aws-sdk-core 3.165.0 → 3.174.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +105 -0
  3. data/VERSION +1 -1
  4. data/lib/aws-sdk-core/credential_provider_chain.rb +8 -5
  5. data/lib/aws-sdk-core/ecs_credentials.rb +111 -53
  6. data/lib/aws-sdk-core/endpoints/condition.rb +5 -0
  7. data/lib/aws-sdk-core/endpoints/endpoint_rule.rb +5 -1
  8. data/lib/aws-sdk-core/endpoints/error_rule.rb +5 -0
  9. data/lib/aws-sdk-core/endpoints/function.rb +5 -0
  10. data/lib/aws-sdk-core/endpoints/reference.rb +5 -0
  11. data/lib/aws-sdk-core/endpoints/rule.rb +5 -0
  12. data/lib/aws-sdk-core/endpoints/rule_set.rb +5 -0
  13. data/lib/aws-sdk-core/endpoints/rules_provider.rb +5 -0
  14. data/lib/aws-sdk-core/endpoints/templater.rb +6 -0
  15. data/lib/aws-sdk-core/endpoints/tree_rule.rb +5 -0
  16. data/lib/aws-sdk-core/endpoints/url.rb +1 -0
  17. data/lib/aws-sdk-core/json/error_handler.rb +15 -5
  18. data/lib/aws-sdk-core/log/formatter.rb +6 -0
  19. data/lib/aws-sdk-core/pageable_response.rb +3 -1
  20. data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +1 -1
  21. data/lib/aws-sdk-core/plugins/retries/error_inspector.rb +2 -1
  22. data/lib/aws-sdk-core/plugins/sign.rb +17 -7
  23. data/lib/aws-sdk-core/plugins/user_agent.rb +117 -14
  24. data/lib/aws-sdk-core/shared_config.rb +38 -9
  25. data/lib/aws-sdk-core/sso_credentials.rb +79 -44
  26. data/lib/aws-sdk-core/sso_token_provider.rb +3 -2
  27. data/lib/aws-sdk-core/waiters/poller.rb +3 -1
  28. data/lib/aws-sdk-core/xml/parser/engines/oga.rb +2 -0
  29. data/lib/aws-sdk-core.rb +1 -0
  30. data/lib/aws-sdk-sso/client.rb +6 -1
  31. data/lib/aws-sdk-sso/endpoint_provider.rb +35 -96
  32. data/lib/aws-sdk-sso/types.rb +0 -35
  33. data/lib/aws-sdk-sso.rb +1 -1
  34. data/lib/aws-sdk-ssooidc/client.rb +6 -1
  35. data/lib/aws-sdk-ssooidc/endpoint_provider.rb +35 -95
  36. data/lib/aws-sdk-ssooidc/types.rb +0 -32
  37. data/lib/aws-sdk-ssooidc.rb +1 -1
  38. data/lib/aws-sdk-sts/client.rb +244 -241
  39. data/lib/aws-sdk-sts/endpoint_provider.rb +96 -213
  40. data/lib/aws-sdk-sts/types.rb +87 -195
  41. data/lib/aws-sdk-sts.rb +1 -1
  42. data/lib/seahorse/client/h2/connection.rb +12 -11
  43. metadata +4 -4
@@ -277,6 +277,11 @@ module Aws::STS
277
277
  # in the future.
278
278
  #
279
279
  #
280
+ # @option options [String] :sdk_ua_app_id
281
+ # A unique and opaque application ID that is appended to the
282
+ # User-Agent header as app/<sdk_ua_app_id>. It should have a
283
+ # maximum length of 50.
284
+ #
280
285
  # @option options [String] :secret_access_key
281
286
  #
282
287
  # @option options [String] :session_token
@@ -376,14 +381,13 @@ module Aws::STS
376
381
  # @!group API Operations
377
382
 
378
383
  # Returns a set of temporary security credentials that you can use to
379
- # access Amazon Web Services resources that you might not normally have
380
- # access to. These temporary credentials consist of an access key ID, a
381
- # secret access key, and a security token. Typically, you use
382
- # `AssumeRole` within your account or for cross-account access. For a
383
- # comparison of `AssumeRole` with other API operations that produce
384
- # temporary credentials, see [Requesting Temporary Security
385
- # Credentials][1] and [Comparing the Amazon Web Services STS API
386
- # operations][2] in the *IAM User Guide*.
384
+ # access Amazon Web Services resources. These temporary credentials
385
+ # consist of an access key ID, a secret access key, and a security
386
+ # token. Typically, you use `AssumeRole` within your account or for
387
+ # cross-account access. For a comparison of `AssumeRole` with other API
388
+ # operations that produce temporary credentials, see [Requesting
389
+ # Temporary Security Credentials][1] and [Comparing the Amazon Web
390
+ # Services STS API operations][2] in the *IAM User Guide*.
387
391
  #
388
392
  # **Permissions**
389
393
  #
@@ -394,23 +398,24 @@ module Aws::STS
394
398
  #
395
399
  # (Optional) You can pass inline or managed [session policies][3] to
396
400
  # this operation. You can pass a single JSON policy document to use as
397
- # an inline session policy. You can also specify up to 10 managed
398
- # policies to use as managed session policies. The plaintext that you
399
- # use for both inline and managed session policies can't exceed 2,048
400
- # characters. Passing policies to this operation returns new temporary
401
- # credentials. The resulting session's permissions are the intersection
402
- # of the role's identity-based policy and the session policies. You can
403
- # use the role's temporary credentials in subsequent Amazon Web
404
- # Services API calls to access resources in the account that owns the
405
- # role. You cannot use session policies to grant more permissions than
406
- # those allowed by the identity-based policy of the role that is being
407
- # assumed. For more information, see [Session Policies][3] in the *IAM
408
- # User Guide*.
