912
|
#
|
1910
1913
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1911
1914
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
1912
|
-
# [3]:
|
1913
|
-
# [4]:
|
1914
|
-
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1915
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
|
1916
|
+
# [4]: http://aws.amazon.com/cognito/
|
1917
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
1915
1918
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1916
1919
|
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
|
1917
1920
|
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
@@ -1934,8 +1937,8 @@ module Aws::STS
|
|
1934
1937
|
#
|
1935
1938
|
# You must pass an inline or managed [session policy][1] to this
|
1936
1939
|
# operation. You can pass a single JSON policy document to use as an
|
1937
|
-
# inline session policy. You can also specify up to 10 managed
|
1938
|
-
# to use as managed session policies.
|
1940
|
+
# inline session policy. You can also specify up to 10 managed policy
|
1941
|
+
# Amazon Resource Names (ARNs) to use as managed session policies.
|
1939
1942
|
#
|
1940
1943
|
# This parameter is optional. However, if you do not pass any session
|
1941
1944
|
# policies, then the resulting federated user session has no
|
@@ -1963,12 +1966,12 @@ module Aws::STS
|
|
1963
1966
|
# the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
|
1964
1967
|
# characters.
|
1965
1968
|
#
|
1966
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1967
|
-
#
|
1968
|
-
# separate limit. Your request can fail for this limit
|
1969
|
-
# plaintext meets the other requirements. The
|
1970
|
-
# response element indicates by percentage how close
|
1971
|
-
# tags for your request are to the upper size limit.
|
1969
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1970
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
1971
|
+
# format that has a separate limit. Your request can fail for this limit
|
1972
|
+
# even if your plaintext meets the other requirements. The
|
1973
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
1974
|
+
# the policies and tags for your request are to the upper size limit.
|
1972
1975
|
#
|
1973
1976
|
# </note>
|
1974
1977
|
#
|
@@ -1983,13 +1986,13 @@ module Aws::STS
|
|
1983
1986
|
#
|
1984
1987
|
# You must pass an inline or managed [session policy][1] to this
|
1985
1988
|
# operation. You can pass a single JSON policy document to use as an
|
1986
|
-
# inline session policy. You can also specify up to 10 managed
|
1987
|
-
# to use as managed session policies. The
|
1988
|
-
# both inline and managed session policies
|
1989
|
-
# characters. You can provide up to 10 managed
|
1990
|
-
# information about ARNs, see [Amazon Resource
|
1991
|
-
# Web Services Service Namespaces][2] in the
|
1992
|
-
# Reference.
|
1989
|
+
# inline session policy. You can also specify up to 10 managed policy
|
1990
|
+
# Amazon Resource Names (ARNs) to use as managed session policies. The
|
1991
|
+
# plaintext that you use for both inline and managed session policies
|
1992
|
+
# can't exceed 2,048 characters. You can provide up to 10 managed
|
1993
|
+
# policy ARNs. For more information about ARNs, see [Amazon Resource
|
1994
|
+
# Names (ARNs) and Amazon Web Services Service Namespaces][2] in the
|
1995
|
+
# Amazon Web Services General Reference.
|
1993
1996
|
#
|
1994
1997
|
# This parameter is optional. However, if you do not pass any session
|
1995
1998
|
# policies, then the resulting federated user session has no
|
@@ -2010,12 +2013,12 @@ module Aws::STS
|
|
2010
2013
|
# are granted in addition to the permissions that are granted by the
|
2011
2014
|
# session policies.
|
2012
2015
|
#
|
2013
