aws-sdk-core 2.6.43 → 2.6.44
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/apis/config/2014-11-12/api-2.json +2 -1
- data/apis/elasticfilesystem/2015-02-01/api-2.json +2 -2
- data/apis/elasticfilesystem/2015-02-01/examples-1.json +217 -0
- data/apis/iam/2010-05-08/examples-1.json +1186 -0
- data/apis/lambda/2015-03-31/examples-1.json +609 -0
- data/apis/marketplacecommerceanalytics/2015-07-01/api-2.json +1 -0
- data/apis/rekognition/2016-06-27/examples-1.json +646 -0
- data/apis/snowball/2016-06-30/examples-1.json +437 -0
- data/apis/streams.dynamodb/2012-08-10/api-2.json +2 -2
- data/apis/streams.dynamodb/2012-08-10/examples-1.json +207 -0
- data/lib/aws-sdk-core/plugins/s3_bucket_dns.rb +1 -1
- data/lib/aws-sdk-core/version.rb +1 -1
- data/lib/seahorse/client/plugin_list.rb +3 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 35325de139b8f3e95204b4cbe99bbcd4ffc6fe9e
|
4
|
+
data.tar.gz: fe22fa3322e1079511a114b70d7c7ba107a463e4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8e4e0958e736988836ce88e5674efd85332aaf782a204257ddd7c87305ef3ddcc65e6718e79bec5edac39797f907e2446d6c0720f354f917c69590d9afa3a791
|
7
|
+
data.tar.gz: 3b8075575062e27d27511cd599c9c368c446d8c5296806a5a5c144b242c61b2f116e32c5ffa61012456be12026fe6ab81f8c0e8cb2bac26de761a4bb5ef0e04a
|
@@ -1084,7 +1084,8 @@
|
|
1084
1084
|
"enum":[
|
1085
1085
|
"ConfigurationItemChangeNotification",
|
1086
1086
|
"ConfigurationSnapshotDeliveryCompleted",
|
1087
|
-
"ScheduledNotification"
|
1087
|
+
"ScheduledNotification",
|
1088
|
+
"OversizedConfigurationItemChangeNotification"
|
1088
1089
|
]
|
1089
1090
|
},
|
1090
1091
|
"Name":{"type":"string"},
|
@@ -1,13 +1,13 @@
|
|
1
1
|
{
|
2
2
|
"version":"2.0",
|
3
3
|
"metadata":{
|
4
|
-
"uid":"elasticfilesystem-2015-02-01",
|
5
4
|
"apiVersion":"2015-02-01",
|
6
5
|
"endpointPrefix":"elasticfilesystem",
|
7
6
|
"protocol":"rest-json",
|
8
7
|
"serviceAbbreviation":"EFS",
|
9
8
|
"serviceFullName":"Amazon Elastic File System",
|
10
|
-
"signatureVersion":"v4"
|
9
|
+
"signatureVersion":"v4",
|
10
|
+
"uid":"elasticfilesystem-2015-02-01"
|
11
11
|
},
|
12
12
|
"operations":{
|
13
13
|
"CreateFileSystem":{
|
@@ -1,5 +1,222 @@
|
|
1
1
|
{
|
2
2
|
"version": "1.0",
|
3
3
|
"examples": {
|
4
|
+
"CreateFileSystem": [
|
5
|
+
{
|
6
|
+
"input": {
|
7
|
+
"CreationToken": "tokenstring",
|
8
|
+
"PerformanceMode": "generalPurpose"
|
9
|
+
},
|
10
|
+
"output": {
|
11
|
+
"CreationTime": "1481841524.0",
|
12
|
+
"CreationToken": "tokenstring",
|
13
|
+
"FileSystemId": "fs-01234567",
|
14
|
+
"LifeCycleState": "creating",
|
15
|
+
"NumberOfMountTargets": 0,
|
16
|
+
"OwnerId": "012345678912",
|
17
|
+
"PerformanceMode": "generalPurpose",
|
18
|
+
"SizeInBytes": {
|
19
|
+
"Value": 0
|
20
|
+
}
|
21
|
+
},
|
22
|
+
"comments": {
|
23
|
+
"input": {
|
24
|
+
},
|
25
|
+
"output": {
|
26
|
+
}
|
27
|
+
},
|
28
|
+
"description": "This operation creates a new file system with the default generalpurpose performance mode.",
|
29
|
+
"id": "to-create-a-new-file-system-1481840798547",
|
30
|
+
"title": "To create a new file system"
|
31
|
+
}
|
32
|
+
],
|
33
|
+
"CreateMountTarget": [
|
34
|
+
{
|
35
|
+
"input": {
|
36
|
+
"FileSystemId": "fs-01234567",
|
37
|
+
"SubnetId": "subnet-1234abcd"
|
38
|
+
},
|
39
|
+
"output": {
|
40
|
+
"FileSystemId": "fs-01234567",
|
41
|
+
"IpAddress": "192.0.0.2",
|
42
|
+
"LifeCycleState": "creating",
|
43
|
+
"MountTargetId": "fsmt-12340abc",
|
44
|
+
"NetworkInterfaceId": "eni-cedf6789",
|
45
|
+
"OwnerId": "012345678912",
|
46
|
+
"SubnetId": "subnet-1234abcd"
|
47
|
+
},
|
48
|
+
"comments": {
|
49
|
+
"input": {
|
50
|
+
},
|
51
|
+
"output": {
|
52
|
+
}
|
53
|
+
},
|
54
|
+
"description": "This operation creates a new mount target for an EFS file system.",
|
55
|
+
"id": "to-create-a-new-mount-target-1481842289329",
|
56
|
+
"title": "To create a new mount target"
|
57
|
+
}
|
58
|
+
],
|
59
|
+
"CreateTags": [
|
60
|
+
{
|
61
|
+
"input": {
|
62
|
+
"FileSystemId": "fs-01234567",
|
63
|
+
"Tags": [
|
64
|
+
{
|
65
|
+
"Key": "Name",
|
66
|
+
"Value": "MyFileSystem"
|
67
|
+
}
|
68
|
+
]
|
69
|
+
},
|
70
|
+
"comments": {
|
71
|
+
},
|
72
|
+
"description": "This operation creates a new tag for an EFS file system.",
|
73
|
+
"id": "to-create-a-new-tag-1481843409357",
|
74
|
+
"title": "To create a new tag"
|
75
|
+
}
|
76
|
+
],
|
77
|
+
"DeleteFileSystem": [
|
78
|
+
{
|
79
|
+
"input": {
|
80
|
+
"FileSystemId": "fs-01234567"
|
81
|
+
},
|
82
|
+
"comments": {
|
83
|
+
},
|
84
|
+
"description": "This operation deletes an EFS file system.",
|
85
|
+
"id": "to-delete-a-file-system-1481847318348",
|
86
|
+
"title": "To delete a file system"
|
87
|
+
}
|
88
|
+
],
|
89
|
+
"DeleteMountTarget": [
|
90
|
+
{
|
91
|
+
"input": {
|
92
|
+
"MountTargetId": "fsmt-12340abc"
|
93
|
+
},
|
94
|
+
"comments": {
|
95
|
+
},
|
96
|
+
"description": "This operation deletes a mount target.",
|
97
|
+
"id": "to-delete-a-mount-target-1481847635607",
|
98
|
+
"title": "To delete a mount target"
|
99
|
+
}
|
100
|
+
],
|
101
|
+
"DeleteTags": [
|
102
|
+
{
|
103
|
+
"input": {
|
104
|
+
"FileSystemId": "fs-01234567",
|
105
|
+
"TagKeys": [
|
106
|
+
"Name"
|
107
|
+
]
|
108
|
+
},
|
109
|
+
"comments": {
|
110
|
+
},
|
111
|
+
"description": "This operation deletes tags for an EFS file system.",
|
112
|
+
"id": "to-delete-tags-for-an-efs-file-system-1481848189061",
|
113
|
+
"title": "To delete tags for an EFS file system"
|
114
|
+
}
|
115
|
+
],
|
116
|
+
"DescribeFileSystems": [
|
117
|
+
{
|
118
|
+
"input": {
|
119
|
+
},
|
120
|
+
"output": {
|
121
|
+
"FileSystems": [
|
122
|
+
{
|
123
|
+
"CreationTime": "1481841524.0",
|
124
|
+
"CreationToken": "tokenstring",
|
125
|
+
"FileSystemId": "fs-01234567",
|
126
|
+
"LifeCycleState": "available",
|
127
|
+
