aws-sdk-iam 1.43.0 → 1.48.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/aws-sdk-iam.rb +3 -2
- data/lib/aws-sdk-iam/account_password_policy.rb +11 -7
- data/lib/aws-sdk-iam/client.rb +1970 -507
- data/lib/aws-sdk-iam/client_api.rb +370 -0
- data/lib/aws-sdk-iam/current_user.rb +9 -10
- data/lib/aws-sdk-iam/group.rb +8 -8
- data/lib/aws-sdk-iam/instance_profile.rb +15 -3
- data/lib/aws-sdk-iam/policy.rb +16 -4
- data/lib/aws-sdk-iam/resource.rb +123 -20
- data/lib/aws-sdk-iam/role.rb +11 -12
- data/lib/aws-sdk-iam/saml_provider.rb +12 -0
- data/lib/aws-sdk-iam/server_certificate.rb +12 -0
- data/lib/aws-sdk-iam/types.rb +1510 -274
- data/lib/aws-sdk-iam/user.rb +19 -21
- data/lib/aws-sdk-iam/virtual_mfa_device.rb +12 -0
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a0ae21648f829d7f5c3cbd4fa54b034663de5937f0c73ff5886ed3fd75b8156f
|
4
|
+
data.tar.gz: 541167e8ac55ec219d5fe10cd624c03a2799cb595fa67f00cef6c921f88e163c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b8fdcc7a8c3aeb6d4cc6669a971a8d378d46213bf0796fef6451d9ac4d91a2f38748aaaf559c3e2e45b2ae2c871668db402968772fe8fcd53933679f55583b29
|
7
|
+
data.tar.gz: f889cfb216c6c224b49fc302446cf7049f3bf22d21c07598410b07b91c014c491fece6b996efea241c3ffd23b06417d9e220e821fb46ae19d0524780ff6be99b
|
data/lib/aws-sdk-iam.rb
CHANGED
@@ -7,6 +7,7 @@
|
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
10
|
+
|
10
11
|
require 'aws-sdk-core'
|
11
12
|
require 'aws-sigv4'
|
12
13
|
|
@@ -66,9 +67,9 @@ require_relative 'aws-sdk-iam/customizations'
|
|
66
67
|
#
|
67
68
|
# See {Errors} for more information.
|
68
69
|
#
|
69
|
-
#
|
70
|
+
# @!group service
|
70
71
|
module Aws::IAM
|
71
72
|
|
72
|
-
GEM_VERSION = '1.
|
73
|
+
GEM_VERSION = '1.48.0'
|
73
74
|
|
74
75
|
end
|
@@ -30,27 +30,31 @@ module Aws::IAM
|
|
30
30
|
data[:minimum_password_length]
|
31
31
|
end
|
32
32
|
|
33
|
-
# Specifies whether
|
33
|
+
# Specifies whether IAM user passwords must contain at least one of the
|
34
|
+
# following symbols:
|
35
|
+
#
|
36
|
+
# ! @ # $ % ^ & * ( ) \_ + - = \[ \] \\\{ \\} \| '
|
34
37
|
# @return [Boolean]
|
35
38
|
def require_symbols
|
36
39
|
data[:require_symbols]
|
37
40
|
end
|
38
41
|
|
39
|
-
# Specifies whether
|
42
|
+
# Specifies whether IAM user passwords must contain at least one numeric
|
43
|
+
# character (0 to 9).
|
40
44
|
# @return [Boolean]
|
41
45
|
def require_numbers
|
42
46
|
data[:require_numbers]
|
43
47
|
end
|
44
48
|
|
45
|
-
# Specifies whether
|
46
|
-
#
|
49
|
+
# Specifies whether IAM user passwords must contain at least one
|
50
|
+
# uppercase character (A to Z).
|
47
51
|
# @return [Boolean]
|
48
52
|
def require_uppercase_characters
|
49
53
|
data[:require_uppercase_characters]
|
50
54
|
end
|
51
55
|
|
52
|
-
# Specifies whether
|
53
|
-
#
|
56
|
+
# Specifies whether IAM user passwords must contain at least one
|
57
|
+
# lowercase character (a to z).
|
54
58
|
# @return [Boolean]
|
55
59
|
def require_lowercase_characters
|
56
60
|
data[:require_lowercase_characters]
|
@@ -286,7 +290,7 @@ module Aws::IAM
|
|
286
290
|
# @option options [Boolean] :allow_users_to_change_password
|
287
291
|
# Allows all IAM users in your account to use the AWS Management Console
|
288
292
|
# to change their own passwords. For more information, see [Letting IAM
|
289
|
-
#
|
293
|
+
# users change their own passwords][1] in the *IAM User Guide*.
|
290
294
|
#
|
291
295
|
# If you do not specify a value for this parameter, then the operation
|
292
296
|
# uses the default value of `false`. The result is that IAM users in the
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -85,13 +85,28 @@ module Aws::IAM
|
|
85
85
|
# * `Aws::Credentials` - Used for configuring static, non-refreshing
|
86
86
|
# credentials.
|
87
87
|
#
|
88
|
+
# * `Aws::SharedCredentials` - Used for loading static credentials from a
|
89
|
+
# shared file, such as `~/.aws/config`.
|
90
|
+
#
|
91
|
+
# * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
|
92
|
+
#
|
93
|
+
# * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to
|
94
|
+
# assume a role after providing credentials via the web.
|
95
|
+
#
|
96
|
+
# * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an
|
97
|
+
# access token generated from `aws login`.
|
98
|
+
#
|
99
|
+
# * `Aws::ProcessCredentials` - Used for loading credentials from a
|
100
|
+
# process that outputs to stdout.
|
101
|
+
#
|
88
102
|
# * `Aws::InstanceProfileCredentials` - Used for loading credentials
|
89
103
|
# from an EC2 IMDS on an EC2 instance.
|
90
104
|
#
|
91
|
-
# * `Aws::
|
92
|
-
#
|
105
|
+
# * `Aws::ECSCredentials` - Used for loading credentials from
|
106
|
+
# instances running in ECS.
|
93
107
|
#
|
94
|
-
# * `Aws::
|
108
|
+
# * `Aws::CognitoIdentityCredentials` - Used for loading credentials
|
109
|
+
# from the Cognito Identity service.
|
95
110
|
#
|
96
111
|
# When `:credentials` are not configured directly, the following
|
97
112
|
# locations will be searched for credentials:
|
@@ -101,10 +116,10 @@ module Aws::IAM
|
|
101
116
|
# * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
|
102
117
|
# * `~/.aws/credentials`
|
103
118
|
# * `~/.aws/config`
|
104
|
-
# * EC2 IMDS instance profile - When used by default, the timeouts
|
105
|
-
# very aggressive. Construct and pass an instance of
|
106
|
-
# `Aws::InstanceProfileCredentails`
|
107
|
-
# timeouts.
|
119
|
+
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
120
|
+
# are very aggressive. Construct and pass an instance of
|
121
|
+
# `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
|
122
|
+
# enable retries and extended timeouts.
|
108
123
|
#
|
109
124
|
# @option options [required, String] :region
|
110
125
|
# The AWS region to connect to. The configured `:region` is
|
@@ -358,33 +373,30 @@ module Aws::IAM
|
|
358
373
|
end
|
359
374
|
|
360
375
|
# Adds the specified IAM role to the specified instance profile. An
|
361
|
-
# instance profile can contain only one role
|
362
|
-
#
|
363
|
-
#
|
364
|
-
#
|
365
|
-
#
|
366
|
-
#
|
367
|
-
#
|
368
|
-
#
|
369
|
-
#
|
370
|
-
#
|
371
|
-
# <note markdown="1"> The caller of this API must be granted the `PassRole` permission on
|
372
|
-
# the IAM role by a permissions policy.
|
376
|
+
# instance profile can contain only one role, and this quota cannot be
|
377
|
+
# increased. You can remove the existing role and then add a different
|
378
|
+
# role to an instance profile. You must then wait for the change to
|
379
|
+
# appear across all of AWS because of [eventual consistency][1]. To
|
380
|
+
# force the change, you must [disassociate the instance profile][2] and
|
381
|
+
# then [associate the instance profile][3], or you can stop your
|
382
|
+
# instance and then restart it.
|
383
|
+
#
|
384
|
+
# <note markdown="1"> The caller of this operation must be granted the `PassRole` permission
|
385
|
+
# on the IAM role by a permissions policy.
|
373
386
|
#
|
374
387
|
# </note>
|
375
388
|
#
|
376
|
-
# For more information about roles,
|
377
|
-
# more information about instance profiles,
|
378
|
-
#
|
389
|
+
# For more information about roles, see [Working with roles][4]. For
|
390
|
+
# more information about instance profiles, see [About instance
|
391
|
+
# profiles][5].
|
379
392
|
#
|
380
393
|
#
|
381
394
|
#
|
382
|
-
# [1]: https://
|
383
|
-
# [2]: https://
|
384
|
-
# [3]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/
|
385
|
-
# [4]: https://docs.aws.amazon.com/
|
386
|
-
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
387
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
|
395
|
+
# [1]: https://en.wikipedia.org/wiki/Eventual_consistency
|
396
|
+
# [2]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DisassociateIamInstanceProfile.html
|
397
|
+
# [3]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_AssociateIamInstanceProfile.html
|
398
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
|
399
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
|
388
400
|
#
|
389
401
|
# @option params [required, String] :instance_profile_name
|
390
402
|
# The name of the instance profile to update.
|
@@ -494,11 +506,11 @@ module Aws::IAM
|
|
494
506
|
|
495
507
|
# Attaches the specified managed policy to the specified IAM group.
|
496
508
|
#
|
497
|
-
# You use this
|
498
|
-
# inline policy in a group, use PutGroupPolicy.
|
509
|
+
# You use this operation to attach a managed policy to a group. To embed
|
510
|
+
# an inline policy in a group, use PutGroupPolicy.
|
499
511
|
#
|
500
|
-
# For more information about policies, see [Managed
|
501
|
-
#
|
512
|
+
# For more information about policies, see [Managed policies and inline
|
513
|
+
# policies][1] in the *IAM User Guide*.
|
502
514
|
#
|
503
515
|
#
|
504
516
|
#
|
@@ -520,8 +532,8 @@ module Aws::IAM
|
|
520
532
|
# @option params [required, String] :policy_arn
|
521
533
|
# The Amazon Resource Name (ARN) of the IAM policy you want to attach.
|
522
534
|
#
|
523
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
524
|
-
#
|
535
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
536
|
+
# in the *AWS General Reference*.
|
525
537
|
#
|
526
538
|
#
|
527
539
|
#
|
@@ -566,9 +578,9 @@ module Aws::IAM
|
|
566
578
|
#
|
567
579
|
# </note>
|
568
580
|
#
|
569
|
-
# Use this
|
581
|
+
# Use this operation to attach a *managed* policy to a role. To embed an
|
570
582
|
# inline policy in a role, use PutRolePolicy. For more information about
|
571
|
-
# policies, see [Managed
|
583
|
+
# policies, see [Managed policies and inline policies][1] in the *IAM
|
572
584
|
# User Guide*.
|
573
585
|
#
|
574
586
|
#
|
@@ -590,8 +602,8 @@ module Aws::IAM
|
|
590
602
|
# @option params [required, String] :policy_arn
|
591
603
|
# The Amazon Resource Name (ARN) of the IAM policy you want to attach.
|
592
604
|
#
|
593
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
594
|
-
#
|
605
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
606
|
+
# in the *AWS General Reference*.
|
595
607
|
#
|
596
608
|
#
|
597
609
|
#
|
@@ -627,11 +639,11 @@ module Aws::IAM
|
|
627
639
|
|
628
640
|
# Attaches the specified managed policy to the specified user.
|
629
641
|
#
|
630
|
-
# You use this
|
631
|
-
# inline policy in a user, use PutUserPolicy.
|
642
|
+
# You use this operation to attach a *managed* policy to a user. To
|
643
|
+
# embed an inline policy in a user, use PutUserPolicy.
|
632
644
|
#
|
633
|
-
# For more information about policies, see [Managed
|
634
|
-
#
|
645
|
+
# For more information about policies, see [Managed policies and inline
|
646
|
+
# policies][1] in the *IAM User Guide*.
|
635
647
|
#
|
636
648
|
#
|
637
649
|
#
|
@@ -653,8 +665,8 @@ module Aws::IAM
|
|
653
665
|
# @option params [required, String] :policy_arn
|
654
666
|
# The Amazon Resource Name (ARN) of the IAM policy you want to attach.
|
655
667
|
#
|
656
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
657
|
-
#
|
668
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
669
|
+
# in the *AWS General Reference*.
|
658
670
|
#
|
659
671
|
#
|
660
672
|
#
|
@@ -689,11 +701,14 @@ module Aws::IAM
|
|
689
701
|
end
|
690
702
|
|
691
703
|
# Changes the password of the IAM user who is calling this operation.
|
692
|
-
#
|
704
|
+
# This operation can be performed using the AWS CLI, the AWS API, or the
|
705
|
+
# **My Security Credentials** page in the AWS Management Console. The
|
706
|
+
# AWS account root user password is not affected by this operation.
|
693
707
|
#
|
694
|
-
#
|
695
|
-
#
|
696
|
-
#
|
708
|
+
# Use UpdateLoginProfile to use the AWS CLI, the AWS API, or the
|
709
|
+
# **Users** page in the IAM console to change the password for any IAM
|
710
|
+
# user. For more information about modifying passwords, see [Managing
|
711
|
+
# passwords][1] in the *IAM User Guide*.
|
697
712
|
#
|
698
713
|
#
|
699
714
|
#
|
@@ -758,9 +773,8 @@ module Aws::IAM
|
|
758
773
|
# credentials. This is true even if the AWS account has no associated
|
759
774
|
# users.
|
760
775
|
#
|
761
|
-
#
|
762
|
-
#
|
763
|
-
# Guide*.
|
776
|
+
# For information about quotas on the number of keys you can create, see
|
777
|
+
# [IAM and STS quotas][1] in the *IAM User Guide*.
|
764
778
|
#
|
765
779
|
# To ensure the security of your AWS account, the secret access key is
|
766
780
|
# accessible only during key and user creation. You must save the key
|
@@ -832,7 +846,7 @@ module Aws::IAM
|
|
832
846
|
end
|
833
847
|
|
834
848
|
# Creates an alias for your AWS account. For information about using an
|
835
|
-
# AWS account alias, see [Using an
|
849
|
+
# AWS account alias, see [Using an alias for your AWS account ID][1] in
|
836
850
|
# the *IAM User Guide*.
|
837
851
|
#
|
838
852
|
#
|
@@ -879,9 +893,8 @@ module Aws::IAM
|
|
879
893
|
|
880
894
|
# Creates a new group.
|
881
895
|
#
|
882
|
-
#
|
883
|
-
#
|
884
|
-
# Guide*.
|
896
|
+
# For information about the number of groups you can create, see [IAM
|
897
|
+
# and STS quotas][1] in the *IAM User Guide*.
|
885
898
|
#
|
886
899
|
#
|
887
900
|
#
|
@@ -889,7 +902,7 @@ module Aws::IAM
|
|
889
902
|
#
|
890
903
|
# @option params [String] :path
|
891
904
|
# The path to the group. For more information about paths, see [IAM
|
892
|
-
#
|
905
|
+
# identifiers][1] in the *IAM User Guide*.
|
893
906
|
#
|
894
907
|
# This parameter is optional. If it is not included, it defaults to a
|
895
908
|
# slash (/).
|
@@ -963,15 +976,14 @@ module Aws::IAM
|
|
963
976
|
end
|
964
977
|
|
965
978
|
# Creates a new instance profile. For information about instance
|
966
|
-
# profiles,
|
979
|
+
# profiles, see [About instance profiles][1].
|
967
980
|
#
|
968
|
-
#
|
969
|
-
#
|
970
|
-
# Guide*.
|
981
|
+
# For information about the number of instance profiles you can create,
|
982
|
+
# see [IAM object quotas][2] in the *IAM User Guide*.
|
971
983
|
#
|
972
984
|
#
|
973
985
|
#
|
974
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
986
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entities
|
975
987
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html
|
976
988
|
#
|
977
989
|
# @option params [required, String] :instance_profile_name
|
@@ -1005,6 +1017,22 @@ module Aws::IAM
|
|
1005
1017
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
1006
1018
|
# [2]: http://wikipedia.org/wiki/regex
|
1007
1019
|
#
|
1020
|
+
# @option params [Array<Types::Tag>] :tags
|
1021
|
+
# A list of tags that you want to attach to the newly created IAM
|
1022
|
+
# instance profile. Each tag consists of a key name and an associated
|
1023
|
+
# value. For more information about tagging, see [Tagging IAM
|
1024
|
+
# resources][1] in the *IAM User Guide*.
|
1025
|
+
#
|
1026
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
1027
|
+
# number of tags, then the entire request fails and the resource is not
|
1028
|
+
# created.
|
1029
|
+
#
|
1030
|
+
# </note>
|
1031
|
+
#
|
1032
|
+
#
|
1033
|
+
#
|
1034
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
1035
|
+
#
|
1008
1036
|
# @return [Types::CreateInstanceProfileResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1009
1037
|
#
|
1010
1038
|
# * {Types::CreateInstanceProfileResponse#instance_profile #instance_profile} => Types::InstanceProfile
|
@@ -1037,6 +1065,12 @@ module Aws::IAM
|
|
1037
1065
|
# resp = client.create_instance_profile({
|
1038
1066
|
# instance_profile_name: "instanceProfileNameType", # required
|
1039
1067
|
# path: "pathType",
|
1068
|
+
# tags: [
|
1069
|
+
# {
|
1070
|
+
# key: "tagKeyType", # required
|
1071
|
+
# value: "tagValueType", # required
|
1072
|
+
# },
|
1073
|
+
# ],
|
1040
1074
|
# })
|
1041
1075
|
#
|
1042
1076
|
# @example Response structure
|
@@ -1062,6 +1096,9 @@ module Aws::IAM
|
|
1062
1096
|
# resp.instance_profile.roles[0].tags[0].value #=> String
|
1063
1097
|
# resp.instance_profile.roles[0].role_last_used.last_used_date #=> Time
|
1064
1098
|
# resp.instance_profile.roles[0].role_last_used.region #=> String
|
1099
|
+
# resp.instance_profile.tags #=> Array
|
1100
|
+
# resp.instance_profile.tags[0].key #=> String
|
1101
|
+
# resp.instance_profile.tags[0].value #=> String
|
1065
1102
|
#
|
1066
1103
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/CreateInstanceProfile AWS API Documentation
|
1067
1104
|
#
|
@@ -1072,10 +1109,16 @@ module Aws::IAM
|
|
1072
1109
|
req.send_request(options)
|
1073
1110
|
end
|
1074
1111
|
|
1075
|
-
# Creates a password for the specified user
|
1076
|
-
# to access AWS services through the AWS Management Console.
|
1077
|
-
#
|
1078
|
-
# the
|
1112
|
+
# Creates a password for the specified IAM user. A password allows an
|
1113
|
+
# IAM user to access AWS services through the AWS Management Console.
|
1114
|
+
#
|
1115
|
+
# You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
|
1116
|
+
# console to create a password for any IAM user. Use ChangePassword to
|
1117
|
+
# update your own existing password in the **My Security Credentials**
|
1118
|
+
# page in the AWS Management Console.
|
1119
|
+
#
|
1120
|
+
# For more information about managing passwords, see [Managing
|
1121
|
+
# passwords][1] in the *IAM User Guide*.
|
1079
1122
|
#
|
1080
1123
|
#
|
1081
1124
|
#
|
@@ -1238,16 +1281,33 @@ module Aws::IAM
|
|
1238
1281
|
# certificate used by https://keys.server.example.com.
|
1239
1282
|
#
|
1240
1283
|
# For more information about obtaining the OIDC provider's thumbprint,
|
1241
|
-
# see [Obtaining the
|
1284
|
+
# see [Obtaining the thumbprint for an OpenID Connect provider][1] in
|
1242
1285
|
# the *IAM User Guide*.
|
1243
1286
|
#
|
1244
1287
|
#
|
1245
1288
|
#
|
1246
1289
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/identity-providers-oidc-obtain-thumbprint.html
|
1247
1290
|
#
|
1291
|
+
# @option params [Array<Types::Tag>] :tags
|
1292
|
+
# A list of tags that you want to attach to the new IAM OpenID Connect
|
1293
|
+
# (OIDC) provider. Each tag consists of a key name and an associated
|
1294
|
+
# value. For more information about tagging, see [Tagging IAM
|
1295
|
+
# resources][1] in the *IAM User Guide*.
|
1296
|
+
#
|
1297
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
1298
|
+
# number of tags, then the entire request fails and the resource is not
|
1299
|
+
# created.
|
1300
|
+
#
|
1301
|
+
# </note>
|
1302
|
+
#
|
1303
|
+
#
|
1304
|
+
#
|
1305
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
1306
|
+
#
|
1248
1307
|
# @return [Types::CreateOpenIDConnectProviderResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1249
1308
|
#
|
1250
1309
|
# * {Types::CreateOpenIDConnectProviderResponse#open_id_connect_provider_arn #open_id_connect_provider_arn} => String
|
1310
|
+
# * {Types::CreateOpenIDConnectProviderResponse#tags #tags} => Array<Types::Tag>
|
1251
1311
|
#
|
1252
1312
|
#
|
1253
1313
|
# @example Example: To create an instance profile
|
@@ -1276,11 +1336,20 @@ module Aws::IAM
|
|
1276
1336
|
# url: "OpenIDConnectProviderUrlType", # required
|
1277
1337
|
# client_id_list: ["clientIDType"],
|
1278
1338
|
# thumbprint_list: ["thumbprintType"], # required
|
1339
|
+
# tags: [
|
1340
|
+
# {
|
1341
|
+
# key: "tagKeyType", # required
|
1342
|
+
# value: "tagValueType", # required
|
1343
|
+
# },
|
1344
|
+
# ],
|
1279
1345
|
# })
|
1280
1346
|
#
|
1281
1347
|
# @example Response structure
|
1282
1348
|
#
|
1283
1349
|
# resp.open_id_connect_provider_arn #=> String
|
1350
|
+
# resp.tags #=> Array
|
1351
|
+
# resp.tags[0].key #=> String
|
1352
|
+
# resp.tags[0].value #=> String
|
1284
1353
|
#
|
1285
1354
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/CreateOpenIDConnectProvider AWS API Documentation
