aws-sdk-iam 1.112.0 → 1.114.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4bab40bd34826fe483e3a57bd5fe985ade14e198b40cb4db7704ff5d354efc86
4
- data.tar.gz: b235a34e1c4d1e83ec515e8889eee1481a58a4ffdb8f27977b293167a231deab
3
+ metadata.gz: 573b04d3c6bf7dc554501c1e0587eaaf384fdf0921be600df5e7dce7cc789296
4
+ data.tar.gz: 4c473c9e190a29abbbb9d34c0d5ab6a821895afaa2d087cbac5b209e926d9d06
5
5
  SHA512:
6
- metadata.gz: '09b9528d7451a0bdbd666894badd5ecdd692c8628b1adcfe79165429e388c25670e3e092b569193b6af92148130b0eb424a5b1fdb734b39d389637eecc5828f7'
7
- data.tar.gz: 6b28c3e1da56da1c56055693e6274916622c12f02754ad4dc87262d4172a775286aa92ec1575a5071bc4274c163e54115f6f4cb45ba917f7cdadfaca455564d4
6
+ metadata.gz: c72c44612e87a3490f57ed09e265986ebeb50bd6fea80847cf267b90bc05e86afc3c65d4fd6f4c758677b9d495525cc654a9513b03af8d815e71f79c22a7b6b7
7
+ data.tar.gz: 3fc76230b83f934c9fd9f87401cef698bfcd53a545dba4b771d21fa3fc5736d1f126749eaf6bd1bcb7e6474586a389782689890d4d80248cf28fbc0c77e00c97
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.114.0 (2024-11-14)
5
+ ------------------
6
+
7
+ * Feature - This release includes support for five new APIs and changes to existing APIs that give AWS Organizations customers the ability to use temporary root credentials, targeted to member accounts in the organization.
8
+
9
+ 1.113.0 (2024-11-06)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.112.0 (2024-10-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.112.0
1
+ 1.114.0
@@ -33,7 +33,7 @@ module Aws::IAM
33
33
  # Specifies whether IAM user passwords must contain at least one of the
34
34
  # following symbols:
35
35
  #
36
- # ! @ # $ % ^ & * ( ) \_ + - = \[ \] \\\{ \\} \| '
36
+ # ! @ # $ % ^ & * ( ) \_ + - = \[ \] \{ } \| '
37
37
  # @return [Boolean]
38
38
  def require_symbols
39
39
  data[:require_symbols]
@@ -275,7 +275,7 @@ module Aws::IAM
275
275
  # Specifies whether IAM user passwords must contain at least one of the
276
276
  # following non-alphanumeric characters:
277
277
  #
278
- # ! @ # $ % ^ & * ( ) \_ + - = \[ \] \\\{ \\} \| '
278
+ # ! @ # $ % ^ & * ( ) \_ + - = \[ \] \{ } \| '
279
279
  #
280
280
  # If you do not specify a value for this parameter, then the operation
281
281
  # uses the default value of `false`. The result is that passwords do not
@@ -1269,23 +1269,32 @@ module Aws::IAM
1269
1269
  #
1270
1270
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html
1271
1271
  #
1272
- # @option params [required, String] :user_name
1272
+ # @option params [String] :user_name
1273
1273
  # The name of the IAM user to create a password for. The user must
1274
1274
  # already exist.
1275
1275
  #
1276
- # This parameter allows (through its [regex pattern][1]) a string of
1276
+ # This parameter is optional. If no user name is included, it defaults
1277
+ # to the principal making the request. When you make this request with
1278
+ # root user credentials, you must use an [AssumeRoot][1] session to omit
1279
+ # the user name.