"Name": "MyFileSystem",
|
128
|
+
"NumberOfMountTargets": 1,
|
129
|
+
"OwnerId": "012345678912",
|
130
|
+
"PerformanceMode": "generalPurpose",
|
131
|
+
"SizeInBytes": {
|
132
|
+
"Value": 6144
|
133
|
+
}
|
134
|
+
}
|
135
|
+
]
|
136
|
+
},
|
137
|
+
"comments": {
|
138
|
+
},
|
139
|
+
"description": "This operation describes all of the EFS file systems in an account.",
|
140
|
+
"id": "to-describe-an-efs-file-system-1481848448460",
|
141
|
+
"title": "To describe an EFS file system"
|
142
|
+
}
|
143
|
+
],
|
144
|
+
"DescribeMountTargetSecurityGroups": [
|
145
|
+
{
|
146
|
+
"input": {
|
147
|
+
"MountTargetId": "fsmt-12340abc"
|
148
|
+
},
|
149
|
+
"output": {
|
150
|
+
"SecurityGroups": [
|
151
|
+
"sg-fghi4567"
|
152
|
+
]
|
153
|
+
},
|
154
|
+
"comments": {
|
155
|
+
},
|
156
|
+
"description": "This operation describes all of the security groups for a file system's mount target.",
|
157
|
+
"id": "to-describe-the-security-groups-for-a-mount-target-1481849317823",
|
158
|
+
"title": "To describe the security groups for a mount target"
|
159
|
+
}
|
160
|
+
],
|
161
|
+
"DescribeMountTargets": [
|
162
|
+
{
|
163
|
+
"input": {
|
164
|
+
"FileSystemId": "fs-01234567"
|
165
|
+
},
|
166
|
+
"output": {
|
167
|
+
"MountTargets": [
|
168
|
+
{
|
169
|
+
"FileSystemId": "fs-01234567",
|
170
|
+
"IpAddress": "192.0.0.2",
|
171
|
+
"LifeCycleState": "available",
|
172
|
+
"MountTargetId": "fsmt-12340abc",
|
173
|
+
"NetworkInterfaceId": "eni-cedf6789",
|
174
|
+
"OwnerId": "012345678912",
|
175
|
+
"SubnetId": "subnet-1234abcd"
|
176
|
+
}
|
177
|
+
]
|
178
|
+
},
|
179
|
+
"comments": {
|
180
|
+
},
|
181
|
+
"description": "This operation describes all of a file system's mount targets.",
|
182
|
+
"id": "to-describe-the-mount-targets-for-a-file-system-1481849958584",
|
183
|
+
"title": "To describe the mount targets for a file system"
|
184
|
+
}
|
185
|
+
],
|
186
|
+
"DescribeTags": [
|
187
|
+
{
|
188
|
+
"input": {
|
189
|
+
"FileSystemId": "fs-01234567"
|
190
|
+
},
|
191
|
+
"output": {
|
192
|
+
"Tags": [
|
193
|
+
{
|
194
|
+
"Key": "Name",
|
195
|
+
"Value": "MyFileSystem"
|
196
|
+
}
|
197
|
+
]
|
198
|
+
},
|
199
|
+
"comments": {
|
200
|
+
},
|
201
|
+
"description": "This operation describes all of a file system's tags.",
|
202
|
+
"id": "to-describe-the-tags-for-a-file-system-1481850497090",
|
203
|
+
"title": "To describe the tags for a file system"
|
204
|
+
}
|
205
|
+
],
|
206
|
+
"ModifyMountTargetSecurityGroups": [
|
207
|
+
{
|
208
|
+
"input": {
|
209
|
+
"MountTargetId": "fsmt-12340abc",
|
210
|
+
"SecurityGroups": [
|
211
|
+
"sg-abcd1234"
|
212
|
+
]
|
213
|
+
},
|
214
|
+
"comments": {
|
215
|
+
},
|
216
|
+
"description": "This operation modifies the security groups associated with a mount target for a file system.",
|
217
|
+
"id": "to-modify-the-security-groups-associated-with-a-mount-target-for-a-file-system-1481850772562",
|
218
|
+
"title": "To modify the security groups associated with a mount target for a file system"
|
219
|
+
}
|
220
|
+
]
|
4
221
|
}
|
5
222
|
}
|
@@ -1,5 +1,1191 @@
|
|
1
1
|
{
|
2
2
|
"version": "1.0",
|
3
3
|
"examples": {
|
4
|
+
"AddClientIDToOpenIDConnectProvider": [
|
5
|
+
{
|
6
|
+
"input": {
|
7
|
+
"ClientID": "my-application-ID",
|
8
|
+
"OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
|
9
|
+
},
|
10
|
+
"comments": {
|
11
|
+
"input": {
|
12
|
+
},
|
13
|
+
"output": {
|
14
|
+
}
|
15
|
+
},
|
16
|
+
"description": "The following add-client-id-to-open-id-connect-provider command adds the client ID my-application-ID to the OIDC provider named server.example.com:",
|
17
|
+
"id": "028e91f4-e2a6-4d59-9e3b-4965a3fb19be",
|
18
|
+
"title": "To add a client ID (audience) to an Open-ID Connect (OIDC) provider"
|
19
|
+
}
|
20
|
+
],
|
21
|
+
"AddRoleToInstanceProfile": [
|
22
|
+
{
|
23
|
+
"input": {
|
24
|
+
"InstanceProfileName": "Webserver",
|
25
|
+
"RoleName": "S3Access"
|
26
|
+
},
|
27
|
+
"comments": {
|
28
|
+
"input": {
|
29
|
+
},
|
30
|
+
"output": {
|
31
|
+
}
|
32
|
+
},
|
33
|
+
"description": "The following command adds the role named S3Access to the instance profile named Webserver:",
|
34
|
+
"id": "c107fac3-edb6-4827-8a71-8863ec91c81f",
|
35
|
+
"title": "To add a role to an instance profile"
|
36
|
+
}
|
37
|
+
],
|
38
|
+
"AddUserToGroup": [
|
39
|
+
{
|
40
|
+
"input": {
|
41
|
+
"GroupName": "Admins",
|
42
|
+
"UserName": "Bob"
|
43
|
+
},
|
44
|
+
"comments": {
|
45
|
+
"input": {
|
46
|
+
},
|
47
|
+
"output": {
|
48
|
+
}
|
49
|
+
},
|
50
|
+
"description": "The following command adds an IAM user named Bob to the IAM group named Admins:",
|
51
|
+
"id": "619c7e6b-09f8-4036-857b-51a6ea5027ca",
|
52
|
+
"title": "To add a user to an IAM group"
|
53
|
+
}
|
54
|
+
],
|
55
|
+
"AttachGroupPolicy": [
|
56
|
+
{
|
57
|
+
"input": {
|
58
|
+
"GroupName": "Finance",
|
59
|
+
"PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess"
|
60
|
+
},
|
61
|
+
"comments": {
|
62
|
+
"input": {
|
63
|
+
},
|
64
|
+
"output": {
|
65
|
+
}
|
66
|
+
},
|
67
|
+
"description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM group named Finance.",
|
68
|
+
"id": "87551489-86f0-45db-9889-759936778f2b",
|
69
|
+
"title": "To attach a managed policy to an IAM group"
|
70
|
+
}
|
71
|
+
],
|
72
|
+
"AttachRolePolicy": [
|
73
|
+
{
|
74
|
+
"input": {
|
75
|
+
"PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess",
|
76
|
+
"RoleName": "ReadOnlyRole"
|
77
|
+
},
|
78
|
+
"comments": {
|
79
|
+
"input": {
|
80
|
+
},
|
81
|
+
"output": {
|
82
|
+
}
|
83
|
+
},
|
84
|
+
"description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM role named ReadOnlyRole.",
|
85
|
+
"id": "3e1b8c7c-99c8-4fc4-a20c-131fe3f22c7e",
|
86
|
+
"title": "To attach a managed policy to an IAM role"
|
87
|
+
}
|
88
|
+
],
|
89
|
+