|
1286
1355
|
#
|
@@ -1295,11 +1364,11 @@ module Aws::IAM
|
|
1295
1364
|
#
|
1296
1365
|
# This operation creates a policy version with a version identifier of
|
1297
1366
|
# `v1` and sets v1 as the policy's default version. For more
|
1298
|
-
# information about policy versions, see [Versioning for
|
1299
|
-
#
|
1367
|
+
# information about policy versions, see [Versioning for managed
|
1368
|
+
# policies][1] in the *IAM User Guide*.
|
1300
1369
|
#
|
1301
1370
|
# For more information about managed policies in general, see [Managed
|
1302
|
-
#
|
1371
|
+
# policies and inline policies][2] in the *IAM User Guide*.
|
1303
1372
|
#
|
1304
1373
|
#
|
1305
1374
|
#
|
@@ -1316,7 +1385,7 @@ module Aws::IAM
|
|
1316
1385
|
# @option params [String] :path
|
1317
1386
|
# The path for the policy.
|
1318
1387
|
#
|
1319
|
-
# For more information about paths, see [IAM
|
1388
|
+
# For more information about paths, see [IAM identifiers][1] in the *IAM
|
1320
1389
|
# User Guide*.
|
1321
1390
|
#
|
1322
1391
|
# This parameter is optional. If it is not included, it defaults to a
|
@@ -1369,6 +1438,22 @@ module Aws::IAM
|
|
1369
1438
|
# The policy description is immutable. After a value is assigned, it
|
1370
1439
|
# cannot be changed.
|
1371
1440
|
#
|
1441
|
+
# @option params [Array<Types::Tag>] :tags
|
1442
|
+
# A list of tags that you want to attach to the new IAM customer managed
|
1443
|
+
# policy. Each tag consists of a key name and an associated value. For
|
1444
|
+
# more information about tagging, see [Tagging IAM resources][1] in the
|
1445
|
+
# *IAM User Guide*.
|
1446
|
+
#
|
1447
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
1448
|
+
# number of tags, then the entire request fails and the resource is not
|
1449
|
+
# created.
|
1450
|
+
#
|
1451
|
+
# </note>
|
1452
|
+
#
|
1453
|
+
#
|
1454
|
+
#
|
1455
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
1456
|
+
#
|
1372
1457
|
# @return [Types::CreatePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1373
1458
|
#
|
1374
1459
|
# * {Types::CreatePolicyResponse#policy #policy} => Types::Policy
|
@@ -1380,6 +1465,12 @@ module Aws::IAM
|
|
1380
1465
|
# path: "policyPathType",
|
1381
1466
|
# policy_document: "policyDocumentType", # required
|
1382
1467
|
# description: "policyDescriptionType",
|
1468
|
+
# tags: [
|
1469
|
+
# {
|
1470
|
+
# key: "tagKeyType", # required
|
1471
|
+
# value: "tagValueType", # required
|
1472
|
+
# },
|
1473
|
+
# ],
|
1383
1474
|
# })
|
1384
1475
|
#
|
1385
1476
|
# @example Response structure
|
@@ -1395,6 +1486,9 @@ module Aws::IAM
|
|
1395
1486
|
# resp.policy.description #=> String
|
1396
1487
|
# resp.policy.create_date #=> Time
|
1397
1488
|
# resp.policy.update_date #=> Time
|
1489
|
+
# resp.policy.tags #=> Array
|
1490
|
+
# resp.policy.tags[0].key #=> String
|
1491
|
+
# resp.policy.tags[0].value #=> String
|
1398
1492
|
#
|
1399
1493
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/CreatePolicy AWS API Documentation
|
1400
1494
|
#
|
@@ -1416,7 +1510,7 @@ module Aws::IAM
|
|
1416
1510
|
# IAM users, groups, and roles to which the policy is attached.
|
1417
1511
|
#
|
1418
1512
|
# For more information about managed policy versions, see [Versioning
|
1419
|
-
# for
|
1513
|
+
# for managed policies][1] in the *IAM User Guide*.
|
1420
1514
|
#
|
1421
1515
|
#
|
1422
1516
|
#
|
@@ -1426,8 +1520,8 @@ module Aws::IAM
|
|
1426
1520
|
# The Amazon Resource Name (ARN) of the IAM policy to which you want to
|
1427
1521
|
# add a new version.
|
1428
1522
|
#
|
1429
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
1430
|
-
#
|
1523
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
1524
|
+
# in the *AWS General Reference*.
|
1431
1525
|
#
|
1432
1526
|
#
|
1433
1527
|
#
|
@@ -1467,7 +1561,7 @@ module Aws::IAM
|
|
1467
1561
|
# for the IAM users, groups, and roles that the policy is attached to.
|
1468
1562
|
#
|
1469
1563
|
# For more information about managed policy versions, see [Versioning
|
1470
|
-
# for
|
1564
|
+
# for managed policies][1] in the *IAM User Guide*.
|
1471
1565
|
#
|
1472
1566
|
#
|
1473
1567
|
#
|
@@ -1502,9 +1596,9 @@ module Aws::IAM
|
|
1502
1596
|
end
|
1503
1597
|
|
1504
1598
|
# Creates a new role for your AWS account. For more information about
|
1505
|
-
# roles,
|
1506
|
-
#
|
1507
|
-
#
|
1599
|
+
# roles, see [IAM roles][1]. For information about quotas for role names
|
1600
|
+
# and the number of roles you can create, see [IAM and STS quotas][2] in
|
1601
|
+
# the *IAM User Guide*.
|
1508
1602
|
#
|
1509
1603
|
#
|
1510
1604
|
#
|
@@ -1584,7 +1678,7 @@ module Aws::IAM
|
|
1584
1678
|
# for one hour by default. This applies when you use the `AssumeRole*`
|
1585
1679
|
# API operations or the `assume-role*` CLI operations but does not apply
|
1586
1680
|
# when you use those operations to create a console URL. For more
|
1587
|
-
# information, see [Using IAM
|
1681
|
+
# information, see [Using IAM roles][1] in the *IAM User Guide*.
|
1588
1682
|
#
|
1589
1683
|
#
|
1590
1684
|
#
|
@@ -1595,13 +1689,12 @@ module Aws::IAM
|
|
1595
1689
|
# the role.
|
1596
1690
|
#
|
1597
1691
|
# @option params [Array<Types::Tag>] :tags
|
1598
|
-
# A list of tags that you want to attach to the
|
1599
|
-
#
|
1600
|
-
#
|
1601
|
-
# User Guide*.
|
1692
|
+
# A list of tags that you want to attach to the new role. Each tag
|
1693
|
+
# consists of a key name and an associated value. For more information
|
1694
|
+
# about tagging, see [Tagging IAM resources][1] in the *IAM User Guide*.
|
1602
1695
|
#
|
1603
|
-
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed
|
1604
|
-
# of tags
|
1696
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
1697
|
+
# number of tags, then the entire request fails and the resource is not
|
1605
1698
|
# created.
|
1606
1699
|
#
|
1607
1700
|
# </note>
|
@@ -1703,9 +1796,9 @@ module Aws::IAM
|
|
1703
1796
|
#
|
1704
1797
|
# </note>
|
1705
1798
|
#
|
1706
|
-
# For more information, see [Enabling SAML 2.0
|
1799
|
+
# For more information, see [Enabling SAML 2.0 federated users to access
|
1707
1800
|
# the AWS Management Console][2] and [About SAML 2.0-based
|
1708
|
-
#
|
1801
|
+
# federation][3] in the *IAM User Guide*.
|
1709
1802
|
#
|
1710
1803
|
#
|
1711
1804
|
#
|
@@ -1721,7 +1814,7 @@ module Aws::IAM
|
|
1721
1814
|
# You must generate the metadata document using the identity management
|
1722
1815
|
# software that is used as your organization's IdP.
|
1723
1816
|
#
|
1724
|
-
# For more information, see [About SAML 2.0-based
|
1817
|
+
# For more information, see [About SAML 2.0-based federation][1] in the
|
1725
1818
|
# *IAM User Guide*
|
1726
1819
|
#
|
1727
1820
|
#
|
@@ -1740,20 +1833,46 @@ module Aws::IAM
|
|
1740
1833
|
#
|
1741
1834
|
# [1]: http://wikipedia.org/wiki/regex
|
1742
1835
|
#
|
1836
|
+
# @option params [Array<Types::Tag>] :tags
|
1837
|
+
# A list of tags that you want to attach to the new IAM SAML provider.
|
1838
|
+
# Each tag consists of a key name and an associated value. For more
|
1839
|
+
# information about tagging, see [Tagging IAM resources][1] in the *IAM
|
1840
|
+
# User Guide*.
|
1841
|
+
#
|
1842
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
1843
|
+
# number of tags, then the entire request fails and the resource is not
|
1844
|
+
# created.
|
1845
|
+
#
|
1846
|
+
# </note>
|
1847
|
+
#
|
1848
|
+
#
|
1849
|
+
#
|
1850
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
1851
|
+
#
|
1743
1852
|
# @return [Types::CreateSAMLProviderResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1744
1853
|
#
|
1745
1854
|
# * {Types::CreateSAMLProviderResponse#saml_provider_arn #saml_provider_arn} => String
|
1855
|
+
# * {Types::CreateSAMLProviderResponse#tags #tags} => Array<Types::Tag>
|
1746
1856
|
#
|
1747
1857
|
# @example Request syntax with placeholder values
|
1748
1858
|
#
|
1749
1859
|
# resp = client.create_saml_provider({
|
1750
1860
|
# saml_metadata_document: "SAMLMetadataDocumentType", # required
|
1751
1861
|
# name: "SAMLProviderNameType", # required
|
1862
|
+
# tags: [
|
1863
|
+
# {
|
1864
|
+
# key: "tagKeyType", # required
|
1865
|
+
# value: "tagValueType", # required
|
1866
|
+
# },
|
1867
|
+
# ],
|
1752
1868
|
# })
|
1753
1869
|
#
|
1754
1870
|
# @example Response structure
|
1755
1871
|
#
|
1756
1872
|
# resp.saml_provider_arn #=> String
|
1873
|
+
# resp.tags #=> Array
|
1874
|
+
# resp.tags[0].key #=> String
|
1875
|
+
# resp.tags[0].value #=> String
|
1757
1876
|
#
|
1758
1877
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/CreateSAMLProvider AWS API Documentation
|
1759
1878
|
#
|
@@ -1771,7 +1890,7 @@ module Aws::IAM
|
|
1771
1890
|
# resources into an unknown state. Allowing the service to control the
|
1772
1891
|
# role helps improve service stability and proper cleanup when a service
|
1773
1892
|
# and its role are no longer needed. For more information, see [Using
|
1774
|
-
#
|
1893
|
+
# service-linked roles][1] in the *IAM User Guide*.
|
1775
1894
|
#
|
1776
1895
|
# To attach a policy to this service-linked role, you must make the
|
1777
1896
|
# request using the AWS service that depends on this role.
|
@@ -1786,8 +1905,8 @@ module Aws::IAM
|
|
1786
1905
|
# front. For example: `elasticbeanstalk.amazonaws.com`.
|
1787
1906
|
#
|
1788
1907
|
# Service principals are unique and case-sensitive. To find the exact
|
1789
|
-
# service principal for your service-linked role, see [AWS
|
1790
|
-
#
|
1908
|
+
# service principal for your service-linked role, see [AWS services that
|
1909
|
+
# work with IAM][1] in the *IAM User Guide*. Look for the services that
|
1791
1910
|
# have <b>Yes </b>in the **Service-Linked Role** column. Choose the
|
1792
1911
|
# **Yes** link to view the service-linked role documentation for that
|
1793
1912
|
# service.
|
@@ -1857,14 +1976,15 @@ module Aws::IAM
|
|
1857
1976
|
# You can have a maximum of two sets of service-specific credentials for
|
1858
1977
|
# each supported service per user.
|
1859
1978
|
#
|
1860
|
-
#
|
1979
|
+
# You can create service-specific credentials for AWS CodeCommit and
|
1980
|
+
# Amazon Keyspaces (for Apache Cassandra).
|
1861
1981
|
#
|
1862
1982
|
# You can reset the password to a new service-generated value by calling
|
1863
1983
|
# ResetServiceSpecificCredential.
|
1864
1984
|
#
|
1865
1985
|
# For more information about service-specific credentials, see [Using
|
1866
|
-
# IAM with AWS CodeCommit: Git
|
1867
|
-
#
|
1986
|
+
# IAM with AWS CodeCommit: Git credentials, SSH keys, and AWS access
|
1987
|
+
# keys][1] in the *IAM User Guide*.
|
1868
1988
|
#
|
1869
1989
|
#
|
1870
1990
|
#
|
@@ -1922,9 +2042,8 @@ module Aws::IAM
|
|
1922
2042
|
|
1923
2043
|
# Creates a new IAM user for your AWS account.
|
1924
2044
|
#
|
1925
|
-
#
|
1926
|
-
#
|
1927
|
-
# Guide*.
|
2045
|
+
# For information about quotas for the number of IAM users you can
|
2046
|
+
# create, see [IAM and STS quotas][1] in the *IAM User Guide*.
|
1928
2047
|
#
|
1929
2048
|
#
|
1930
2049
|
#
|
@@ -1932,7 +2051,7 @@ module Aws::IAM
|
|
1932
2051
|
#
|
1933
2052
|
# @option params [String] :path
|
1934
2053
|
# The path for the user name. For more information about paths, see [IAM
|
1935
|
-
#
|
2054
|
+
# identifiers][1] in the *IAM User Guide*.
|
1936
2055
|
#
|
1937
2056
|
# This parameter is optional. If it is not included, it defaults to a
|
1938
2057
|
# slash (/).
|
@@ -1961,13 +2080,12 @@ module Aws::IAM
|
|
1961
2080
|
# the user.
|
1962
2081
|
#
|
1963
2082
|
# @option params [Array<Types::Tag>] :tags
|
1964
|
-
# A list of tags that you want to attach to the
|
1965
|
-
#
|
1966
|
-
#
|
1967
|
-
# User Guide*.
|
2083
|
+
# A list of tags that you want to attach to the new user. Each tag
|
2084
|
+
# consists of a key name and an associated value. For more information
|
2085
|
+
# about tagging, see [Tagging IAM resources][1] in the *IAM User Guide*.
|
1968
2086
|
#
|
1969
|
-
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed
|
1970
|
-
# of tags
|
2087
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
2088
|
+
# number of tags, then the entire request fails and the resource is not
|
1971
2089
|
# created.
|
1972
2090
|
#
|
1973
2091
|
# </note>
|
@@ -2040,12 +2158,11 @@ module Aws::IAM
|
|
2040
2158
|
# Creates a new virtual MFA device for the AWS account. After creating
|
2041
2159
|
# the virtual MFA, use EnableMFADevice to attach the MFA device to an
|
2042
2160
|
# IAM user. For more information about creating and working with virtual
|
2043
|
-
# MFA devices,
|
2161
|
+
# MFA devices, see [Using a virtual MFA device][1] in the *IAM User
|
2044
2162
|
# Guide*.
|
2045
2163
|
#
|
2046
|
-
#
|
2047
|
-
#
|
2048
|
-
# Guide*.
|
2164
|
+
# For information about the maximum number of MFA devices you can
|
2165
|
+
# create, see [IAM and STS quotas][2] in the *IAM User Guide*.
|
2049
2166
|
#
|
2050
2167
|
# The seed information contained in the QR code and the Base32 string
|
2051
2168
|
# should be treated like any other secret access information. In other
|
@@ -2060,7 +2177,7 @@ module Aws::IAM
|
|
2060
2177
|
#
|
2061
2178
|
# @option params [String] :path
|
2062
2179
|
# The path for the virtual MFA device. For more information about paths,
|
2063
|
-
# see [IAM
|
2180
|
+
# see [IAM identifiers][1] in the *IAM User Guide*.
|
2064
2181
|
#
|
2065
2182
|
# This parameter is optional. If it is not included, it defaults to a
|
2066
2183
|
# slash (/).
|
@@ -2090,6 +2207,22 @@ module Aws::IAM
|
|
2090
2207
|
#
|
2091
2208
|
# [1]: http://wikipedia.org/wiki/regex
|
2092
2209
|
#
|
2210
|
+
# @option params [Array<Types::Tag>] :tags
|
2211
|
+
# A list of tags that you want to attach to the new IAM virtual MFA
|
2212
|
+
# device. Each tag consists of a key name and an associated value. For
|
2213
|
+
# more information about tagging, see [Tagging IAM resources][1] in the
|
2214
|
+
# *IAM User Guide*.
|
2215
|
+
#
|
2216
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
2217
|
+
# number of tags, then the entire request fails and the resource is not
|
2218
|
+
# created.
|
2219
|
+
#
|
2220
|
+
# </note>
|
2221
|
+
#
|
2222
|
+
#
|
2223
|
+
#
|
2224
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
2225
|
+
#
|
2093
2226
|
# @return [Types::CreateVirtualMFADeviceResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2094
2227
|
#
|
2095
2228
|
# * {Types::CreateVirtualMFADeviceResponse#virtual_mfa_device #virtual_mfa_device} => Types::VirtualMFADevice
|
@@ -2099,6 +2232,12 @@ module Aws::IAM
|
|
2099
2232
|
# resp = client.create_virtual_mfa_device({
|
2100
2233
|
# path: "pathType",
|
2101
2234
|
# virtual_mfa_device_name: "virtualMFADeviceName", # required
|
2235
|
+
# tags: [
|
2236
|
+
# {
|
2237
|
+
# key: "tagKeyType", # required
|
2238
|
+
# value: "tagValueType", # required
|
2239
|
+
# },
|
2240
|
+
# ],
|
2102
2241
|
# })
|
2103
2242
|
#
|
2104
2243
|
# @example Response structure
|
@@ -2118,6 +2257,9 @@ module Aws::IAM
|
|
2118
2257
|
# resp.virtual_mfa_device.user.tags[0].key #=> String
|
2119
2258
|
# resp.virtual_mfa_device.user.tags[0].value #=> String
|
2120
2259
|
# resp.virtual_mfa_device.enable_date #=> Time
|
2260
|
+
# resp.virtual_mfa_device.tags #=> Array
|
2261
|
+
# resp.virtual_mfa_device.tags[0].key #=> String
|
2262
|
+
# resp.virtual_mfa_device.tags[0].value #=> String
|
2121
2263
|
#
|
2122
2264
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/CreateVirtualMFADevice AWS API Documentation