1280
+ #
1281
+ # This parameter allows (through its [regex pattern][2]) a string of
1277
1282
  # characters consisting of upper and lowercase alphanumeric characters
1278
1283
  # with no spaces. You can also include any of the following characters:
1279
1284
  # \_+=,.@-
1280
1285
  #
1281
1286
  #
1282
1287
  #
1283
- # [1]: http://wikipedia.org/wiki/regex
1288
+ # [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
1289
+ # [2]: http://wikipedia.org/wiki/regex
1284
1290
  #
1285
- # @option params [required, String] :password
1291
+ # @option params [String] :password
1286
1292
  # The new password for the user.
1287
1293
  #
1288
- # The [regex pattern][1] that is used to validate this parameter is a
1294
+ # This parameter must be omitted when you make the request with an
1295
+ # [AssumeRoot][1] session. It is required in all other cases.
1296
+ #
1297
+ # The [regex pattern][2] that is used to validate this parameter is a
1289
1298
  # string of characters. That string can include almost any printable
1290
1299
  # ASCII character from the space (`\u0020`) through the end of the ASCII
1291
1300
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
@@ -1297,7 +1306,8 @@ module Aws::IAM
1297
1306
  #
1298
1307
  #
1299
1308
  #
1300
- # [1]: http://wikipedia.org/wiki/regex
1309
+ # [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
1310
+ # [2]: http://wikipedia.org/wiki/regex
1301
1311
  #
1302
1312
  # @option params [Boolean] :password_reset_required
1303
1313
  # Specifies whether the user is required to set a new password on next
@@ -1331,8 +1341,8 @@ module Aws::IAM
1331
1341
  # @example Request syntax with placeholder values
1332
1342
  #
1333
1343
  # resp = client.create_login_profile({
1334
- # user_name: "userNameType", # required
1335
- # password: "passwordType", # required
1344
+ # user_name: "userNameType",
1345
+ # password: "passwordType",
1336
1346
  # password_reset_required: false,
1337
1347
  # })
1338
1348
  #
@@ -2519,17 +2529,23 @@ module Aws::IAM
2519
2529
  #
2520
2530
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html
2521
2531
  #
2522
- # @option params [required, String] :user_name
2532
+ # @option params [String] :user_name
2523
2533
  # The name of the user whose MFA device you want to deactivate.
2524
2534
  #
2525
- # This parameter allows (through its [regex pattern][1]) a string of
2535
+ # This parameter is optional. If no user name is included, it defaults
2536
+ # to the principal making the request. When you make this request with
2537
+ # root user credentials, you must use an [AssumeRoot][1] session to omit
2538
+ # the user name.
2539
+ #
2540
+ # This parameter allows (through its [regex pattern][2]) a string of
2526
2541
  # characters consisting of upper and lowercase alphanumeric characters
2527
2542
  # with no spaces. You can also include any of the following characters:
2528
2543
  # \_+=,.@-
2529
2544
  #
2530
2545
  #
2531
2546
  #
2532
- # [1]: http://wikipedia.org/wiki/regex
2547
+ # [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
2548
+ # [2]: http://wikipedia.org/wiki/regex
2533
2549
  #
2534
2550
  # @option params [required, String] :serial_number
2535
2551
  # The serial number that uniquely identifies the MFA device. For virtual
@@ -2549,7 +2565,7 @@ module Aws::IAM
2549
2565
  # @example Request syntax with placeholder values
2550
2566
  #
2551
2567
  # resp = client.deactivate_mfa_device({
2552
- # user_name: "existingUserNameType", # required
2568
+ # user_name: "existingUserNameType",
2553
2569
  # serial_number: "serialNumberType", # required
2554
2570
  # })
2555
2571
  #
@@ -2861,17 +2877,23 @@ module Aws::IAM
2861
2877
  #
2862
2878
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_admin-change-user.html
2863
2879
  #
2864
- # @option params [required, String] :user_name
2880
+ # @option params [String] :user_name
2865
2881
  # The name of the user whose password you want to delete.
2866
2882
  #
2867
- # This parameter allows (through its [regex pattern][1]) a string of
2883
+ # This parameter is optional. If no user name is included, it defaults
2884
+ # to the principal making the request. When you make this request with
2885
+ # root user credentials, you must use an [AssumeRoot][1] session to omit
2886
+ # the user name.