409
- #
410
- # When you create a role, you create two policies: A role trust policy
411
- # that specifies *who* can assume the role and a permissions policy that
412
- # specifies *what* can be done with the role. You specify the trusted
413
- # principal who is allowed to assume the role in the role trust policy.
401
+ # an inline session policy. You can also specify up to 10 managed policy
402
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
403
+ # plaintext that you use for both inline and managed session policies
404
+ # can't exceed 2,048 characters. Passing policies to this operation
405
+ # returns new temporary credentials. The resulting session's
406
+ # permissions are the intersection of the role's identity-based policy
407
+ # and the session policies. You can use the role's temporary
408
+ # credentials in subsequent Amazon Web Services API calls to access
409
+ # resources in the account that owns the role. You cannot use session
410
+ # policies to grant more permissions than those allowed by the
411
+ # identity-based policy of the role that is being assumed. For more
412
+ # information, see [Session Policies][3] in the *IAM User Guide*.
413
+ #
414
+ # When you create a role, you create two policies: a role trust policy
415
+ # that specifies *who* can assume the role, and a permissions policy
416
+ # that specifies *what* can be done with the role. You specify the
417
+ # trusted principal that is allowed to assume the role in the role trust
418
+ # policy.
414
419
  #
415
420
  # To assume a role from a different account, your Amazon Web Services
416
421
  # account must be trusted by the role. The trust relationship is defined
@@ -419,10 +424,9 @@ module Aws::STS
419
424
  # users in the account.
420
425
  #
421
426
  # A user who wants to access a role in a different account must also
422
- # have permissions that are delegated from the user account
423
- # administrator. The administrator must attach a policy that allows the
424
- # user to call `AssumeRole` for the ARN of the role in the other
425
- # account.
427
+ # have permissions that are delegated from the account administrator.
428
+ # The administrator must attach a policy that allows the user to call
429
+ # `AssumeRole` for the ARN of the role in the other account.
426
430
  #
427
431
  # To allow a user to assume a role in the same account, you can do
428
432
  # either of the following:
@@ -519,12 +523,12 @@ module Aws::STS
519
523
  # about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
520
524
  # Service Namespaces][1] in the Amazon Web Services General Reference.
521
525
  #
522
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
523
- # policies and session tags into a packed binary format that has a
524
- # separate limit. Your request can fail for this limit even if your
525
- # plaintext meets the other requirements. The `PackedPolicySize`
526
- # response element indicates by percentage how close the policies and
527
- # tags for your request are to the upper size limit.
526
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
527
+ # policy, managed policy ARNs, and session tags into a packed binary
528
+ # format that has a separate limit. Your request can fail for this limit
529
+ # even if your plaintext meets the other requirements. The
530
+ # `PackedPolicySize` response element indicates by percentage how close
531
+ # the policies and tags for your request are to the upper size limit.
528
532
  #
529
533
  # </note>
530
534
  #
@@ -564,12 +568,12 @@ module Aws::STS
564
568
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
565
569
  # characters.
566
570
  #
567
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
568
- # policies and session tags into a packed binary format that has a
569
- # separate limit. Your request can fail for this limit even if your
570
- # plaintext meets the other requirements. The `PackedPolicySize`
571
- # response element indicates by percentage how close the policies and
572
- # tags for your request are to the upper size limit.
571
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
572
+ # policy, managed policy ARNs, and session tags into a packed binary
573
+ # format that has a separate limit. Your request can fail for this limit
574
+ # even if your plaintext meets the other requirements. The
575
+ # `PackedPolicySize` response element indicates by percentage how close
576
+ # the policies and tags for your request are to the upper size limit.
573
577
  #
574
578
  # </note>
575
579
  #
@@ -627,12 +631,12 @@ module Aws::STS
627
631
  # can’t exceed 256 characters. For these and additional limits, see [IAM
628
632
  # and STS Character Limits][2] in the *IAM User Guide*.
629
633
  #
630
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
631
- # policies and session tags into a packed binary format that has a
632
- # separate limit. Your request can fail for this limit even if your
633
- # plaintext meets the other requirements. The `PackedPolicySize`
634
- # response element indicates by percentage how close the policies and
635
- # tags for your request are to the upper size limit.
634
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
635
+ # policy, managed policy ARNs, and session tags into a packed binary
636
+ # format that has a separate limit. Your request can fail for this limit
637
+ # even if your plaintext meets the other requirements. The
638
+ # `PackedPolicySize` response element indicates by percentage how close
639
+ # the policies and tags for your request are to the upper size limit.
636
640
  #
637
641
  # </note>
638
642
  #
@@ -895,18 +899,18 @@ module Aws::STS
895
899
  #
896
900
  # (Optional) You can pass inline or managed [session policies][6] to
897
901
  # this operation. You can pass a single JSON policy document to use as
898
- # an inline session policy. You can also specify up to 10 managed
899
- # policies to use as managed session policies. The plaintext that you
900
- # use for both inline and managed session policies can't exceed 2,048
901
- # characters. Passing policies to this operation returns new temporary
902
- # credentials. The resulting session's permissions are the intersection
903
- # of the role's identity-based policy and the session policies. You can
904
- # use the role's temporary credentials in subsequent Amazon Web
905
- # Services API calls to access resources in the account that owns the
906
- # role. You cannot use session policies to grant more permissions than
907
- # those allowed by the identity-based policy of the role that is being
908
- # assumed. For more information, see [Session Policies][6] in the *IAM
909
- # User Guide*.