|
2123
2265
|
#
|
@@ -2132,8 +2274,8 @@ module Aws::IAM
|
|
2132
2274
|
# with the user name for which it was originally enabled.
|
2133
2275
|
#
|
2134
2276
|
# For more information about creating and working with virtual MFA
|
2135
|
-
# devices,
|
2136
|
-
#
|
2277
|
+
# devices, see [Enabling a virtual multi-factor authentication (MFA)
|
2278
|
+
# device][1] in the *IAM User Guide*.
|
2137
2279
|
#
|
2138
2280
|
#
|
2139
2281
|
#
|
@@ -2243,7 +2385,7 @@ module Aws::IAM
|
|
2243
2385
|
end
|
2244
2386
|
|
2245
2387
|
# Deletes the specified AWS account alias. For information about using
|
2246
|
-
# an AWS account alias, see [Using an
|
2388
|
+
# an AWS account alias, see [Using an alias for your AWS account ID][1]
|
2247
2389
|
# in the *IAM User Guide*.
|
2248
2390
|
#
|
2249
2391
|
#
|
@@ -2347,8 +2489,8 @@ module Aws::IAM
|
|
2347
2489
|
#
|
2348
2490
|
# A group can also have managed policies attached to it. To detach a
|
2349
2491
|
# managed policy from a group, use DetachGroupPolicy. For more
|
2350
|
-
# information about policies, refer to [Managed
|
2351
|
-
#
|
2492
|
+
# information about policies, refer to [Managed policies and inline
|
2493
|
+
# policies][1] in the *IAM User Guide*.
|
2352
2494
|
#
|
2353
2495
|
#
|
2354
2496
|
#
|
@@ -2415,8 +2557,8 @@ module Aws::IAM
|
|
2415
2557
|
# instance profile that is associated with a running instance will break
|
2416
2558
|
# any applications running on the instance.
|
2417
2559
|
#
|
2418
|
-
# For more information about instance profiles,
|
2419
|
-
#
|
2560
|
+
# For more information about instance profiles, see [About instance
|
2561
|
+
# profiles][1].
|
2420
2562
|
#
|
2421
2563
|
#
|
2422
2564
|
#
|
@@ -2464,6 +2606,11 @@ module Aws::IAM
|
|
2464
2606
|
# user's ability to access AWS services through the AWS Management
|
2465
2607
|
# Console.
|
2466
2608
|
#
|
2609
|
+
# You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
|
2610
|
+
# console to delete a password for any IAM user. You can use
|
2611
|
+
# ChangePassword to update, but not delete, your own password in the
|
2612
|
+
# **My Security Credentials** page in the AWS Management Console.
|
2613
|
+
#
|
2467
2614
|
# Deleting a user's password does not prevent a user from accessing AWS
|
2468
2615
|
# through the command line interface or the API. To prevent all user
|
2469
2616
|
# access, you must also either make any access keys inactive or delete
|
@@ -2549,9 +2696,9 @@ module Aws::IAM
|
|
2549
2696
|
# steps describe the process for deleting a managed policy:
|
2550
2697
|
#
|
2551
2698
|
# * Detach the policy from all users, groups, and roles that the policy
|
2552
|
-
# is attached to, using
|
2553
|
-
# DetachRolePolicy
|
2554
|
-
#
|
2699
|
+
# is attached to, using DetachUserPolicy, DetachGroupPolicy, or
|
2700
|
+
# DetachRolePolicy. To list all the users, groups, and roles that a
|
2701
|
+
# policy is attached to, use ListEntitiesForPolicy.
|
2555
2702
|
#
|
2556
2703
|
# * Delete all versions of the policy using DeletePolicyVersion. To list
|
2557
2704
|
# the policy's versions, use ListPolicyVersions. You cannot use
|
@@ -2560,10 +2707,10 @@ module Aws::IAM
|
|
2560
2707
|
# next step of the process.
|
2561
2708
|
#
|
2562
2709
|
# * Delete the policy (this automatically deletes the policy's default
|
2563
|
-
# version) using this
|
2710
|
+
# version) using this operation.
|
2564
2711
|
#
|
2565
|
-
# For information about managed policies, see [Managed
|
2566
|
-
#
|
2712
|
+
# For information about managed policies, see [Managed policies and
|
2713
|
+
# inline policies][1] in the *IAM User Guide*.
|
2567
2714
|
#
|
2568
2715
|
#
|
2569
2716
|
#
|
@@ -2572,8 +2719,8 @@ module Aws::IAM
|
|
2572
2719
|
# @option params [required, String] :policy_arn
|
2573
2720
|
# The Amazon Resource Name (ARN) of the IAM policy you want to delete.
|
2574
2721
|
#
|
2575
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
2576
|
-
#
|
2722
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
2723
|
+
# in the *AWS General Reference*.
|
2577
2724
|
#
|
2578
2725
|
#
|
2579
2726
|
#
|
@@ -2598,13 +2745,13 @@ module Aws::IAM
|
|
2598
2745
|
|
2599
2746
|
# Deletes the specified version from the specified managed policy.
|
2600
2747
|
#
|
2601
|
-
# You cannot delete the default version from a policy using this
|
2602
|
-
# delete the default version from a policy, use
|
2603
|
-
# out which version of a policy is marked as the
|
2604
|
-
# ListPolicyVersions.
|
2748
|
+
# You cannot delete the default version from a policy using this
|
2749
|
+
# operation. To delete the default version from a policy, use
|
2750
|
+
# DeletePolicy. To find out which version of a policy is marked as the
|
2751
|
+
# default version, use ListPolicyVersions.
|
2605
2752
|
#
|
2606
2753
|
# For information about versions for managed policies, see [Versioning
|
2607
|
-
# for
|
2754
|
+
# for managed policies][1] in the *IAM User Guide*.
|
2608
2755
|
#
|
2609
2756
|
#
|
2610
2757
|
#
|
@@ -2614,8 +2761,8 @@ module Aws::IAM
|
|
2614
2761
|
# The Amazon Resource Name (ARN) of the IAM policy from which you want
|
2615
2762
|
# to delete a version.
|
2616
2763
|
#
|
2617
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
2618
|
-
#
|
2764
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
2765
|
+
# in the *AWS General Reference*.
|
2619
2766
|
#
|
2620
2767
|
#
|
2621
2768
|
#
|
@@ -2630,7 +2777,7 @@ module Aws::IAM
|
|
2630
2777
|
# of letters and digits.
|
2631
2778
|
#
|
2632
2779
|
# For more information about managed policy versions, see [Versioning
|
2633
|
-
# for
|
2780
|
+
# for managed policies][2] in the *IAM User Guide*.
|
2634
2781
|
#
|
2635
2782
|
#
|
2636
2783
|
#
|
@@ -2656,8 +2803,8 @@ module Aws::IAM
|
|
2656
2803
|
end
|
2657
2804
|
|
2658
2805
|
# Deletes the specified role. The role must not have any policies
|
2659
|
-
# attached. For more information about roles,
|
2660
|
-
#
|
2806
|
+
# attached. For more information about roles, see [Working with
|
2807
|
+
# roles][1].
|
2661
2808
|
#
|
2662
2809
|
# Make sure that you do not have any Amazon EC2 instances running with
|
2663
2810
|
# the role you are about to delete. Deleting a role or instance profile
|
@@ -2738,7 +2885,7 @@ module Aws::IAM
|
|
2738
2885
|
#
|
2739
2886
|
# A role can also have managed policies attached to it. To detach a
|
2740
2887
|
# managed policy from a role, use DetachRolePolicy. For more information
|
2741
|
-
# about policies, refer to [Managed
|
2888
|
+
# about policies, refer to [Managed policies and inline policies][1] in
|
2742
2889
|
# the *IAM User Guide*.
|
2743
2890
|
#
|
2744
2891
|
#
|
@@ -2839,7 +2986,7 @@ module Aws::IAM
|
|
2839
2986
|
# authenticating the associated IAM user to an AWS CodeCommit
|
2840
2987
|
# repository. For more information about using SSH keys to authenticate
|
2841
2988
|
# to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
|
2842
|
-
#
|
2989
|
+
# connections][1] in the *AWS CodeCommit User Guide*.
|
2843
2990
|
#
|
2844
2991
|
#
|
2845
2992
|
#
|
@@ -2889,7 +3036,7 @@ module Aws::IAM
|
|
2889
3036
|
# Deletes the specified server certificate.
|
2890
3037
|
#
|
2891
3038
|
# For more information about working with server certificates, see
|
2892
|
-
# [Working with
|
3039
|
+
# [Working with server certificates][1] in the *IAM User Guide*. This
|
2893
3040
|
# topic also includes a list of AWS services that can use the server
|
2894
3041
|
# certificates that you manage with IAM.
|
2895
3042
|
#
|
@@ -2900,8 +3047,8 @@ module Aws::IAM
|
|
2900
3047
|
# cause Elastic Load Balancing to stop accepting traffic. We recommend
|
2901
3048
|
# that you remove the reference to the certificate from Elastic Load
|
2902
3049
|
# Balancing before using this command to delete the certificate. For
|
2903
|
-
# more information,
|
2904
|
-
#
|
3050
|
+
# more information, see [DeleteLoadBalancerListeners][2] in the *Elastic
|
3051
|
+
# Load Balancing API Reference*.
|
2905
3052
|
#
|
2906
3053
|
#
|
2907
3054
|
#
|
@@ -2947,17 +3094,16 @@ module Aws::IAM
|
|
2947
3094
|
#
|
2948
3095
|
# If you submit a deletion request for a service-linked role whose
|
2949
3096
|
# linked service is still accessing a resource, then the deletion task
|
2950
|
-
# fails. If it fails, the GetServiceLinkedRoleDeletionStatus
|
2951
|
-
#
|
2952
|
-
#
|
2953
|
-
#
|
2954
|
-
#
|
2955
|
-
#
|
2956
|
-
#
|
2957
|
-
# your service.
|
3097
|
+
# fails. If it fails, the GetServiceLinkedRoleDeletionStatus operation
|
3098
|
+
# returns the reason for the failure, usually including the resources
|
3099
|
+
# that must be deleted. To delete the service-linked role, you must
|
3100
|
+
# first remove those resources from the linked service and then submit
|
3101
|
+
# the deletion request again. Resources are specific to the service that
|
3102
|
+
# is linked to the role. For more information about removing resources
|
3103
|
+
# from a service, see the [AWS documentation][1] for your service.
|
2958
3104
|
#
|
2959
|
-
# For more information about service-linked roles, see [Roles
|
2960
|
-
#
|
3105
|
+
# For more information about service-linked roles, see [Roles terms and
|
3106
|
+
# concepts: AWS service-linked role][2] in the *IAM User Guide*.
|
2961
3107
|
#
|
2962
3108
|
#
|
2963
3109
|
#
|
@@ -3098,7 +3244,7 @@ module Aws::IAM
|
|
3098
3244
|
# Deletes the specified IAM user. Unlike the AWS Management Console,
|
3099
3245
|
# when you delete a user programmatically, you must delete the items
|
3100
3246
|
# attached to the user manually, or the deletion fails. For more
|
3101
|
-
# information, see [Deleting an IAM
|
3247
|
+
# information, see [Deleting an IAM user][1]. Before attempting to
|
3102
3248
|
# delete a user, remove the following items:
|
3103
3249
|
#
|
3104
3250
|
# * Password (DeleteLoginProfile)
|
@@ -3194,7 +3340,7 @@ module Aws::IAM
|
|
3194
3340
|
#
|
3195
3341
|
# A user can also have managed policies attached to it. To detach a
|
3196
3342
|
# managed policy from a user, use DetachUserPolicy. For more information
|
3197
|
-
# about policies, refer to [Managed
|
3343
|
+
# about policies, refer to [Managed policies and inline policies][1] in
|
3198
3344
|
# the *IAM User Guide*.
|
3199
3345
|
#
|
3200
3346
|
#
|
@@ -3304,9 +3450,8 @@ module Aws::IAM
|
|
3304
3450
|
# Removes the specified managed policy from the specified IAM group.
|
3305
3451
|
#
|
3306
3452
|
# A group can also have inline policies embedded with it. To delete an
|
3307
|
-
# inline policy, use
|
3308
|
-
#
|
3309
|
-
# User Guide*.
|
3453
|
+
# inline policy, use DeleteGroupPolicy. For information about policies,
|
3454
|
+
# see [Managed policies and inline policies][1] in the *IAM User Guide*.
|
3310
3455
|
#
|
3311
3456
|
#
|
3312
3457
|
#
|
@@ -3328,8 +3473,8 @@ module Aws::IAM
|
|
3328
3473
|
# @option params [required, String] :policy_arn
|
3329
3474
|
# The Amazon Resource Name (ARN) of the IAM policy you want to detach.
|
3330
3475
|
#
|
3331
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
3332
|
-
#
|
3476
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
3477
|
+
# in the *AWS General Reference*.
|
3333
3478
|
#
|
3334
3479
|
#
|
3335
3480
|
#
|
@@ -3356,9 +3501,8 @@ module Aws::IAM
|
|
3356
3501
|
# Removes the specified managed policy from the specified role.
|
3357
3502
|
#
|
3358
3503
|
# A role can also have inline policies embedded with it. To delete an
|
3359
|
-
# inline policy, use
|
3360
|
-
#
|
3361
|
-
# User Guide*.
|
3504
|
+
# inline policy, use DeleteRolePolicy. For information about policies,
|
3505
|
+
# see [Managed policies and inline policies][1] in the *IAM User Guide*.
|
3362
3506
|
#
|
3363
3507
|
#
|
3364
3508
|
#
|
@@ -3380,8 +3524,8 @@ module Aws::IAM
|
|
3380
3524
|
# @option params [required, String] :policy_arn
|
3381
3525
|
# The Amazon Resource Name (ARN) of the IAM policy you want to detach.
|
3382
3526
|
#
|
3383
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
3384
|
-
#
|
3527
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
3528
|
+
# in the *AWS General Reference*.
|
3385
3529
|
#
|
3386
3530
|
#
|
3387
3531
|
#
|
@@ -3408,9 +3552,8 @@ module Aws::IAM
|
|
3408
3552
|
# Removes the specified managed policy from the specified user.
|
3409
3553
|
#
|
3410
3554
|
# A user can also have inline policies embedded with it. To delete an
|
3411
|
-
# inline policy, use
|
3412
|
-
#
|
3413
|
-
# User Guide*.
|
3555
|
+
# inline policy, use DeleteUserPolicy. For information about policies,
|
3556
|
+
# see [Managed policies and inline policies][1] in the *IAM User Guide*.
|
3414
3557
|
#
|
3415
3558
|
#
|
3416
3559
|
#
|
@@ -3432,8 +3575,8 @@ module Aws::IAM
|
|
3432
3575
|
# @option params [required, String] :policy_arn
|
3433
3576
|
# The Amazon Resource Name (ARN) of the IAM policy you want to detach.
|
3434
3577
|
#
|
3435
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
3436
|
-
#
|
3578
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
3579
|
+
# in the *AWS General Reference*.
|
3437
3580
|
#
|
3438
3581
|
#
|
3439
3582
|
#
|
@@ -3539,8 +3682,8 @@ module Aws::IAM
|
|
3539
3682
|
end
|
3540
3683
|
|
3541
3684
|
# Generates a credential report for the AWS account. For more
|
3542
|
-
# information about the credential report, see [Getting
|
3543
|
-
#
|
3685
|
+
# information about the credential report, see [Getting credential
|
3686
|
+
# reports][1] in the *IAM User Guide*.
|
3544
3687
|
#
|
3545
3688
|
#
|
3546
3689
|
#
|
@@ -3571,12 +3714,12 @@ module Aws::IAM
|
|
3571
3714
|
# your organization.
|
3572
3715
|
#
|
3573
3716
|
# To call this operation, you must be signed in using your AWS
|
3574
|
-
# Organizations
|
3575
|
-
# IAM user or root user credentials, or temporary credentials
|
3576
|
-
# assuming an IAM role. SCPs must be enabled for your organization
|
3577
|
-
# You must have the required IAM and AWS Organizations
|
3578
|
-
# more information, see [Refining
|
3579
|
-
#
|
3717
|
+
# Organizations management account credentials. You can use your
|
3718
|
+
# long-term IAM user or root user credentials, or temporary credentials
|
3719
|
+
# from assuming an IAM role. SCPs must be enabled for your organization
|
3720
|
+
# root. You must have the required IAM and AWS Organizations
|
3721
|
+
# permissions. For more information, see [Refining permissions using
|
3722
|
+
# service last accessed data][1] in the *IAM User Guide*.
|
3580
3723
|
#
|
3581
3724
|
# You can generate a service last accessed data report for entities by
|
3582
3725
|
# specifying only the entity's path. This data includes a list of
|
@@ -3592,8 +3735,8 @@ module Aws::IAM
|
|
3592
3735
|
# recent account activity that the policy allows to account principals
|
3593
3736
|
# in the entity or the entity's children. For important information
|
3594
3737
|
# about the data, reporting period, permissions required,
|
3595
|
-
# troubleshooting, and supported Regions see [Reducing
|
3596
|
-
#
|
3738
|
+
# troubleshooting, and supported Regions see [Reducing permissions using
|
3739
|
+
# service last accessed data][1] in the *IAM User Guide*.
|
3597
3740
|
#
|
3598
3741
|
# The data includes all attempts to access AWS, not just the successful
|
3599
3742
|
# ones. This includes all attempts that were made using the AWS
|
@@ -3603,7 +3746,7 @@ module Aws::IAM
|
|
3603
3746
|
# request might have been denied. Refer to your CloudTrail logs as the
|
3604
3747
|
# authoritative source for information about all API calls and whether
|
3605
3748
|
# they were successful or denied access. For more information,
|
3606
|
-
# see [Logging IAM
|
3749
|
+
# see [Logging IAM events with CloudTrail][2] in the *IAM User Guide*.
|
3607
3750
|
#
|
3608
3751
|
# This operation returns a `JobId`. Use this parameter in the `
|
3609
3752
|
# GetOrganizationsAccessReport ` operation to check the status of the
|
@@ -3620,20 +3763,20 @@ module Aws::IAM
|
|
3620
3763
|
# * **Root** – When you specify the organizations root as the entity,
|
3621
3764
|
# the resulting report lists all of the services allowed by SCPs that
|
3622
3765
|
# are attached to your root. For each service, the report includes
|
3623
|
-
# data for all accounts in your organization except the
|
3624
|
-
# account, because the
|
3766
|
+
# data for all accounts in your organization except the management
|
3767
|
+
# account, because the management account is not limited by SCPs.
|
3625
3768
|
#
|
3626
3769
|
# * **OU** – When you specify an organizational unit (OU) as the entity,
|
3627
3770
|
# the resulting report lists all of the services allowed by SCPs that
|
3628
3771
|
# are attached to the OU and its parents. For each service, the report
|
3629
3772
|
# includes data for all accounts in the OU or its children. This data
|
3630
|
-
# excludes the
|
3631
|
-
# limited by SCPs.
|
3773
|
+
# excludes the management account, because the management account is
|
3774
|
+
# not limited by SCPs.
|
3632
3775
|
#
|
3633
|
-
# * **
|
3634
|
-
# resulting report lists all AWS services, because the
|
3635
|
-
# is not limited by SCPs. For each service, the report
|
3636
|
-
# for only the
|
3776
|
+
# * **management account** – When you specify the management account,
|
3777
|
+
# the resulting report lists all AWS services, because the management
|
3778
|
+
# account is not limited by SCPs. For each service, the report
|
3779
|
+
# includes data for only the management account.
|
3637
3780
|
#
|
3638
3781
|
# * **Account** – When you specify another account as the entity, the
|
3639
3782
|
# resulting report lists all of the services allowed by SCPs that are
|
@@ -3649,26 +3792,26 @@ module Aws::IAM
|
|
3649
3792
|
# resulting report lists all of the services that are allowed by the
|
3650
3793
|
# specified SCP. For each service, the report includes data for all
|
3651
3794
|
# accounts in your organization to which the SCP applies. This data
|
3652
|
-
# excludes the
|
3653
|
-
# limited by SCPs. If the SCP is not attached to any entities in
|
3654
|
-
# organization, then the report will return a list of services
|
3655
|
-
# data.
|
3795
|
+
# excludes the management account, because the management account is
|
3796
|
+
# not limited by SCPs. If the SCP is not attached to any entities in
|
3797
|
+
# the organization, then the report will return a list of services
|
3798
|
+
# with no data.
|
3656
3799
|
#
|
3657
3800
|
# * **OU** – When you specify an OU entity and a policy ID, the
|
3658
3801
|
# resulting report lists all of the services that are allowed by the
|
3659
3802
|
# specified SCP. For each service, the report includes data for all
|
3660
3803
|
# accounts in the OU or its children to which the SCP applies. This
|
3661
3804
|
# means that other accounts outside the OU that are affected by the
|
3662
|
-
# SCP might not be included in the data. This data excludes the
|
3663
|
-
# account, because the
|
3664
|
-
# SCP is not attached to the OU or one of its children,
|
3665
|
-
# will return a list of services with no data.
|
3805
|
+
# SCP might not be included in the data. This data excludes the
|
3806
|
+
# management account, because the management account is not limited by
|
3807
|
+
# SCPs. If the SCP is not attached to the OU or one of its children,
|
3808
|
+
# the report will return a list of services with no data.
|
3666
3809
|
#
|
3667
|
-
# * **
|
3668
|
-
# resulting report lists all AWS services, because the
|
3669
|
-
# is not limited by SCPs. If you specify a policy ID in the
|
3670
|
-
# API, the policy is ignored. For each service, the report
|
3671
|
-
# data for only the
|
3810
|
+
# * **management account** – When you specify the management account,
|
3811
|
+
# the resulting report lists all AWS services, because the management
|
3812
|
+
# account is not limited by SCPs. If you specify a policy ID in the
|
3813
|
+
# CLI or API, the policy is ignored. For each service, the report
|
3814
|
+
# includes data for only the management account.
|
3672
3815
|
#
|
3673
3816
|
# * **Account** – When you specify another account entity and a policy
|
3674
3817
|
# ID, the resulting report lists all of the services that are allowed
|
@@ -3683,12 +3826,12 @@ module Aws::IAM
|
|
3683
3826
|
# policy types include identity-based policies, resource-based policies,
|
3684
3827
|
# access control lists, IAM permissions boundaries, and STS assume role
|
3685
3828
|
# policies. It only applies SCP logic. For more about the evaluation of
|
3686
|
-
# policy types, see [Evaluating
|
3829
|
+
# policy types, see [Evaluating policies][3] in the *IAM User Guide*.
|
3687
3830
|
#
|
3688
3831
|
# </note>
|
3689
3832
|
#
|
3690
3833
|
# For more information about service last accessed data, see [Reducing
|
3691
|
-
#
|
3834
|
+
# policy scope by viewing user activity][1] in the *IAM User Guide*.
|
3692
3835
|
#
|
3693
3836
|
#
|
3694
3837
|
#
|
@@ -3756,7 +3899,7 @@ module Aws::IAM
|
|
3756
3899
|
# AWS services. Recent activity usually appears within four hours. IAM
|
3757
3900
|
# reports activity for the last 365 days, or less if your Region began
|
3758
3901
|
# supporting this feature within the last year. For more information,
|
3759
|
-
# see [Regions
|
3902
|
+
# see [Regions where data is tracked][1].
|
3760
3903
|
#
|
3761
3904
|
# The service last accessed data includes all attempts to access an AWS
|
3762
3905
|
# API, not just the successful ones. This includes all attempts that
|
@@ -3766,7 +3909,7 @@ module Aws::IAM
|
|
3766
3909
|
# compromised, because the request might have been denied. Refer to your
|
3767
3910
|
# CloudTrail logs as the authoritative source for information about all
|
3768
3911
|
# API calls and whether they were successful or denied access. For more
|
3769
|
-
# information, see [Logging IAM
|
3912
|
+
# information, see [Logging IAM events with CloudTrail][2] in the *IAM
|
3770
3913
|
# User Guide*.
|
3771
3914
|
#
|
3772
3915
|
# The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
|
@@ -3802,12 +3945,12 @@ module Aws::IAM
|
|
3802
3945
|
# AWS Organizations policies, IAM permissions boundaries, and AWS STS
|
3803
3946
|
# assume role policies. It only applies permissions policy logic. For
|
3804
3947
|
# more about the evaluation of policy types, see [Evaluating
|
3805
|
-
#
|
3948
|
+
# policies][3] in the *IAM User Guide*.
|
3806
3949
|
#
|
3807
3950
|
# </note>
|
3808
3951
|
#
|
3809
3952
|
# For more information about service and action last accessed data, see
|
3810
|
-
# [Reducing
|
3953
|
+
# [Reducing permissions using service last accessed data][4] in the *IAM
|
3811
3954
|
# User Guide*.
|
3812
3955
|
#
|
3813
3956
|
#
|
@@ -3913,12 +4056,12 @@ module Aws::IAM
|
|
3913
4056
|
|
3914
4057
|
# Retrieves information about all IAM users, groups, roles, and policies
|
3915
4058
|
# in your AWS account, including their relationships to one another. Use
|
3916
|
-
# this
|
3917
|
-
# (users, groups, roles, and policies) in your account.
|
4059
|
+
# this operation to obtain a snapshot of the configuration of IAM
|
4060
|
+
# permissions (users, groups, roles, and policies) in your account.
|
3918
4061
|
#
|
3919
|
-
# <note markdown="1"> Policies returned by this
|
3920
|
-
# 3986][1]. You can use a URL decoding method to convert the policy
|
3921
|
-
# to plain JSON text. For example, if you use Java, you can use the
|
4062
|
+
# <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
|
4063
|
+
# [RFC 3986][1]. You can use a URL decoding method to convert the policy
|
4064
|
+
# back to plain JSON text. For example, if you use Java, you can use the
|
3922
4065
|
# `decode` method of the `java.net.URLDecoder` utility class in the Java
|
3923
4066
|
# SDK. Other languages and SDKs provide similar functionality.
|
3924
4067
|
#
|
@@ -4039,6 +4182,9 @@ module Aws::IAM
|
|
4039
4182
|
# resp.role_detail_list[0].instance_profile_list[0].roles[0].tags[0].value #=> String
|
4040
4183
|
# resp.role_detail_list[0].instance_profile_list[0].roles[0].role_last_used.last_used_date #=> Time
|
4041
4184
|
# resp.role_detail_list[0].instance_profile_list[0].roles[0].role_last_used.region #=> String
|
4185
|
+
# resp.role_detail_list[0].instance_profile_list[0].tags #=> Array
|
4186
|
+
# resp.role_detail_list[0].instance_profile_list[0].tags[0].key #=> String
|
4187
|
+
# resp.role_detail_list[0].instance_profile_list[0].tags[0].value #=> String
|
4042
4188
|
# resp.role_detail_list[0].role_policy_list #=> Array
|
4043
4189
|
# resp.role_detail_list[0].role_policy_list[0].policy_name #=> String
|
4044
4190
|
# resp.role_detail_list[0].role_policy_list[0].policy_document #=> String
|
@@ -4081,9 +4227,10 @@ module Aws::IAM
|
|
4081
4227
|
req.send_request(options)