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
2014
|
-
#
|
2015
|
-
# separate limit. Your request can fail for this limit
|
2016
|
-
# plaintext meets the other requirements. The
|
2017
|
-
# response element indicates by percentage how close
|
2018
|
-
# tags for your request are to the upper size limit.
|
2016
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
2017
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
2018
|
+
# format that has a separate limit. Your request can fail for this limit
|
2019
|
+
# even if your plaintext meets the other requirements. The
|
2020
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
2021
|
+
# the policies and tags for your request are to the upper size limit.
|
2019
2022
|
#
|
2020
2023
|
# </note>
|
2021
2024
|
#
|
@@ -2028,10 +2031,10 @@ module Aws::STS
|
|
2028
2031
|
# The duration, in seconds, that the session should last. Acceptable
|
2029
2032
|
# durations for federation sessions range from 900 seconds (15 minutes)
|
2030
2033
|
# to 129,600 seconds (36 hours), with 43,200 seconds (12 hours) as the
|
2031
|
-
# default. Sessions obtained using
|
2032
|
-
#
|
2033
|
-
#
|
2034
|
-
#
|
2034
|
+
# default. Sessions obtained using root user credentials are restricted
|
2035
|
+
# to a maximum of 3,600 seconds (one hour). If the specified duration is
|
2036
|
+
# longer than one hour, the session obtained by using root user
|
2037
|
+
# credentials defaults to one hour.
|
2035
2038
|
#
|
2036
2039
|
# @option params [Array<Types::Tag>] :tags
|
2037
2040
|
# A list of session tags. Each session tag consists of a key name and an
|
@@ -2043,12 +2046,12 @@ module Aws::STS
|
|
2043
2046
|
# can’t exceed 256 characters. For these and additional limits, see [IAM
|
2044
2047
|
# and STS Character Limits][2] in the *IAM User Guide*.
|
2045
2048
|
#
|
2046
|
-
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
2047
|
-
#
|
2048
|
-
# separate limit. Your request can fail for this limit
|
2049
|
-
# plaintext meets the other requirements. The
|
2050
|
-
# response element indicates by percentage how close
|
2051
|
-
# tags for your request are to the upper size limit.
|
2049
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
2050
|
+
# policy, managed policy ARNs, and session tags into a packed binary
|
2051
|
+
# format that has a separate limit. Your request can fail for this limit
|
2052
|
+
# even if your plaintext meets the other requirements. The
|
2053
|
+
# `PackedPolicySize` response element indicates by percentage how close
|
2054
|
+
# the policies and tags for your request are to the upper size limit.
|
2052
2055
|
#
|
2053
2056
|
# </note>
|
2054
2057
|
#
|
@@ -2151,14 +2154,15 @@ module Aws::STS
|
|
2151
2154
|
# secret access key, and a security token. Typically, you use
|
2152
2155
|
# `GetSessionToken` if you want to use MFA to protect programmatic calls
|
2153
2156
|
# to specific Amazon Web Services API operations like Amazon EC2
|
2154
|
-
# `StopInstances`.
|
2155
|
-
#
|
2156
|
-
# MFA
|
2157
|
-
#
|
2158
|
-
#
|
2159
|
-
#
|
2160
|
-
#
|
2161
|
-
#
|
2157
|
+
# `StopInstances`.
|
2158
|
+
#
|
2159
|
+
# MFA-enabled IAM users must call `GetSessionToken` and submit an MFA
|
2160
|
+
# code that is associated with their MFA device. Using the temporary
|
2161
|
+
# security credentials that the call returns, IAM users can then make
|
2162
|
+
# programmatic calls to API operations that require MFA authentication.
|
2163
|
+
# An incorrect MFA code causes the API to return an access denied error.
|
2164
|
+
# For a comparison of `GetSessionToken` with the other API operations
|
2165
|
+
# that produce temporary credentials, see [Requesting Temporary Security
|
2162
2166
|
# Credentials][1] and [Comparing the Amazon Web Services STS API
|