2887
+ #
2888
+ # This parameter allows (through its [regex pattern][2]) a string of
2868
2889
  # characters consisting of upper and lowercase alphanumeric characters
2869
2890
  # with no spaces. You can also include any of the following characters:
2870
2891
  # \_+=,.@-
2871
2892
  #
2872
2893
  #
2873
2894
  #
2874
- # [1]: http://wikipedia.org/wiki/regex
2895
+ # [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
2896
+ # [2]: http://wikipedia.org/wiki/regex
2875
2897
  #
2876
2898
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2877
2899
  #
@@ -2887,7 +2909,7 @@ module Aws::IAM
2887
2909
  # @example Request syntax with placeholder values
2888
2910
  #
2889
2911
  # resp = client.delete_login_profile({
2890
- # user_name: "userNameType", # required
2912
+ # user_name: "userNameType",
2891
2913
  # })
2892
2914
  #
2893
2915
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/DeleteLoginProfile AWS API Documentation
@@ -3860,6 +3882,91 @@ module Aws::IAM
3860
3882
  req.send_request(options)
3861
3883
  end
3862
3884
 
3885
+ # Disables the management of privileged root user credentials across
3886
+ # member accounts in your organization. When you disable this feature,
3887
+ # the management account and the delegated admininstrator for IAM can no
3888
+ # longer manage root user credentials for member accounts in your
3889
+ # organization.
3890
+ #
3891
+ # @return [Types::DisableOrganizationsRootCredentialsManagementResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3892
+ #
3893
+ # * {Types::DisableOrganizationsRootCredentialsManagementResponse#organization_id #organization_id} => String
3894
+ # * {Types::DisableOrganizationsRootCredentialsManagementResponse#enabled_features #enabled_features} => Array<String>
3895
+ #
3896
+ #
3897
+ # @example Example: To disable the RootCredentialsManagement feature in your organization
3898
+ #
3899
+ # # The following command disables the management of privileged root user credentials across member accounts in your
3900
+ # # organization.
3901
+ #
3902
+ # resp = client.disable_organizations_root_credentials_management({
3903
+ # })
3904
+ #
3905
+ # resp.to_h outputs the following:
3906
+ # {
3907
+ # enabled_features: [
3908
+ # "RootSessions",
3909
+ # ],
3910
+ # organization_id: "o-aa111bb222",
3911
+ # }
3912
+ #
3913
+ # @example Response structure
3914
+ #
3915
+ # resp.organization_id #=> String
3916
+ # resp.enabled_features #=> Array
3917
+ # resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
3918
+ #
3919
+ # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/DisableOrganizationsRootCredentialsManagement AWS API Documentation
3920
+ #
3921
+ # @overload disable_organizations_root_credentials_management(params = {})
3922
+ # @param [Hash] params ({})
3923
+ def disable_organizations_root_credentials_management(params = {}, options = {})
3924
+ req = build_request(:disable_organizations_root_credentials_management, params)
3925
+ req.send_request(options)
3926
+ end
3927
+
3928
+ # Disables root user sessions for privileged tasks across member
3929
+ # accounts in your organization. When you disable this feature, the
3930
+ # management account and the delegated admininstrator for IAM can no
3931
+ # longer perform privileged tasks on member accounts in your
3932
+ # organization.
3933
+ #
3934
+ # @return [Types::DisableOrganizationsRootSessionsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3935
+ #
3936
+ # * {Types::DisableOrganizationsRootSessionsResponse#organization_id #organization_id} => String
3937
+ # * {Types::DisableOrganizationsRootSessionsResponse#enabled_features #enabled_features} => Array<String>
3938
+ #
3939
+ #
3940
+ # @example Example: To disable the RootSessions feature in your organization
3941
+ #
3942
+ # # The following command disables root user sessions for privileged tasks across member accounts in your organization.
