aws-sdk-iam 1.112.0 → 1.114.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/account_password_policy.rb +2 -2
- data/lib/aws-sdk-iam/client.rb +300 -25
- data/lib/aws-sdk-iam/client_api.rb +127 -5
- data/lib/aws-sdk-iam/errors.rb +55 -0
- data/lib/aws-sdk-iam/login_profile.rb +8 -4
- data/lib/aws-sdk-iam/resource.rb +1 -1
- data/lib/aws-sdk-iam/types.rb +204 -12
- data/lib/aws-sdk-iam/user.rb +8 -4
- data/lib/aws-sdk-iam.rb +1 -1
- data/sig/account_summary.rbs +1 -1
- data/sig/client.rbs +59 -9
- data/sig/errors.rbs +10 -0
- data/sig/login_profile.rbs +1 -1
- data/sig/types.rbs +61 -1
- data/sig/user.rbs +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 573b04d3c6bf7dc554501c1e0587eaaf384fdf0921be600df5e7dce7cc789296
|
4
|
+
data.tar.gz: 4c473c9e190a29abbbb9d34c0d5ab6a821895afaa2d087cbac5b209e926d9d06
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: c72c44612e87a3490f57ed09e265986ebeb50bd6fea80847cf267b90bc05e86afc3c65d4fd6f4c758677b9d495525cc654a9513b03af8d815e71f79c22a7b6b7
|
7
|
+
data.tar.gz: 3fc76230b83f934c9fd9f87401cef698bfcd53a545dba4b771d21fa3fc5736d1f126749eaf6bd1bcb7e6474586a389782689890d4d80248cf28fbc0c77e00c97
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.114.0 (2024-11-14)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - This release includes support for five new APIs and changes to existing APIs that give AWS Organizations customers the ability to use temporary root credentials, targeted to member accounts in the organization.
|
8
|
+
|
9
|
+
1.113.0 (2024-11-06)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.112.0 (2024-10-18)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.114.0
|
@@ -33,7 +33,7 @@ module Aws::IAM
|
|
33
33
|
# Specifies whether IAM user passwords must contain at least one of the
|
34
34
|
# following symbols:
|
35
35
|
#
|
36
|
-
# ! @ # $ % ^ & * ( ) \_ + - = \[ \]
|
36
|
+
# ! @ # $ % ^ & * ( ) \_ + - = \[ \] \{ } \| '
|
37
37
|
# @return [Boolean]
|
38
38
|
def require_symbols
|
39
39
|
data[:require_symbols]
|
@@ -275,7 +275,7 @@ module Aws::IAM
|
|
275
275
|
# Specifies whether IAM user passwords must contain at least one of the
|
276
276
|
# following non-alphanumeric characters:
|
277
277
|
#
|
278
|
-
# ! @ # $ % ^ & * ( ) \_ + - = \[ \]
|
278
|
+
# ! @ # $ % ^ & * ( ) \_ + - = \[ \] \{ } \| '
|
279
279
|
#
|
280
280
|
# If you do not specify a value for this parameter, then the operation
|
281
281
|
# uses the default value of `false`. The result is that passwords do not
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -1269,23 +1269,32 @@ module Aws::IAM