"AttachUserPolicy": [
|
90
|
+
{
|
91
|
+
"input": {
|
92
|
+
"PolicyArn": "arn:aws:iam::aws:policy/AdministratorAccess",
|
93
|
+
"UserName": "Alice"
|
94
|
+
},
|
95
|
+
"comments": {
|
96
|
+
"input": {
|
97
|
+
},
|
98
|
+
"output": {
|
99
|
+
}
|
100
|
+
},
|
101
|
+
"description": "The following command attaches the AWS managed policy named AdministratorAccess to the IAM user named Alice.",
|
102
|
+
"id": "1372ebd8-9475-4b1a-a479-23b6fd4b8b3e",
|
103
|
+
"title": "To attach a managed policy to an IAM user"
|
104
|
+
}
|
105
|
+
],
|
106
|
+
"ChangePassword": [
|
107
|
+
{
|
108
|
+
"input": {
|
109
|
+
"NewPassword": "]35d/{pB9Fo9wJ",
|
110
|
+
"OldPassword": "3s0K_;xh4~8XXI"
|
111
|
+
},
|
112
|
+
"comments": {
|
113
|
+
"input": {
|
114
|
+
},
|
115
|
+
"output": {
|
116
|
+
}
|
117
|
+
},
|
118
|
+
"description": "The following command changes the password for the current IAM user.",
|
119
|
+
"id": "3a80c66f-bffb-46df-947c-1e8fa583b470",
|
120
|
+
"title": "To change the password for your IAM user"
|
121
|
+
}
|
122
|
+
],
|
123
|
+
"CreateAccessKey": [
|
124
|
+
{
|
125
|
+
"input": {
|
126
|
+
"UserName": "Bob"
|
127
|
+
},
|
128
|
+
"output": {
|
129
|
+
"AccessKey": {
|
130
|
+
"AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
|
131
|
+
"CreateDate": "2015-03-09T18:39:23.411Z",
|
132
|
+
"SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
133
|
+
"Status": "Active",
|
134
|
+
"UserName": "Bob"
|
135
|
+
}
|
136
|
+
},
|
137
|
+
"comments": {
|
138
|
+
"input": {
|
139
|
+
},
|
140
|
+
"output": {
|
141
|
+
}
|
142
|
+
},
|
143
|
+
"description": "The following command creates an access key (access key ID and secret access key) for the IAM user named Bob.",
|
144
|
+
"id": "1fbb3211-4cf2-41db-8c20-ba58d9f5802d",
|
145
|
+
"title": "To create an access key for an IAM user"
|
146
|
+
}
|
147
|
+
],
|
148
|
+
"CreateAccountAlias": [
|
149
|
+
{
|
150
|
+
"input": {
|
151
|
+
"AccountAlias": "examplecorp"
|
152
|
+
},
|
153
|
+
"comments": {
|
154
|
+
"input": {
|
155
|
+
},
|
156
|
+
"output": {
|
157
|
+
}
|
158
|
+
},
|
159
|
+
"description": "The following command associates the alias examplecorp to your AWS account.",
|
160
|
+
"id": "5adaf6fb-94fc-4ca2-b825-2fbc2062add1",
|
161
|
+
"title": "To create an account alias"
|
162
|
+
}
|
163
|
+
],
|
164
|
+
"CreateGroup": [
|
165
|
+
{
|
166
|
+
"input": {
|
167
|
+
"GroupName": "Admins"
|
168
|
+
},
|
169
|
+
"output": {
|
170
|
+
"Group": {
|
171
|
+
"Arn": "arn:aws:iam::123456789012:group/Admins",
|
172
|
+
"CreateDate": "2015-03-09T20:30:24.940Z",
|
173
|
+
"GroupId": "AIDGPMS9RO4H3FEXAMPLE",
|
174
|
+
"GroupName": "Admins",
|
175
|
+
"Path": "/"
|
176
|
+
}
|
177
|
+
},
|
178
|
+
"comments": {
|
179
|
+
"input": {
|
180
|
+
},
|
181
|
+
"output": {
|
182
|
+
}
|
183
|
+
},
|
184
|
+
"description": "The following command creates an IAM group named Admins.",
|
185
|
+
"id": "d5da2a90-5e69-4ef7-8ae8-4c33dc21fd21",
|
186
|
+
"title": "To create an IAM group"
|
187
|
+
}
|
188
|
+
],
|
189
|
+
"CreateInstanceProfile": [
|
190
|
+
{
|
191
|
+
"input": {
|
192
|
+
"InstanceProfileName": "Webserver"
|
193
|
+
},
|
194
|
+
"output": {
|
195
|
+
"InstanceProfile": {
|
196
|
+
"Arn": "arn:aws:iam::123456789012:instance-profile/Webserver",
|
197
|
+
"CreateDate": "2015-03-09T20:33:19.626Z",
|
198
|
+
"InstanceProfileId": "AIPAJMBYC7DLSPEXAMPLE",
|
199
|
+
"InstanceProfileName": "Webserver",
|
200
|
+
"Path": "/",
|
201
|
+
"Roles": [
|
202
|
+
|
203
|
+
]
|
204
|
+
}
|
205
|
+
},
|
206
|
+
"comments": {
|
207
|
+
"input": {
|
208
|
+
},
|
209
|
+
"output": {
|
210
|
+
}
|
211
|
+
},
|
212
|
+
"description": "The following command creates an instance profile named Webserver that is ready to have a role attached and then be associated with an EC2 instance.",
|
213
|
+
"id": "5d84e6ae-5921-4e39-8454-10232cd9ff9a",
|
214
|
+
"title": "To create an instance profile"
|
215
|
+
}
|
216
|
+
],
|
217
|
+
"CreateLoginProfile": [
|
218
|
+
{
|
219
|
+
"input": {
|
220
|
+
"Password": "h]6EszR}vJ*m",
|
221
|
+
"PasswordResetRequired": true,
|
222
|
+
"UserName": "Bob"
|
223
|
+
},
|
224
|
+
"output": {
|
225
|
+
"LoginProfile": {
|
226
|
+
"CreateDate": "2015-03-10T20:55:40.274Z",
|
227
|
+
"PasswordResetRequired": true,
|
228
|
+
"UserName": "Bob"
|
229
|
+
}
|
230
|
+
},
|
231
|
+
"comments": {
|
232
|
+
"input": {
|
233
|
+
},
|
234
|
+
"output": {
|
235
|
+
}
|
236
|
+
},
|
237
|
+
"description": "The following command changes IAM user Bob's password and sets the flag that required Bob to change the password the next time he signs in.",
|
238
|
+
"id": "c63795bc-3444-40b3-89df-83c474ef88be",
|
239
|
+
"title": "To create an instance profile"
|
240
|
+
}
|
241
|
+
],
|
242
|
+
"CreateOpenIDConnectProvider": [
|
243
|
+
{
|
244
|
+
"input": {
|
245
|
+
"ClientIDList": [
|
246
|
+
"my-application-id"
|
247
|
+
],
|
248
|
+
"ThumbprintList": [
|
249
|
+
"3768084dfb3d2b68b7897bf5f565da8efEXAMPLE"
|
250
|
+
],
|
251
|
+
"Url": "https://server.example.com"
|
252
|
+
},
|
253
|
+
"output": {
|
254
|
+
"OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
|
255
|
+
},
|
256
|
+
"comments": {
|
257
|
+
"input": {
|
258
|
+
},
|
259
|
+
"output": {
|
260
|
+
}
|
261
|
+
},
|
262
|
+
"description": "The following example defines a new OIDC provider in IAM with a client ID of my-application-id and pointing at the server with a URL of https://server.example.com.",
|
263
|
+
"id": "4e4a6bff-cc97-4406-922e-0ab4a82cdb63",
|
264
|
+
"title": "To create an instance profile"
|
265
|
+
}
|
266
|
+
],
|
267
|
+
"CreateRole": [
|
268
|
+
{
|
269
|
+
"input": {
|
270
|
+
"AssumeRolePolicyDocument": "<URL-encoded-JSON>",
|
271
|
+
"Path": "/",
|
272
|
+
"RoleName": "Test-Role"
|
273
|
+
},
|
274
|
+
"output": {
|
275
|
+
"Role": {
|
276
|
+