3943
+ #
3944
+ # resp = client.disable_organizations_root_sessions({
3945
+ # })
3946
+ #
3947
+ # resp.to_h outputs the following:
3948
+ # {
3949
+ # enabled_features: [
3950
+ # "RootCredentialsManagement",
3951
+ # ],
3952
+ # organization_id: "o-aa111bb222",
3953
+ # }
3954
+ #
3955
+ # @example Response structure
3956
+ #
3957
+ # resp.organization_id #=> String
3958
+ # resp.enabled_features #=> Array
3959
+ # resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
3960
+ #
3961
+ # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/DisableOrganizationsRootSessions AWS API Documentation
3962
+ #
3963
+ # @overload disable_organizations_root_sessions(params = {})
3964
+ # @param [Hash] params ({})
3965
+ def disable_organizations_root_sessions(params = {}, options = {})
3966
+ req = build_request(:disable_organizations_root_sessions, params)
3967
+ req.send_request(options)
3968
+ end
3969
+
3863
3970
  # Enables the specified MFA device and associates it with the specified
3864
3971
  # IAM user. When enabled, the MFA device is required for every
3865
3972
  # subsequent login by the IAM user associated with the device.
@@ -3941,6 +4048,124 @@ module Aws::IAM
3941
4048
  req.send_request(options)
3942
4049
  end
3943
4050
 
4051
+ # Enables the management of privileged root user credentials across
4052
+ # member accounts in your organization. When you enable root credentials
4053
+ # management for [centralized root access][1], the management account
4054
+ # and the delegated admininstrator for IAM can manage root user
4055
+ # credentials for member accounts in your organization.
4056
+ #
4057
+ # Before you enable centralized root access, you must have an account
4058
+ # configured with the following settings:
4059
+ #
4060
+ # * You must manage your Amazon Web Services accounts in
4061
+ # [Organizations][2].
4062
+ #
4063
+ # * Enable trusted access for Identity and Access Management in
4064
+ # Organizations. For details, see [IAM and Organizations][3] in the
4065
+ # *Organizations User Guide*.
4066
+ #
4067
+ #
4068
+ #
4069
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#id_root-user-access-management
4070
+ # [2]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html
4071
+ # [3]: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ra.html
4072
+ #
4073
+ # @return [Types::EnableOrganizationsRootCredentialsManagementResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4074
+ #
4075
+ # * {Types::EnableOrganizationsRootCredentialsManagementResponse#organization_id #organization_id} => String
4076
+ # * {Types::EnableOrganizationsRootCredentialsManagementResponse#enabled_features #enabled_features} => Array<String>
4077
+ #
4078
+ #
4079
+ # @example Example: To enable the RootCredentialsManagement feature in your organization
4080
+ #
4081
+ # # The following command enables the management of privileged root user credentials across member accounts in your
4082
+ # # organization.
4083
+ #
4084
+ # resp = client.enable_organizations_root_credentials_management({
4085
+ # })
4086
+ #
4087
+ # resp.to_h outputs the following:
4088
+ # {
4089
+ # enabled_features: [
4090
+ # "RootCredentialsManagement",
4091
+ # ],
4092
+ # organization_id: "o-aa111bb222",
4093
+ # }
4094
+ #
4095
+ # @example Response structure
4096
+ #
4097
+ # resp.organization_id #=> String
4098
+ # resp.enabled_features #=> Array
4099
+ # resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
4100
+ #
4101
+ # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/EnableOrganizationsRootCredentialsManagement AWS API Documentation
4102
+ #
4103
+ # @overload enable_organizations_root_credentials_management(params = {})
4104
+ # @param [Hash] params ({})
4105
+ def enable_organizations_root_credentials_management(params = {}, options = {})
4106
+ req = build_request(:enable_organizations_root_credentials_management, params)
4107
+ req.send_request(options)
4108
+ end
4109
+
4110
+ # Allows the management account or delegated administrator to perform
4111
+ # privileged tasks on member accounts in your organization. For more
4112
+ # information, see [Centrally manage root access for member accounts][1]
4113
+ # in the *Identity and Access Management User Guide*.