902
+ # an inline session policy. You can also specify up to 10 managed policy
903
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
904
+ # plaintext that you use for both inline and managed session policies
905
+ # can't exceed 2,048 characters. Passing policies to this operation
906
+ # returns new temporary credentials. The resulting session's
907
+ # permissions are the intersection of the role's identity-based policy
908
+ # and the session policies. You can use the role's temporary
909
+ # credentials in subsequent Amazon Web Services API calls to access
910
+ # resources in the account that owns the role. You cannot use session
911
+ # policies to grant more permissions than those allowed by the
912
+ # identity-based policy of the role that is being assumed. For more
913
+ # information, see [Session Policies][6] in the *IAM User Guide*.
910
914
  #
911
915
  # Calling `AssumeRoleWithSAML` does not require the use of Amazon Web
912
916
  # Services security credentials. The identity of the caller is validated
@@ -932,12 +936,12 @@ module Aws::STS
932
936
  # characters. For these and additional limits, see [IAM and STS
933
937
  # Character Limits][8] in the *IAM User Guide*.
934
938
  #
935
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
936
- # policies and session tags into a packed binary format that has a
937
- # separate limit. Your request can fail for this limit even if your
938
- # plaintext meets the other requirements. The `PackedPolicySize`
939
- # response element indicates by percentage how close the policies and
940
- # tags for your request are to the upper size limit.
939
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
940
+ # policy, managed policy ARNs, and session tags into a packed binary
941
+ # format that has a separate limit. Your request can fail for this limit
942
+ # even if your plaintext meets the other requirements. The
943
+ # `PackedPolicySize` response element indicates by percentage how close
944
+ # the policies and tags for your request are to the upper size limit.
941
945
  #
942
946
  # </note>
943
947
  #
@@ -1023,12 +1027,12 @@ module Aws::STS
1023
1027
  # about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
1024
1028
  # Service Namespaces][1] in the Amazon Web Services General Reference.
1025
1029
  #
1026
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1027
- # policies and session tags into a packed binary format that has a
1028
- # separate limit. Your request can fail for this limit even if your
1029
- # plaintext meets the other requirements. The `PackedPolicySize`
1030
- # response element indicates by percentage how close the policies and
1031
- # tags for your request are to the upper size limit.
1030
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1031
+ # policy, managed policy ARNs, and session tags into a packed binary
1032
+ # format that has a separate limit. Your request can fail for this limit
1033
+ # even if your plaintext meets the other requirements. The
1034
+ # `PackedPolicySize` response element indicates by percentage how close
1035
+ # the policies and tags for your request are to the upper size limit.
1032
1036
  #
1033
1037
  # </note>
1034
1038
  #
@@ -1068,12 +1072,12 @@ module Aws::STS
1068
1072
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
1069
1073
  # characters.
1070
1074
  #
1071
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1072
- # policies and session tags into a packed binary format that has a
1073
- # separate limit. Your request can fail for this limit even if your
1074
- # plaintext meets the other requirements. The `PackedPolicySize`
1075
- # response element indicates by percentage how close the policies and
1076
- # tags for your request are to the upper size limit.
1075
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1076
+ # policy, managed policy ARNs, and session tags into a packed binary
1077
+ # format that has a separate limit. Your request can fail for this limit
1078
+ # even if your plaintext meets the other requirements. The
1079
+ # `PackedPolicySize` response element indicates by percentage how close
1080
+ # the policies and tags for your request are to the upper size limit.
1077
1081
  #
1078
1082
  # </note>
1079
1083
  #
@@ -1207,10 +1211,8 @@ module Aws::STS
1207
1211
  # the user with a consistent identity throughout the lifetime of an
1208
1212
  # application.
1209
1213
  #
1210
- # To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
1211
- # in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
1212
- # Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
1213
- # Guide*.
1214
+ # To learn more about Amazon Cognito, see [Amazon Cognito identity
1215
+ # pools][1] in *Amazon Cognito Developer Guide*.
1214
1216
  #
1215
1217
  # </note>
1216
1218
  #
@@ -1224,8 +1226,8 @@ module Aws::STS
1224
1226
  # a token from the web identity provider. For a comparison of
1225
1227
  # `AssumeRoleWithWebIdentity` with the other API operations that produce
1226
1228
  # temporary credentials, see [Requesting Temporary Security
1227
- # Credentials][6] and [Comparing the Amazon Web Services STS API
1228
- # operations][7] in the *IAM User Guide*.
1229
+ # Credentials][4] and [Comparing the Amazon Web Services STS API
1230
+ # operations][5] in the *IAM User Guide*.
1229
1231
  #
1230
1232
  # The temporary security credentials returned by this API consist of an
1231
1233
  # access key ID, a secret access key, and a security token. Applications
@@ -1241,11 +1243,11 @@ module Aws::STS
1241
1243
  # to the maximum session duration setting for the role. This setting can
1242
1244
  # have a value from 1 hour to 12 hours. To learn how to view the maximum
1243
1245
  # value for your role, see [View the Maximum Session Duration Setting
1244
- # for a Role][8] in the *IAM User Guide*. The maximum session duration
1246
+ # for a Role][6] in the *IAM User Guide*. The maximum session duration
1245
1247
  # limit applies when you use the `AssumeRole*` API operations or the
1246
1248
  # `assume-role*` CLI commands. However the limit does not apply when you
1247
1249
  # use those operations to create a console URL. For more information,
1248
- # see [Using IAM Roles][9] in the *IAM User Guide*.