"Arn": "arn:aws:iam::123456789012:role/Test-Role",
|
277
|
+
"AssumeRolePolicyDocument": "<URL-encoded-JSON>",
|
278
|
+
"CreateDate": "2013-06-07T20:43:32.821Z",
|
279
|
+
"Path": "/",
|
280
|
+
"RoleId": "AKIAIOSFODNN7EXAMPLE",
|
281
|
+
"RoleName": "Test-Role"
|
282
|
+
}
|
283
|
+
},
|
284
|
+
"comments": {
|
285
|
+
"input": {
|
286
|
+
},
|
287
|
+
"output": {
|
288
|
+
}
|
289
|
+
},
|
290
|
+
"description": "The following command creates a role named Test-Role and attaches a trust policy to it that is provided as a URL-encoded JSON string.",
|
291
|
+
"id": "eaaa4b5f-51f1-4f73-b0d3-30127040eff8",
|
292
|
+
"title": "To create an IAM role"
|
293
|
+
}
|
294
|
+
],
|
295
|
+
"CreateUser": [
|
296
|
+
{
|
297
|
+
"input": {
|
298
|
+
"UserName": "Bob"
|
299
|
+
},
|
300
|
+
"output": {
|
301
|
+
"User": {
|
302
|
+
"Arn": "arn:aws:iam::123456789012:user/Bob",
|
303
|
+
"CreateDate": "2013-06-08T03:20:41.270Z",
|
304
|
+
"Path": "/",
|
305
|
+
"UserId": "AKIAIOSFODNN7EXAMPLE",
|
306
|
+
"UserName": "Bob"
|
307
|
+
}
|
308
|
+
},
|
309
|
+
"comments": {
|
310
|
+
"input": {
|
311
|
+
},
|
312
|
+
"output": {
|
313
|
+
}
|
314
|
+
},
|
315
|
+
"description": "The following create-user command creates an IAM user named Bob in the current account.",
|
316
|
+
"id": "eb15f90b-e5f5-4af8-a594-e4e82b181a62",
|
317
|
+
"title": "To create an IAM user"
|
318
|
+
}
|
319
|
+
],
|
320
|
+
"DeleteAccessKey": [
|
321
|
+
{
|
322
|
+
"input": {
|
323
|
+
"AccessKeyId": "AKIDPMS9RO4H3FEXAMPLE",
|
324
|
+
"UserName": "Bob"
|
325
|
+
},
|
326
|
+
"comments": {
|
327
|
+
"input": {
|
328
|
+
},
|
329
|
+
"output": {
|
330
|
+
}
|
331
|
+
},
|
332
|
+
"description": "The following command deletes one access key (access key ID and secret access key) assigned to the IAM user named Bob.",
|
333
|
+
"id": "61a785a7-d30a-415a-ae18-ab9236e56871",
|
334
|
+
"title": "To delete an access key for an IAM user"
|
335
|
+
}
|
336
|
+
],
|
337
|
+
"DeleteAccountAlias": [
|
338
|
+
{
|
339
|
+
"input": {
|
340
|
+
"AccountAlias": "mycompany"
|
341
|
+
},
|
342
|
+
"comments": {
|
343
|
+
"input": {
|
344
|
+
},
|
345
|
+
"output": {
|
346
|
+
}
|
347
|
+
},
|
348
|
+
"description": "The following command removes the alias mycompany from the current AWS account:",
|
349
|
+
"id": "7abeca65-04a8-4500-a890-47f1092bf766",
|
350
|
+
"title": "To delete an account alias"
|
351
|
+
}
|
352
|
+
],
|
353
|
+
"DeleteAccountPasswordPolicy": [
|
354
|
+
{
|
355
|
+
"comments": {
|
356
|
+
"input": {
|
357
|
+
},
|
358
|
+
"output": {
|
359
|
+
}
|
360
|
+
},
|
361
|
+
"description": "The following command removes the password policy from the current AWS account:",
|
362
|
+
"id": "9ddf755e-495c-49bc-ae3b-ea6cc9b8ebcf",
|
363
|
+
"title": "To delete the current account password policy"
|
364
|
+
}
|
365
|
+
],
|
366
|
+
"DeleteGroupPolicy": [
|
367
|
+
{
|
368
|
+
"input": {
|
369
|
+
"GroupName": "Admins",
|
370
|
+
"PolicyName": "ExamplePolicy"
|
371
|
+
},
|
372
|
+
"comments": {
|
373
|
+
"input": {
|
374
|
+
},
|
375
|
+
"output": {
|
376
|
+
}
|
377
|
+
},
|
378
|
+
"description": "The following command deletes the policy named ExamplePolicy from the group named Admins:",
|
379
|
+
"id": "e683f2bd-98a4-4fe0-bb66-33169c692d4a",
|
380
|
+
"title": "To delete a policy from an IAM group"
|
381
|
+
}
|
382
|
+
],
|
383
|
+
"DeleteInstanceProfile": [
|
384
|
+
{
|
385
|
+
"input": {
|
386
|
+
"InstanceProfileName": "ExampleInstanceProfile"
|
387
|
+
},
|
388
|
+
"comments": {
|
389
|
+
"input": {
|
390
|
+
},
|
391
|
+
"output": {
|
392
|
+
}
|
393
|
+
},
|
394
|
+
"description": "The following command deletes the instance profile named ExampleInstanceProfile",
|
395
|
+
"id": "12d74fb8-3433-49db-8171-a1fc764e354d",
|
396
|
+
"title": "To delete an instance profile"
|
397
|
+
}
|
398
|
+
],
|
399
|
+
"DeleteLoginProfile": [
|
400
|
+
{
|
401
|
+
"input": {
|
402
|
+
"UserName": "Bob"
|
403
|
+
},
|
404
|
+
"comments": {
|
405
|
+
"input": {
|
406
|
+
},
|
407
|
+
"output": {
|
408
|
+
}
|
409
|
+
},
|
410
|
+
"description": "The following command deletes the password for the IAM user named Bob.",
|
411
|
+
"id": "1fe57059-fc73-42e2-b992-517b7d573b5c",
|
412
|
+
"title": "To delete a password for an IAM user"
|
413
|
+
}
|
414
|
+
],
|
415
|
+
"DeleteRole": [
|
416
|
+
{
|
417
|
+
"input": {
|
418
|
+
"RoleName": "Test-Role"
|
419
|
+
},
|
420
|
+
"comments": {
|
421
|
+
"input": {
|
422
|
+
},
|
423
|
+
"output": {
|
424
|
+
}
|
425
|
+
},
|
426
|
+
"description": "The following command removes the role named Test-Role.",
|
427
|
+
"id": "053cdf74-9bda-44b8-bdbb-140fd5a32603",
|
428
|
+
"title": "To delete an IAM role"
|
429
|
+
}
|
430
|
+
],
|
431
|
+
"DeleteRolePolicy": [
|
432
|
+
{
|
433
|
+
"input": {
|
434
|
+
"PolicyName": "ExamplePolicy",
|
435
|
+
"RoleName": "Test-Role"
|
436
|
+
},
|
437
|
+
"comments": {
|
438
|
+
"input": {
|
439
|
+
},
|
440
|
+
"output": {
|
441
|
+
}
|
442
|
+
},
|
443
|
+
"description": "The following command removes the policy named ExamplePolicy from the role named Test-Role.",
|
444
|
+
"id": "9c667336-fde3-462c-b8f3-950800821e27",
|
445
|
+
"title": "To remove a policy from an IAM role"
|
446
|
+
}
|
447
|
+
],
|
448
|
+
"DeleteSigningCertificate": [
|
449
|
+
{
|
450
|
+
"input": {
|
451
|
+
"CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
|
452
|
+
"UserName": "Anika"
|
453
|
+
},
|
454
|
+
"comments": {
|
455
|
+
"input": {
|
456
|
+
},
|
457
|
+
"output": {
|
458
|
+
}
|
459
|
+
},
|
460
|
+
"description": "The following command deletes the specified signing certificate for the IAM user named Anika.",
|
461
|
+
"id": "e3357586-ba9c-4070-b35b-d1a899b71987",
|
462
|
+
"title": "To delete a signing certificate for an IAM user"
|
463
|
+
}
|
464
|
+
],
|
465
|
+
"DeleteUser": [
|
466
|
+
{
|
467
|
+