|
4082
4228
|
end
|
4083
4229
|
|
4084
|
-
# Retrieves the password policy for the AWS account.
|
4085
|
-
#
|
4086
|
-
#
|
4230
|
+
# Retrieves the password policy for the AWS account. This tells you the
|
4231
|
+
# complexity requirements and mandatory rotation periods for the IAM
|
4232
|
+
# user passwords in your account. For more information about using a
|
4233
|
+
# password policy, see [Managing an IAM password policy][1].
|
4087
4234
|
#
|
4088
4235
|
#
|
4089
4236
|
#
|
@@ -4142,9 +4289,8 @@ module Aws::IAM
|
|
4142
4289
|
# Retrieves information about IAM entity usage and IAM quotas in the AWS
|
4143
4290
|
# account.
|
4144
4291
|
#
|
4145
|
-
#
|
4146
|
-
#
|
4147
|
-
# Guide*.
|
4292
|
+
# For information about IAM quotas, see [IAM and STS quotas][1] in the
|
4293
|
+
# *IAM User Guide*.
|
4148
4294
|
#
|
4149
4295
|
#
|
4150
4296
|
#
|
@@ -4277,8 +4423,8 @@ module Aws::IAM
|
|
4277
4423
|
# specified as strings. If you want to include *only* a list of policies
|
4278
4424
|
# by string, use GetContextKeysForCustomPolicy instead.
|
4279
4425
|
#
|
4280
|
-
# **Note:** This
|
4281
|
-
# to other users. If you do not want users to see other user's
|
4426
|
+
# **Note:** This operation discloses information about the permissions
|
4427
|
+
# granted to other users. If you do not want users to see other user's
|
4282
4428
|
# permissions, then consider allowing them to use
|
4283
4429
|
# GetContextKeysForCustomPolicy instead.
|
4284
4430
|
#
|
@@ -4298,8 +4444,8 @@ module Aws::IAM
|
|
4298
4444
|
# parameters are shown in unencoded form here for clarity, but must be
|
4299
4445
|
# URL encoded to be included as a part of a real HTML request.
|
4300
4446
|
#
|
4301
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
4302
|
-
#
|
4447
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
4448
|
+
# in the *AWS General Reference*.
|
4303
4449
|
#
|
4304
4450
|
#
|
4305
4451
|
#
|
@@ -4351,8 +4497,8 @@ module Aws::IAM
|
|
4351
4497
|
end
|
4352
4498
|
|
4353
4499
|
# Retrieves a credential report for the AWS account. For more
|
4354
|
-
# information about the credential report, see [Getting
|
4355
|
-
#
|
4500
|
+
# information about the credential report, see [Getting credential
|
4501
|
+
# reports][1] in the *IAM User Guide*.
|
4356
4502
|
#
|
4357
4503
|
#
|
4358
4504
|
#
|
@@ -4462,9 +4608,9 @@ module Aws::IAM
|
|
4462
4608
|
# Retrieves the specified inline policy document that is embedded in the
|
4463
4609
|
# specified IAM group.
|
4464
4610
|
#
|
4465
|
-
# <note markdown="1"> Policies returned by this
|
4466
|
-
# 3986][1]. You can use a URL decoding method to convert the policy
|
4467
|
-
# to plain JSON text. For example, if you use Java, you can use the
|
4611
|
+
# <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
|
4612
|
+
# [RFC 3986][1]. You can use a URL decoding method to convert the policy
|
4613
|
+
# back to plain JSON text. For example, if you use Java, you can use the
|
4468
4614
|
# `decode` method of the `java.net.URLDecoder` utility class in the Java
|
4469
4615
|
# SDK. Other languages and SDKs provide similar functionality.
|
4470
4616
|
#
|
@@ -4475,8 +4621,8 @@ module Aws::IAM
|
|
4475
4621
|
# GetPolicy to determine the policy's default version, then use
|
4476
4622
|
# GetPolicyVersion to retrieve the policy document.
|
4477
4623
|
#
|
4478
|
-
# For more information about policies, see [Managed
|
4479
|
-
#
|
4624
|
+
# For more information about policies, see [Managed policies and inline
|
4625
|
+
# policies][2] in the *IAM User Guide*.
|
4480
4626
|
#
|
4481
4627
|
#
|
4482
4628
|
#
|
@@ -4537,7 +4683,7 @@ module Aws::IAM
|
|
4537
4683
|
|
4538
4684
|
# Retrieves information about the specified instance profile, including
|
4539
4685
|
# the instance profile's path, GUID, ARN, and role. For more
|
4540
|
-
# information about instance profiles, see [About
|
4686
|
+
# information about instance profiles, see [About instance profiles][1]
|
4541
4687
|
# in the *IAM User Guide*.
|
4542
4688
|
#
|
4543
4689
|
#
|
@@ -4619,6 +4765,9 @@ module Aws::IAM
|
|
4619
4765
|
# resp.instance_profile.roles[0].tags[0].value #=> String
|
4620
4766
|
# resp.instance_profile.roles[0].role_last_used.last_used_date #=> Time
|
4621
4767
|
# resp.instance_profile.roles[0].role_last_used.region #=> String
|
4768
|
+
# resp.instance_profile.tags #=> Array
|
4769
|
+
# resp.instance_profile.tags[0].key #=> String
|
4770
|
+
# resp.instance_profile.tags[0].value #=> String
|
4622
4771
|
#
|
4623
4772
|
#
|
4624
4773
|
# The following waiters are defined for this operation (see {Client#wait_until} for detailed usage):
|
@@ -4634,7 +4783,7 @@ module Aws::IAM
|
|
4634
4783
|
req.send_request(options)
|
4635
4784
|
end
|
4636
4785
|
|
4637
|
-
# Retrieves the user name and password
|
4786
|
+
# Retrieves the user name and password creation date for the specified
|
4638
4787
|
# IAM user. If the user has not been assigned a password, the operation
|
4639
4788
|
# returns a 404 (`NoSuchEntity`) error.
|
4640
4789
|
#
|
@@ -4700,8 +4849,8 @@ module Aws::IAM
|
|
4700
4849
|
# IAM to get information for. You can get a list of OIDC provider
|
4701
4850
|
# resource ARNs by using the ListOpenIDConnectProviders operation.
|
4702
4851
|
#
|
4703
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
4704
|
-
#
|
4852
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
4853
|
+
# in the *AWS General Reference*.
|
4705
4854
|
#
|
4706
4855
|
#
|
4707
4856
|
#
|
@@ -4713,6 +4862,7 @@ module Aws::IAM
|
|
4713
4862
|
# * {Types::GetOpenIDConnectProviderResponse#client_id_list #client_id_list} => Array<String>
|
4714
4863
|
# * {Types::GetOpenIDConnectProviderResponse#thumbprint_list #thumbprint_list} => Array<String>
|
4715
4864
|
# * {Types::GetOpenIDConnectProviderResponse#create_date #create_date} => Time
|
4865
|
+
# * {Types::GetOpenIDConnectProviderResponse#tags #tags} => Array<Types::Tag>
|
4716
4866
|
#
|
4717
4867
|
# @example Request syntax with placeholder values
|
4718
4868
|
#
|
@@ -4728,6 +4878,9 @@ module Aws::IAM
|
|
4728
4878
|
# resp.thumbprint_list #=> Array
|
4729
4879
|
# resp.thumbprint_list[0] #=> String
|
4730
4880
|
# resp.create_date #=> Time
|
4881
|
+
# resp.tags #=> Array
|
4882
|
+
# resp.tags[0].key #=> String
|
4883
|
+
# resp.tags[0].value #=> String
|
4731
4884
|
#
|
4732
4885
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/GetOpenIDConnectProvider AWS API Documentation
|
4733
4886
|
#
|
@@ -4747,11 +4900,11 @@ module Aws::IAM
|
|
4747
4900
|
# report, the data returned could include different information. For
|
4748
4901
|
# details, see GenerateOrganizationsAccessReport.
|
4749
4902
|
#
|
4750
|
-
# To call this operation, you must be signed in to the
|
4751
|
-
# your organization. SCPs must be enabled for your
|
4752
|
-
# You must have permissions to perform this
|
4753
|
-
# information, see [Refining
|
4754
|
-
#
|
4903
|
+
# To call this operation, you must be signed in to the management
|
4904
|
+
# account in your organization. SCPs must be enabled for your
|
4905
|
+
# organization root. You must have permissions to perform this
|
4906
|
+
# operation. For more information, see [Refining permissions using
|
4907
|
+
# service last accessed data][1] in the *IAM User Guide*.
|
4755
4908
|
#
|
4756
4909
|
# For each service that principals in an account (root users, IAM users,
|
4757
4910
|
# or IAM roles) could access using SCPs, the operation returns details
|
@@ -4887,17 +5040,17 @@ module Aws::IAM
|
|
4887
5040
|
# the policy's default version and the total number of IAM users,
|
4888
5041
|
# groups, and roles to which the policy is attached. To retrieve the
|
4889
5042
|
# list of the specific users, groups, and roles that the policy is
|
4890
|
-
# attached to, use
|
5043
|
+
# attached to, use ListEntitiesForPolicy. This operation returns
|
4891
5044
|
# metadata about the policy. To retrieve the actual policy document for
|
4892
5045
|
# a specific version of the policy, use GetPolicyVersion.
|
4893
5046
|
#
|
4894
|
-
# This
|
4895
|
-
# information about an inline policy that is embedded with an
|
4896
|
-
# group, or role, use
|
4897
|
-
# GetRolePolicy
|
5047
|
+
# This operation retrieves information about managed policies. To
|
5048
|
+
# retrieve information about an inline policy that is embedded with an
|
5049
|
+
# IAM user, group, or role, use GetUserPolicy, GetGroupPolicy, or
|
5050
|
+
# GetRolePolicy.
|
4898
5051
|
#
|
4899
|
-
# For more information about policies, see [Managed
|
4900
|
-
#
|
5052
|
+
# For more information about policies, see [Managed policies and inline
|
5053
|
+
# policies][1] in the *IAM User Guide*.
|
4901
5054
|
#
|
4902
5055
|
#
|
4903
5056
|
#
|
@@ -4907,8 +5060,8 @@ module Aws::IAM
|
|
4907
5060
|
# The Amazon Resource Name (ARN) of the managed policy that you want
|
4908
5061
|
# information about.
|
4909
5062
|
#
|
4910
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
4911
|
-
#
|
5063
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
5064
|
+
# in the *AWS General Reference*.
|
4912
5065
|
#
|
4913
5066
|
#
|
4914
5067
|
#
|
@@ -4937,6 +5090,9 @@ module Aws::IAM
|
|
4937
5090
|
# resp.policy.description #=> String
|
4938
5091
|
# resp.policy.create_date #=> Time
|
4939
5092
|
# resp.policy.update_date #=> Time
|
5093
|
+
# resp.policy.tags #=> Array
|
5094
|
+
# resp.policy.tags[0].key #=> String
|
5095
|
+
# resp.policy.tags[0].value #=> String
|
4940
5096
|
#
|
4941
5097
|
#
|
4942
5098
|
# The following waiters are defined for this operation (see {Client#wait_until} for detailed usage):
|
@@ -4955,9 +5111,9 @@ module Aws::IAM
|
|
4955
5111
|
# Retrieves information about the specified version of the specified
|
4956
5112
|
# managed policy, including the policy document.
|
4957
5113
|
#
|
4958
|
-
# <note markdown="1"> Policies returned by this
|
4959
|
-
# 3986][1]. You can use a URL decoding method to convert the policy
|
4960
|
-
# to plain JSON text. For example, if you use Java, you can use the
|
5114
|
+
# <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
|
5115
|
+
# [RFC 3986][1]. You can use a URL decoding method to convert the policy
|
5116
|
+
# back to plain JSON text. For example, if you use Java, you can use the
|
4961
5117
|
# `decode` method of the `java.net.URLDecoder` utility class in the Java
|
4962
5118
|
# SDK. Other languages and SDKs provide similar functionality.
|
4963
5119
|
#
|
@@ -4965,15 +5121,16 @@ module Aws::IAM
|
|
4965
5121
|
#
|
4966
5122
|
# To list the available versions for a policy, use ListPolicyVersions.
|
4967
5123
|
#
|
4968
|
-
# This
|
4969
|
-
# information about an inline policy that is embedded in a
|
4970
|
-
# or role, use
|
5124
|
+
# This operation retrieves information about managed policies. To
|
5125
|
+
# retrieve information about an inline policy that is embedded in a
|
5126
|
+
# user, group, or role, use GetUserPolicy, GetGroupPolicy, or
|
5127
|
+
# GetRolePolicy.
|
4971
5128
|
#
|
4972
5129
|
# For more information about the types of policies, see [Managed
|
4973
|
-
#
|
5130
|
+
# policies and inline policies][2] in the *IAM User Guide*.
|
4974
5131
|
#
|
4975
5132
|
# For more information about managed policy versions, see [Versioning
|
4976
|
-
# for
|
5133
|
+
# for managed policies][3] in the *IAM User Guide*.
|
4977
5134
|
#
|
4978
5135
|
#
|
4979
5136
|
#
|
@@ -4985,8 +5142,8 @@ module Aws::IAM
|
|
4985
5142
|
# The Amazon Resource Name (ARN) of the managed policy that you want
|
4986
5143
|
# information about.
|
4987
5144
|
#
|
4988
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
4989
|
-
#
|
5145
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
5146
|
+
# in the *AWS General Reference*.
|
4990
5147
|
#
|
4991
5148
|
#
|
4992
5149
|
#
|
@@ -5034,11 +5191,11 @@ module Aws::IAM
|
|
5034
5191
|
# Retrieves information about the specified role, including the role's
|
5035
5192
|
# path, GUID, ARN, and the role's trust policy that grants permission
|
5036
5193
|
# to assume the role. For more information about roles, see [Working
|
5037
|
-
# with
|
5194
|
+
# with roles][1].
|
5038
5195
|
#
|
5039
|
-
# <note markdown="1"> Policies returned by this
|
5040
|
-
# 3986][2]. You can use a URL decoding method to convert the policy
|
5041
|
-
# to plain JSON text. For example, if you use Java, you can use the
|
5196
|
+
# <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
|
5197
|
+
# [RFC 3986][2]. You can use a URL decoding method to convert the policy
|
5198
|
+
# back to plain JSON text. For example, if you use Java, you can use the
|
5042
5199
|
# `decode` method of the `java.net.URLDecoder` utility class in the Java
|
5043
5200
|
# SDK. Other languages and SDKs provide similar functionality.
|
5044
5201
|
#
|
@@ -5132,9 +5289,9 @@ module Aws::IAM
|
|
5132
5289
|
# Retrieves the specified inline policy document that is embedded with
|
5133
5290
|
# the specified IAM role.
|
5134
5291
|
#
|
5135
|
-
# <note markdown="1"> Policies returned by this
|
5136
|
-
# 3986][1]. You can use a URL decoding method to convert the policy
|
5137
|
-
# to plain JSON text. For example, if you use Java, you can use the
|
5292
|
+
# <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
|
5293
|
+
# [RFC 3986][1]. You can use a URL decoding method to convert the policy
|
5294
|
+
# back to plain JSON text. For example, if you use Java, you can use the
|
5138
5295
|
# `decode` method of the `java.net.URLDecoder` utility class in the Java
|
5139
5296
|
# SDK. Other languages and SDKs provide similar functionality.
|
5140
5297
|
#
|
@@ -5145,11 +5302,11 @@ module Aws::IAM
|
|
5145
5302
|
# determine the policy's default version, then use GetPolicyVersion to
|
5146
5303
|
# retrieve the policy document.
|
5147
5304
|
#
|
5148
|
-
# For more information about policies, see [Managed
|
5149
|
-
#
|
5305
|
+
# For more information about policies, see [Managed policies and inline
|
5306
|
+
# policies][2] in the *IAM User Guide*.
|
5150
5307
|
#
|
5151
|
-
# For more information about roles, see [Using
|
5152
|
-
#
|
5308
|
+
# For more information about roles, see [Using roles to delegate
|
5309
|
+
# permissions and federate identities][3].
|
5153
5310
|
#
|
5154
5311
|
#
|
5155
5312
|
#
|
@@ -5224,8 +5381,8 @@ module Aws::IAM
|
|
5224
5381
|
# The Amazon Resource Name (ARN) of the SAML provider resource object in
|
5225
5382
|
# IAM to get information about.
|
5226
5383
|
#
|
5227
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
5228
|
-
#
|
5384
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
5385
|
+
# in the *AWS General Reference*.
|
5229
5386
|
#
|
5230
5387
|
#
|
5231
5388
|
#
|
@@ -5236,6 +5393,7 @@ module Aws::IAM
|
|
5236
5393
|
# * {Types::GetSAMLProviderResponse#saml_metadata_document #saml_metadata_document} => String
|
5237
5394
|
# * {Types::GetSAMLProviderResponse#create_date #create_date} => Time
|
5238
5395
|
# * {Types::GetSAMLProviderResponse#valid_until #valid_until} => Time
|
5396
|
+
# * {Types::GetSAMLProviderResponse#tags #tags} => Array<Types::Tag>
|
5239
5397
|
#
|
5240
5398
|
# @example Request syntax with placeholder values
|
5241
5399
|
#
|
@@ -5248,6 +5406,9 @@ module Aws::IAM
|
|
5248
5406
|
# resp.saml_metadata_document #=> String
|
5249
5407
|
# resp.create_date #=> Time
|
5250
5408
|
# resp.valid_until #=> Time
|
5409
|
+
# resp.tags #=> Array
|
5410
|
+
# resp.tags[0].key #=> String
|
5411
|
+
# resp.tags[0].value #=> String
|
5251
5412
|
#
|
5252
5413
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/GetSAMLProvider AWS API Documentation
|
5253
5414
|
#
|
@@ -5265,7 +5426,7 @@ module Aws::IAM
|
|
5265
5426
|
# authenticating the associated IAM user to an AWS CodeCommit
|
5266
5427
|
# repository. For more information about using SSH keys to authenticate
|
5267
5428
|
# to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
|
5268
|
-
#
|
5429
|
+
# connections][1] in the *AWS CodeCommit User Guide*.
|
5269
5430
|
#
|
5270
5431
|
#
|
5271
5432
|
#
|
@@ -5333,7 +5494,7 @@ module Aws::IAM
|
|
5333
5494
|
# IAM.
|
5334
5495
|
#
|
5335
5496
|
# For more information about working with server certificates, see
|
5336
|
-
# [Working with
|
5497
|
+
# [Working with server certificates][1] in the *IAM User Guide*. This
|
5337
5498
|
# topic includes a list of AWS services that can use the server
|
5338
5499
|
# certificates that you manage with IAM.
|
5339
5500
|
#
|
@@ -5374,6 +5535,9 @@ module Aws::IAM
|
|
5374
5535
|
# resp.server_certificate.server_certificate_metadata.expiration #=> Time
|
5375
5536
|
# resp.server_certificate.certificate_body #=> String
|
5376
5537
|
# resp.server_certificate.certificate_chain #=> String
|
5538
|
+
# resp.server_certificate.tags #=> Array
|
5539
|
+
# resp.server_certificate.tags[0].key #=> String
|
5540
|
+
# resp.server_certificate.tags[0].value #=> String
|
5377
5541
|
#
|
5378
5542
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/GetServerCertificate AWS API Documentation
|
5379
5543
|
#
|
@@ -5398,7 +5562,7 @@ module Aws::IAM
|
|
5398
5562
|
# AWS Organizations policies, IAM permissions boundaries, and AWS STS
|
5399
5563
|
# assume role policies. It only applies permissions policy logic. For
|
5400
5564
|
# more about the evaluation of policy types, see [Evaluating
|
5401
|
-
#
|
5565
|
+
# policies][1] in the *IAM User Guide*.
|
5402
5566
|
#
|
5403
5567
|
# </note>
|
5404
5568
|
#
|
@@ -5433,7 +5597,7 @@ module Aws::IAM
|
|
5433
5597
|
# within a service. Otherwise, this operation returns only service data.
|
5434
5598
|
#
|
5435
5599
|
# For more information about service and action last accessed data, see
|
5436
|
-
# [Reducing
|
5600
|
+
# [Reducing permissions using service last accessed data][2] in the *IAM
|
5437
5601
|
# User Guide*.
|
5438
5602
|
#
|
5439
5603
|
#
|
@@ -5581,17 +5745,16 @@ module Aws::IAM
|
|
5581
5745
|
# namespace to learn when the IAM entity last attempted to access the
|
5582
5746
|
# specified service.
|
5583
5747
|
#
|
5584
|
-
# To learn the service namespace for a service,
|
5585
|
-
#
|
5586
|
-
#
|
5587
|
-
#
|
5588
|
-
#
|
5589
|
-
# namespaces
|
5590
|
-
# Reference*.
|
5748
|
+
# To learn the service namespace for a service, see [Actions, resources,
|
5749
|
+
# and condition keys for AWS services][1] in the *IAM User Guide*.
|
5750
|
+
# Choose the name of the service to view details for that service. In
|
5751
|
+
# the first paragraph, find the service prefix. For example, `(service
|
5752
|
+
# prefix: a4b)`. For more information about service namespaces, see [AWS
|
5753
|
+
# service namespaces][2] in the *AWS General Reference*.
|
5591
5754
|
#
|
5592
5755
|
#
|
5593
5756
|
#
|
5594
|
-
# [1]: https://docs.aws.amazon.com/
|
5757
|
+
# [1]: https://docs.aws.amazon.com/service-authorization/latest/reference/reference_policies_actions-resources-contextkeys.html
|
5595
5758
|
# [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html#genref-aws-service-namespaces
|
5596
5759
|
#
|
5597
5760
|
# @option params [Integer] :max_items
|
@@ -5696,11 +5859,11 @@ module Aws::IAM
|
|
5696
5859
|
end
|
5697
5860
|
|
5698
5861
|
# Retrieves the status of your service-linked role deletion. After you
|
5699
|
-
# use
|
5700
|
-
#
|
5701
|
-
#
|
5702
|
-
#
|
5703
|
-
#
|
5862
|
+
# use DeleteServiceLinkedRole to submit a service-linked role for
|
5863
|
+
# deletion, you can use the `DeletionTaskId` parameter in
|
5864
|
+
# `GetServiceLinkedRoleDeletionStatus` to check the status of the
|
5865
|
+
# deletion. If the deletion fails, this operation returns the reason
|
5866
|
+
# that it failed, if that information is returned by the service.
|
5704
5867
|
#
|
5705
5868
|
# @option params [required, String] :deletion_task_id
|
5706
5869
|
# The deletion task identifier. This identifier is returned by the
|
@@ -5741,7 +5904,7 @@ module Aws::IAM
|
|
5741
5904
|
#
|
5742
5905
|
# If you do not specify a user name, IAM determines the user name
|
5743
5906
|
# implicitly based on the AWS access key ID used to sign the request to
|
5744
|
-
# this
|
5907
|
+
# this operation.
|
5745
5908
|
#
|
5746
5909
|
# @option params [String] :user_name
|
5747
5910
|
# The name of the user to get information about.
|
@@ -5817,9 +5980,9 @@ module Aws::IAM
|
|
5817
5980
|
# Retrieves the specified inline policy document that is embedded in the
|
5818
5981
|
# specified IAM user.
|
5819
5982
|
#
|
5820
|
-
# <note markdown="1"> Policies returned by this
|
5821
|
-
# 3986][1]. You can use a URL decoding method to convert the policy
|
5822
|
-
# to plain JSON text. For example, if you use Java, you can use the
|
5983
|
+
# <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
|
5984
|
+
# [RFC 3986][1]. You can use a URL decoding method to convert the policy
|
5985
|
+
# back to plain JSON text. For example, if you use Java, you can use the
|
5823
5986
|
# `decode` method of the `java.net.URLDecoder` utility class in the Java
|
5824
5987
|
# SDK. Other languages and SDKs provide similar functionality.
|
5825
5988
|
#
|
@@ -5830,8 +5993,8 @@ module Aws::IAM
|
|
5830
5993
|
# determine the policy's default version. Then use GetPolicyVersion to
|
5831
5994
|
# retrieve the policy document.
|
5832
5995
|
#
|
5833
|
-
# For more information about policies, see [Managed
|
5834
|
-
#
|
5996
|
+
# For more information about policies, see [Managed policies and inline
|
5997
|
+
# policies][2] in the *IAM User Guide*.
|
5835
5998
|
#
|
5836
5999
|
#
|
5837
6000
|
#
|
@@ -6001,7 +6164,7 @@ module Aws::IAM
|
|
6001
6164
|
|
6002
6165
|
# Lists the account alias associated with the AWS account (Note: you can
|
6003
6166
|
# have only one). For information about using an AWS account alias, see
|
6004
|
-
# [Using an
|
6167
|
+
# [Using an alias for your AWS account ID][1] in the *IAM User Guide*.
|
6005
6168
|
#
|
6006
6169
|
#
|
6007
6170
|
#
|
@@ -6074,9 +6237,9 @@ module Aws::IAM
|
|
6074
6237
|
# group.
|
6075
6238
|
#
|
6076
6239
|
# An IAM group can also have inline policies embedded with it. To list
|
6077
|
-
# the inline policies for a group, use
|
6078
|
-
# information about policies, see [Managed
|
6079
|
-
#
|
6240
|
+
# the inline policies for a group, use ListGroupPolicies. For
|
6241
|
+
# information about policies, see [Managed policies and inline
|
6242
|
+
# policies][1] in the *IAM User Guide*.
|
6080
6243
|
#
|
6081
6244
|
# You can paginate the results using the `MaxItems` and `Marker`
|
6082
6245
|
# parameters. You can use the `PathPrefix` parameter to limit the list
|
@@ -6172,9 +6335,9 @@ module Aws::IAM
|
|
6172
6335
|
# role.
|
6173
6336
|
#
|
6174
6337
|
# An IAM role can also have inline policies embedded with it. To list
|
6175
|
-
# the inline policies for a role, use
|
6176
|
-
#
|
6177
|
-
#
|
6338
|
+
# the inline policies for a role, use ListRolePolicies. For information
|
6339
|
+
# about policies, see [Managed policies and inline policies][1] in the
|
6340
|
+
# *IAM User Guide*.
|
6178
6341
|
#
|
6179
6342
|
# You can paginate the results using the `MaxItems` and `Marker`
|
6180
6343
|
# parameters. You can use the `PathPrefix` parameter to limit the list
|
@@ -6270,9 +6433,9 @@ module Aws::IAM
|
|
6270
6433
|
# user.
|
6271
6434
|
#
|
6272
6435
|
# An IAM user can also have inline policies embedded with it. To list
|
6273
|
-
# the inline policies for a user, use
|
6274
|
-
#
|
6275
|
-
#
|
6436
|
+
# the inline policies for a user, use ListUserPolicies. For information
|
6437
|
+
# about policies, see [Managed policies and inline policies][1] in the
|
6438
|
+
# *IAM User Guide*.
|
6276
6439
|
#
|
6277
6440
|
# You can paginate the results using the `MaxItems` and `Marker`
|
6278
6441
|
# parameters. You can use the `PathPrefix` parameter to limit the list
|
@@ -6379,8 +6542,8 @@ module Aws::IAM
|
|
6379
6542
|
# The Amazon Resource Name (ARN) of the IAM policy for which you want
|
6380
6543
|
# the versions.
|
6381
6544
|
#
|
6382
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
6383
|
-
#
|
6545
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
6546
|
+
# in the *AWS General Reference*.
|
6384
6547
|
#
|
6385
6548
|
#
|
6386
6549
|
#
|
@@ -6489,7 +6652,7 @@ module Aws::IAM
|
|
6489
6652
|
# An IAM group can also have managed policies attached to it. To list
|
6490
6653
|
# the managed policies that are attached to a group, use
|
6491
6654
|
# ListAttachedGroupPolicies. For more information about policies, see
|
6492
|
-
# [Managed
|
6655
|
+
# [Managed policies and inline policies][1] in the *IAM User Guide*.
|
6493
6656
|
#
|
6494
6657
|
# You can paginate the results using the `MaxItems` and `Marker`
|
6495
6658
|
# parameters. If there are no inline policies embedded with the
|
@@ -6786,10 +6949,87 @@ module Aws::IAM
|
|
6786
6949
|
req.send_request(options)