1250
+ # see [Using IAM Roles][7] in the *IAM User Guide*.
1249
1251
  #
1250
1252
  # **Permissions**
1251
1253
  #
@@ -1254,39 +1256,39 @@ module Aws::STS
1254
1256
  # Amazon Web Services service with the following exception: you cannot
1255
1257
  # call the STS `GetFederationToken` or `GetSessionToken` API operations.
1256
1258
  #
1257
- # (Optional) You can pass inline or managed [session policies][10] to
1259
+ # (Optional) You can pass inline or managed [session policies][8] to
1258
1260
  # this operation. You can pass a single JSON policy document to use as
1259
- # an inline session policy. You can also specify up to 10 managed
1260
- # policies to use as managed session policies. The plaintext that you
1261
- # use for both inline and managed session policies can't exceed 2,048
1262
- # characters. Passing policies to this operation returns new temporary
1263
- # credentials. The resulting session's permissions are the intersection
1264
- # of the role's identity-based policy and the session policies. You can
1265
- # use the role's temporary credentials in subsequent Amazon Web
1266
- # Services API calls to access resources in the account that owns the
1267
- # role. You cannot use session policies to grant more permissions than
1268
- # those allowed by the identity-based policy of the role that is being
1269
- # assumed. For more information, see [Session Policies][10] in the *IAM
1270
- # User Guide*.
1261
+ # an inline session policy. You can also specify up to 10 managed policy
1262
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
1263
+ # plaintext that you use for both inline and managed session policies
1264
+ # can't exceed 2,048 characters. Passing policies to this operation
1265
+ # returns new temporary credentials. The resulting session's
1266
+ # permissions are the intersection of the role's identity-based policy
1267
+ # and the session policies. You can use the role's temporary
1268
+ # credentials in subsequent Amazon Web Services API calls to access
1269
+ # resources in the account that owns the role. You cannot use session
1270
+ # policies to grant more permissions than those allowed by the
1271
+ # identity-based policy of the role that is being assumed. For more
1272
+ # information, see [Session Policies][8] in the *IAM User Guide*.
1271
1273
  #
1272
1274
  # **Tags**
1273
1275
  #
1274
1276
  # (Optional) You can configure your IdP to pass attributes into your web
1275
1277
  # identity token as session tags. Each session tag consists of a key
1276
1278
  # name and an associated value. For more information about session tags,
1277
- # see [Passing Session Tags in STS][11] in the *IAM User Guide*.
1279
+ # see [Passing Session Tags in STS][9] in the *IAM User Guide*.
1278
1280
  #
1279
1281
  # You can pass up to 50 session tags. The plaintext session tag keys
1280
1282
  # can’t exceed 128 characters and the values can’t exceed 256
1281
1283
  # characters. For these and additional limits, see [IAM and STS
1282
- # Character Limits][12] in the *IAM User Guide*.
1284
+ # Character Limits][10] in the *IAM User Guide*.
1283
1285
  #
1284
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1285
- # policies and session tags into a packed binary format that has a
1286
- # separate limit. Your request can fail for this limit even if your
1287
- # plaintext meets the other requirements. The `PackedPolicySize`
1288
- # response element indicates by percentage how close the policies and
1289
- # tags for your request are to the upper size limit.
1286
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1287
+ # policy, managed policy ARNs, and session tags into a packed binary
1288
+ # format that has a separate limit. Your request can fail for this limit
1289
+ # even if your plaintext meets the other requirements. The
1290
+ # `PackedPolicySize` response element indicates by percentage how close
1291
+ # the policies and tags for your request are to the upper size limit.
1290
1292
  #
1291
1293
  # </note>
1292
1294
  #
@@ -1297,12 +1299,12 @@ module Aws::STS
1297
1299
  # An administrator must grant you the permissions necessary to pass
1298
1300
  # session tags. The administrator can also create granular permissions
1299
1301
  # to allow you to pass only specific session tags. For more information,
1300
- # see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
1302
+ # see [Tutorial: Using Tags for Attribute-Based Access Control][11] in
1301
1303
  # the *IAM User Guide*.
1302
1304
  #
1303
1305
  # You can set the session tags as transitive. Transitive tags persist
1304
1306
  # during role chaining. For more information, see [Chaining Roles with
1305
- # Session Tags][14] in the *IAM User Guide*.
1307
+ # Session Tags][12] in the *IAM User Guide*.
1306
1308
  #
1307
1309
  # **Identities**
1308
1310
  #
@@ -1314,19 +1316,19 @@ module Aws::STS
1314
1316
  # specified in the role's trust policy.
1315
1317
  #
1316
1318
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your
1317
- # CloudTrail logs. The entry includes the [Subject][15] of the provided
1319
+ # CloudTrail logs. The entry includes the [Subject][13] of the provided
1318
1320
  # web identity token. We recommend that you avoid using any personally
1319
1321
  # identifiable information (PII) in this field. For example, you could
1320
1322
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
1321
- # specification][16].
1323
+ # specification][14].