"input": {
|
468
|
+
"UserName": "Bob"
|
469
|
+
},
|
470
|
+
"comments": {
|
471
|
+
"input": {
|
472
|
+
},
|
473
|
+
"output": {
|
474
|
+
}
|
475
|
+
},
|
476
|
+
"description": "The following command removes the IAM user named Bob from the current account.",
|
477
|
+
"id": "a13dc3f9-59fe-42d9-abbb-fb98b204fdf0",
|
478
|
+
"title": "To delete an IAM user"
|
479
|
+
}
|
480
|
+
],
|
481
|
+
"DeleteUserPolicy": [
|
482
|
+
{
|
483
|
+
"input": {
|
484
|
+
"PolicyName": "ExamplePolicy",
|
485
|
+
"UserName": "Juan"
|
486
|
+
},
|
487
|
+
"comments": {
|
488
|
+
"input": {
|
489
|
+
},
|
490
|
+
"output": {
|
491
|
+
}
|
492
|
+
},
|
493
|
+
"description": "The following delete-user-policy command removes the specified policy from the IAM user named Juan:",
|
494
|
+
"id": "34f07ddc-9bc1-4f52-bc59-cd0a3ccd06c8",
|
495
|
+
"title": "To remove a policy from an IAM user"
|
496
|
+
}
|
497
|
+
],
|
498
|
+
"DeleteVirtualMFADevice": [
|
499
|
+
{
|
500
|
+
"input": {
|
501
|
+
"SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleName"
|
502
|
+
},
|
503
|
+
"comments": {
|
504
|
+
"input": {
|
505
|
+
},
|
506
|
+
"output": {
|
507
|
+
}
|
508
|
+
},
|
509
|
+
"description": "The following delete-virtual-mfa-device command removes the specified MFA device from the current AWS account.",
|
510
|
+
"id": "2933b08b-dbe7-4b89-b8c1-fdf75feea1ee",
|
511
|
+
"title": "To remove a virtual MFA device"
|
512
|
+
}
|
513
|
+
],
|
514
|
+
"GetAccountPasswordPolicy": [
|
515
|
+
{
|
516
|
+
"output": {
|
517
|
+
"PasswordPolicy": {
|
518
|
+
"AllowUsersToChangePassword": false,
|
519
|
+
"ExpirePasswords": false,
|
520
|
+
"HardExpiry": false,
|
521
|
+
"MaxPasswordAge": 90,
|
522
|
+
"MinimumPasswordLength": 8,
|
523
|
+
"PasswordReusePrevention": 12,
|
524
|
+
"RequireLowercaseCharacters": false,
|
525
|
+
"RequireNumbers": true,
|
526
|
+
"RequireSymbols": true,
|
527
|
+
"RequireUppercaseCharacters": false
|
528
|
+
}
|
529
|
+
},
|
530
|
+
"comments": {
|
531
|
+
"input": {
|
532
|
+
},
|
533
|
+
"output": {
|
534
|
+
}
|
535
|
+
},
|
536
|
+
"description": "The following command displays details about the password policy for the current AWS account.",
|
537
|
+
"id": "5e4598c7-c425-431f-8af1-19073b3c4a5f",
|
538
|
+
"title": "To see the current account password policy"
|
539
|
+
}
|
540
|
+
],
|
541
|
+
"GetAccountSummary": [
|
542
|
+
{
|
543
|
+
"output": {
|
544
|
+
"SummaryMap": {
|
545
|
+
"AccessKeysPerUserQuota": 2,
|
546
|
+
"AccountAccessKeysPresent": 1,
|
547
|
+
"AccountMFAEnabled": 0,
|
548
|
+
"AccountSigningCertificatesPresent": 0,
|
549
|
+
"AttachedPoliciesPerGroupQuota": 10,
|
550
|
+
"AttachedPoliciesPerRoleQuota": 10,
|
551
|
+
"AttachedPoliciesPerUserQuota": 10,
|
552
|
+
"GroupPolicySizeQuota": 5120,
|
553
|
+
"Groups": 15,
|
554
|
+
"GroupsPerUserQuota": 10,
|
555
|
+
"GroupsQuota": 100,
|
556
|
+
"MFADevices": 6,
|
557
|
+
"MFADevicesInUse": 3,
|
558
|
+
"Policies": 8,
|
559
|
+
"PoliciesQuota": 1000,
|
560
|
+
"PolicySizeQuota": 5120,
|
561
|
+
"PolicyVersionsInUse": 22,
|
562
|
+
"PolicyVersionsInUseQuota": 10000,
|
563
|
+
"ServerCertificates": 1,
|
564
|
+
"ServerCertificatesQuota": 20,
|
565
|
+
"SigningCertificatesPerUserQuota": 2,
|
566
|
+
"UserPolicySizeQuota": 2048,
|
567
|
+
"Users": 27,
|
568
|
+
"UsersQuota": 5000,
|
569
|
+
"VersionsPerPolicyQuota": 5
|
570
|
+
}
|
571
|
+
},
|
572
|
+
"comments": {
|
573
|
+
"input": {
|
574
|
+
},
|
575
|
+
"output": {
|
576
|
+
}
|
577
|
+
},
|
578
|
+
"description": "The following command returns information about the IAM entity quotas and usage in the current AWS account.",
|
579
|
+
"id": "9d8447af-f344-45de-8219-2cebc3cce7f2",
|
580
|
+
"title": "To get information about IAM entity quotas and usage in the current account"
|
581
|
+
}
|
582
|
+
],
|
583
|
+
"GetInstanceProfile": [
|
584
|
+
{
|
585
|
+
"input": {
|
586
|
+
"InstanceProfileName": "ExampleInstanceProfile"
|
587
|
+
},
|
588
|
+
"output": {
|
589
|
+
"InstanceProfile": {
|
590
|
+
"Arn": "arn:aws:iam::336924118301:instance-profile/ExampleInstanceProfile",
|
591
|
+
"CreateDate": "2013-06-12T23:52:02Z",
|
592
|
+
"InstanceProfileId": "AID2MAB8DPLSRHEXAMPLE",
|
593
|
+
"InstanceProfileName": "ExampleInstanceProfile",
|
594
|
+
"Path": "/",
|
595
|
+
"Roles": [
|
596
|
+
{
|
597
|
+
"Arn": "arn:aws:iam::336924118301:role/Test-Role",
|
598
|
+
"AssumeRolePolicyDocument": "<URL-encoded-JSON>",
|
599
|
+
"CreateDate": "2013-01-09T06:33:26Z",
|
600
|
+
"Path": "/",
|
601
|
+
"RoleId": "AIDGPMS9RO4H3FEXAMPLE",
|
602
|
+
"RoleName": "Test-Role"
|
603
|
+
}
|
604
|
+
]
|
605
|
+
}
|
606
|
+
},
|
607
|
+
"comments": {
|
608
|
+
"input": {
|
609
|
+
},
|
610
|
+
"output": {
|
611
|
+
}
|
612
|
+
},
|
613
|
+
"description": "The following command gets information about the instance profile named ExampleInstanceProfile.",
|
614
|
+
"id": "463b9ba5-18cc-4608-9ccb-5a7c6b6e5fe7",
|
615
|
+
"title": "To get information about an instance profile"
|
616
|
+
}
|
617
|
+
],
|
618
|
+
"GetLoginProfile": [
|
619
|
+
{
|
620
|
+
"input": {
|
621
|
+
"UserName": "Anika"
|
622
|
+
},
|
623
|
+
"output": {
|
624
|
+
"LoginProfile": {
|
625
|
+
"CreateDate": "2012-09-21T23:03:39Z",
|
626
|
+
"UserName": "Anika"
|
627
|
+
}
|
628
|
+
},
|
629
|
+
"comments": {
|
630
|
+
"input": {
|
631
|
+
},
|
632
|
+
"output": {
|
633
|
+
}
|
634
|
+
},
|
635
|
+
"description": "The following command gets information about the password for the IAM user named Anika.",
|
636
|
+
"id": "d6b580cc-909f-4925-9caa-d425cbc1ad47",
|
637
|
+
"title": "To get password information for an IAM user"
|
638
|
+
}
|
639
|
+
],
|
640
|
+
"GetRole": [
|
641
|
+
{
|
642
|
+
"input": {
|
643
|
+
"RoleName": "Test-Role"
|
644
|
+
},
|
645
|
+
"output": {
|
646
|
+
"Role": {
|
647
|
+
"Arn": "arn:aws:iam::123456789012:role/Test-Role",