|
|
1269
1269
|
#
|
1270
1270
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html
|
1271
1271
|
#
|
1272
|
-
# @option params [
|
1272
|
+
# @option params [String] :user_name
|
1273
1273
|
# The name of the IAM user to create a password for. The user must
|
1274
1274
|
# already exist.
|
1275
1275
|
#
|
1276
|
-
# This parameter
|
1276
|
+
# This parameter is optional. If no user name is included, it defaults
|
1277
|
+
# to the principal making the request. When you make this request with
|
1278
|
+
# root user credentials, you must use an [AssumeRoot][1] session to omit
|
1279
|
+
# the user name.
|
1280
|
+
#
|
1281
|
+
# This parameter allows (through its [regex pattern][2]) a string of
|
1277
1282
|
# characters consisting of upper and lowercase alphanumeric characters
|
1278
1283
|
# with no spaces. You can also include any of the following characters:
|
1279
1284
|
# \_+=,.@-
|
1280
1285
|
#
|
1281
1286
|
#
|
1282
1287
|
#
|
1283
|
-
# [1]:
|
1288
|
+
# [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
|
1289
|
+
# [2]: http://wikipedia.org/wiki/regex
|
1284
1290
|
#
|
1285
|
-
# @option params [
|
1291
|
+
# @option params [String] :password
|
1286
1292
|
# The new password for the user.
|
1287
1293
|
#
|
1288
|
-
#
|
1294
|
+
# This parameter must be omitted when you make the request with an
|
1295
|
+
# [AssumeRoot][1] session. It is required in all other cases.
|
1296
|
+
#
|
1297
|
+
# The [regex pattern][2] that is used to validate this parameter is a
|
1289
1298
|
# string of characters. That string can include almost any printable
|
1290
1299
|
# ASCII character from the space (`\u0020`) through the end of the ASCII
|
1291
1300
|
# character range (`\u00FF`). You can also include the tab (`\u0009`),
|
@@ -1297,7 +1306,8 @@ module Aws::IAM
|
|
1297
1306
|
#
|
1298
1307
|
#
|
1299
1308
|
#
|
1300
|
-
# [1]:
|
1309
|
+
# [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
|
1310
|
+
# [2]: http://wikipedia.org/wiki/regex
|
1301
1311
|
#
|
1302
1312
|
# @option params [Boolean] :password_reset_required
|
1303
1313
|
# Specifies whether the user is required to set a new password on next
|
@@ -1331,8 +1341,8 @@ module Aws::IAM
|
|
1331
1341
|
# @example Request syntax with placeholder values
|
1332
1342
|
#
|
1333
1343
|
# resp = client.create_login_profile({
|
1334
|
-
# user_name: "userNameType",
|
1335
|
-
# password: "passwordType",
|
1344
|
+
# user_name: "userNameType",
|
1345
|
+
# password: "passwordType",
|
1336
1346
|
# password_reset_required: false,
|
1337
1347
|
# })
|
1338
1348
|
#
|
@@ -2519,17 +2529,23 @@ module Aws::IAM
|
|
2519
2529
|
#
|
2520
2530
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html
|
2521
2531
|
#
|
2522
|
-
# @option params [
|
2532
|
+
# @option params [String] :user_name
|
2523
2533
|
# The name of the user whose MFA device you want to deactivate.
|
2524
2534
|
#
|
2525
|
-
# This parameter
|
2535
|
+
# This parameter is optional. If no user name is included, it defaults
|
2536
|
+
# to the principal making the request. When you make this request with
|
2537
|
+
# root user credentials, you must use an [AssumeRoot][1] session to omit
|
2538
|
+
# the user name.
|
2539
|
+
#
|
2540
|
+
# This parameter allows (through its [regex pattern][2]) a string of
|
2526
2541
|
# characters consisting of upper and lowercase alphanumeric characters
|
2527
2542
|
# with no spaces. You can also include any of the following characters:
|
2528
2543
|
# \_+=,.@-
|
2529
2544
|
#
|
2530
2545
|
#
|
2531
2546
|
#
|
2532
|
-
# [1]:
|
2547
|
+
# [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
|
2548
|
+
# [2]: http://wikipedia.org/wiki/regex
|
2533
2549
|
#
|
2534
2550
|
# @option params [required, String] :serial_number
|
2535
2551
|
# The serial number that uniquely identifies the MFA device. For virtual
|
@@ -2549,7 +2565,7 @@ module Aws::IAM
|
|
2549
2565
|
# @example Request syntax with placeholder values
|
2550
2566
|
#
|
2551
2567
|
# resp = client.deactivate_mfa_device({
|