1322
1324
  #
1323
1325
  # For more information about how to use web identity federation and the
1324
1326
  # `AssumeRoleWithWebIdentity` API, see the following resources:
1325
1327
  #
1326
- # * [Using Web Identity Federation API Operations for Mobile Apps][17]
1327
- # and [Federation Through a Web-based Identity Provider][18].
1328
+ # * [Using Web Identity Federation API Operations for Mobile Apps][15]
1329
+ # and [Federation Through a Web-based Identity Provider][16].
1328
1330
  #
1329
- # * [ Web Identity Federation Playground][19]. Walk through the process
1331
+ # * [ Web Identity Federation Playground][17]. Walk through the process
1330
1332
  # of authenticating through Login with Amazon, Facebook, or Google,
1331
1333
  # getting temporary security credentials, and then using those
1332
1334
  # credentials to make a request to Amazon Web Services.
@@ -1337,7 +1339,7 @@ module Aws::STS
1337
1339
  # toolkits then show how to use the information from these providers
1338
1340
  # to get and use temporary security credentials.
1339
1341
  #
1340
- # * [Web Identity Federation with Mobile Applications][20]. This article
1342
+ # * [Web Identity Federation with Mobile Applications][18]. This article
1341
1343
  # discusses web identity federation and shows an example of how to use
1342
1344
  # web identity federation to get access to content in Amazon S3.
1343
1345
  #
@@ -1346,23 +1348,21 @@ module Aws::STS
1346
1348
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
1347
1349
  # [2]: http://aws.amazon.com/sdkforios/
1348
1350
  # [3]: http://aws.amazon.com/sdkforandroid/
1349
- # [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1350
- # [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1351
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1352
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1353
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1354
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1355
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1356
- # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1357
- # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1358
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1359
- # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1360
- # [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1361
- # [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1362
- # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1363
- # [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1364
- # [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1365
- # [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1351
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1352
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1353
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1354
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1355
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1356
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1357
+ # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1358
+ # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1359
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1360
+ # [13]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1361
+ # [14]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1362
+ # [15]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1363
+ # [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1364
+ # [17]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1365
+ # [18]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1366
1366
  #
1367
1367
  # @option params [required, String] :role_arn
1368
1368
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1410,12 +1410,12 @@ module Aws::STS
1410
1410
  # about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
1411
1411
  # Service Namespaces][1] in the Amazon Web Services General Reference.
1412
1412
  #
1413
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1414
- # policies and session tags into a packed binary format that has a
1415
- # separate limit. Your request can fail for this limit even if your
1416
- # plaintext meets the other requirements. The `PackedPolicySize`
1417
- # response element indicates by percentage how close the policies and
1418
- # tags for your request are to the upper size limit.
1413
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1414
+ # policy, managed policy ARNs, and session tags into a packed binary
1415
+ # format that has a separate limit. Your request can fail for this limit
1416
+ # even if your plaintext meets the other requirements. The
1417
+ # `PackedPolicySize` response element indicates by percentage how close
1418
+ # the policies and tags for your request are to the upper size limit.
1419
1419
  #
1420
1420
  # </note>
1421
1421
  #
@@ -1455,12 +1455,12 @@ module Aws::STS
1455
1455
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
1456
1456
  # characters.
1457
1457
  #
1458
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1459
- # policies and session tags into a packed binary format that has a
1460
- # separate limit. Your request can fail for this limit even if your
1461
- # plaintext meets the other requirements. The `PackedPolicySize`
1462
- # response element indicates by percentage how close the policies and
1463
- # tags for your request are to the upper size limit.
1458
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1459
+ # policy, managed policy ARNs, and session tags into a packed binary
1460
+ # format that has a separate limit. Your request can fail for this limit
1461
+ # even if your plaintext meets the other requirements. The
1462
+ # `PackedPolicySize` response element indicates by percentage how close
1463
+ # the policies and tags for your request are to the upper size limit.
1464
1464
  #
1465
1465
  # </note>
1466
1466
  #
@@ -1721,11 +1721,11 @@ module Aws::STS
1721
1721
  # to call the operation.
1722
1722
  #
1723
1723
  # <note markdown="1"> No permissions are required to perform this operation. If an
1724
- # administrator adds a policy to your IAM user or role that explicitly
1724
+ # administrator attaches a policy to your identity that explicitly
1725
1725
  # denies access to the `sts:GetCallerIdentity` action, you can still
1726
1726
  # perform this operation. Permissions are not required because the same
1727
- # information is returned when an IAM user or role is denied access. To
1728
- # view an example response, see [I Am Not Authorized to Perform:
1727
+ # information is returned when access is denied. To view an example
1728
+ # response, see [I Am Not Authorized to Perform:
1729
1729
  # iam:DeleteVirtualMFADevice][1] in the *IAM User Guide*.
1730
1730
  #
1731
1731
  # </note>
@@ -1802,60 +1802,63 @@ module Aws::STS
1802
1802
  end
1803
1803
 
1804
1804
  # Returns a set of temporary security credentials (consisting of an
1805
- # access key ID, a secret access key, and a security token) for a
1806
- # federated user. A typical use is in a proxy application that gets
1807
- # temporary security credentials on behalf of distributed applications
1808
- # inside a corporate network. You must call the `GetFederationToken`
1809
- # operation using the long-term security credentials of an IAM user. As
1810
- # a result, this call is appropriate in contexts where those credentials
1811
- # can be safely stored, usually in a server-based application. For a
1812
- # comparison of `GetFederationToken` with the other API operations that
1813
- # produce temporary credentials, see [Requesting Temporary Security
1805
+ # access key ID, a secret access key, and a security token) for a user.