|
648
|
+
"AssumeRolePolicyDocument": "<URL-encoded-JSON>",
|
649
|
+
"CreateDate": "2013-04-18T05:01:58Z",
|
650
|
+
"Path": "/",
|
651
|
+
"RoleId": "AIDIODR4TAW7CSEXAMPLE",
|
652
|
+
"RoleName": "Test-Role"
|
653
|
+
}
|
654
|
+
},
|
655
|
+
"comments": {
|
656
|
+
"input": {
|
657
|
+
},
|
658
|
+
"output": {
|
659
|
+
}
|
660
|
+
},
|
661
|
+
"description": "The following command gets information about the role named Test-Role.",
|
662
|
+
"id": "5b7d03a6-340c-472d-aa77-56425950d8b0",
|
663
|
+
"title": "To get information about an IAM role"
|
664
|
+
}
|
665
|
+
],
|
666
|
+
"GetUser": [
|
667
|
+
{
|
668
|
+
"input": {
|
669
|
+
"UserName": "Bob"
|
670
|
+
},
|
671
|
+
"output": {
|
672
|
+
"User": {
|
673
|
+
"Arn": "arn:aws:iam::123456789012:user/Bob",
|
674
|
+
"CreateDate": "2012-09-21T23:03:13Z",
|
675
|
+
"Path": "/",
|
676
|
+
"UserId": "AKIAIOSFODNN7EXAMPLE",
|
677
|
+
"UserName": "Bob"
|
678
|
+
}
|
679
|
+
},
|
680
|
+
"comments": {
|
681
|
+
"input": {
|
682
|
+
},
|
683
|
+
"output": {
|
684
|
+
}
|
685
|
+
},
|
686
|
+
"description": "The following command gets information about the IAM user named Bob.",
|
687
|
+
"id": "ede000a1-9e4c-40db-bd0a-d4f95e41a6ab",
|
688
|
+
"title": "To get information about an IAM user"
|
689
|
+
}
|
690
|
+
],
|
691
|
+
"ListAccessKeys": [
|
692
|
+
{
|
693
|
+
"input": {
|
694
|
+
"UserName": "Alice"
|
695
|
+
},
|
696
|
+
"output": {
|
697
|
+
"AccessKeyMetadata": [
|
698
|
+
{
|
699
|
+
"AccessKeyId": "AKIA111111111EXAMPLE",
|
700
|
+
"CreateDate": "2016-12-01T22:19:58Z",
|
701
|
+
"Status": "Active",
|
702
|
+
"UserName": "Alice"
|
703
|
+
},
|
704
|
+
{
|
705
|
+
"AccessKeyId": "AKIA222222222EXAMPLE",
|
706
|
+
"CreateDate": "2016-12-01T22:20:01Z",
|
707
|
+
"Status": "Active",
|
708
|
+
"UserName": "Alice"
|
709
|
+
}
|
710
|
+
]
|
711
|
+
},
|
712
|
+
"comments": {
|
713
|
+
"input": {
|
714
|
+
},
|
715
|
+
"output": {
|
716
|
+
}
|
717
|
+
},
|
718
|
+
"description": "The following command lists the access keys IDs for the IAM user named Alice.",
|
719
|
+
"id": "15571463-ebea-411a-a021-1c76bd2a3625",
|
720
|
+
"title": "To list the access key IDs for an IAM user"
|
721
|
+
}
|
722
|
+
],
|
723
|
+
"ListAccountAliases": [
|
724
|
+
{
|
725
|
+
"input": {
|
726
|
+
},
|
727
|
+
"output": {
|
728
|
+
"AccountAliases": [
|
729
|
+
"exmaple-corporation"
|
730
|
+
]
|
731
|
+
},
|
732
|
+
"comments": {
|
733
|
+
"input": {
|
734
|
+
},
|
735
|
+
"output": {
|
736
|
+
}
|
737
|
+
},
|
738
|
+
"description": "The following command lists the aliases for the current account.",
|
739
|
+
"id": "e27b457a-16f9-4e05-a006-3df7b3472741",
|
740
|
+
"title": "To list account aliases"
|
741
|
+
}
|
742
|
+
],
|
743
|
+
"ListGroupPolicies": [
|
744
|
+
{
|
745
|
+
"input": {
|
746
|
+
"GroupName": "Admins"
|
747
|
+
},
|
748
|
+
"output": {
|
749
|
+
"PolicyNames": [
|
750
|
+
"AdminRoot",
|
751
|
+
"KeyPolicy"
|
752
|
+
]
|
753
|
+
},
|
754
|
+
"comments": {
|
755
|
+
"input": {
|
756
|
+
},
|
757
|
+
"output": {
|
758
|
+
}
|
759
|
+
},
|
760
|
+
"description": "The following command lists the names of in-line policies that are embedded in the IAM group named Admins.",
|
761
|
+
"id": "02de5095-2410-4d3a-ac1b-cc40234af68f",
|
762
|
+
"title": "To list the in-line policies for an IAM group"
|
763
|
+
}
|
764
|
+
],
|
765
|
+
"ListGroups": [
|
766
|
+
{
|
767
|
+
"input": {
|
768
|
+
},
|
769
|
+
"output": {
|
770
|
+
"Groups": [
|
771
|
+
{
|
772
|
+
"Arn": "arn:aws:iam::123456789012:group/Admins",
|
773
|
+
"CreateDate": "2016-12-15T21:40:08.121Z",
|
774
|
+
"GroupId": "AGPA1111111111EXAMPLE",
|
775
|
+
"GroupName": "Admins",
|
776
|
+
"Path": "/division_abc/subdivision_xyz/"
|
777
|
+
},
|
778
|
+
{
|
779
|
+
"Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
|
780
|
+
"CreateDate": "2016-11-30T14:10:01.156Z",
|
781
|
+
"GroupId": "AGP22222222222EXAMPLE",
|
782
|
+
"GroupName": "Test",
|
783
|
+
"Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
|
784
|
+
},
|
785
|
+
{
|
786
|
+
"Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
|
787
|
+
"CreateDate": "2016-06-12T20:14:52.032Z",
|
788
|
+
"GroupId": "AGPI3333333333EXAMPLE",
|
789
|
+
"GroupName": "Managers",
|
790
|
+
"Path": "/division_abc/subdivision_xyz/product_1234/"
|
791
|
+
}
|
792
|
+
]
|
793
|
+
},
|
794
|
+
"comments": {
|
795
|
+
"input": {
|
796
|
+
},
|
797
|
+
"output": {
|
798
|
+
}
|
799
|
+
},
|
800
|
+
"description": "The following command lists the IAM groups in the current account:",
|
801
|
+
"id": "b3ab1380-2a21-42fb-8e85-503f65512c66",
|
802
|
+
"title": "To list the IAM groups for the current account"
|
803
|
+
}
|
804
|
+
],
|
805
|
+
"ListGroupsForUser": [
|
806
|
+
{
|
807
|
+
"input": {
|
808
|
+
"UserName": "Bob"
|
809
|
+
},
|
810
|
+
"output": {
|
811
|
+
"Groups": [
|
812
|
+
{
|
813
|
+
"Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
|
814
|
+
"CreateDate": "2016-11-30T14:10:01.156Z",
|
815
|
+
"GroupId": "AGP2111111111EXAMPLE",
|
816
|
+
"GroupName": "Test",
|
817
|
+
"Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
|
818
|
+
},
|
819
|
+
{
|
820
|
+
"Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
|
821
|
+
"CreateDate": "2016-06-12T20:14:52.032Z",
|
822
|
+
"GroupId": "AGPI222222222SEXAMPLE",
|
823
|
+
"GroupName": "Managers",
|
824
|
+
"Path": "/division_abc/subdivision_xyz/product_1234/"
|
825
|
+
}
|
826
|
+
]
|
827
|
+
},
|
828
|
+
"comments": {
|
829
|
+
"input": {
|
830
|
+
},
|
831
|
+
"output": {
|
832
|
+
}
|
833
|
+
},
|
834
|
+
"description": "The following command displays the groups that the IAM user named Bob belongs to.",
|
835
|
+
"id": "278ec2ee-fc28-4136-83fb-433af0ae46a2",
|
836
|
+
"title": "To list the groups that an IAM user belongs to"
|
837
|
+
}
|
838
|
+
],
|
839
|
+
"ListSigningCertificates": [