4114
+ #
4115
+ # Before you enable this feature, you must have an account configured
4116
+ # with the following settings:
4117
+ #
4118
+ # * You must manage your Amazon Web Services accounts in
4119
+ # [Organizations][2].
4120
+ #
4121
+ # * Enable trusted access for Identity and Access Management in
4122
+ # Organizations. For details, see [IAM and Organizations][3] in the
4123
+ # *Organizations User Guide*.
4124
+ #
4125
+ #
4126
+ #
4127
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#id_root-user-access-management
4128
+ # [2]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html
4129
+ # [3]: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ra.html
4130
+ #
4131
+ # @return [Types::EnableOrganizationsRootSessionsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4132
+ #
4133
+ # * {Types::EnableOrganizationsRootSessionsResponse#organization_id #organization_id} => String
4134
+ # * {Types::EnableOrganizationsRootSessionsResponse#enabled_features #enabled_features} => Array<String>
4135
+ #
4136
+ #
4137
+ # @example Example: To enable the RootSessions feature in your organization
4138
+ #
4139
+ # # The following command allows the management account or delegated administrator to perform privileged tasks on member
4140
+ # # accounts in your organization.
4141
+ #
4142
+ # resp = client.enable_organizations_root_sessions({
4143
+ # })
4144
+ #
4145
+ # resp.to_h outputs the following:
4146
+ # {
4147
+ # enabled_features: [
4148
+ # "RootCredentialsManagement",
4149
+ # "RootSessions",
4150
+ # ],
4151
+ # organization_id: "o-aa111bb222",
4152
+ # }
4153
+ #
4154
+ # @example Response structure
4155
+ #
4156
+ # resp.organization_id #=> String
4157
+ # resp.enabled_features #=> Array
4158
+ # resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
4159
+ #
4160
+ # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/EnableOrganizationsRootSessions AWS API Documentation
4161
+ #
4162
+ # @overload enable_organizations_root_sessions(params = {})
4163
+ # @param [Hash] params ({})
4164
+ def enable_organizations_root_sessions(params = {}, options = {})
4165
+ req = build_request(:enable_organizations_root_sessions, params)
4166
+ req.send_request(options)
4167
+ end
4168
+
3944
4169
  # Generates a credential report for the Amazon Web Services account. For
3945
4170
  # more information about the credential report, see [Getting credential
3946
4171
  # reports][1] in the *IAM User Guide*.
@@ -5066,17 +5291,23 @@ module Aws::IAM
5066
5291
  # you create a password for the user to access the Amazon Web Services
5067
5292
  # Management Console.
5068
5293
  #
5069
- # @option params [required, String] :user_name
5294
+ # @option params [String] :user_name
5070
5295
  # The name of the user whose login profile you want to retrieve.
5071
5296
  #
5072
- # This parameter allows (through its [regex pattern][1]) a string of
5297
+ # This parameter is optional. If no user name is included, it defaults
5298
+ # to the principal making the request. When you make this request with
5299
+ # root user credentials, you must use an [AssumeRoot][1] session to omit
5300
+ # the user name.
5301
+ #
5302
+ # This parameter allows (through its [regex pattern][2]) a string of
5073
5303
  # characters consisting of upper and lowercase alphanumeric characters
5074
5304
  # with no spaces. You can also include any of the following characters:
5075
5305
  # \_+=,.@-
5076
5306
  #
5077
5307
  #
5078
5308
  #
5079
- # [1]: http://wikipedia.org/wiki/regex
5309
+ # [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
5310
+ # [2]: http://wikipedia.org/wiki/regex
5080
5311
  #
5081
5312
  # @return [Types::GetLoginProfileResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
5082
5313
  #
@@ -5102,7 +5333,7 @@ module Aws::IAM
5102
5333
  # @example Request syntax with placeholder values
5103
5334
  #
5104
5335
  # resp = client.get_login_profile({
5105
- # user_name: "userNameType", # required
5336
+ # user_name: "userNameType",
5106
5337
  # })
5107
5338
  #
5108
5339
  # @example Response structure
@@ -6494,12 +6725,12 @@ module Aws::IAM
6494
6725
  # Lists the account alias associated with the Amazon Web Services
6495
6726
  # account (Note: you can have only one). For information about using an
6496
6727
  # Amazon Web Services account alias, see [Creating, deleting, and
6497
- # listing an Amazon Web Services account alias][1] in the *IAM User
6498
- # Guide*.