2552
|
-
# user_name: "existingUserNameType",
|
2568
|
+
# user_name: "existingUserNameType",
|
2553
2569
|
# serial_number: "serialNumberType", # required
|
2554
2570
|
# })
|
2555
2571
|
#
|
@@ -2861,17 +2877,23 @@ module Aws::IAM
|
|
2861
2877
|
#
|
2862
2878
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_admin-change-user.html
|
2863
2879
|
#
|
2864
|
-
# @option params [
|
2880
|
+
# @option params [String] :user_name
|
2865
2881
|
# The name of the user whose password you want to delete.
|
2866
2882
|
#
|
2867
|
-
# This parameter
|
2883
|
+
# This parameter is optional. If no user name is included, it defaults
|
2884
|
+
# to the principal making the request. When you make this request with
|
2885
|
+
# root user credentials, you must use an [AssumeRoot][1] session to omit
|
2886
|
+
# the user name.
|
2887
|
+
#
|
2888
|
+
# This parameter allows (through its [regex pattern][2]) a string of
|
2868
2889
|
# characters consisting of upper and lowercase alphanumeric characters
|
2869
2890
|
# with no spaces. You can also include any of the following characters:
|
2870
2891
|
# \_+=,.@-
|
2871
2892
|
#
|
2872
2893
|
#
|
2873
2894
|
#
|
2874
|
-
# [1]:
|
2895
|
+
# [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
|
2896
|
+
# [2]: http://wikipedia.org/wiki/regex
|
2875
2897
|
#
|
2876
2898
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
2877
2899
|
#
|
@@ -2887,7 +2909,7 @@ module Aws::IAM
|
|
2887
2909
|
# @example Request syntax with placeholder values
|
2888
2910
|
#
|
2889
2911
|
# resp = client.delete_login_profile({
|
2890
|
-
# user_name: "userNameType",
|
2912
|
+
# user_name: "userNameType",
|
2891
2913
|
# })
|
2892
2914
|
#
|
2893
2915
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/DeleteLoginProfile AWS API Documentation
|
@@ -3860,6 +3882,91 @@ module Aws::IAM
|
|
3860
3882
|
req.send_request(options)
|
3861
3883
|
end
|
3862
3884
|
|
3885
|
+
# Disables the management of privileged root user credentials across
|
3886
|
+
# member accounts in your organization. When you disable this feature,
|
3887
|
+
# the management account and the delegated admininstrator for IAM can no
|
3888
|
+
# longer manage root user credentials for member accounts in your
|
3889
|
+
# organization.
|
3890
|
+
#
|
3891
|
+
# @return [Types::DisableOrganizationsRootCredentialsManagementResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3892
|
+
#
|
3893
|
+
# * {Types::DisableOrganizationsRootCredentialsManagementResponse#organization_id #organization_id} => String
|
3894
|
+
# * {Types::DisableOrganizationsRootCredentialsManagementResponse#enabled_features #enabled_features} => Array<String>
|
3895
|
+
#
|
3896
|
+
#
|
3897
|
+
# @example Example: To disable the RootCredentialsManagement feature in your organization
|
3898
|
+
#
|
3899
|
+
# # The following command disables the management of privileged root user credentials across member accounts in your
|
3900
|
+
# # organization.
|
3901
|
+
#
|
3902
|
+
# resp = client.disable_organizations_root_credentials_management({
|
3903
|
+
# })
|
3904
|
+
#
|
3905
|
+
# resp.to_h outputs the following:
|
3906
|
+
# {
|
3907
|
+
# enabled_features: [
|
3908
|
+
# "RootSessions",
|
3909
|
+
# ],
|
3910
|
+
# organization_id: "o-aa111bb222",
|
3911
|
+
# }
|
3912
|
+
#
|
3913
|
+
# @example Response structure
|
3914
|
+
#
|
3915
|
+
# resp.organization_id #=> String
|
3916
|
+
# resp.enabled_features #=> Array
|
3917
|
+
# resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
|
3918
|
+
#
|
3919
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/DisableOrganizationsRootCredentialsManagement AWS API Documentation
|
3920
|
+
#
|
3921
|
+
# @overload disable_organizations_root_credentials_management(params = {})
|
3922
|
+
# @param [Hash] params ({})
|
3923
|
+
def disable_organizations_root_credentials_management(params = {}, options = {})
|
3924
|
+
req = build_request(:disable_organizations_root_credentials_management, params)
|
3925
|
+
req.send_request(options)