|
840
|
+
{
|
841
|
+
"input": {
|
842
|
+
"UserName": "Bob"
|
843
|
+
},
|
844
|
+
"output": {
|
845
|
+
"Certificates": [
|
846
|
+
{
|
847
|
+
"CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
|
848
|
+
"CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
|
849
|
+
"Status": "Active",
|
850
|
+
"UploadDate": "2013-06-06T21:40:08Z",
|
851
|
+
"UserName": "Bob"
|
852
|
+
}
|
853
|
+
]
|
854
|
+
},
|
855
|
+
"comments": {
|
856
|
+
"input": {
|
857
|
+
},
|
858
|
+
"output": {
|
859
|
+
}
|
860
|
+
},
|
861
|
+
"description": "The following command lists the signing certificates for the IAM user named Bob.",
|
862
|
+
"id": "b4c10256-4fc9-457e-b3fd-4a110d4d73dc",
|
863
|
+
"title": "To list the signing certificates for an IAM user"
|
864
|
+
}
|
865
|
+
],
|
866
|
+
"ListUsers": [
|
867
|
+
{
|
868
|
+
"input": {
|
869
|
+
},
|
870
|
+
"output": {
|
871
|
+
"Users": [
|
872
|
+
{
|
873
|
+
"Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Juan",
|
874
|
+
"CreateDate": "2012-09-05T19:38:48Z",
|
875
|
+
"PasswordLastUsed": "2016-09-08T21:47:36Z",
|
876
|
+
"Path": "/division_abc/subdivision_xyz/engineering/",
|
877
|
+
"UserId": "AID2MAB8DPLSRHEXAMPLE",
|
878
|
+
"UserName": "Juan"
|
879
|
+
},
|
880
|
+
{
|
881
|
+
"Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Anika",
|
882
|
+
"CreateDate": "2014-04-09T15:43:45Z",
|
883
|
+
"PasswordLastUsed": "2016-09-24T16:18:07Z",
|
884
|
+
"Path": "/division_abc/subdivision_xyz/engineering/",
|
885
|
+
"UserId": "AIDIODR4TAW7CSEXAMPLE",
|
886
|
+
"UserName": "Anika"
|
887
|
+
}
|
888
|
+
]
|
889
|
+
},
|
890
|
+
"comments": {
|
891
|
+
"input": {
|
892
|
+
},
|
893
|
+
"output": {
|
894
|
+
}
|
895
|
+
},
|
896
|
+
"description": "The following command lists the IAM users in the current account.",
|
897
|
+
"id": "9edfbd73-03d8-4d8a-9a79-76c85e8c8298",
|
898
|
+
"title": "To list IAM users"
|
899
|
+
}
|
900
|
+
],
|
901
|
+
"ListVirtualMFADevices": [
|
902
|
+
{
|
903
|
+
"input": {
|
904
|
+
},
|
905
|
+
"output": {
|
906
|
+
"VirtualMFADevices": [
|
907
|
+
{
|
908
|
+
"SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleMFADevice"
|
909
|
+
},
|
910
|
+
{
|
911
|
+
"SerialNumber": "arn:aws:iam::123456789012:mfa/Juan"
|
912
|
+
}
|
913
|
+
]
|
914
|
+
},
|
915
|
+
"comments": {
|
916
|
+
"input": {
|
917
|
+
},
|
918
|
+
"output": {
|
919
|
+
}
|
920
|
+
},
|
921
|
+
"description": "The following command lists the virtual MFA devices that have been configured for the current account.",
|
922
|
+
"id": "54f9ac18-5100-4070-bec4-fe5f612710d5",
|
923
|
+
"title": "To list virtual MFA devices"
|
924
|
+
}
|
925
|
+
],
|
926
|
+
"PutGroupPolicy": [
|
927
|
+
{
|
928
|
+
"input": {
|
929
|
+
"GroupName": "Admins",
|
930
|
+
"PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
|
931
|
+
"PolicyName": "AllPerms"
|
932
|
+
},
|
933
|
+
"comments": {
|
934
|
+
"input": {
|
935
|
+
},
|
936
|
+
"output": {
|
937
|
+
}
|
938
|
+
},
|
939
|
+
"description": "The following command adds a policy named AllPerms to the IAM group named Admins.",
|
940
|
+
"id": "4bc17418-758f-4d0f-ab0c-4d00265fec2e",
|
941
|
+
"title": "To add a policy to a group"
|
942
|
+
}
|
943
|
+
],
|
944
|
+
"PutRolePolicy": [
|
945
|
+
{
|
946
|
+
"input": {
|
947
|
+
"PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"s3:*\",\"Resource\":\"*\"}}",
|
948
|
+
"PolicyName": "S3AccessPolicy",
|
949
|
+
"RoleName": "S3Access"
|
950
|
+
},
|
951
|
+
"comments": {
|
952
|
+
"input": {
|
953
|
+
},
|
954
|
+
"output": {
|
955
|
+
}
|
956
|
+
},
|
957
|
+
"description": "The following command adds a permissions policy to the role named Test-Role.",
|
958
|
+
"id": "de62fd00-46c7-4601-9e0d-71d5fbb11ecb",
|
959
|
+
"title": "To attach a permissions policy to an IAM role"
|
960
|
+
}
|
961
|
+
],
|
962
|
+
"PutUserPolicy": [
|
963
|
+
{
|
964
|
+
"input": {
|
965
|
+
"PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
|
966
|
+
"PolicyName": "AllAccessPolicy",
|
967
|
+
"UserName": "Bob"
|
968
|
+
},
|
969
|
+
"comments": {
|
970
|
+
"input": {
|
971
|
+
},
|
972
|
+
"output": {
|
973
|
+
}
|
974
|
+
},
|
975
|
+
"description": "The following command attaches a policy to the IAM user named Bob.",
|
976
|
+
"id": "2551ffc6-3576-4d39-823f-30b60bffc2c7",
|
977
|
+
"title": "To attach a policy to an IAM user"
|
978
|
+
}
|
979
|
+
],
|
980
|
+
"RemoveRoleFromInstanceProfile": [
|
981
|
+
{
|
982
|
+
"input": {
|
983
|
+
"InstanceProfileName": "ExampleInstanceProfile",
|
984
|
+
"RoleName": "Test-Role"
|
985
|
+
},
|
986
|
+
"comments": {
|
987
|
+
"input": {
|
988
|
+
},
|
989
|
+
"output": {
|
990
|
+
}
|
991
|
+
},
|
992
|
+
"description": "The following command removes the role named Test-Role from the instance profile named ExampleInstanceProfile.",
|
993
|
+
"id": "6d9f46f1-9f4a-4873-b403-51a85c5c627c",
|
994
|
+
"title": "To remove a role from an instance profile"
|
995
|
+
}
|
996
|
+
],
|
997
|
+
"RemoveUserFromGroup": [
|
998
|
+
{
|
999
|
+
"input": {
|
1000
|
+
"GroupName": "Admins",
|
1001
|
+
"UserName": "Bob"
|
1002
|
+
},
|
1003
|
+
"comments": {
|
1004
|
+
"input": {
|
1005
|
+
},
|
1006
|
+
"output": {
|
1007
|
+
}
|
1008
|
+
},
|
1009
|
+
"description": "The following command removes the user named Bob from the IAM group named Admins.",
|
1010
|
+
"id": "fb54d5b4-0caf-41d8-af0e-10a84413f174",
|
1011
|
+
"title": "To remove a user from an IAM group"
|
1012
|
+
}
|
1013
|
+
],
|
1014
|
+
"UpdateAccessKey": [
|
1015
|
+
{
|
1016
|
+
"input": {
|
1017
|
+
"AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
|
1018
|
+
"Status": "Inactive",
|
1019
|
+
"UserName": "Bob"
|
1020
|
+
},
|
1021
|
+
"comments": {
|
1022
|
+
"input": {
|
1023
|
+
},
|
1024
|
+
"output": {
|
1025
|
+
}
|
1026
|
+
},
|
1027
|
+