1806
+ # A typical use is in a proxy application that gets temporary security
1807
+ # credentials on behalf of distributed applications inside a corporate
1808
+ # network.
1809
+ #
1810
+ # You must call the `GetFederationToken` operation using the long-term
1811
+ # security credentials of an IAM user. As a result, this call is
1812
+ # appropriate in contexts where those credentials can be safeguarded,
1813
+ # usually in a server-based application. For a comparison of
1814
+ # `GetFederationToken` with the other API operations that produce
1815
+ # temporary credentials, see [Requesting Temporary Security
1814
1816
  # Credentials][1] and [Comparing the Amazon Web Services STS API
1815
1817
  # operations][2] in the *IAM User Guide*.
1816
1818
  #
1819
+ # Although it is possible to call `GetFederationToken` using the
1820
+ # security credentials of an Amazon Web Services account root user
1821
+ # rather than an IAM user that you create for the purpose of a proxy
1822
+ # application, we do not recommend it. For more information, see
1823
+ # [Safeguard your root user credentials and don't use them for everyday
1824
+ # tasks][3] in the *IAM User Guide*.
1825
+ #
1817
1826
  # <note markdown="1"> You can create a mobile-based or browser-based app that can
1818
1827
  # authenticate users using a web identity provider like Login with
1819
1828
  # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
1820
- # provider. In this case, we recommend that you use [Amazon Cognito][3]
1829
+ # provider. In this case, we recommend that you use [Amazon Cognito][4]
1821
1830
  # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
1822
- # Through a Web-based Identity Provider][4] in the *IAM User Guide*.
1831
+ # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
1823
1832
  #
1824
1833
  # </note>
1825
1834
  #
1826
- # You can also call `GetFederationToken` using the security credentials
1827
- # of an Amazon Web Services account root user, but we do not recommend
1828
- # it. Instead, we recommend that you create an IAM user for the purpose
1829
- # of the proxy application. Then attach a policy to the IAM user that
1830
- # limits federated users to only the actions and resources that they
1831
- # need to access. For more information, see [IAM Best Practices][5] in
1832
- # the *IAM User Guide*.
1833
- #
1834
1835
  # **Session duration**
1835
1836
  #
1836
1837
  # The temporary credentials are valid for the specified duration, from
1837
1838
  # 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36
1838
1839
  # hours). The default session duration is 43,200 seconds (12 hours).
1839
- # Temporary credentials obtained by using the Amazon Web Services
1840
- # account root user credentials have a maximum duration of 3,600 seconds
1841
- # (1 hour).
1840
+ # Temporary credentials obtained by using the root user credentials have
1841
+ # a maximum duration of 3,600 seconds (1 hour).
1842
1842
  #
1843
1843
  # **Permissions**
1844
1844
  #
1845
1845
  # You can use the temporary credentials created by `GetFederationToken`
1846
- # in any Amazon Web Services service except the following:
1846
+ # in any Amazon Web Services service with the following exceptions:
1847
1847
  #
1848
1848
  # * You cannot call any IAM operations using the CLI or the Amazon Web
1849
- # Services API.
1849
+ # Services API. This limitation does not apply to console sessions.
1850
1850
  #
1851
1851
  # * You cannot call any STS operations except `GetCallerIdentity`.
1852
1852
  #
1853
+ # You can use temporary credentials for single sign-on (SSO) to the
1854
+ # console.
1855
+ #
1853
1856
  # You must pass an inline or managed [session policy][6] to this
1854
1857
  # operation. You can pass a single JSON policy document to use as an
1855
- # inline session policy. You can also specify up to 10 managed policies
1856
- # to use as managed session policies. The plaintext that you use for
1857
- # both inline and managed session policies can't exceed 2,048
1858
- # characters.
1858
+ # inline session policy. You can also specify up to 10 managed policy
1859
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
1860
+ # plaintext that you use for both inline and managed session policies
1861
+ # can't exceed 2,048 characters.
1859
1862
  #
1860
1863
  # Though the session policy parameters are optional, if you do not pass
1861
1864
  # a policy, then the resulting federated user session has no
@@ -1885,9 +1888,9 @@ module Aws::STS
1885
1888
  # <note markdown="1"> You can create a mobile-based or browser-based app that can
1886
1889
  # authenticate users using a web identity provider like Login with
1887
1890
  # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
1888
- # provider. In this case, we recommend that you use [Amazon Cognito][3]
1891
+ # provider. In this case, we recommend that you use [Amazon Cognito][4]
1889
1892
  # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
1890
- # Through a Web-based Identity Provider][4] in the *IAM User Guide*.
1893
+ # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
1891
1894
  #
1892
1895
  # </note>
1893
1896
  #
@@ -1909,9 +1912,9 @@ module Aws::STS
1909
1912
  #
1910
1913
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1911
1914
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1912
- # [3]: http://aws.amazon.com/cognito/
1913
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1914
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
1915
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
1916
+ # [4]: http://aws.amazon.com/cognito/
1917
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1915
1918
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1916
1919
  # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
1917
1920
  # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
@@ -1934,8 +1937,8 @@ module Aws::STS
1934
1937
  #
1935
1938
  # You must pass an inline or managed [session policy][1] to this
1936
1939
  # operation. You can pass a single JSON policy document to use as an
1937
- # inline session policy. You can also specify up to 10 managed policies
1938
- # to use as managed session policies.