|
3926
|
+
end
|
3927
|
+
|
3928
|
+
# Disables root user sessions for privileged tasks across member
|
3929
|
+
# accounts in your organization. When you disable this feature, the
|
3930
|
+
# management account and the delegated admininstrator for IAM can no
|
3931
|
+
# longer perform privileged tasks on member accounts in your
|
3932
|
+
# organization.
|
3933
|
+
#
|
3934
|
+
# @return [Types::DisableOrganizationsRootSessionsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3935
|
+
#
|
3936
|
+
# * {Types::DisableOrganizationsRootSessionsResponse#organization_id #organization_id} => String
|
3937
|
+
# * {Types::DisableOrganizationsRootSessionsResponse#enabled_features #enabled_features} => Array<String>
|
3938
|
+
#
|
3939
|
+
#
|
3940
|
+
# @example Example: To disable the RootSessions feature in your organization
|
3941
|
+
#
|
3942
|
+
# # The following command disables root user sessions for privileged tasks across member accounts in your organization.
|
3943
|
+
#
|
3944
|
+
# resp = client.disable_organizations_root_sessions({
|
3945
|
+
# })
|
3946
|
+
#
|
3947
|
+
# resp.to_h outputs the following:
|
3948
|
+
# {
|
3949
|
+
# enabled_features: [
|
3950
|
+
# "RootCredentialsManagement",
|
3951
|
+
# ],
|
3952
|
+
# organization_id: "o-aa111bb222",
|
3953
|
+
# }
|
3954
|
+
#
|
3955
|
+
# @example Response structure
|
3956
|
+
#
|
3957
|
+
# resp.organization_id #=> String
|
3958
|
+
# resp.enabled_features #=> Array
|
3959
|
+
# resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
|
3960
|
+
#
|
3961
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/DisableOrganizationsRootSessions AWS API Documentation
|
3962
|
+
#
|
3963
|
+
# @overload disable_organizations_root_sessions(params = {})
|
3964
|
+
# @param [Hash] params ({})
|
3965
|
+
def disable_organizations_root_sessions(params = {}, options = {})
|
3966
|
+
req = build_request(:disable_organizations_root_sessions, params)
|
3967
|
+
req.send_request(options)
|
3968
|
+
end
|
3969
|
+
|
3863
3970
|
# Enables the specified MFA device and associates it with the specified
|
3864
3971
|
# IAM user. When enabled, the MFA device is required for every
|
3865
3972
|
# subsequent login by the IAM user associated with the device.
|
@@ -3941,6 +4048,124 @@ module Aws::IAM
|
|
3941
4048
|
req.send_request(options)