|
6787
6950
|
end
|
6788
6951
|
|
6952
|
+
# Lists the tags that are attached to the specified IAM instance
|
6953
|
+
# profile. The returned list of tags is sorted by tag key. For more
|
6954
|
+
# information about tagging, see [Tagging IAM resources][1] in the *IAM
|
6955
|
+
# User Guide*.
|
6956
|
+
#
|
6957
|
+
#
|
6958
|
+
#
|
6959
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
6960
|
+
#
|
6961
|
+
# @option params [required, String] :instance_profile_name
|
6962
|
+
# The name of the IAM instance profile whose tags you want to see.
|
6963
|
+
#
|
6964
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
6965
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
6966
|
+
# with no spaces. You can also include any of the following characters:
|
6967
|
+
# =,.@-
|
6968
|
+
#
|
6969
|
+
#
|
6970
|
+
#
|
6971
|
+
# [1]: http://wikipedia.org/wiki/regex
|
6972
|
+
#
|
6973
|
+
# @option params [String] :marker
|
6974
|
+
# Use this parameter only when paginating results and only after you
|
6975
|
+
# receive a response indicating that the results are truncated. Set it
|
6976
|
+
# to the value of the `Marker` element in the response that you received
|
6977
|
+
# to indicate where the next call should start.
|
6978
|
+
#
|
6979
|
+
# @option params [Integer] :max_items
|
6980
|
+
# (Optional) Use this only when paginating results to indicate the
|
6981
|
+
# maximum number of items that you want in the response. If additional
|
6982
|
+
# items exist beyond the maximum that you specify, the `IsTruncated`
|
6983
|
+
# response element is `true`.
|
6984
|
+
#
|
6985
|
+
# If you do not include this parameter, it defaults to 100. Note that
|
6986
|
+
# IAM might return fewer results, even when more results are available.
|
6987
|
+
# In that case, the `IsTruncated` response element returns `true`, and
|
6988
|
+
# `Marker` contains a value to include in the subsequent call that tells
|
6989
|
+
# the service where to continue from.
|
6990
|
+
#
|
6991
|
+
# @return [Types::ListInstanceProfileTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
6992
|
+
#
|
6993
|
+
# * {Types::ListInstanceProfileTagsResponse#tags #tags} => Array<Types::Tag>
|
6994
|
+
# * {Types::ListInstanceProfileTagsResponse#is_truncated #is_truncated} => Boolean
|
6995
|
+
# * {Types::ListInstanceProfileTagsResponse#marker #marker} => String
|
6996
|
+
#
|
6997
|
+
# @example Request syntax with placeholder values
|
6998
|
+
#
|
6999
|
+
# resp = client.list_instance_profile_tags({
|
7000
|
+
# instance_profile_name: "instanceProfileNameType", # required
|
7001
|
+
# marker: "markerType",
|
7002
|
+
# max_items: 1,
|
7003
|
+
# })
|
7004
|
+
#
|
7005
|
+
# @example Response structure
|
7006
|
+
#
|
7007
|
+
# resp.tags #=> Array
|
7008
|
+
# resp.tags[0].key #=> String
|
7009
|
+
# resp.tags[0].value #=> String
|
7010
|
+
# resp.is_truncated #=> Boolean
|
7011
|
+
# resp.marker #=> String
|
7012
|
+
#
|
7013
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListInstanceProfileTags AWS API Documentation
|
7014
|
+
#
|
7015
|
+
# @overload list_instance_profile_tags(params = {})
|
7016
|
+
# @param [Hash] params ({})
|
7017
|
+
def list_instance_profile_tags(params = {}, options = {})
|
7018
|
+
req = build_request(:list_instance_profile_tags, params)
|
7019
|
+
req.send_request(options)
|
7020
|
+
end
|
7021
|
+
|
6789
7022
|
# Lists the instance profiles that have the specified path prefix. If
|
6790
7023
|
# there are none, the operation returns an empty list. For more
|
6791
|
-
# information about instance profiles,
|
6792
|
-
#
|
7024
|
+
# information about instance profiles, see [About instance profiles][1].
|
7025
|
+
#
|
7026
|
+
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
7027
|
+
# attributes for the resource. For example, this operation does not
|
7028
|
+
# return tags, even though they are an attribute of the returned object.
|
7029
|
+
# To view all of the information for an instance profile, see
|
7030
|
+
# GetInstanceProfile.
|
7031
|
+
#
|
7032
|
+
# </note>
|
6793
7033
|
#
|
6794
7034
|
# You can paginate the results using the `MaxItems` and `Marker`
|
6795
7035
|
# parameters.
|
@@ -6873,6 +7113,9 @@ module Aws::IAM
|
|
6873
7113
|
# resp.instance_profiles[0].roles[0].tags[0].value #=> String
|
6874
7114
|
# resp.instance_profiles[0].roles[0].role_last_used.last_used_date #=> Time
|
6875
7115
|
# resp.instance_profiles[0].roles[0].role_last_used.region #=> String
|
7116
|
+
# resp.instance_profiles[0].tags #=> Array
|
7117
|
+
# resp.instance_profiles[0].tags[0].key #=> String
|
7118
|
+
# resp.instance_profiles[0].tags[0].value #=> String
|
6876
7119
|
# resp.is_truncated #=> Boolean
|
6877
7120
|
# resp.marker #=> String
|
6878
7121
|
#
|
@@ -6887,8 +7130,8 @@ module Aws::IAM
|
|
6887
7130
|
|
6888
7131
|
# Lists the instance profiles that have the specified associated IAM
|
6889
7132
|
# role. If there are none, the operation returns an empty list. For more
|
6890
|
-
# information about instance profiles, go to [About
|
6891
|
-
#
|
7133
|
+
# information about instance profiles, go to [About instance
|
7134
|
+
# profiles][1].
|
6892
7135
|
#
|
6893
7136
|
# You can paginate the results using the `MaxItems` and `Marker`
|
6894
7137
|
# parameters.
|
@@ -6966,6 +7209,9 @@ module Aws::IAM
|
|
6966
7209
|
# resp.instance_profiles[0].roles[0].tags[0].value #=> String
|
6967
7210
|
# resp.instance_profiles[0].roles[0].role_last_used.last_used_date #=> Time
|
6968
7211
|
# resp.instance_profiles[0].roles[0].role_last_used.region #=> String
|
7212
|
+
# resp.instance_profiles[0].tags #=> Array
|
7213
|
+
# resp.instance_profiles[0].tags[0].key #=> String
|
7214
|
+
# resp.instance_profiles[0].tags[0].value #=> String
|
6969
7215
|
# resp.is_truncated #=> Boolean
|
6970
7216
|
# resp.marker #=> String
|
6971
7217
|
#
|
@@ -6978,11 +7224,83 @@ module Aws::IAM
|
|
6978
7224
|
req.send_request(options)
|
6979
7225
|
end
|
6980
7226
|
|
7227
|
+
# Lists the tags that are attached to the specified IAM virtual
|
7228
|
+
# multi-factor authentication (MFA) device. The returned list of tags is
|
7229
|
+
# sorted by tag key. For more information about tagging, see [Tagging
|
7230
|
+
# IAM resources][1] in the *IAM User Guide*.
|
7231
|
+
#
|
7232
|
+
#
|
7233
|
+
#
|
7234
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
7235
|
+
#
|
7236
|
+
# @option params [required, String] :serial_number
|
7237
|
+
# The unique identifier for the IAM virtual MFA device whose tags you
|
7238
|
+
# want to see. For virtual MFA devices, the serial number is the same as
|
7239
|
+
# the ARN.
|
7240
|
+
#
|
7241
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
7242
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
7243
|
+
# with no spaces. You can also include any of the following characters:
|
7244
|
+
# =,.@-
|
7245
|
+
#
|
7246
|
+
#
|
7247
|
+
#
|
7248
|
+
# [1]: http://wikipedia.org/wiki/regex
|
7249
|
+
#
|
7250
|
+
# @option params [String] :marker
|
7251
|
+
# Use this parameter only when paginating results and only after you
|
7252
|
+
# receive a response indicating that the results are truncated. Set it
|
7253
|
+
# to the value of the `Marker` element in the response that you received
|
7254
|
+
# to indicate where the next call should start.
|
7255
|
+
#
|
7256
|
+
# @option params [Integer] :max_items
|
7257
|
+
# (Optional) Use this only when paginating results to indicate the
|
7258
|
+
# maximum number of items that you want in the response. If additional
|
7259
|
+
# items exist beyond the maximum that you specify, the `IsTruncated`
|
7260
|
+
# response element is `true`.
|
7261
|
+
#
|
7262
|
+
# If you do not include this parameter, it defaults to 100. Note that
|
7263
|
+
# IAM might return fewer results, even when more results are available.
|
7264
|
+
# In that case, the `IsTruncated` response element returns `true`, and
|
7265
|
+
# `Marker` contains a value to include in the subsequent call that tells
|
7266
|
+
# the service where to continue from.
|
7267
|
+
#
|
7268
|
+
# @return [Types::ListMFADeviceTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
7269
|
+
#
|
7270
|
+
# * {Types::ListMFADeviceTagsResponse#tags #tags} => Array<Types::Tag>
|
7271
|
+
# * {Types::ListMFADeviceTagsResponse#is_truncated #is_truncated} => Boolean
|
7272
|
+
# * {Types::ListMFADeviceTagsResponse#marker #marker} => String
|
7273
|
+
#
|
7274
|
+
# @example Request syntax with placeholder values
|
7275
|
+
#
|
7276
|
+
# resp = client.list_mfa_device_tags({
|
7277
|
+
# serial_number: "serialNumberType", # required
|
7278
|
+
# marker: "markerType",
|
7279
|
+
# max_items: 1,
|
7280
|
+
# })
|
7281
|
+
#
|
7282
|
+
# @example Response structure
|
7283
|
+
#
|
7284
|
+
# resp.tags #=> Array
|
7285
|
+
# resp.tags[0].key #=> String
|
7286
|
+
# resp.tags[0].value #=> String
|
7287
|
+
# resp.is_truncated #=> Boolean
|
7288
|
+
# resp.marker #=> String
|
7289
|
+
#
|
7290
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListMFADeviceTags AWS API Documentation
|
7291
|
+
#
|
7292
|
+
# @overload list_mfa_device_tags(params = {})
|
7293
|
+
# @param [Hash] params ({})
|
7294
|
+
def list_mfa_device_tags(params = {}, options = {})
|
7295
|
+
req = build_request(:list_mfa_device_tags, params)
|
7296
|
+
req.send_request(options)
|
7297
|
+
end
|
7298
|
+
|
6981
7299
|
# Lists the MFA devices for an IAM user. If the request includes a IAM
|
6982
7300
|
# user name, then this operation lists all the MFA devices associated
|
6983
7301
|
# with the specified user. If you do not specify a user name, IAM
|
6984
7302
|
# determines the user name implicitly based on the AWS access key ID
|
6985
|
-
# signing the request for this
|
7303
|
+
# signing the request for this operation.
|
6986
7304
|
#
|
6987
7305
|
# You can paginate the results using the `MaxItems` and `Marker`
|
6988
7306
|
# parameters.
|
@@ -7050,21 +7368,104 @@ module Aws::IAM
|
|
7050
7368
|
req.send_request(options)
|
7051
7369
|
end
|
7052
7370
|
|
7053
|
-
# Lists
|
7054
|
-
#
|
7371
|
+
# Lists the tags that are attached to the specified OpenID Connect
|
7372
|
+
# (OIDC)-compatible identity provider. The returned list of tags is
|
7373
|
+
# sorted by tag key. For more information, see [About web identity
|
7374
|
+
# federation][1].
|
7055
7375
|
#
|
7056
|
-
#
|
7376
|
+
# For more information about tagging, see [Tagging IAM resources][2] in
|
7377
|
+
# the *IAM User Guide*.
|
7057
7378
|
#
|
7058
|
-
# * {Types::ListOpenIDConnectProvidersResponse#open_id_connect_provider_list #open_id_connect_provider_list} => Array<Types::OpenIDConnectProviderListEntry>
|
7059
7379
|
#
|
7060
|
-
# @example Response structure
|
7061
7380
|
#
|
7062
|
-
#
|
7063
|
-
#
|
7381
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html
|
7382
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
7064
7383
|
#
|
7065
|
-
# @
|
7384
|
+
# @option params [required, String] :open_id_connect_provider_arn
|
7385
|
+
# The ARN of the OpenID Connect (OIDC) identity provider whose tags you
|
7386
|
+
# want to see.
|
7066
7387
|
#
|
7067
|
-
#
|
7388
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
7389
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
7390
|
+
# with no spaces. You can also include any of the following characters:
|
7391
|
+
# =,.@-
|
7392
|
+
#
|
7393
|
+
#
|
7394
|
+
#
|
7395
|
+
# [1]: http://wikipedia.org/wiki/regex
|
7396
|
+
#
|
7397
|
+
# @option params [String] :marker
|
7398
|
+
# Use this parameter only when paginating results and only after you
|
7399
|
+
# receive a response indicating that the results are truncated. Set it
|
7400
|
+
# to the value of the `Marker` element in the response that you received
|
7401
|
+
# to indicate where the next call should start.
|
7402
|
+
#
|
7403
|
+
# @option params [Integer] :max_items
|
7404
|
+
# (Optional) Use this only when paginating results to indicate the
|
7405
|
+
# maximum number of items that you want in the response. If additional
|
7406
|
+
# items exist beyond the maximum that you specify, the `IsTruncated`
|
7407
|
+
# response element is `true`.
|
7408
|
+
#
|
7409
|
+
# If you do not include this parameter, it defaults to 100. Note that
|
7410
|
+
# IAM might return fewer results, even when more results are available.
|
7411
|
+
# In that case, the `IsTruncated` response element returns `true`, and
|
7412
|
+
# `Marker` contains a value to include in the subsequent call that tells
|
7413
|
+
# the service where to continue from.
|
7414
|
+
#
|
7415
|
+
# @return [Types::ListOpenIDConnectProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
7416
|
+
#
|
7417
|
+
# * {Types::ListOpenIDConnectProviderTagsResponse#tags #tags} => Array<Types::Tag>
|
7418
|
+
# * {Types::ListOpenIDConnectProviderTagsResponse#is_truncated #is_truncated} => Boolean
|
7419
|
+
# * {Types::ListOpenIDConnectProviderTagsResponse#marker #marker} => String
|
7420
|
+
#
|
7421
|
+
# @example Request syntax with placeholder values
|
7422
|
+
#
|
7423
|
+
# resp = client.list_open_id_connect_provider_tags({
|
7424
|
+
# open_id_connect_provider_arn: "arnType", # required
|
7425
|
+
# marker: "markerType",
|
7426
|
+
# max_items: 1,
|
7427
|
+
# })
|
7428
|
+
#
|
7429
|
+
# @example Response structure
|
7430
|
+
#
|
7431
|
+
# resp.tags #=> Array
|
7432
|
+
# resp.tags[0].key #=> String
|
7433
|
+
# resp.tags[0].value #=> String
|
7434
|
+
# resp.is_truncated #=> Boolean
|
7435
|
+
# resp.marker #=> String
|
7436
|
+
#
|
7437
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOpenIDConnectProviderTags AWS API Documentation
|
7438
|
+
#
|
7439
|
+
# @overload list_open_id_connect_provider_tags(params = {})
|
7440
|
+
# @param [Hash] params ({})
|
7441
|
+
def list_open_id_connect_provider_tags(params = {}, options = {})
|
7442
|
+
req = build_request(:list_open_id_connect_provider_tags, params)
|
7443
|
+
req.send_request(options)
|
7444
|
+
end
|
7445
|
+
|
7446
|
+
# Lists information about the IAM OpenID Connect (OIDC) provider
|
7447
|
+
# resource objects defined in the AWS account.
|
7448
|
+
#
|
7449
|
+
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
7450
|
+
# attributes for the resource. For example, this operation does not
|
7451
|
+
# return tags, even though they are an attribute of the returned object.
|
7452
|
+
# To view all of the information for an OIDC provider, see
|
7453
|
+
# GetOpenIDConnectProvider.
|
7454
|
+
#
|
7455
|
+
# </note>
|
7456
|
+
#
|
7457
|
+
# @return [Types::ListOpenIDConnectProvidersResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
7458
|
+
#
|
7459
|
+
# * {Types::ListOpenIDConnectProvidersResponse#open_id_connect_provider_list #open_id_connect_provider_list} => Array<Types::OpenIDConnectProviderListEntry>
|
7460
|
+
#
|
7461
|
+
# @example Response structure
|
7462
|
+
#
|
7463
|
+
# resp.open_id_connect_provider_list #=> Array
|
7464
|
+
# resp.open_id_connect_provider_list[0].arn #=> String
|
7465
|
+
#
|
7466
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOpenIDConnectProviders AWS API Documentation
|
7467
|
+
#
|
7468
|
+
# @overload list_open_id_connect_providers(params = {})
|
7068
7469
|
# @param [Hash] params ({})
|
7069
7470
|
def list_open_id_connect_providers(params = {}, options = {})
|
7070
7471
|
req = build_request(:list_open_id_connect_providers, params)
|
@@ -7084,8 +7485,16 @@ module Aws::IAM
|
|
7084
7485
|
# You can paginate the results using the `MaxItems` and `Marker`
|
7085
7486
|
# parameters.
|
7086
7487
|
#
|
7087
|
-
# For more information about managed policies, see [Managed
|
7088
|
-
#
|
7488
|
+
# For more information about managed policies, see [Managed policies and
|
7489
|
+
# inline policies][1] in the *IAM User Guide*.
|
7490
|
+
#
|
7491
|
+
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
7492
|
+
# attributes for the resource. For example, this operation does not
|
7493
|
+
# return tags, even though they are an attribute of the returned object.
|
7494
|
+
# To view all of the information for a customer manged policy, see
|
7495
|
+
# GetPolicy.
|
7496
|
+
#
|
7497
|
+
# </note>
|
7089
7498
|
#
|
7090
7499
|
#
|
7091
7500
|
#
|
@@ -7184,6 +7593,9 @@ module Aws::IAM
|
|
7184
7593
|
# resp.policies[0].description #=> String
|
7185
7594
|
# resp.policies[0].create_date #=> Time
|
7186
7595
|
# resp.policies[0].update_date #=> Time
|
7596
|
+
# resp.policies[0].tags #=> Array
|
7597
|
+
# resp.policies[0].tags[0].key #=> String
|
7598
|
+
# resp.policies[0].tags[0].value #=> String
|
7187
7599
|
# resp.is_truncated #=> Boolean
|
7188
7600
|
# resp.marker #=> String
|
7189
7601
|
#
|
@@ -7204,7 +7616,7 @@ module Aws::IAM
|
|
7204
7616
|
# include resource-based policies, access control lists, AWS
|
7205
7617
|
# Organizations policies, IAM permissions boundaries, and AWS STS assume
|
7206
7618
|
# role policies. It only applies permissions policy logic. For more
|
7207
|
-
# about the evaluation of policy types, see [Evaluating
|
7619
|
+
# about the evaluation of policy types, see [Evaluating policies][1] in
|
7208
7620
|
# the *IAM User Guide*.
|
7209
7621
|
#
|
7210
7622
|
# </note>
|
@@ -7227,8 +7639,8 @@ module Aws::IAM
|
|
7227
7639
|
# For each managed policy, this operation returns the ARN and policy
|
7228
7640
|
# name. For each inline policy, it returns the policy name and the
|
7229
7641
|
# entity to which it is attached. Inline policies do not have an ARN.
|
7230
|
-
# For more information about these policy types, see [Managed
|
7231
|
-
# and
|
7642
|
+
# For more information about these policy types, see [Managed policies
|
7643
|
+
# and inline policies][2] in the *IAM User Guide*.
|
7232
7644
|
#
|
7233
7645
|
# Policies that are attached to users and roles as permissions
|
7234
7646
|
# boundaries are not returned. To view which managed policy is currently
|
@@ -7254,17 +7666,16 @@ module Aws::IAM
|
|
7254
7666
|
# The service namespace for the AWS services whose policies you want to
|
7255
7667
|
# list.
|
7256
7668
|
#
|
7257
|
-
# To learn the service namespace for a service,
|
7258
|
-
#
|
7259
|
-
#
|
7260
|
-
#
|
7261
|
-
#
|
7262
|
-
# namespaces
|
7263
|
-
# Reference*.
|
7669
|
+
# To learn the service namespace for a service, see [Actions, resources,
|
7670
|
+
# and condition keys for AWS services][1] in the *IAM User Guide*.
|
7671
|
+
# Choose the name of the service to view details for that service. In
|
7672
|
+
# the first paragraph, find the service prefix. For example, `(service
|
7673
|
+
# prefix: a4b)`. For more information about service namespaces, see [AWS
|
7674
|
+
# service namespaces][2] in the *AWS General Reference*.
|
7264
7675
|
#
|
7265
7676
|
#
|
7266
7677
|
#
|
7267
|
-
# [1]: https://docs.aws.amazon.com/
|
7678
|
+
# [1]: https://docs.aws.amazon.com/service-authorization/latest/reference/reference_policies_actions-resources-contextkeys.html
|
7268
7679
|
# [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html#genref-aws-service-namespaces
|
7269
7680
|
#
|
7270
7681
|
# @return [Types::ListPoliciesGrantingServiceAccessResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -7349,12 +7760,82 @@ module Aws::IAM
|
|
7349
7760
|
req.send_request(options)
|
7350
7761
|
end
|
7351
7762
|
|
7763
|
+
# Lists the tags that are attached to the specified IAM customer managed
|
7764
|
+
# policy. The returned list of tags is sorted by tag key. For more
|
7765
|
+
# information about tagging, see [Tagging IAM resources][1] in the *IAM
|
7766
|
+
# User Guide*.
|
7767
|
+
#
|
7768
|
+
#
|
7769
|
+
#
|
7770
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
7771
|
+
#
|
7772
|
+
# @option params [required, String] :policy_arn
|
7773
|
+
# The ARN of the IAM customer managed policy whose tags you want to see.
|
7774
|
+
#
|
7775
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
7776
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
7777
|
+
# with no spaces. You can also include any of the following characters:
|
7778
|
+
# =,.@-
|
7779
|
+
#
|
7780
|
+
#
|
7781
|
+
#
|
7782
|
+
# [1]: http://wikipedia.org/wiki/regex
|
7783
|
+
#
|
7784
|
+
# @option params [String] :marker
|
7785
|
+
# Use this parameter only when paginating results and only after you
|
7786
|
+
# receive a response indicating that the results are truncated. Set it
|
7787
|
+
# to the value of the `Marker` element in the response that you received
|
7788
|
+
# to indicate where the next call should start.
|
7789
|
+
#
|
7790
|
+
# @option params [Integer] :max_items
|
7791
|
+
# (Optional) Use this only when paginating results to indicate the
|
7792
|
+
# maximum number of items that you want in the response. If additional
|
7793
|
+
# items exist beyond the maximum that you specify, the `IsTruncated`
|
7794
|
+
# response element is `true`.
|
7795
|
+
#
|
7796
|
+
# If you do not include this parameter, it defaults to 100. Note that
|
7797
|
+
# IAM might return fewer results, even when more results are available.
|
7798
|
+
# In that case, the `IsTruncated` response element returns `true`, and
|
7799
|
+
# `Marker` contains a value to include in the subsequent call that tells
|
7800
|
+
# the service where to continue from.
|
7801
|
+
#
|
7802
|
+
# @return [Types::ListPolicyTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
7803
|
+
#
|
7804
|
+
# * {Types::ListPolicyTagsResponse#tags #tags} => Array<Types::Tag>
|
7805
|
+
# * {Types::ListPolicyTagsResponse#is_truncated #is_truncated} => Boolean
|
7806
|
+
# * {Types::ListPolicyTagsResponse#marker #marker} => String
|
7807
|
+
#
|
7808
|
+
# @example Request syntax with placeholder values
|
7809
|
+
#
|
7810
|
+
# resp = client.list_policy_tags({
|
7811
|
+
# policy_arn: "arnType", # required
|
7812
|
+
# marker: "markerType",
|
7813
|
+
# max_items: 1,
|
7814
|
+
# })
|
7815
|
+
#
|
7816
|
+
# @example Response structure
|
7817
|
+
#
|
7818
|
+
# resp.tags #=> Array
|
7819
|
+
# resp.tags[0].key #=> String
|
7820
|
+
# resp.tags[0].value #=> String
|
7821
|
+
# resp.is_truncated #=> Boolean
|
7822
|
+
# resp.marker #=> String
|
7823
|
+
#
|
7824
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListPolicyTags AWS API Documentation
|
7825
|
+
#
|
7826
|
+
# @overload list_policy_tags(params = {})
|
7827
|
+
# @param [Hash] params ({})
|
7828
|
+
def list_policy_tags(params = {}, options = {})
|
7829
|
+
req = build_request(:list_policy_tags, params)
|
7830
|
+
req.send_request(options)