1940
+ # inline session policy. You can also specify up to 10 managed policy
1941
+ # Amazon Resource Names (ARNs) to use as managed session policies.
1939
1942
  #
1940
1943
  # This parameter is optional. However, if you do not pass any session
1941
1944
  # policies, then the resulting federated user session has no
@@ -1963,12 +1966,12 @@ module Aws::STS
1963
1966
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
1964
1967
  # characters.
1965
1968
  #
1966
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1967
- # policies and session tags into a packed binary format that has a
1968
- # separate limit. Your request can fail for this limit even if your
1969
- # plaintext meets the other requirements. The `PackedPolicySize`
1970
- # response element indicates by percentage how close the policies and
1971
- # tags for your request are to the upper size limit.
1969
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1970
+ # policy, managed policy ARNs, and session tags into a packed binary
1971
+ # format that has a separate limit. Your request can fail for this limit
1972
+ # even if your plaintext meets the other requirements. The
1973
+ # `PackedPolicySize` response element indicates by percentage how close
1974
+ # the policies and tags for your request are to the upper size limit.
1972
1975
  #
1973
1976
  # </note>
1974
1977
  #
@@ -1983,13 +1986,13 @@ module Aws::STS
1983
1986
  #
1984
1987
  # You must pass an inline or managed [session policy][1] to this
1985
1988
  # operation. You can pass a single JSON policy document to use as an
1986
- # inline session policy. You can also specify up to 10 managed policies
1987
- # to use as managed session policies. The plaintext that you use for
1988
- # both inline and managed session policies can't exceed 2,048
1989
- # characters. You can provide up to 10 managed policy ARNs. For more
1990
- # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
1991
- # Web Services Service Namespaces][2] in the Amazon Web Services General
1992
- # Reference.
1989
+ # inline session policy. You can also specify up to 10 managed policy
1990
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
1991
+ # plaintext that you use for both inline and managed session policies
1992
+ # can't exceed 2,048 characters. You can provide up to 10 managed
1993
+ # policy ARNs. For more information about ARNs, see [Amazon Resource
1994
+ # Names (ARNs) and Amazon Web Services Service Namespaces][2] in the
1995
+ # Amazon Web Services General Reference.
1993
1996
  #
1994
1997
  # This parameter is optional. However, if you do not pass any session
1995
1998
  # policies, then the resulting federated user session has no
@@ -2010,12 +2013,12 @@ module Aws::STS
2010
2013
  # are granted in addition to the permissions that are granted by the
2011
2014
  # session policies.
2012
2015
  #
2013
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
2014
- # policies and session tags into a packed binary format that has a
2015
- # separate limit. Your request can fail for this limit even if your
2016
- # plaintext meets the other requirements. The `PackedPolicySize`
2017
- # response element indicates by percentage how close the policies and
2018
- # tags for your request are to the upper size limit.
2016
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
2017
+ # policy, managed policy ARNs, and session tags into a packed binary
2018
+ # format that has a separate limit. Your request can fail for this limit
2019
+ # even if your plaintext meets the other requirements. The
2020
+ # `PackedPolicySize` response element indicates by percentage how close
2021
+ # the policies and tags for your request are to the upper size limit.
2019
2022
  #
2020
2023
  # </note>
2021
2024
  #
@@ -2028,10 +2031,10 @@ module Aws::STS
2028
2031
  # The duration, in seconds, that the session should last. Acceptable
2029
2032
  # durations for federation sessions range from 900 seconds (15 minutes)
2030
2033
  # to 129,600 seconds (36 hours), with 43,200 seconds (12 hours) as the
2031
- # default. Sessions obtained using Amazon Web Services account root user
2032
- # credentials are restricted to a maximum of 3,600 seconds (one hour).
2033
- # If the specified duration is longer than one hour, the session
2034
- # obtained by using root user credentials defaults to one hour.
2034
+ # default. Sessions obtained using root user credentials are restricted
2035
+ # to a maximum of 3,600 seconds (one hour). If the specified duration is
2036
+ # longer than one hour, the session obtained by using root user
2037
+ # credentials defaults to one hour.
2035
2038
  #
2036
2039
  # @option params [Array<Types::Tag>] :tags
2037
2040
  # A list of session tags. Each session tag consists of a key name and an
@@ -2043,12 +2046,12 @@ module Aws::STS
2043
2046
  # can’t exceed 256 characters. For these and additional limits, see [IAM
2044
2047
  # and STS Character Limits][2] in the *IAM User Guide*.
2045
2048
  #
2046
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
2047
- # policies and session tags into a packed binary format that has a
2048
- # separate limit. Your request can fail for this limit even if your
2049
- # plaintext meets the other requirements. The `PackedPolicySize`
2050
- # response element indicates by percentage how close the policies and
2051
- # tags for your request are to the upper size limit.
2049
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
2050
+ # policy, managed policy ARNs, and session tags into a packed binary
2051
+ # format that has a separate limit. Your request can fail for this limit
2052
+ # even if your plaintext meets the other requirements. The
2053
+ # `PackedPolicySize` response element indicates by percentage how close
2054
+ # the policies and tags for your request are to the upper size limit.