|
3942
4049
|
end
|
3943
4050
|
|
4051
|
+
# Enables the management of privileged root user credentials across
|
4052
|
+
# member accounts in your organization. When you enable root credentials
|
4053
|
+
# management for [centralized root access][1], the management account
|
4054
|
+
# and the delegated admininstrator for IAM can manage root user
|
4055
|
+
# credentials for member accounts in your organization.
|
4056
|
+
#
|
4057
|
+
# Before you enable centralized root access, you must have an account
|
4058
|
+
# configured with the following settings:
|
4059
|
+
#
|
4060
|
+
# * You must manage your Amazon Web Services accounts in
|
4061
|
+
# [Organizations][2].
|
4062
|
+
#
|
4063
|
+
# * Enable trusted access for Identity and Access Management in
|
4064
|
+
# Organizations. For details, see [IAM and Organizations][3] in the
|
4065
|
+
# *Organizations User Guide*.
|
4066
|
+
#
|
4067
|
+
#
|
4068
|
+
#
|
4069
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#id_root-user-access-management
|
4070
|
+
# [2]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html
|
4071
|
+
# [3]: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ra.html
|
4072
|
+
#
|
4073
|
+
# @return [Types::EnableOrganizationsRootCredentialsManagementResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
4074
|
+
#
|
4075
|
+
# * {Types::EnableOrganizationsRootCredentialsManagementResponse#organization_id #organization_id} => String
|
4076
|
+
# * {Types::EnableOrganizationsRootCredentialsManagementResponse#enabled_features #enabled_features} => Array<String>
|
4077
|
+
#
|
4078
|
+
#
|
4079
|
+
# @example Example: To enable the RootCredentialsManagement feature in your organization
|
4080
|
+
#
|
4081
|
+
# # The following command enables the management of privileged root user credentials across member accounts in your
|
4082
|
+
# # organization.
|
4083
|
+
#
|
4084
|
+
# resp = client.enable_organizations_root_credentials_management({
|
4085
|
+
# })
|
4086
|
+
#
|
4087
|
+
# resp.to_h outputs the following:
|
4088
|
+
# {
|
4089
|
+
# enabled_features: [
|
4090
|
+
# "RootCredentialsManagement",
|
4091
|
+
# ],
|
4092
|
+
# organization_id: "o-aa111bb222",
|
4093
|
+
# }
|
4094
|
+
#
|
4095
|
+
# @example Response structure
|
4096
|
+
#
|
4097
|
+
# resp.organization_id #=> String
|
4098
|
+
# resp.enabled_features #=> Array
|
4099
|
+
# resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
|
4100
|
+
#
|
4101
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/EnableOrganizationsRootCredentialsManagement AWS API Documentation
|
4102
|
+
#
|
4103
|
+
# @overload enable_organizations_root_credentials_management(params = {})
|
4104
|
+
# @param [Hash] params ({})
|
4105
|
+
def enable_organizations_root_credentials_management(params = {}, options = {})
|
4106
|
+
req = build_request(:enable_organizations_root_credentials_management, params)
|
4107
|
+
req.send_request(options)
|
4108
|
+
end
|
4109
|
+
|
4110
|
+
# Allows the management account or delegated administrator to perform
|
4111
|
+
# privileged tasks on member accounts in your organization. For more
|
4112
|
+
# information, see [Centrally manage root access for member accounts][1]
|
4113
|
+
# in the *Identity and Access Management User Guide*.
|
4114
|
+
#
|
4115
|
+
# Before you enable this feature, you must have an account configured
|
4116
|
+
# with the following settings:
|
4117
|
+
#
|
4118
|
+
# * You must manage your Amazon Web Services accounts in
|
4119
|
+
# [Organizations][2].
|
4120
|
+
#
|
4121
|
+
# * Enable trusted access for Identity and Access Management in
|
4122
|
+
# Organizations. For details, see [IAM and Organizations][3] in the
|
4123
|
+
# *Organizations User Guide*.
|
4124
|
+
#
|
4125
|
+
#
|
4126
|
+
#
|
4127
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#id_root-user-access-management