|
7831
|
+
end
|
7832
|
+
|
7352
7833
|
# Lists information about the versions of the specified managed policy,
|
7353
7834
|
# including the version that is currently set as the policy's default
|
7354
7835
|
# version.
|
7355
7836
|
#
|
7356
|
-
# For more information about managed policies, see [Managed
|
7357
|
-
#
|
7837
|
+
# For more information about managed policies, see [Managed policies and
|
7838
|
+
# inline policies][1] in the *IAM User Guide*.
|
7358
7839
|
#
|
7359
7840
|
#
|
7360
7841
|
#
|
@@ -7364,8 +7845,8 @@ module Aws::IAM
|
|
7364
7845
|
# The Amazon Resource Name (ARN) of the IAM policy for which you want
|
7365
7846
|
# the versions.
|
7366
7847
|
#
|
7367
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
7368
|
-
#
|
7848
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
7849
|
+
# in the *AWS General Reference*.
|
7369
7850
|
#
|
7370
7851
|
#
|
7371
7852
|
#
|
@@ -7429,7 +7910,7 @@ module Aws::IAM
|
|
7429
7910
|
# An IAM role can also have managed policies attached to it. To list the
|
7430
7911
|
# managed policies that are attached to a role, use
|
7431
7912
|
# ListAttachedRolePolicies. For more information about policies, see
|
7432
|
-
# [Managed
|
7913
|
+
# [Managed policies and inline policies][1] in the *IAM User Guide*.
|
7433
7914
|
#
|
7434
7915
|
# You can paginate the results using the `MaxItems` and `Marker`
|
7435
7916
|
# parameters. If there are no inline policies embedded with the
|
@@ -7502,7 +7983,7 @@ module Aws::IAM
|
|
7502
7983
|
|
7503
7984
|
# Lists the tags that are attached to the specified role. The returned
|
7504
7985
|
# list of tags is sorted by tag key. For more information about tagging,
|
7505
|
-
# see [Tagging IAM
|
7986
|
+
# see [Tagging IAM resources][1] in the *IAM User Guide*.
|
7506
7987
|
#
|
7507
7988
|
#
|
7508
7989
|
#
|
@@ -7595,7 +8076,14 @@ module Aws::IAM
|
|
7595
8076
|
|
7596
8077
|
# Lists the IAM roles that have the specified path prefix. If there are
|
7597
8078
|
# none, the operation returns an empty list. For more information about
|
7598
|
-
# roles,
|
8079
|
+
# roles, see [Working with roles][1].
|
8080
|
+
#
|
8081
|
+
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
8082
|
+
# attributes for the resource. For example, this operation does not
|
8083
|
+
# return tags, even though they are an attribute of the returned object.
|
8084
|
+
# To view all of the information for a role, see GetRole.
|
8085
|
+
#
|
8086
|
+
# </note>
|
7599
8087
|
#
|
7600
8088
|
# You can paginate the results using the `MaxItems` and `Marker`
|
7601
8089
|
# parameters.
|
@@ -7684,12 +8172,89 @@ module Aws::IAM
|
|
7684
8172
|
req.send_request(options)
|
7685
8173
|
end
|
7686
8174
|
|
7687
|
-
# Lists the
|
7688
|
-
#
|
8175
|
+
# Lists the tags that are attached to the specified Security Assertion
|
8176
|
+
# Markup Language (SAML) identity provider. The returned list of tags is
|
8177
|
+
# sorted by tag key. For more information, see [About SAML 2.0-based
|
8178
|
+
# federation][1].
|
7689
8179
|
#
|
7690
|
-
#
|
8180
|
+
# For more information about tagging, see [Tagging IAM resources][2] in
|
8181
|
+
# the *IAM User Guide*.
|
7691
8182
|
#
|
7692
|
-
#
|
8183
|
+
#
|
8184
|
+
#
|
8185
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
|
8186
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
8187
|
+
#
|
8188
|
+
# @option params [required, String] :saml_provider_arn
|
8189
|
+
# The ARN of the Security Assertion Markup Language (SAML) identity
|
8190
|
+
# provider whose tags you want to see.
|
8191
|
+
#
|
8192
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
8193
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
8194
|
+
# with no spaces. You can also include any of the following characters:
|
8195
|
+
# =,.@-
|
8196
|
+
#
|
8197
|
+
#
|
8198
|
+
#
|
8199
|
+
# [1]: http://wikipedia.org/wiki/regex
|
8200
|
+
#
|
8201
|
+
# @option params [String] :marker
|
8202
|
+
# Use this parameter only when paginating results and only after you
|
8203
|
+
# receive a response indicating that the results are truncated. Set it
|
8204
|
+
# to the value of the `Marker` element in the response that you received
|
8205
|
+
# to indicate where the next call should start.
|
8206
|
+
#
|
8207
|
+
# @option params [Integer] :max_items
|
8208
|
+
# (Optional) Use this only when paginating results to indicate the
|
8209
|
+
# maximum number of items that you want in the response. If additional
|
8210
|
+
# items exist beyond the maximum that you specify, the `IsTruncated`
|
8211
|
+
# response element is `true`.
|
8212
|
+
#
|
8213
|
+
# If you do not include this parameter, it defaults to 100. Note that
|
8214
|
+
# IAM might return fewer results, even when more results are available.
|
8215
|
+
# In that case, the `IsTruncated` response element returns `true`, and
|
8216
|
+
# `Marker` contains a value to include in the subsequent call that tells
|
8217
|
+
# the service where to continue from.
|
8218
|
+
#
|
8219
|
+
# @return [Types::ListSAMLProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
8220
|
+
#
|
8221
|
+
# * {Types::ListSAMLProviderTagsResponse#tags #tags} => Array<Types::Tag>
|
8222
|
+
# * {Types::ListSAMLProviderTagsResponse#is_truncated #is_truncated} => Boolean
|
8223
|
+
# * {Types::ListSAMLProviderTagsResponse#marker #marker} => String
|
8224
|
+
#
|
8225
|
+
# @example Request syntax with placeholder values
|
8226
|
+
#
|
8227
|
+
# resp = client.list_saml_provider_tags({
|
8228
|
+
# saml_provider_arn: "arnType", # required
|
8229
|
+
# marker: "markerType",
|
8230
|
+
# max_items: 1,
|
8231
|
+
# })
|
8232
|
+
#
|
8233
|
+
# @example Response structure
|
8234
|
+
#
|
8235
|
+
# resp.tags #=> Array
|
8236
|
+
# resp.tags[0].key #=> String
|
8237
|
+
# resp.tags[0].value #=> String
|
8238
|
+
# resp.is_truncated #=> Boolean
|
8239
|
+
# resp.marker #=> String
|
8240
|
+
#
|
8241
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListSAMLProviderTags AWS API Documentation
|
8242
|
+
#
|
8243
|
+
# @overload list_saml_provider_tags(params = {})
|
8244
|
+
# @param [Hash] params ({})
|
8245
|
+
def list_saml_provider_tags(params = {}, options = {})
|
8246
|
+
req = build_request(:list_saml_provider_tags, params)
|
8247
|
+
req.send_request(options)
|
8248
|
+
end
|
8249
|
+
|
8250
|
+
# Lists the SAML provider resource objects defined in IAM in the
|
8251
|
+
# account. IAM resource-listing operations return a subset of the
|
8252
|
+
# available attributes for the resource. For example, this operation
|
8253
|
+
# does not return tags, even though they are an attribute of the
|
8254
|
+
# returned object. To view all of the information for a SAML provider,
|
8255
|
+
# see GetSAMLProvider.
|
8256
|
+
#
|
8257
|
+
# This operation requires [Signature Version 4][1].
|
7693
8258
|
#
|
7694
8259
|
#
|
7695
8260
|
#
|
@@ -7722,7 +8287,7 @@ module Aws::IAM
|
|
7722
8287
|
# The SSH public keys returned by this operation are used only for
|
7723
8288
|
# authenticating the IAM user to an AWS CodeCommit repository. For more
|
7724
8289
|
# information about using SSH keys to authenticate to an AWS CodeCommit
|
7725
|
-
# repository, see [Set up AWS CodeCommit for SSH
|
8290
|
+
# repository, see [Set up AWS CodeCommit for SSH connections][1] in the
|
7726
8291
|
# *AWS CodeCommit User Guide*.
|
7727
8292
|
#
|
7728
8293
|
# Although each user is limited to a small number of keys, you can still
|
@@ -7798,6 +8363,85 @@ module Aws::IAM
|
|
7798
8363
|
req.send_request(options)
|
7799
8364
|
end
|
7800
8365
|
|
8366
|
+
# Lists the tags that are attached to the specified IAM server
|
8367
|
+
# certificate. The returned list of tags is sorted by tag key. For more
|
8368
|
+
# information about tagging, see [Tagging IAM resources][1] in the *IAM
|
8369
|
+
# User Guide*.
|
8370
|
+
#
|
8371
|
+
# <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
|
8372
|
+
# (ACM), we recommend that you don't use IAM server certificates.
|
8373
|
+
# Instead, use ACM to provision, manage, and deploy your server
|
8374
|
+
# certificates. For more information about IAM server certificates,
|
8375
|
+
# [Working with server certificates][2] in the *IAM User Guide*.
|
8376
|
+
#
|
8377
|
+
# </note>
|
8378
|
+
#
|
8379
|
+
#
|
8380
|
+
#
|
8381
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
8382
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
|
8383
|
+
#
|
8384
|
+
# @option params [required, String] :server_certificate_name
|
8385
|
+
# The name of the IAM server certificate whose tags you want to see.
|
8386
|
+
#
|
8387
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
8388
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
8389
|
+
# with no spaces. You can also include any of the following characters:
|
8390
|
+
# =,.@-
|
8391
|
+
#
|
8392
|
+
#
|
8393
|
+
#
|
8394
|
+
# [1]: http://wikipedia.org/wiki/regex
|
8395
|
+
#
|
8396
|
+
# @option params [String] :marker
|
8397
|
+
# Use this parameter only when paginating results and only after you
|
8398
|
+
# receive a response indicating that the results are truncated. Set it
|
8399
|
+
# to the value of the `Marker` element in the response that you received
|
8400
|
+
# to indicate where the next call should start.
|
8401
|
+
#
|
8402
|
+
# @option params [Integer] :max_items
|
8403
|
+
# (Optional) Use this only when paginating results to indicate the
|
8404
|
+
# maximum number of items that you want in the response. If additional
|
8405
|
+
# items exist beyond the maximum that you specify, the `IsTruncated`
|
8406
|
+
# response element is `true`.
|
8407
|
+
#
|
8408
|
+
# If you do not include this parameter, it defaults to 100. Note that
|
8409
|
+
# IAM might return fewer results, even when more results are available.
|
8410
|
+
# In that case, the `IsTruncated` response element returns `true`, and
|
8411
|
+
# `Marker` contains a value to include in the subsequent call that tells
|
8412
|
+
# the service where to continue from.
|
8413
|
+
#
|
8414
|
+
# @return [Types::ListServerCertificateTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
8415
|
+
#
|
8416
|
+
# * {Types::ListServerCertificateTagsResponse#tags #tags} => Array<Types::Tag>
|
8417
|
+
# * {Types::ListServerCertificateTagsResponse#is_truncated #is_truncated} => Boolean
|
8418
|
+
# * {Types::ListServerCertificateTagsResponse#marker #marker} => String
|
8419
|
+
#
|
8420
|
+
# @example Request syntax with placeholder values
|
8421
|
+
#
|
8422
|
+
# resp = client.list_server_certificate_tags({
|
8423
|
+
# server_certificate_name: "serverCertificateNameType", # required
|
8424
|
+
# marker: "markerType",
|
8425
|
+
# max_items: 1,
|
8426
|
+
# })
|
8427
|
+
#
|
8428
|
+
# @example Response structure
|
8429
|
+
#
|
8430
|
+
# resp.tags #=> Array
|
8431
|
+
# resp.tags[0].key #=> String
|
8432
|
+
# resp.tags[0].value #=> String
|
8433
|
+
# resp.is_truncated #=> Boolean
|
8434
|
+
# resp.marker #=> String
|
8435
|
+
#
|
8436
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListServerCertificateTags AWS API Documentation
|
8437
|
+
#
|
8438
|
+
# @overload list_server_certificate_tags(params = {})
|
8439
|
+
# @param [Hash] params ({})
|
8440
|
+
def list_server_certificate_tags(params = {}, options = {})
|
8441
|
+
req = build_request(:list_server_certificate_tags, params)
|
8442
|
+
req.send_request(options)
|
8443
|
+
end
|
8444
|
+
|
7801
8445
|
# Lists the server certificates stored in IAM that have the specified
|
7802
8446
|
# path prefix. If none exist, the operation returns an empty list.
|
7803
8447
|
#
|
@@ -7805,10 +8449,18 @@ module Aws::IAM
|
|
7805
8449
|
# parameters.
|
7806
8450
|
#
|
7807
8451
|
# For more information about working with server certificates, see
|
7808
|
-
# [Working with
|
8452
|
+
# [Working with server certificates][1] in the *IAM User Guide*. This
|
7809
8453
|
# topic also includes a list of AWS services that can use the server
|
7810
8454
|
# certificates that you manage with IAM.
|
7811
8455
|
#
|
8456
|
+
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
8457
|
+
# attributes for the resource. For example, this operation does not
|
8458
|
+
# return tags, even though they are an attribute of the returned object.
|
8459
|
+
# To view all of the information for a servercertificate, see
|
8460
|
+
# GetServerCertificate.
|
8461
|
+
#
|
8462
|
+
# </note>
|
8463
|
+
#
|
7812
8464
|
#
|
7813
8465
|
#
|
7814
8466
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
|
@@ -7890,7 +8542,7 @@ module Aws::IAM
|
|
7890
8542
|
# empty list. The service-specific credentials returned by this
|
7891
8543
|
# operation are used only for authenticating the IAM user to a specific
|
7892
8544
|
# service. For more information about using service-specific credentials
|
7893
|
-
# to authenticate to an AWS service, see [Set
|
8545
|
+
# to authenticate to an AWS service, see [Set up service-specific
|
7894
8546
|
# credentials][1] in the AWS CodeCommit User Guide.
|
7895
8547
|
#
|
7896
8548
|
#
|
@@ -7956,9 +8608,10 @@ module Aws::IAM
|
|
7956
8608
|
#
|
7957
8609
|
# If the `UserName` field is not specified, the user name is determined
|
7958
8610
|
# implicitly based on the AWS access key ID used to sign the request for
|
7959
|
-
# this
|
7960
|
-
# Consequently, you can use this operation to manage AWS
|
7961
|
-
# user credentials even if the AWS account has no
|
8611
|
+
# this operation. This operation works for access keys under the AWS
|
8612
|
+
# account. Consequently, you can use this operation to manage AWS
|
8613
|
+
# account root user credentials even if the AWS account has no
|
8614
|
+
# associated users.
|
7962
8615
|
#
|
7963
8616
|
# @option params [String] :user_name
|
7964
8617
|
# The name of the IAM user whose signing certificates you want to
|
@@ -8054,7 +8707,7 @@ module Aws::IAM
|
|
8054
8707
|
# An IAM user can also have managed policies attached to it. To list the
|
8055
8708
|
# managed policies that are attached to a user, use
|
8056
8709
|
# ListAttachedUserPolicies. For more information about policies, see
|
8057
|
-
# [Managed
|
8710
|
+
# [Managed policies and inline policies][1] in the *IAM User Guide*.
|
8058
8711
|
#
|
8059
8712
|
# You can paginate the results using the `MaxItems` and `Marker`
|
8060
8713
|
# parameters. If there are no inline policies embedded with the
|
@@ -8125,9 +8778,9 @@ module Aws::IAM
|
|
8125
8778
|
req.send_request(options)