2163
2167
|
# operations][2] in the *IAM User Guide*.
|
2164
2168
|
#
|
@@ -2173,13 +2177,13 @@ module Aws::STS
|
|
2173
2177
|
# **Session Duration**
|
2174
2178
|
#
|
2175
2179
|
# The `GetSessionToken` operation must be called by using the long-term
|
2176
|
-
# Amazon Web Services security credentials of
|
2177
|
-
#
|
2178
|
-
#
|
2179
|
-
#
|
2180
|
-
# (
|
2181
|
-
#
|
2182
|
-
#
|
2180
|
+
# Amazon Web Services security credentials of an IAM user. Credentials
|
2181
|
+
# that are created by IAM users are valid for the duration that you
|
2182
|
+
# specify. This duration can range from 900 seconds (15 minutes) up to a
|
2183
|
+
# maximum of 129,600 seconds (36 hours), with a default of 43,200
|
2184
|
+
# seconds (12 hours). Credentials based on account credentials can range
|
2185
|
+
# from 900 seconds (15 minutes) up to 3,600 seconds (1 hour), with a
|
2186
|
+
# default of 1 hour.
|
2183
2187
|
#
|
2184
2188
|
# **Permissions**
|
2185
2189
|
#
|
@@ -2193,24 +2197,23 @@ module Aws::STS
|
|
2193
2197
|
# * You cannot call any STS API *except* `AssumeRole` or
|
2194
2198
|
# `GetCallerIdentity`.
|
2195
2199
|
#
|
2196
|
-
#
|
2197
|
-
#
|
2198
|
-
#
|
2199
|
-
#
|
2200
|
-
# with Amazon Web Services.
|
2200
|
+
# The credentials that `GetSessionToken` returns are based on
|
2201
|
+
# permissions associated with the IAM user whose credentials were used
|
2202
|
+
# to call the operation. The temporary credentials have the same
|
2203
|
+
# permissions as the IAM user.
|
2201
2204
|
#
|
2202
|
-
#
|
2205
|
+
# <note markdown="1"> Although it is possible to call `GetSessionToken` using the security
|
2206
|
+
# credentials of an Amazon Web Services account root user rather than an
|
2207
|
+
# IAM user, we do not recommend it. If `GetSessionToken` is called using
|
2208
|
+
# root user credentials, the temporary credentials have root user
|
2209
|
+
# permissions. For more information, see [Safeguard your root user
|
2210
|
+
# credentials and don't use them for everyday tasks][4] in the *IAM
|
2211
|
+
# User Guide*
|
2203
2212
|
#
|
2204
|
-
#
|
2205
|
-
# permissions associated with the user whose credentials were used to
|
2206
|
-
# call the operation. If `GetSessionToken` is called using Amazon Web
|
2207
|
-
# Services account root user credentials, the temporary credentials have
|
2208
|
-
# root user permissions. Similarly, if `GetSessionToken` is called using
|
2209
|
-
# the credentials of an IAM user, the temporary credentials have the
|
2210
|
-
# same permissions as the IAM user.
|
2213
|
+
# </note>
|
2211
2214
|
#
|
2212
2215
|
# For more information about using `GetSessionToken` to create temporary
|
2213
|
-
# credentials,
|
2216
|
+
# credentials, see [Temporary Credentials for Users in Untrusted
|
2214
2217
|
# Environments][5] in the *IAM User Guide*.
|
2215
2218
|
#
|
2216
2219
|
#
|
@@ -2218,7 +2221,7 @@ module Aws::STS
|
|
2218
2221
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
2219
2222
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
2220
2223
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_getsessiontoken.html
|
2221
|
-
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#
|
2224
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
|
2222
2225
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken
|
2223
2226
|
#
|
2224
2227
|
# @option params [Integer] :duration_seconds
|
@@ -2316,7 +2319,7 @@ module Aws::STS
|
|
2316
2319
|
params: params,
|
2317
2320
|
config: config)
|
2318
2321
|
context[:gem_name] = 'aws-sdk-core'
|
2319
|
-
context[:gem_version] = '3.
|
2322
|
+
context[:gem_version] = '3.174.0'
|
2320
2323
|
Seahorse::Client::Request.new(handlers, context)
|
2321
2324
|
end
|
2322
2325
|
|