|
4128
|
+
# [2]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html
|
4129
|
+
# [3]: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ra.html
|
4130
|
+
#
|
4131
|
+
# @return [Types::EnableOrganizationsRootSessionsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
4132
|
+
#
|
4133
|
+
# * {Types::EnableOrganizationsRootSessionsResponse#organization_id #organization_id} => String
|
4134
|
+
# * {Types::EnableOrganizationsRootSessionsResponse#enabled_features #enabled_features} => Array<String>
|
4135
|
+
#
|
4136
|
+
#
|
4137
|
+
# @example Example: To enable the RootSessions feature in your organization
|
4138
|
+
#
|
4139
|
+
# # The following command allows the management account or delegated administrator to perform privileged tasks on member
|
4140
|
+
# # accounts in your organization.
|
4141
|
+
#
|
4142
|
+
# resp = client.enable_organizations_root_sessions({
|
4143
|
+
# })
|
4144
|
+
#
|
4145
|
+
# resp.to_h outputs the following:
|
4146
|
+
# {
|
4147
|
+
# enabled_features: [
|
4148
|
+
# "RootCredentialsManagement",
|
4149
|
+
# "RootSessions",
|
4150
|
+
# ],
|
4151
|
+
# organization_id: "o-aa111bb222",
|
4152
|
+
# }
|
4153
|
+
#
|
4154
|
+
# @example Response structure
|
4155
|
+
#
|
4156
|
+
# resp.organization_id #=> String
|
4157
|
+
# resp.enabled_features #=> Array
|
4158
|
+
# resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
|
4159
|
+
#
|
4160
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/EnableOrganizationsRootSessions AWS API Documentation
|
4161
|
+
#
|
4162
|
+
# @overload enable_organizations_root_sessions(params = {})
|
4163
|
+
# @param [Hash] params ({})
|
4164
|
+
def enable_organizations_root_sessions(params = {}, options = {})
|
4165
|
+
req = build_request(:enable_organizations_root_sessions, params)
|
4166
|
+
req.send_request(options)