2052
2055
  #
2053
2056
  # </note>
2054
2057
  #
@@ -2151,14 +2154,15 @@ module Aws::STS
2151
2154
  # secret access key, and a security token. Typically, you use
2152
2155
  # `GetSessionToken` if you want to use MFA to protect programmatic calls
2153
2156
  # to specific Amazon Web Services API operations like Amazon EC2
2154
- # `StopInstances`. MFA-enabled IAM users would need to call
2155
- # `GetSessionToken` and submit an MFA code that is associated with their
2156
- # MFA device. Using the temporary security credentials that are returned
2157
- # from the call, IAM users can then make programmatic calls to API
2158
- # operations that require MFA authentication. If you do not supply a
2159
- # correct MFA code, then the API returns an access denied error. For a
2160
- # comparison of `GetSessionToken` with the other API operations that
2161
- # produce temporary credentials, see [Requesting Temporary Security
2157
+ # `StopInstances`.
2158
+ #
2159
+ # MFA-enabled IAM users must call `GetSessionToken` and submit an MFA
2160
+ # code that is associated with their MFA device. Using the temporary
2161
+ # security credentials that the call returns, IAM users can then make
2162
+ # programmatic calls to API operations that require MFA authentication.
2163
+ # An incorrect MFA code causes the API to return an access denied error.
2164
+ # For a comparison of `GetSessionToken` with the other API operations
2165
+ # that produce temporary credentials, see [Requesting Temporary Security
2162
2166
  # Credentials][1] and [Comparing the Amazon Web Services STS API
2163
2167
  # operations][2] in the *IAM User Guide*.
2164
2168
  #
@@ -2173,13 +2177,13 @@ module Aws::STS
2173
2177
  # **Session Duration**
2174
2178
  #
2175
2179
  # The `GetSessionToken` operation must be called by using the long-term
2176
- # Amazon Web Services security credentials of the Amazon Web Services
2177
- # account root user or an IAM user. Credentials that are created by IAM
2178
- # users are valid for the duration that you specify. This duration can
2179
- # range from 900 seconds (15 minutes) up to a maximum of 129,600 seconds
2180
- # (36 hours), with a default of 43,200 seconds (12 hours). Credentials
2181
- # based on account credentials can range from 900 seconds (15 minutes)
2182
- # up to 3,600 seconds (1 hour), with a default of 1 hour.
2180
+ # Amazon Web Services security credentials of an IAM user. Credentials
2181
+ # that are created by IAM users are valid for the duration that you
2182
+ # specify. This duration can range from 900 seconds (15 minutes) up to a
2183
+ # maximum of 129,600 seconds (36 hours), with a default of 43,200
2184
+ # seconds (12 hours). Credentials based on account credentials can range
2185
+ # from 900 seconds (15 minutes) up to 3,600 seconds (1 hour), with a
2186
+ # default of 1 hour.
2183
2187
  #
2184
2188
  # **Permissions**
2185
2189
  #
@@ -2193,24 +2197,23 @@ module Aws::STS
2193
2197
  # * You cannot call any STS API *except* `AssumeRole` or
2194
2198
  # `GetCallerIdentity`.
2195
2199
  #
2196
- # <note markdown="1"> We recommend that you do not call `GetSessionToken` with Amazon Web
2197
- # Services account root user credentials. Instead, follow our [best
2198
- # practices][4] by creating one or more IAM users, giving them the
2199
- # necessary permissions, and using IAM users for everyday interaction
2200
- # with Amazon Web Services.
2200
+ # The credentials that `GetSessionToken` returns are based on
2201
+ # permissions associated with the IAM user whose credentials were used
2202
+ # to call the operation. The temporary credentials have the same
2203
+ # permissions as the IAM user.
2201
2204
  #
2202
- # </note>
2205
+ # <note markdown="1"> Although it is possible to call `GetSessionToken` using the security
2206
+ # credentials of an Amazon Web Services account root user rather than an
2207
+ # IAM user, we do not recommend it. If `GetSessionToken` is called using
2208
+ # root user credentials, the temporary credentials have root user
2209
+ # permissions. For more information, see [Safeguard your root user
2210
+ # credentials and don't use them for everyday tasks][4] in the *IAM
2211
+ # User Guide*
2203
2212
  #
2204
- # The credentials that are returned by `GetSessionToken` are based on
2205
- # permissions associated with the user whose credentials were used to
2206
- # call the operation. If `GetSessionToken` is called using Amazon Web
2207
- # Services account root user credentials, the temporary credentials have
2208
- # root user permissions. Similarly, if `GetSessionToken` is called using
2209
- # the credentials of an IAM user, the temporary credentials have the
2210
- # same permissions as the IAM user.
2213
+ # </note>
2211
2214
  #
2212
2215
  # For more information about using `GetSessionToken` to create temporary
2213
- # credentials, go to [Temporary Credentials for Users in Untrusted
2216
+ # credentials, see [Temporary Credentials for Users in Untrusted
2214
2217
  # Environments][5] in the *IAM User Guide*.
2215
2218
  #
2216
2219
  #
@@ -2218,7 +2221,7 @@ module Aws::STS
2218
2221
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
2219
2222
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
2220
2223
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_getsessiontoken.html
2221
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#create-iam-users
2224
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
2222
2225
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken
2223
2226
  #
2224
2227
  # @option params [Integer] :duration_seconds
@@ -2316,7 +2319,7 @@ module Aws::STS
2316
2319
  params: params,
2317
2320
  config: config)
2318
2321
  context[:gem_name] = 'aws-sdk-core'
2319
- context[:gem_version] = '3.165.0'
2322
+ context[:gem_version] = '3.174.0'
2320
2323
  Seahorse::Client::Request.new(handlers, context)
2321
2324
  end
2322
2325