|
8126
8779
|
end
|
8127
8780
|
|
8128
|
-
# Lists the tags that are attached to the specified user. The
|
8129
|
-
# list of tags is sorted by tag key. For more information about
|
8130
|
-
# see [Tagging IAM
|
8781
|
+
# Lists the tags that are attached to the specified IAM user. The
|
8782
|
+
# returned list of tags is sorted by tag key. For more information about
|
8783
|
+
# tagging, see [Tagging IAM resources][1] in the *IAM User Guide*.
|
8131
8784
|
#
|
8132
8785
|
#
|
8133
8786
|
#
|
@@ -8222,6 +8875,13 @@ module Aws::IAM
|
|
8222
8875
|
# prefix is specified, the operation returns all users in the AWS
|
8223
8876
|
# account. If there are none, the operation returns an empty list.
|
8224
8877
|
#
|
8878
|
+
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
8879
|
+
# attributes for the resource. For example, this operation does not
|
8880
|
+
# return tags, even though they are an attribute of the returned object.
|
8881
|
+
# To view all of the information for a user, see GetUser.
|
8882
|
+
#
|
8883
|
+
# </note>
|
8884
|
+
#
|
8225
8885
|
# You can paginate the results using the `MaxItems` and `Marker`
|
8226
8886
|
# parameters.
|
8227
8887
|
#
|
@@ -8336,6 +8996,14 @@ module Aws::IAM
|
|
8336
8996
|
# returns a list of all virtual MFA devices. Assignment status can be
|
8337
8997
|
# `Assigned`, `Unassigned`, or `Any`.
|
8338
8998
|
#
|
8999
|
+
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
9000
|
+
# attributes for the resource. For example, this operation does not
|
9001
|
+
# return tags, even though they are an attribute of the returned object.
|
9002
|
+
# To view all of the information for a virtual MFA device, see
|
9003
|
+
# ListVirtualMFADevices.
|
9004
|
+
#
|
9005
|
+
# </note>
|
9006
|
+
#
|
8339
9007
|
# You can paginate the results using the `MaxItems` and `Marker`
|
8340
9008
|
# parameters.
|
8341
9009
|
#
|
@@ -8415,6 +9083,9 @@ module Aws::IAM
|
|
8415
9083
|
# resp.virtual_mfa_devices[0].user.tags[0].key #=> String
|
8416
9084
|
# resp.virtual_mfa_devices[0].user.tags[0].value #=> String
|
8417
9085
|
# resp.virtual_mfa_devices[0].enable_date #=> Time
|
9086
|
+
# resp.virtual_mfa_devices[0].tags #=> Array
|
9087
|
+
# resp.virtual_mfa_devices[0].tags[0].key #=> String
|
9088
|
+
# resp.virtual_mfa_devices[0].tags[0].value #=> String
|
8418
9089
|
# resp.is_truncated #=> Boolean
|
8419
9090
|
# resp.marker #=> String
|
8420
9091
|
#
|
@@ -8433,15 +9104,15 @@ module Aws::IAM
|
|
8433
9104
|
# A user can also have managed policies attached to it. To attach a
|
8434
9105
|
# managed policy to a group, use AttachGroupPolicy. To create a new
|
8435
9106
|
# managed policy, use CreatePolicy. For information about policies, see
|
8436
|
-
# [Managed
|
9107
|
+
# [Managed policies and inline policies][1] in the *IAM User Guide*.
|
8437
9108
|
#
|
8438
|
-
# For information about
|
8439
|
-
# can embed in a group, see [
|
8440
|
-
#
|
9109
|
+
# For information about the maximum number of inline policies that you
|
9110
|
+
# can embed in a group, see [IAM and STS quotas][2] in the *IAM User
|
9111
|
+
# Guide*.
|
8441
9112
|
#
|
8442
9113
|
# <note markdown="1"> Because policy documents can be large, you should use POST rather than
|
8443
9114
|
# GET when calling `PutGroupPolicy`. For general information about using
|
8444
|
-
# the Query API with IAM,
|
9115
|
+
# the Query API with IAM, see [Making query requests][3] in the *IAM
|
8445
9116
|
# User Guide*.
|
8446
9117
|
#
|
8447
9118
|
# </note>
|
@@ -8449,7 +9120,7 @@ module Aws::IAM
|
|
8449
9120
|
#
|
8450
9121
|
#
|
8451
9122
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html
|
8452
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
9123
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html
|
8453
9124
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html
|
8454
9125
|
#
|
8455
9126
|
# @option params [required, String] :group_name
|
@@ -8542,7 +9213,7 @@ module Aws::IAM
|
|
8542
9213
|
# Policies used as permissions boundaries do not provide permissions.
|
8543
9214
|
# You must also attach a permissions policy to the role. To learn how
|
8544
9215
|
# the effective permissions for a role are evaluated, see [IAM JSON
|
8545
|
-
#
|
9216
|
+
# policy evaluation logic][1] in the IAM User Guide.
|
8546
9217
|
#
|
8547
9218
|
#
|
8548
9219
|
#
|
@@ -8581,21 +9252,21 @@ module Aws::IAM
|
|
8581
9252
|
# as part of the role's access (permissions) policy. The role's trust
|
8582
9253
|
# policy is created at the same time as the role, using CreateRole. You
|
8583
9254
|
# can update a role's trust policy using UpdateAssumeRolePolicy. For
|
8584
|
-
# more information about IAM roles,
|
8585
|
-
#
|
9255
|
+
# more information about IAM roles, see [Using roles to delegate
|
9256
|
+
# permissions and federate identities][1].
|
8586
9257
|
#
|
8587
9258
|
# A role can also have a managed policy attached to it. To attach a
|
8588
9259
|
# managed policy to a role, use AttachRolePolicy. To create a new
|
8589
9260
|
# managed policy, use CreatePolicy. For information about policies, see
|
8590
|
-
# [Managed
|
9261
|
+
# [Managed policies and inline policies][2] in the *IAM User Guide*.
|
8591
9262
|
#
|
8592
|
-
# For information about
|
8593
|
-
# can embed with a role, see [
|
8594
|
-
#
|
9263
|
+
# For information about the maximum number of inline policies that you
|
9264
|
+
# can embed with a role, see [IAM and STS quotas][3] in the *IAM User
|
9265
|
+
# Guide*.
|
8595
9266
|
#
|
8596
9267
|
# <note markdown="1"> Because policy documents can be large, you should use POST rather than
|
8597
9268
|
# GET when calling `PutRolePolicy`. For general information about using
|
8598
|
-
# the Query API with IAM,
|
9269
|
+
# the Query API with IAM, see [Making query requests][4] in the *IAM
|
8599
9270
|
# User Guide*.
|
8600
9271
|
#
|
8601
9272
|
# </note>
|
@@ -8604,7 +9275,7 @@ module Aws::IAM
|
|
8604
9275
|
#
|
8605
9276
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html
|
8606
9277
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html
|
8607
|
-
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
9278
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html
|
8608
9279
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html
|
8609
9280
|
#
|
8610
9281
|
# @option params [required, String] :role_name
|
@@ -8695,7 +9366,7 @@ module Aws::IAM
|
|
8695
9366
|
# Policies that are used as permissions boundaries do not provide
|
8696
9367
|
# permissions. You must also attach a permissions policy to the user. To
|
8697
9368
|
# learn how the effective permissions for a user are evaluated, see [IAM
|
8698
|
-
# JSON
|
9369
|
+
# JSON policy evaluation logic][1] in the IAM User Guide.
|
8699
9370
|
#
|
8700
9371
|
#
|
8701
9372
|
#
|
@@ -8733,15 +9404,15 @@ module Aws::IAM
|
|
8733
9404
|
# An IAM user can also have a managed policy attached to it. To attach a
|
8734
9405
|
# managed policy to a user, use AttachUserPolicy. To create a new
|
8735
9406
|
# managed policy, use CreatePolicy. For information about policies, see
|
8736
|
-
# [Managed
|
9407
|
+
# [Managed policies and inline policies][1] in the *IAM User Guide*.
|
8737
9408
|
#
|
8738
|
-
# For information about
|
8739
|
-
# can embed in a user, see [
|
8740
|
-
#
|
9409
|
+
# For information about the maximum number of inline policies that you
|
9410
|
+
# can embed in a user, see [IAM and STS quotas][2] in the *IAM User
|
9411
|
+
# Guide*.
|
8741
9412
|
#
|
8742
9413
|
# <note markdown="1"> Because policy documents can be large, you should use POST rather than
|
8743
9414
|
# GET when calling `PutUserPolicy`. For general information about using
|
8744
|
-
# the Query API with IAM,
|
9415
|
+
# the Query API with IAM, see [Making query requests][3] in the *IAM
|
8745
9416
|
# User Guide*.
|
8746
9417
|
#
|
8747
9418
|
# </note>
|
@@ -8749,7 +9420,7 @@ module Aws::IAM
|
|
8749
9420
|
#
|
8750
9421
|
#
|
8751
9422
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html
|
8752
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
9423
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html
|
8753
9424
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html
|
8754
9425
|
#
|
8755
9426
|
# @option params [required, String] :user_name
|
@@ -8842,8 +9513,8 @@ module Aws::IAM
|
|
8842
9513
|
# remove the client ID from. You can get a list of OIDC provider ARNs by
|
8843
9514
|
# using the ListOpenIDConnectProviders operation.
|
8844
9515
|
#
|
8845
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
8846
|
-
#
|
9516
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
9517
|
+
# in the *AWS General Reference*.
|
8847
9518
|
#
|
8848
9519
|
#
|
8849
9520
|
#
|
@@ -8880,9 +9551,9 @@ module Aws::IAM
|
|
8880
9551
|
# role from an instance profile that is associated with a running
|
8881
9552
|
# instance might break any applications running on the instance.
|
8882
9553
|
#
|
8883
|
-
# For more information about IAM roles,
|
8884
|
-
#
|
8885
|
-
#
|
9554
|
+
# For more information about IAM roles, see [Working with roles][1]. For
|
9555
|
+
# more information about instance profiles, see [About instance
|
9556
|
+
# profiles][2].
|
8886
9557
|
#
|
8887
9558
|
#
|
8888
9559
|
#
|
@@ -9059,8 +9730,7 @@ module Aws::IAM
|
|
9059
9730
|
# the AWS servers.
|
9060
9731
|
#
|
9061
9732
|
# For more information about creating and working with virtual MFA
|
9062
|
-
# devices,
|
9063
|
-
# Guide*.
|
9733
|
+
# devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
|
9064
9734
|
#
|
9065
9735
|
#
|
9066
9736
|
#
|
@@ -9125,10 +9795,10 @@ module Aws::IAM
|
|
9125
9795
|
#
|
9126
9796
|
# This operation affects all users, groups, and roles that the policy is
|
9127
9797
|
# attached to. To list the users, groups, and roles that the policy is
|
9128
|
-
# attached to, use
|
9798
|
+
# attached to, use ListEntitiesForPolicy.
|
9129
9799
|
#
|
9130
|
-
# For information about managed policies, see [Managed
|
9131
|
-
#
|
9800
|
+
# For information about managed policies, see [Managed policies and
|
9801
|
+
# inline policies][1] in the *IAM User Guide*.
|
9132
9802
|
#
|
9133
9803
|
#
|
9134
9804
|
#
|
@@ -9138,8 +9808,8 @@ module Aws::IAM
|
|
9138
9808
|
# The Amazon Resource Name (ARN) of the IAM policy whose default version
|
9139
9809
|
# you want to set.
|
9140
9810
|
#
|
9141
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
9142
|
-
#
|
9811
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
9812
|
+
# in the *AWS General Reference*.
|
9143
9813
|
#
|
9144
9814
|
#
|
9145
9815
|
#
|
@@ -9149,7 +9819,7 @@ module Aws::IAM
|
|
9149
9819
|
# The version of the policy to set as the default (operative) version.
|
9150
9820
|
#
|
9151
9821
|
# For more information about managed policy versions, see [Versioning
|
9152
|
-
# for
|
9822
|
+
# for managed policies][1] in the *IAM User Guide*.
|
9153
9823
|
#
|
9154
9824
|
#
|
9155
9825
|
#
|
@@ -9181,7 +9851,8 @@ module Aws::IAM
|
|
9181
9851
|
# `https://sts.amazonaws.com`. AWS recommends using Regional STS
|
9182
9852
|
# endpoints to reduce latency, build in redundancy, and increase session
|
9183
9853
|
# token availability. For information about Regional endpoints for STS,
|
9184
|
-
# see [AWS
|
9854
|
+
# see [AWS AWS Security Token Service endpoints and quotas][1] in the
|
9855
|
+
# *AWS General Reference*.
|
9185
9856
|
#
|
9186
9857
|
# If you make an STS call to the global endpoint, the resulting session
|
9187
9858
|
# tokens might be valid in some Regions but not others. It depends on
|
@@ -9190,8 +9861,8 @@ module Aws::IAM
|
|
9190
9861
|
# work in manually enabled Regions, such as Asia Pacific (Hong Kong).
|
9191
9862
|
# Version 2 tokens are valid in all Regions. However, version 2 tokens
|
9192
9863
|
# are longer and might affect systems where you temporarily store
|
9193
|
-
# tokens. For information, see [Activating and
|
9194
|
-
# AWS
|
9864
|
+
# tokens. For information, see [Activating and deactivating STS in an
|
9865
|
+
# AWS region][2] in the *IAM User Guide*.
|
9195
9866
|
#
|
9196
9867
|
# To view the current session token version, see the
|
9197
9868
|
# `GlobalEndpointTokenVersion` entry in the response of the
|
@@ -9199,7 +9870,7 @@ module Aws::IAM
|
|
9199
9870
|
#
|
9200
9871
|
#
|
9201
9872
|
#
|
9202
|
-
# [1]: https://docs.aws.amazon.com/general/latest/gr/
|
9873
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/sts.html
|
9203
9874
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
|
9204
9875
|
#
|
9205
9876
|
# @option params [required, String] :global_endpoint_token_version
|
@@ -9210,8 +9881,8 @@ module Aws::IAM
|
|
9210
9881
|
# are longer and might affect systems where you temporarily store
|
9211
9882
|
# tokens.
|
9212
9883
|
#
|
9213
|
-
# For information, see [Activating and
|
9214
|
-
#
|
9884
|
+
# For information, see [Activating and deactivating STS in an AWS
|
9885
|
+
# region][1] in the *IAM User Guide*.
|
9215
9886
|
#
|
9216
9887
|
#
|
9217
9888
|
#
|
@@ -9250,7 +9921,8 @@ module Aws::IAM
|
|
9250
9921
|
#
|
9251
9922
|
# The simulation does not perform the API operations; it only checks the
|
9252
9923
|
# authorization to determine if the simulated policies allow or deny the
|
9253
|
-
# operations.
|
9924
|
+
# operations. You can simulate resources that don't exist in your
|
9925
|
+
# account.
|
9254
9926
|
#
|
9255
9927
|
# If you want to simulate existing policies that are attached to an IAM
|
9256
9928
|
# user, group, or role, use SimulatePrincipalPolicy instead.
|
@@ -9264,6 +9936,14 @@ module Aws::IAM
|
|
9264
9936
|
# If the output is long, you can use `MaxItems` and `Marker` parameters
|
9265
9937
|
# to paginate the results.
|
9266
9938
|
#
|
9939
|
+
# For more information about using the policy simulator, see [Testing
|
9940
|
+
# IAM policies with the IAM policy simulator ][1]in the *IAM User
|
9941
|
+
# Guide*.
|
9942
|
+
#
|
9943
|
+
#
|
9944
|
+
#
|
9945
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html
|
9946
|
+
#
|
9267
9947
|
# @option params [required, Array<String>] :policy_input_list
|
9268
9948
|
# A list of policy documents to include in the simulation. Each document
|
9269
9949
|
# is specified as a string containing the complete, valid JSON text of
|
@@ -9298,7 +9978,7 @@ module Aws::IAM
|
|
9298
9978
|
# boundary sets the maximum permissions that an IAM entity can have. You
|
9299
9979
|
# can input only one permissions boundary when you pass a policy to this
|
9300
9980
|
# operation. For more information about permissions boundaries, see
|
9301
|
-
# [Permissions
|
9981
|
+
# [Permissions boundaries for IAM entities][1] in the *IAM User Guide*.
|
9302
9982
|
# The policy input is specified as a string that contains the complete,
|
9303
9983
|
# valid JSON text of a permissions boundary policy.
|
9304
9984
|
#
|
@@ -9331,7 +10011,8 @@ module Aws::IAM
|
|
9331
10011
|
# resources). Each API in the `ActionNames` parameter is evaluated for
|
9332
10012
|
# each resource in this list. The simulation determines the access
|
9333
10013
|
# result (allowed or denied) of each combination and reports it in the
|
9334
|
-
# response.
|
10014
|
+
# response. You can simulate resources that don't exist in your
|
10015
|
+
# account.
|
9335
10016
|
#
|
9336
10017
|
# The simulation does not automatically retrieve policies for the
|
9337
10018
|
# specified resources. If you want to include a resource policy in the
|
@@ -9342,8 +10023,8 @@ module Aws::IAM
|
|
9342
10023
|
# of the resources included in the simulation or you receive an invalid
|
9343
10024
|
# input error.
|
9344
10025
|
#
|
9345
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
9346
|
-
#
|
10026
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10027
|
+
# in the *AWS General Reference*.
|
9347
10028
|
#
|
9348
10029
|
#
|
9349
10030
|
#
|
@@ -9419,7 +10100,7 @@ module Aws::IAM
|
|
9419
10100
|
# includes VPC, then you must supply the network-interface resource. If
|
9420
10101
|
# it includes an IP subnet, then you must specify the subnet resource.
|
9421
10102
|
# For more information on the EC2 scenario options, see [Supported
|
9422
|
-
#
|
10103
|
+
# platforms][1] in the *Amazon EC2 User Guide*.
|
9423
10104
|
#
|
9424
10105
|
# * **EC2-Classic-InstanceStore**
|
9425
10106
|
#
|
@@ -9547,7 +10228,8 @@ module Aws::IAM
|
|
9547
10228
|
# policies' effective permissions. The entity can be an IAM user,
|
9548
10229
|
# group, or role. If you specify a user, then the simulation also
|
9549
10230
|
# includes all of the policies that are attached to groups that the user
|
9550
|
-
# belongs to.
|
10231
|
+
# belongs to. You can simulate resources that don't exist in your
|
10232
|
+
# account.
|
9551
10233
|
#
|
9552
10234
|
# You can optionally include a list of one or more additional policies
|
9553
10235
|
# specified as strings to include in the simulation. If you want to
|
@@ -9561,8 +10243,8 @@ module Aws::IAM
|
|
9561
10243
|
# authorization to determine if the simulated policies allow or deny the
|
9562
10244
|
# operations.
|
9563
10245
|
#
|
9564
|
-
# **Note:** This
|
9565
|
-
# to other users. If you do not want users to see other user's
|
10246
|
+
# **Note:** This operation discloses information about the permissions
|
10247
|
+
# granted to other users. If you do not want users to see other user's
|
9566
10248
|
# permissions, then consider allowing them to use SimulateCustomPolicy
|
9567
10249
|
# instead.
|
9568
10250
|
#
|
@@ -9575,6 +10257,14 @@ module Aws::IAM
|
|
9575
10257
|
# If the output is long, you can use the `MaxItems` and `Marker`
|
9576
10258
|
# parameters to paginate the results.
|
9577
10259
|
#
|
10260
|
+
# For more information about using the policy simulator, see [Testing
|
10261
|
+
# IAM policies with the IAM policy simulator ][1]in the *IAM User
|
10262
|
+
# Guide*.
|
10263
|
+
#
|
10264
|
+
#
|
10265
|
+
#
|
10266
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html
|
10267
|
+
#
|
9578
10268
|
# @option params [required, String] :policy_source_arn
|
9579
10269
|
# The Amazon Resource Name (ARN) of a user, group, or role whose
|
9580
10270
|
# policies you want to include in the simulation. If you specify a user,
|
@@ -9583,8 +10273,8 @@ module Aws::IAM
|
|
9583
10273
|
# also includes all policies that are attached to any groups the user
|
9584
10274
|
# belongs to.
|
9585
10275
|
#
|
9586
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
9587
|
-
#
|
10276
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10277
|
+
# in the *AWS General Reference*.
|
9588
10278
|
#
|
9589
10279
|
#
|
9590
10280
|
#
|
@@ -9620,7 +10310,7 @@ module Aws::IAM
|
|
9620
10310
|
# to an entity and you pass in a different permissions boundary policy
|
9621
10311
|
# using this parameter, then the new permissions boundary policy is used
|
9622
10312
|
# for the simulation. For more information about permissions boundaries,
|
9623
|
-
# see [Permissions
|
10313
|
+
# see [Permissions boundaries for IAM entities][1] in the *IAM User
|
9624
10314
|
# Guide*. The policy input is specified as a string containing the
|
9625
10315
|
# complete, valid JSON text of a permissions boundary policy.
|
9626
10316
|
#
|
@@ -9652,15 +10342,16 @@ module Aws::IAM
|
|
9652
10342
|
# resources). Each API in the `ActionNames` parameter is evaluated for
|
9653
10343
|
# each resource in this list. The simulation determines the access
|
9654
10344
|
# result (allowed or denied) of each combination and reports it in the
|
9655
|
-
# response.
|
10345
|
+
# response. You can simulate resources that don't exist in your
|
10346
|
+
# account.
|
9656
10347
|
#
|
9657
10348
|
# The simulation does not automatically retrieve policies for the
|
9658
10349
|
# specified resources. If you want to include a resource policy in the
|
9659
10350
|
# simulation, then you must include the policy as a string in the
|
9660
10351
|
# `ResourcePolicy` parameter.
|
9661
10352
|
#
|
9662
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
9663
|
-
#
|
10353
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10354
|
+
# in the *AWS General Reference*.
|
9664
10355
|
#
|
9665
10356
|
#
|
9666
10357
|
#
|
@@ -9718,8 +10409,8 @@ module Aws::IAM
|
|
9718
10409
|
# that the resource-based policy's `Principal` element has a value to
|
9719
10410
|
# use in evaluating the policy.
|
9720
10411
|
#
|
9721
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
9722
|
-
#
|
10412
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10413
|
+
# in the *AWS General Reference*.
|
9723
10414
|
#
|
9724
10415
|
#
|
9725
10416
|
#
|
@@ -9746,7 +10437,7 @@ module Aws::IAM
|
|
9746
10437
|
# includes VPC, then you must supply the network interface resource. If
|
9747
10438
|
# it includes an IP subnet, then you must specify the subnet resource.
|
9748
10439
|
# For more information on the EC2 scenario options, see [Supported
|
9749
|
-
#
|
10440
|
+
# platforms][1] in the *Amazon EC2 User Guide*.
|
9750
10441
|
#
|
9751
10442
|
# * **EC2-Classic-InstanceStore**
|
9752
10443
|
#
|
@@ -9870,6 +10561,309 @@ module Aws::IAM
|
|
9870
10561
|
req.send_request(options)
|
9871
10562
|
end
|
9872
10563
|
|
10564
|
+
# Adds one or more tags to an IAM instance profile. If a tag with the
|
10565
|
+
# same key name already exists, then that tag is overwritten with the
|
10566
|
+
# new value.
|
10567
|
+
#
|
10568
|
+
# Each tag consists of a key name and an associated value. By assigning
|
10569
|
+
# tags to your resources, you can do the following:
|
10570
|
+
#
|
10571
|
+
# * **Administrative grouping and discovery** - Attach tags to resources
|
10572
|
+
# to aid in organization and search. For example, you could search for
|
10573
|
+
# all resources with the key name *Project* and the value
|
10574
|
+
# *MyImportantProject*. Or search for all resources with the key name
|
10575
|
+
# *Cost Center* and the value *41200*.
|
10576
|
+
#
|
10577
|
+
# * **Access control** - Include tags in IAM user-based and
|
10578
|
+
# resource-based policies. You can use tags to restrict access to only
|
10579
|
+
# an IAM instance profile that has a specified tag attached. For
|
10580
|
+
# examples of policies that show how to use tags to control access,
|
10581
|
+
# see [Control access using IAM tags][1] in the *IAM User Guide*.
|
10582
|
+
#
|
10583
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
10584
|
+
# maximum number of tags, then the entire request fails and the
|
10585
|
+
# resource is not created. For more information about tagging, see
|
10586
|
+
# [Tagging IAM resources][2] in the *IAM User Guide*.
|
10587
|
+
#
|
10588
|
+
# * AWS always interprets the tag `Value` as a single string. If you
|
10589
|
+
# need to store an array, you can store comma-separated values in the
|
10590
|
+
# string. However, you must interpret the value in your code.
|
10591
|
+
#
|
10592
|
+
# </note>
|
10593
|
+
#
|
10594
|
+
#
|
10595
|
+
#
|
10596
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
10597
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
10598
|
+
#
|
10599
|
+
# @option params [required, String] :instance_profile_name
|
10600
|
+
# The name of the IAM instance profile to which you want to add tags.
|
10601
|
+
#
|
10602
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
10603
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
10604
|
+
# with no spaces. You can also include any of the following characters:
|
10605
|
+
# =,.@-
|
10606
|
+
#
|
10607
|
+
#
|
10608
|
+
#
|
10609
|
+
# [1]: http://wikipedia.org/wiki/regex
|
10610
|
+
#
|
10611
|
+
# @option params [required, Array<Types::Tag>] :tags
|
10612
|
+
# The list of tags that you want to attach to the IAM instance profile.
|
10613
|
+
# Each tag consists of a key name and an associated value.
|
10614
|
+
#
|
10615
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
10616
|
+
#
|
10617
|
+
# @example Request syntax with placeholder values
|
10618
|
+
#
|
10619
|
+
# resp = client.tag_instance_profile({
|
10620
|
+
# instance_profile_name: "instanceProfileNameType", # required
|
10621
|
+
# tags: [ # required
|
10622
|
+
# {
|
10623
|
+
# key: "tagKeyType", # required
|
10624
|
+
# value: "tagValueType", # required
|
10625
|
+
# },
|
10626
|
+
# ],
|
10627
|
+
# })
|
10628
|
+
#
|
10629
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/TagInstanceProfile AWS API Documentation
|
10630
|
+
#
|
10631
|
+
# @overload tag_instance_profile(params = {})
|
10632
|
+
# @param [Hash] params ({})
|
10633
|
+
def tag_instance_profile(params = {}, options = {})
|
10634
|
+
req = build_request(:tag_instance_profile, params)
|
10635
|
+
req.send_request(options)
|
10636
|
+
end
|
10637
|
+
|
10638
|
+
# Adds one or more tags to an IAM virtual multi-factor authentication
|
10639
|
+
# (MFA) device. If a tag with the same key name already exists, then
|
10640
|
+
# that tag is overwritten with the new value.
|
10641
|
+
#
|
10642
|
+
# A tag consists of a key name and an associated value. By assigning
|
10643
|
+
# tags to your resources, you can do the following:
|
10644
|
+
#
|
10645
|
+
# * **Administrative grouping and discovery** - Attach tags to resources
|
10646
|
+
# to aid in organization and search. For example, you could search for
|
10647
|
+
# all resources with the key name *Project* and the value
|
10648
|
+
# *MyImportantProject*. Or search for all resources with the key name
|
10649
|
+
# *Cost Center* and the value *41200*.
|
10650
|
+
#
|
10651
|
+
# * **Access control** - Include tags in IAM user-based and
|
10652
|
+
# resource-based policies. You can use tags to restrict access to only
|
10653
|
+
# an IAM virtual MFA device that has a specified tag attached. For
|
10654
|
+
# examples of policies that show how to use tags to control access,
|
10655
|
+
# see [Control access using IAM tags][1] in the *IAM User Guide*.
|
10656
|
+
#
|
10657
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
10658
|
+
# maximum number of tags, then the entire request fails and the
|
10659
|
+
# resource is not created. For more information about tagging, see
|
10660
|
+
# [Tagging IAM resources][2] in the *IAM User Guide*.
|
10661
|
+
#
|
10662
|
+
# * AWS always interprets the tag `Value` as a single string. If you
|
10663
|
+
# need to store an array, you can store comma-separated values in the
|
10664
|
+
# string. However, you must interpret the value in your code.
|
10665
|
+
#
|
10666
|
+
# </note>
|
10667
|
+
#
|
10668
|
+
#
|
10669
|
+
#
|
10670
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
10671
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
10672
|
+
#
|
10673
|
+
# @option params [required, String] :serial_number
|
10674
|
+
# The unique identifier for the IAM virtual MFA device to which you want
|
10675
|
+
# to add tags. For virtual MFA devices, the serial number is the same as
|
10676
|
+
# the ARN.
|
10677
|
+
#
|
10678
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
10679
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
10680
|
+
# with no spaces. You can also include any of the following characters:
|
10681
|
+
# =,.@-
|
10682
|
+
#
|
10683
|
+
#
|
10684
|
+
#
|
10685
|
+
# [1]: http://wikipedia.org/wiki/regex
|
10686
|
+
#
|
10687
|
+
# @option params [required, Array<Types::Tag>] :tags
|
10688
|
+
# The list of tags that you want to attach to the IAM virtual MFA
|
10689
|
+
# device. Each tag consists of a key name and an associated value.
|
10690
|
+
#
|
10691
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
10692
|
+
#
|
10693
|
+
# @example Request syntax with placeholder values
|
10694
|
+
#
|
10695
|
+
# resp = client.tag_mfa_device({
|
10696
|
+
# serial_number: "serialNumberType", # required
|
10697
|
+
# tags: [ # required
|
10698
|
+
# {
|
10699
|
+
# key: "tagKeyType", # required
|
10700
|
+
# value: "tagValueType", # required
|
10701
|
+
# },
|
10702
|
+
# ],
|
10703
|
+
# })
|
10704
|
+
#
|
10705
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/TagMFADevice AWS API Documentation
|
10706
|
+
#
|
10707
|
+
# @overload tag_mfa_device(params = {})
|
10708
|
+
# @param [Hash] params ({})
|
10709
|
+
def tag_mfa_device(params = {}, options = {})
|
10710
|
+
req = build_request(:tag_mfa_device, params)
|
10711
|
+
req.send_request(options)