|
4167
|
+
end
|
4168
|
+
|
3944
4169
|
# Generates a credential report for the Amazon Web Services account. For
|
3945
4170
|
# more information about the credential report, see [Getting credential
|
3946
4171
|
# reports][1] in the *IAM User Guide*.
|
@@ -5066,17 +5291,23 @@ module Aws::IAM
|
|
5066
5291
|
# you create a password for the user to access the Amazon Web Services
|
5067
5292
|
# Management Console.
|
5068
5293
|
#
|
5069
|
-
# @option params [
|
5294
|
+
# @option params [String] :user_name
|
5070
5295
|
# The name of the user whose login profile you want to retrieve.
|
5071
5296
|
#
|
5072
|
-
# This parameter
|
5297
|
+
# This parameter is optional. If no user name is included, it defaults
|
5298
|
+
# to the principal making the request. When you make this request with
|
5299
|
+
# root user credentials, you must use an [AssumeRoot][1] session to omit
|
5300
|
+
# the user name.
|
5301
|
+
#
|
5302
|
+
# This parameter allows (through its [regex pattern][2]) a string of
|
5073
5303
|
# characters consisting of upper and lowercase alphanumeric characters
|
5074
5304
|
# with no spaces. You can also include any of the following characters:
|
5075
5305
|
# \_+=,.@-
|
5076
5306
|
#
|
5077
5307
|
#
|
5078
5308
|
#
|
5079
|
-
# [1]:
|
5309
|
+
# [1]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoot.html
|
5310
|
+
# [2]: http://wikipedia.org/wiki/regex
|
5080
5311
|
#
|
5081
5312
|
# @return [Types::GetLoginProfileResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
5082
5313
|
#
|
@@ -5102,7 +5333,7 @@ module Aws::IAM
|
|
5102
5333
|
# @example Request syntax with placeholder values
|
5103
5334
|
#
|
5104
5335
|
# resp = client.get_login_profile({
|
5105
|
-
# user_name: "userNameType",
|
5336
|
+
# user_name: "userNameType",
|
5106
5337
|
# })
|
5107
5338
|
#
|
5108
5339
|
# @example Response structure
|
@@ -6494,12 +6725,12 @@ module Aws::IAM
|
|
6494
6725
|
# Lists the account alias associated with the Amazon Web Services
|
6495
6726
|
# account (Note: you can have only one). For information about using an
|
6496
6727
|
# Amazon Web Services account alias, see [Creating, deleting, and
|
6497
|
-
# listing an Amazon Web Services account alias][1] in the *
|
6498
|
-
# Guide*.
|
6728
|
+
# listing an Amazon Web Services account alias][1] in the *Amazon Web
|
6729
|
+
# Services Sign-In User Guide*.
|
6499
6730
|
#
|
6500
6731
|
#
|
6501
6732
|
#
|
6502
|
-
# [1]: https://docs.aws.amazon.com/
|
6733
|
+
# [1]: https://docs.aws.amazon.com/signin/latest/userguide/CreateAccountAlias.html
|
6503
6734
|
#
|
6504
6735
|
# @option params [String] :marker
|
6505
6736
|
# Use this parameter only when paginating results and only after you
|
@@ -7807,6 +8038,50 @@ module Aws::IAM
|
|
7807
8038
|
req.send_request(options)
|
7808
8039
|
end
|
7809
8040
|
|
8041
|
+
# Lists the centralized root access features enabled for your
|
8042
|
+
# organization. For more information, see [Centrally manage root access
|
8043
|
+
# for member accounts][1].
|
8044
|
+
#
|
8045
|
+
#
|
8046
|
+
#
|
8047
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#id_root-user-access-management
|
8048
|
+
#
|
8049
|
+
# @return [Types::ListOrganizationsFeaturesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
8050
|
+
#
|
8051
|
+
# * {Types::ListOrganizationsFeaturesResponse#organization_id #organization_id} => String
|
8052
|
+
# * {Types::ListOrganizationsFeaturesResponse#enabled_features #enabled_features} => Array<String>
|
8053
|
+
#
|
8054
|
+
#
|
8055
|
+
# @example Example: To list the centralized root access features enabled for your organization
|
8056
|
+
#
|
8057
|
+
# # he following command lists the centralized root access features enabled for your organization.
|
8058
|
+
#
|
8059
|
+
# resp = client.list_organizations_features({
|
8060
|
+
# })
|
8061
|
+
#
|
8062
|
+
# resp.to_h outputs the following:
|
8063
|
+
# {
|
8064
|
+
# enabled_features: [
|
8065
|
+
# "RootCredentialsManagement",
|
8066
|
+
# ],
|
8067
|
+
# organization_id: "o-aa111bb222",
|
8068
|
+
# }
|
8069
|
+
#
|
8070
|
+
# @example Response structure
|
8071
|
+
#
|
8072
|
+
# resp.organization_id #=> String
|
8073
|
+
# resp.enabled_features #=> Array
|
8074
|
+
# resp.enabled_features[0] #=> String, one of "RootCredentialsManagement", "RootSessions"
|
8075
|
+
#
|
8076
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOrganizationsFeatures AWS API Documentation
|
8077
|
+
#
|
8078
|
+
# @overload list_organizations_features(params = {})
|
8079
|
+
# @param [Hash] params ({})
|
8080
|
+
def list_organizations_features(params = {}, options = {})
|
8081
|
+
req = build_request(:list_organizations_features, params)
|
8082
|
+
req.send_request(options)
|
8083
|
+
end
|
8084
|
+
|
7810
8085
|
# Lists all the managed policies that are available in your Amazon Web
|
7811
8086
|
# Services account, including your own customer-defined managed policies
|
7812
8087
|
# and all Amazon Web Services managed policies.
|
@@ -12176,7 +12451,7 @@ module Aws::IAM
|
|
12176
12451
|
# Specifies whether IAM user passwords must contain at least one of the
|
12177
12452
|
# following non-alphanumeric characters:
|
12178
12453
|
#
|
12179
|
-
# ! @ # $ % ^ & * ( ) \_ + - = \[ \]
|
12454
|
+
# ! @ # $ % ^ & * ( ) \_ + - = \[ \] \{ } \| '
|
12180
12455
|
#
|
12181
12456
|
# If you do not specify a value for this parameter, then the operation
|
12182
12457
|
# uses the default value of `false`. The result is that passwords do not
|
@@ -13537,7 +13812,7 @@ module Aws::IAM
|
|
13537
13812
|
tracer: tracer
|
13538
13813
|
)
|
13539
13814
|
context[:gem_name] = 'aws-sdk-iam'
|
13540
|
-
context[:gem_version] = '1.
|
13815
|
+
context[:gem_version] = '1.114.0'
|
13541
13816
|
Seahorse::Client::Request.new(handlers, context)
|
13542
13817
|
end
|
13543
13818
|
|