"description": "The following command deactivates the specified access key (access key ID and secret access key) for the IAM user named Bob.",
|
1028
|
+
"id": "02b556fd-e673-49b7-ab6b-f2f9035967d0",
|
1029
|
+
"title": "To activate or deactivate an access key for an IAM user"
|
1030
|
+
}
|
1031
|
+
],
|
1032
|
+
"UpdateAccountPasswordPolicy": [
|
1033
|
+
{
|
1034
|
+
"input": {
|
1035
|
+
"MinimumPasswordLength": 8,
|
1036
|
+
"RequireNumbers": true
|
1037
|
+
},
|
1038
|
+
"comments": {
|
1039
|
+
"input": {
|
1040
|
+
},
|
1041
|
+
"output": {
|
1042
|
+
}
|
1043
|
+
},
|
1044
|
+
"description": "The following command sets the password policy to require a minimum length of eight characters and to require one or more numbers in the password:",
|
1045
|
+
"id": "c263a1af-37dc-4423-8dba-9790284ef5e0",
|
1046
|
+
"title": "To set or change the current account password policy"
|
1047
|
+
}
|
1048
|
+
],
|
1049
|
+
"UpdateAssumeRolePolicy": [
|
1050
|
+
{
|
1051
|
+
"input": {
|
1052
|
+
"PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}",
|
1053
|
+
"RoleName": "S3AccessForEC2Instances"
|
1054
|
+
},
|
1055
|
+
"comments": {
|
1056
|
+
"input": {
|
1057
|
+
},
|
1058
|
+
"output": {
|
1059
|
+
}
|
1060
|
+
},
|
1061
|
+
"description": "The following command updates the role trust policy for the role named Test-Role:",
|
1062
|
+
"id": "c9150063-d953-4e99-9576-9685872006c6",
|
1063
|
+
"title": "To update the trust policy for an IAM role"
|
1064
|
+
}
|
1065
|
+
],
|
1066
|
+
"UpdateGroup": [
|
1067
|
+
{
|
1068
|
+
"input": {
|
1069
|
+
"GroupName": "Test",
|
1070
|
+
"NewGroupName": "Test-1"
|
1071
|
+
},
|
1072
|
+
"comments": {
|
1073
|
+
"input": {
|
1074
|
+
},
|
1075
|
+
"output": {
|
1076
|
+
}
|
1077
|
+
},
|
1078
|
+
"description": "The following command changes the name of the IAM group Test to Test-1.",
|
1079
|
+
"id": "f0cf1662-91ae-4278-a80e-7db54256ccba",
|
1080
|
+
"title": "To rename an IAM group"
|
1081
|
+
}
|
1082
|
+
],
|
1083
|
+
"UpdateLoginProfile": [
|
1084
|
+
{
|
1085
|
+
"input": {
|
1086
|
+
"Password": "SomeKindOfPassword123!@#",
|
1087
|
+
"UserName": "Bob"
|
1088
|
+
},
|
1089
|
+
"comments": {
|
1090
|
+
"input": {
|
1091
|
+
},
|
1092
|
+
"output": {
|
1093
|
+
}
|
1094
|
+
},
|
1095
|
+
"description": "The following command creates or changes the password for the IAM user named Bob.",
|
1096
|
+
"id": "036d9498-ecdb-4ed6-a8d8-366c383d1487",
|
1097
|
+
"title": "To change the password for an IAM user"
|
1098
|
+
}
|
1099
|
+
],
|
1100
|
+
"UpdateSigningCertificate": [
|
1101
|
+
{
|
1102
|
+
"input": {
|
1103
|
+
"CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
|
1104
|
+
"Status": "Inactive",
|
1105
|
+
"UserName": "Bob"
|
1106
|
+
},
|
1107
|
+
"comments": {
|
1108
|
+
"input": {
|
1109
|
+
},
|
1110
|
+
"output": {
|
1111
|
+
}
|
1112
|
+
},
|
1113
|
+
"description": "The following command changes the status of a signing certificate for a user named Bob to Inactive.",
|
1114
|
+
"id": "829aee7b-efc5-4b3b-84a5-7f899b38018d",
|
1115
|
+
"title": "To change the active status of a signing certificate for an IAM user"
|
1116
|
+
}
|
1117
|
+
],
|
1118
|
+
"UpdateUser": [
|
1119
|
+
{
|
1120
|
+
"input": {
|
1121
|
+
"NewUserName": "Robert",
|
1122
|
+
"UserName": "Bob"
|
1123
|
+
},
|
1124
|
+
"comments": {
|
1125
|
+
"input": {
|
1126
|
+
},
|
1127
|
+
"output": {
|
1128
|
+
}
|
1129
|
+
},
|
1130
|
+
"description": "The following command changes the name of the IAM user Bob to Robert. It does not change the user's path.",
|
1131
|
+
"id": "275d53ed-347a-44e6-b7d0-a96276154352",
|
1132
|
+
"title": "To change an IAM user's name"
|
1133
|
+
}
|
1134
|
+
],
|
1135
|
+
"UploadServerCertificate": [
|
1136
|
+
{
|
1137
|
+
"input": {
|
1138
|
+
"CertificateBody": "-----BEGIN CERTIFICATE-----<a very long certificate text string>-----END CERTIFICATE-----",
|
1139
|
+
"Path": "/company/servercerts/",
|
1140
|
+
"PrivateKey": "-----BEGIN DSA PRIVATE KEY-----<a very long private key string>-----END DSA PRIVATE KEY-----",
|
1141
|
+
"ServerCertificateName": "ProdServerCert"
|
1142
|
+
},
|
1143
|
+
"output": {
|
1144
|
+
"ServerCertificateMetadata": {
|
1145
|
+
"Arn": "arn:aws:iam::123456789012:server-certificate/company/servercerts/ProdServerCert",
|
1146
|
+
"Expiration": "2012-05-08T01:02:03.004Z",
|
1147
|
+
"Path": "/company/servercerts/",
|
1148
|
+
"ServerCertificateId": "ASCA1111111111EXAMPLE",
|
1149
|
+
"ServerCertificateName": "ProdServerCert",
|
1150
|
+
"UploadDate": "2010-05-08T01:02:03.004Z"
|
1151
|
+
}
|
1152
|
+
},
|
1153
|
+
"comments": {
|
1154
|
+
"input": {
|
1155
|
+
},
|
1156
|
+
"output": {
|
1157
|
+
}
|
1158
|
+
},
|
1159
|
+
"description": "The following upload-server-certificate command uploads a server certificate to your AWS account:",
|
1160
|
+
"id": "06eab6d1-ebf2-4bd9-839d-f7508b9a38b6",
|
1161
|
+
"title": "To upload a server certificate to your AWS account"
|
1162
|
+
}
|
1163
|
+
],
|
1164
|
+
"UploadSigningCertificate": [
|
1165
|
+
{
|
1166
|
+
"input": {
|
1167
|
+
"CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
|
1168
|
+
"UserName": "Bob"
|
1169
|
+
},
|
1170
|
+
"output": {
|
1171
|
+
"Certificate": {
|
1172
|
+
"CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
|
1173
|
+
"CertificateId": "ID123456789012345EXAMPLE",
|
1174
|
+
"Status": "Active",
|
1175
|
+
"UploadDate": "2015-06-06T21:40:08.121Z",
|
1176
|
+
"UserName": "Bob"
|
1177
|
+
}
|
1178
|
+
},
|
1179
|
+
"comments": {
|
1180
|
+
"input": {
|
1181
|
+
},
|
1182
|
+
"output": {
|
1183
|
+
}
|
1184
|
+
},
|
1185
|
+
"description": "The following command uploads a signing certificate for the IAM user named Bob.",
|
1186
|
+
"id": "e67489b6-7b73-4e30-9ed3-9a9e0231e458",
|
1187
|
+
"title": "To upload a signing certificate for an IAM user"
|
1188
|
+
}
|
1189
|
+
]
|
4
1190
|
}
|
5
1191
|
}
|