6728
+ # listing an Amazon Web Services account alias][1] in the *Amazon Web
6729
+ # Services Sign-In User Guide*.
6499
6730
  #
6500
6731
  #
6501
6732
  #
6502
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/console_account-alias.html#CreateAccountAlias
6733
+ # [1]: https://docs.aws.amazon.com/signin/latest/userguide/CreateAccountAlias.html
6503
6734
  #
6504
6735
  # @option params [String] :marker
6505
6736
  # Use this parameter only when paginating results and only after you
@@ -7807,6 +8038,50 @@ module Aws::IAM
7807
8038
  req.send_request(options)
7808
8039
  end
7809
8040
 
8041
+ # Lists the centralized root access features enabled for your
8042
+ # organization. For more information, see [Centrally manage root access
8043
+ # for member accounts][1].
8044
+ #
8045
+ #
8046
+ #
8047
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#id_root-user-access-management
8048
+ #
8049
+ # @return [Types::ListOrganizationsFeaturesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8050
+ #
8051
+ # * {Types::ListOrganizationsFeaturesResponse#organization_id #organization_id} => String
8052
+ # * {Types::ListOrganizationsFeaturesResponse#enabled_features #enabled_features} => Array<String>
8053
+ #
8054
+ #
8055
+ # @example Example: To list the centralized root access features enabled for your organization
8056
+ #
8057
+ # # he following command lists the centralized root access features enabled for your organization.
8058
+ #
8059
+ # resp = client.list_organizations_features({
8060
+ # })
8061
+ #
8062
+ # resp.to_h outputs the following:
8063
+ # {
8064
+ # enabled_features: [
8065
+ # "RootCredentialsManagement",
8066
+ # ],
8067
+ # organization_id: "o-aa111bb222",
8068
+ # }
8069
+ #
8070
+ # @example Response structure
8071
+ #
8072
+ # resp.organization_id #=> String
8073
+ # resp.enabled_features #=> Array
8074
+ # resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
8075
+ #
8076
+ # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOrganizationsFeatures AWS API Documentation
8077
+ #
8078
+ # @overload list_organizations_features(params = {})
8079
+ # @param [Hash] params ({})
8080
+ def list_organizations_features(params = {}, options = {})
8081
+ req = build_request(:list_organizations_features, params)
8082
+ req.send_request(options)
8083
+ end
8084
+
7810
8085
  # Lists all the managed policies that are available in your Amazon Web
7811
8086
  # Services account, including your own customer-defined managed policies
7812
8087
  # and all Amazon Web Services managed policies.
@@ -12176,7 +12451,7 @@ module Aws::IAM
12176
12451
  # Specifies whether IAM user passwords must contain at least one of the
12177
12452
  # following non-alphanumeric characters:
12178
12453
  #
12179
- # ! @ # $ % ^ & * ( ) \_ + - = \[ \] \\\{ \\} \| '
12454
+ # ! @ # $ % ^ & * ( ) \_ + - = \[ \] \{ } \| '
12180
12455
  #
12181
12456
  # If you do not specify a value for this parameter, then the operation
12182
12457
  # uses the default value of `false`. The result is that passwords do not
@@ -13537,7 +13812,7 @@ module Aws::IAM
13537
13812
  tracer: tracer
13538
13813
  )
13539
13814
  context[:gem_name] = 'aws-sdk-iam'
13540
- context[:gem_version] = '1.112.0'
13815
+ context[:gem_version] = '1.114.0'
13541
13816
  Seahorse::Client::Request.new(handlers, context)
13542
13817
  end
13543
13818