|
10712
|
+
end
|
10713
|
+
|
10714
|
+
# Adds one or more tags to an OpenID Connect (OIDC)-compatible identity
|
10715
|
+
# provider. For more information about these providers, see [About web
|
10716
|
+
# identity federation][1]. If a tag with the same key name already
|
10717
|
+
# exists, then that tag is overwritten with the new value.
|
10718
|
+
#
|
10719
|
+
# A tag consists of a key name and an associated value. By assigning
|
10720
|
+
# tags to your resources, you can do the following:
|
10721
|
+
#
|
10722
|
+
# * **Administrative grouping and discovery** - Attach tags to resources
|
10723
|
+
# to aid in organization and search. For example, you could search for
|
10724
|
+
# all resources with the key name *Project* and the value
|
10725
|
+
# *MyImportantProject*. Or search for all resources with the key name
|
10726
|
+
# *Cost Center* and the value *41200*.
|
10727
|
+
#
|
10728
|
+
# * **Access control** - Include tags in IAM user-based and
|
10729
|
+
# resource-based policies. You can use tags to restrict access to only
|
10730
|
+
# an OIDC provider that has a specified tag attached. For examples of
|
10731
|
+
# policies that show how to use tags to control access, see [Control
|
10732
|
+
# access using IAM tags][2] in the *IAM User Guide*.
|
10733
|
+
#
|
10734
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
10735
|
+
# maximum number of tags, then the entire request fails and the
|
10736
|
+
# resource is not created. For more information about tagging, see
|
10737
|
+
# [Tagging IAM resources][3] in the *IAM User Guide*.
|
10738
|
+
#
|
10739
|
+
# * AWS always interprets the tag `Value` as a single string. If you
|
10740
|
+
# need to store an array, you can store comma-separated values in the
|
10741
|
+
# string. However, you must interpret the value in your code.
|
10742
|
+
#
|
10743
|
+
# </note>
|
10744
|
+
#
|
10745
|
+
#
|
10746
|
+
#
|
10747
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html
|
10748
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
10749
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
10750
|
+
#
|
10751
|
+
# @option params [required, String] :open_id_connect_provider_arn
|
10752
|
+
# The ARN of the OIDC identity provider in IAM to which you want to add
|
10753
|
+
# tags.
|
10754
|
+
#
|
10755
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
10756
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
10757
|
+
# with no spaces. You can also include any of the following characters:
|
10758
|
+
# =,.@-
|
10759
|
+
#
|
10760
|
+
#
|
10761
|
+
#
|
10762
|
+
# [1]: http://wikipedia.org/wiki/regex
|
10763
|
+
#
|
10764
|
+
# @option params [required, Array<Types::Tag>] :tags
|
10765
|
+
# The list of tags that you want to attach to the OIDC identity provider
|
10766
|
+
# in IAM. Each tag consists of a key name and an associated value.
|
10767
|
+
#
|
10768
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
10769
|
+
#
|
10770
|
+
# @example Request syntax with placeholder values
|
10771
|
+
#
|
10772
|
+
# resp = client.tag_open_id_connect_provider({
|
10773
|
+
# open_id_connect_provider_arn: "arnType", # required
|
10774
|
+
# tags: [ # required
|
10775
|
+
# {
|
10776
|
+
# key: "tagKeyType", # required
|
10777
|
+
# value: "tagValueType", # required
|
10778
|
+
# },
|
10779
|
+
# ],
|
10780
|
+
# })
|
10781
|
+
#
|
10782
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/TagOpenIDConnectProvider AWS API Documentation
|
10783
|
+
#
|
10784
|
+
# @overload tag_open_id_connect_provider(params = {})
|
10785
|
+
# @param [Hash] params ({})
|
10786
|
+
def tag_open_id_connect_provider(params = {}, options = {})
|
10787
|
+
req = build_request(:tag_open_id_connect_provider, params)
|
10788
|
+
req.send_request(options)
|
10789
|
+
end
|
10790
|
+
|
10791
|
+
# Adds one or more tags to an IAM customer managed policy. If a tag with
|
10792
|
+
# the same key name already exists, then that tag is overwritten with
|
10793
|
+
# the new value.
|
10794
|
+
#
|
10795
|
+
# A tag consists of a key name and an associated value. By assigning
|
10796
|
+
# tags to your resources, you can do the following:
|
10797
|
+
#
|
10798
|
+
# * **Administrative grouping and discovery** - Attach tags to resources
|
10799
|
+
# to aid in organization and search. For example, you could search for
|
10800
|
+
# all resources with the key name *Project* and the value
|
10801
|
+
# *MyImportantProject*. Or search for all resources with the key name
|
10802
|
+
# *Cost Center* and the value *41200*.
|
10803
|
+
#
|
10804
|
+
# * **Access control** - Include tags in IAM user-based and
|
10805
|
+
# resource-based policies. You can use tags to restrict access to only
|
10806
|
+
# an IAM customer managed policy that has a specified tag attached.
|
10807
|
+
# For examples of policies that show how to use tags to control
|
10808
|
+
# access, see [Control access using IAM tags][1] in the *IAM User
|
10809
|
+
# Guide*.
|
10810
|
+
#
|
10811
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
10812
|
+
# maximum number of tags, then the entire request fails and the
|
10813
|
+
# resource is not created. For more information about tagging, see
|
10814
|
+
# [Tagging IAM resources][2] in the *IAM User Guide*.
|
10815
|
+
#
|
10816
|
+
# * AWS always interprets the tag `Value` as a single string. If you
|
10817
|
+
# need to store an array, you can store comma-separated values in the
|
10818
|
+
# string. However, you must interpret the value in your code.
|
10819
|
+
#
|
10820
|
+
# </note>
|
10821
|
+
#
|
10822
|
+
#
|
10823
|
+
#
|
10824
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
10825
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
10826
|
+
#
|
10827
|
+
# @option params [required, String] :policy_arn
|
10828
|
+
# The ARN of the IAM customer managed policy to which you want to add
|
10829
|
+
# tags.
|
10830
|
+
#
|
10831
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
10832
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
10833
|
+
# with no spaces. You can also include any of the following characters:
|
10834
|
+
# =,.@-
|
10835
|
+
#
|
10836
|
+
#
|
10837
|
+
#
|
10838
|
+
# [1]: http://wikipedia.org/wiki/regex
|
10839
|
+
#
|
10840
|
+
# @option params [required, Array<Types::Tag>] :tags
|
10841
|
+
# The list of tags that you want to attach to the IAM customer managed
|
10842
|
+
# policy. Each tag consists of a key name and an associated value.
|
10843
|
+
#
|
10844
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
10845
|
+
#
|
10846
|
+
# @example Request syntax with placeholder values
|
10847
|
+
#
|
10848
|
+
# resp = client.tag_policy({
|
10849
|
+
# policy_arn: "arnType", # required
|
10850
|
+
# tags: [ # required
|
10851
|
+
# {
|
10852
|
+
# key: "tagKeyType", # required
|
10853
|
+
# value: "tagValueType", # required
|
10854
|
+
# },
|
10855
|
+
# ],
|
10856
|
+
# })
|
10857
|
+
#
|
10858
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/TagPolicy AWS API Documentation
|
10859
|
+
#
|
10860
|
+
# @overload tag_policy(params = {})
|
10861
|
+
# @param [Hash] params ({})
|
10862
|
+
def tag_policy(params = {}, options = {})
|
10863
|
+
req = build_request(:tag_policy, params)
|
10864
|
+
req.send_request(options)
|
10865
|
+
end
|
10866
|
+
|
9873
10867
|
# Adds one or more tags to an IAM role. The role can be a regular role
|
9874
10868
|
# or a service-linked role. If a tag with the same key name already
|
9875
10869
|
# exists, then that tag is overwritten with the new value.
|
@@ -9883,20 +10877,20 @@ module Aws::IAM
|
|
9883
10877
|
# *MyImportantProject*. Or search for all resources with the key name
|
9884
10878
|
# *Cost Center* and the value *41200*.
|
9885
10879
|
#
|
9886
|
-
# * **Access control** -
|
10880
|
+
# * **Access control** - Include tags in IAM user-based and
|
9887
10881
|
# resource-based policies. You can use tags to restrict access to only
|
9888
|
-
# an IAM
|
9889
|
-
#
|
9890
|
-
#
|
9891
|
-
#
|
9892
|
-
# User Guide*.
|
10882
|
+
# an IAM role that has a specified tag attached. You can also restrict
|
10883
|
+
# access to only those resources that have a certain tag attached. For
|
10884
|
+
# examples of policies that show how to use tags to control access,
|
10885
|
+
# see [Control access using IAM tags][1] in the *IAM User Guide*.
|
9893
10886
|
#
|
9894
10887
|
# * **Cost allocation** - Use tags to help track which individuals and
|
9895
10888
|
# teams are using which AWS resources.
|
9896
10889
|
#
|
9897
|
-
# <note markdown="1"> *
|
9898
|
-
#
|
9899
|
-
#
|
10890
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
10891
|
+
# maximum number of tags, then the entire request fails and the
|
10892
|
+
# resource is not created. For more information about tagging, see
|
10893
|
+
# [Tagging IAM resources][2] in the *IAM User Guide*.
|
9900
10894
|
#
|
9901
10895
|
# * AWS always interprets the tag `Value` as a single string. If you
|
9902
10896
|
# need to store an array, you can store comma-separated values in the
|
@@ -9904,7 +10898,7 @@ module Aws::IAM
|
|
9904
10898
|
#
|
9905
10899
|
# </note>
|
9906
10900
|
#
|
9907
|
-
# For more information about tagging, see [Tagging IAM
|
10901
|
+
# For more information about tagging, see [Tagging IAM identities][2] in
|
9908
10902
|
# the *IAM User Guide*.
|
9909
10903
|
#
|
9910
10904
|
#
|
@@ -9913,47 +10907,209 @@ module Aws::IAM
|
|
9913
10907
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
9914
10908
|
#
|
9915
10909
|
# @option params [required, String] :role_name
|
9916
|
-
# The name of the role
|
10910
|
+
# The name of the IAM role to which you want to add tags.
|
10911
|
+
#
|
10912
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
10913
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
10914
|
+
# with no spaces. You can also include any of the following characters:
|
10915
|
+
# \_+=,.@-
|
10916
|
+
#
|
10917
|
+
#
|
10918
|
+
#
|
10919
|
+
# [1]: http://wikipedia.org/wiki/regex
|
10920
|
+
#
|
10921
|
+
# @option params [required, Array<Types::Tag>] :tags
|
10922
|
+
# The list of tags that you want to attach to the IAM role. Each tag
|
10923
|
+
# consists of a key name and an associated value.
|
10924
|
+
#
|
10925
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
10926
|
+
#
|
10927
|
+
#
|
10928
|
+
# @example Example: To add a tag key and value to an IAM role
|
10929
|
+
#
|
10930
|
+
# # The following example shows how to add tags to an existing role.
|
10931
|
+
#
|
10932
|
+
# resp = client.tag_role({
|
10933
|
+
# role_name: "taggedrole",
|
10934
|
+
# tags: [
|
10935
|
+
# {
|
10936
|
+
# key: "Dept",
|
10937
|
+
# value: "Accounting",
|
10938
|
+
# },
|
10939
|
+
# {
|
10940
|
+
# key: "CostCenter",
|
10941
|
+
# value: "12345",
|
10942
|
+
# },
|
10943
|
+
# ],
|
10944
|
+
# })
|
10945
|
+
#
|
10946
|
+
# @example Request syntax with placeholder values
|
10947
|
+
#
|
10948
|
+
# resp = client.tag_role({
|
10949
|
+
# role_name: "roleNameType", # required
|
10950
|
+
# tags: [ # required
|
10951
|
+
# {
|
10952
|
+
# key: "tagKeyType", # required
|
10953
|
+
# value: "tagValueType", # required
|
10954
|
+
# },
|
10955
|
+
# ],
|
10956
|
+
# })
|
10957
|
+
#
|
10958
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/TagRole AWS API Documentation
|
10959
|
+
#
|
10960
|
+
# @overload tag_role(params = {})
|
10961
|
+
# @param [Hash] params ({})
|
10962
|
+
def tag_role(params = {}, options = {})
|
10963
|
+
req = build_request(:tag_role, params)
|
10964
|
+
req.send_request(options)
|
10965
|
+
end
|
10966
|
+
|
10967
|
+
# Adds one or more tags to a Security Assertion Markup Language (SAML)
|
10968
|
+
# identity provider. For more information about these providers, see
|
10969
|
+
# [About SAML 2.0-based federation ][1]. If a tag with the same key name
|
10970
|
+
# already exists, then that tag is overwritten with the new value.
|
10971
|
+
#
|
10972
|
+
# A tag consists of a key name and an associated value. By assigning
|
10973
|
+
# tags to your resources, you can do the following:
|
10974
|
+
#
|
10975
|
+
# * **Administrative grouping and discovery** - Attach tags to resources
|
10976
|
+
# to aid in organization and search. For example, you could search for
|
10977
|
+
# all resources with the key name *Project* and the value
|
10978
|
+
# *MyImportantProject*. Or search for all resources with the key name
|
10979
|
+
# *Cost Center* and the value *41200*.
|
10980
|
+
#
|
10981
|
+
# * **Access control** - Include tags in IAM user-based and
|
10982
|
+
# resource-based policies. You can use tags to restrict access to only
|
10983
|
+
# a SAML identity provider that has a specified tag attached. For
|
10984
|
+
# examples of policies that show how to use tags to control access,
|
10985
|
+
# see [Control access using IAM tags][2] in the *IAM User Guide*.
|
10986
|
+
#
|
10987
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
10988
|
+
# maximum number of tags, then the entire request fails and the
|
10989
|
+
# resource is not created. For more information about tagging, see
|
10990
|
+
# [Tagging IAM resources][3] in the *IAM User Guide*.
|
10991
|
+
#
|
10992
|
+
# * AWS always interprets the tag `Value` as a single string. If you
|
10993
|
+
# need to store an array, you can store comma-separated values in the
|
10994
|
+
# string. However, you must interpret the value in your code.
|
10995
|
+
#
|
10996
|
+
# </note>
|
10997
|
+
#
|
10998
|
+
#
|
10999
|
+
#
|
11000
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
|
11001
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
11002
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11003
|
+
#
|
11004
|
+
# @option params [required, String] :saml_provider_arn
|
11005
|
+
# The ARN of the SAML identity provider in IAM to which you want to add
|
11006
|
+
# tags.
|
11007
|
+
#
|
11008
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
11009
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
11010
|
+
# with no spaces. You can also include any of the following characters:
|
11011
|
+
# =,.@-
|
11012
|
+
#
|
11013
|
+
#
|
11014
|
+
#
|
11015
|
+
# [1]: http://wikipedia.org/wiki/regex
|
11016
|
+
#
|
11017
|
+
# @option params [required, Array<Types::Tag>] :tags
|
11018
|
+
# The list of tags that you want to attach to the SAML identity provider
|
11019
|
+
# in IAM. Each tag consists of a key name and an associated value.
|
11020
|
+
#
|
11021
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11022
|
+
#
|
11023
|
+
# @example Request syntax with placeholder values
|
11024
|
+
#
|
11025
|
+
# resp = client.tag_saml_provider({
|
11026
|
+
# saml_provider_arn: "arnType", # required
|
11027
|
+
# tags: [ # required
|
11028
|
+
# {
|
11029
|
+
# key: "tagKeyType", # required
|
11030
|
+
# value: "tagValueType", # required
|
11031
|
+
# },
|
11032
|
+
# ],
|
11033
|
+
# })
|
11034
|
+
#
|
11035
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/TagSAMLProvider AWS API Documentation
|
11036
|
+
#
|
11037
|
+
# @overload tag_saml_provider(params = {})
|
11038
|
+
# @param [Hash] params ({})
|
11039
|
+
def tag_saml_provider(params = {}, options = {})
|
11040
|
+
req = build_request(:tag_saml_provider, params)
|
11041
|
+
req.send_request(options)
|
11042
|
+
end
|
11043
|
+
|
11044
|
+
# Adds one or more tags to an IAM server certificate. If a tag with the
|
11045
|
+
# same key name already exists, then that tag is overwritten with the
|
11046
|
+
# new value.
|
11047
|
+
#
|
11048
|
+
# <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
|
11049
|
+
# (ACM), we recommend that you don't use IAM server certificates.
|
11050
|
+
# Instead, use ACM to provision, manage, and deploy your server
|
11051
|
+
# certificates. For more information about IAM server certificates,
|
11052
|
+
# [Working with server certificates][1] in the *IAM User Guide*.
|
11053
|
+
#
|
11054
|
+
# </note>
|
11055
|
+
#
|
11056
|
+
# A tag consists of a key name and an associated value. By assigning
|
11057
|
+
# tags to your resources, you can do the following:
|
11058
|
+
#
|
11059
|
+
# * **Administrative grouping and discovery** - Attach tags to resources
|
11060
|
+
# to aid in organization and search. For example, you could search for
|
11061
|
+
# all resources with the key name *Project* and the value
|
11062
|
+
# *MyImportantProject*. Or search for all resources with the key name
|
11063
|
+
# *Cost Center* and the value *41200*.
|
11064
|
+
#
|
11065
|
+
# * **Access control** - Include tags in IAM user-based and
|
11066
|
+
# resource-based policies. You can use tags to restrict access to only
|
11067
|
+
# a server certificate that has a specified tag attached. For examples
|
11068
|
+
# of policies that show how to use tags to control access, see
|
11069
|
+
# [Control access using IAM tags][2] in the *IAM User Guide*.
|
11070
|
+
#
|
11071
|
+
# * **Cost allocation** - Use tags to help track which individuals and
|
11072
|
+
# teams are using which AWS resources.
|
11073
|
+
#
|
11074
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
11075
|
+
# maximum number of tags, then the entire request fails and the
|
11076
|
+
# resource is not created. For more information about tagging, see
|
11077
|
+
# [Tagging IAM resources][3] in the *IAM User Guide*.
|
11078
|
+
#
|
11079
|
+
# * AWS always interprets the tag `Value` as a single string. If you
|
11080
|
+
# need to store an array, you can store comma-separated values in the
|
11081
|
+
# string. However, you must interpret the value in your code.
|
11082
|
+
#
|
11083
|
+
# </note>
|
11084
|
+
#
|
11085
|
+
#
|
11086
|
+
#
|
11087
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
|
11088
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
11089
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11090
|
+
#
|
11091
|
+
# @option params [required, String] :server_certificate_name
|
11092
|
+
# The name of the IAM server certificate to which you want to add tags.
|
9917
11093
|
#
|
9918
11094
|
# This parameter accepts (through its [regex pattern][1]) a string of
|
9919
11095
|
# characters that consist of upper and lowercase alphanumeric characters
|
9920
11096
|
# with no spaces. You can also include any of the following characters:
|
9921
|
-
#
|
11097
|
+
# =,.@-
|
9922
11098
|
#
|
9923
11099
|
#
|
9924
11100
|
#
|
9925
11101
|
# [1]: http://wikipedia.org/wiki/regex
|
9926
11102
|
#
|
9927
11103
|
# @option params [required, Array<Types::Tag>] :tags
|
9928
|
-
# The list of tags that you want to attach to the
|
9929
|
-
# consists of a key name and an associated value.
|
9930
|
-
# with a JSON string.
|
11104
|
+
# The list of tags that you want to attach to the IAM server
|
11105
|
+
# certificate. Each tag consists of a key name and an associated value.
|
9931
11106
|
#
|
9932
11107
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
9933
11108
|
#
|
9934
|
-
#
|
9935
|
-
# @example Example: To add a tag key and value to an IAM role
|
9936
|
-
#
|
9937
|
-
# # The following example shows how to add tags to an existing role.
|
9938
|
-
#
|
9939
|
-
# resp = client.tag_role({
|
9940
|
-
# role_name: "taggedrole",
|
9941
|
-
# tags: [
|
9942
|
-
# {
|
9943
|
-
# key: "Dept",
|
9944
|
-
# value: "Accounting",
|
9945
|
-
# },
|
9946
|
-
# {
|
9947
|
-
# key: "CostCenter",
|
9948
|
-
# value: "12345",
|
9949
|
-
# },
|
9950
|
-
# ],
|
9951
|
-
# })
|
9952
|
-
#
|
9953
11109
|
# @example Request syntax with placeholder values
|
9954
11110
|
#
|
9955
|
-
# resp = client.
|
9956
|
-
#
|
11111
|
+
# resp = client.tag_server_certificate({
|
11112
|
+
# server_certificate_name: "serverCertificateNameType", # required
|
9957
11113
|
# tags: [ # required
|
9958
11114
|
# {
|
9959
11115
|
# key: "tagKeyType", # required
|
@@ -9962,12 +11118,12 @@ module Aws::IAM
|
|
9962
11118
|
# ],
|
9963
11119
|
# })
|
9964
11120
|
#
|
9965
|
-
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/
|
11121
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/TagServerCertificate AWS API Documentation
|
9966
11122
|
#
|
9967
|
-
# @overload
|
11123
|
+
# @overload tag_server_certificate(params = {})
|
9968
11124
|
# @param [Hash] params ({})
|
9969
|
-
def
|
9970
|
-
req = build_request(:
|
11125
|
+
def tag_server_certificate(params = {}, options = {})
|
11126
|
+
req = build_request(:tag_server_certificate, params)
|
9971
11127
|
req.send_request(options)
|
9972
11128
|
end
|
9973
11129
|
|
@@ -9983,20 +11139,21 @@ module Aws::IAM
|
|
9983
11139
|
# *MyImportantProject*. Or search for all resources with the key name
|
9984
11140
|
# *Cost Center* and the value *41200*.
|
9985
11141
|
#
|
9986
|
-
# * **Access control** -
|
11142
|
+
# * **Access control** - Include tags in IAM user-based and
|
9987
11143
|
# resource-based policies. You can use tags to restrict access to only
|
9988
|
-
# an IAM requesting user
|
9989
|
-
#
|
9990
|
-
#
|
9991
|
-
#
|
9992
|
-
#
|
11144
|
+
# an IAM requesting user that has a specified tag attached. You can
|
11145
|
+
# also restrict access to only those resources that have a certain tag
|
11146
|
+
# attached. For examples of policies that show how to use tags to
|
11147
|
+
# control access, see [Control access using IAM tags][1] in the *IAM
|
11148
|
+
# User Guide*.
|
9993
11149
|
#
|
9994
11150
|
# * **Cost allocation** - Use tags to help track which individuals and
|
9995
11151
|
# teams are using which AWS resources.
|
9996
11152
|
#
|
9997
|
-
# <note markdown="1"> *
|
9998
|
-
#
|
9999
|
-
#
|
11153
|
+
# <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
|
11154
|
+
# maximum number of tags, then the entire request fails and the
|
11155
|
+
# resource is not created. For more information about tagging, see
|
11156
|
+
# [Tagging IAM resources][2] in the *IAM User Guide*.
|
10000
11157
|
#
|
10001
11158
|
# * AWS always interprets the tag `Value` as a single string. If you
|
10002
11159
|
# need to store an array, you can store comma-separated values in the
|
@@ -10004,7 +11161,7 @@ module Aws::IAM
|
|
10004
11161
|
#
|
10005
11162
|
# </note>
|
10006
11163
|
#
|
10007
|
-
# For more information about tagging, see [Tagging IAM
|
11164
|
+
# For more information about tagging, see [Tagging IAM identities][2] in
|
10008
11165
|
# the *IAM User Guide*.
|
10009
11166
|
#
|
10010
11167
|
#
|
@@ -10013,7 +11170,7 @@ module Aws::IAM
|
|
10013
11170
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
10014
11171
|
#
|
10015
11172
|
# @option params [required, String] :user_name
|
10016
|
-
# The name of the user
|
11173
|
+
# The name of the IAM user to which you want to add tags.
|
10017
11174
|
#
|
10018
11175
|
# This parameter accepts (through its [regex pattern][1]) a string of
|
10019
11176
|
# characters that consist of upper and lowercase alphanumeric characters
|
@@ -10025,7 +11182,7 @@ module Aws::IAM
|
|
10025
11182
|
# [1]: http://wikipedia.org/wiki/regex
|
10026
11183
|
#
|
10027
11184
|
# @option params [required, Array<Types::Tag>] :tags
|
10028
|
-
# The list of tags that you want to attach to the user. Each tag
|
11185
|
+
# The list of tags that you want to attach to the IAM user. Each tag
|
10029
11186
|
# consists of a key name and an associated value.
|
10030
11187
|
#
|
10031
11188
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
@@ -10070,8 +11227,184 @@ module Aws::IAM
|
|
10070
11227
|
req.send_request(options)
|
10071
11228
|
end
|
10072
11229
|
|
11230
|
+
# Removes the specified tags from the IAM instance profile. For more
|
11231
|
+
# information about tagging, see [Tagging IAM resources][1] in the *IAM
|
11232
|
+
# User Guide*.
|
11233
|
+
#
|
11234
|
+
#
|
11235
|
+
#
|
11236
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11237
|
+
#
|
11238
|
+
# @option params [required, String] :instance_profile_name
|
11239
|
+
# The name of the IAM instance profile from which you want to remove
|
11240
|
+
# tags.
|
11241
|
+
#
|
11242
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
11243
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
11244
|
+
# with no spaces. You can also include any of the following characters:
|
11245
|
+
# =,.@-
|
11246
|
+
#
|
11247
|
+
#
|
11248
|
+
#
|
11249
|
+
# [1]: http://wikipedia.org/wiki/regex
|
11250
|
+
#
|
11251
|
+
# @option params [required, Array<String>] :tag_keys
|
11252
|
+
# A list of key names as a simple array of strings. The tags with
|
11253
|
+
# matching keys are removed from the specified instance profile.
|
11254
|
+
#
|
11255
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11256
|
+
#
|
11257
|
+
# @example Request syntax with placeholder values
|
11258
|
+
#
|
11259
|
+
# resp = client.untag_instance_profile({
|
11260
|
+
# instance_profile_name: "instanceProfileNameType", # required
|
11261
|
+
# tag_keys: ["tagKeyType"], # required
|
11262
|
+
# })
|
11263
|
+
#
|
11264
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UntagInstanceProfile AWS API Documentation
|
11265
|
+
#
|
11266
|
+
# @overload untag_instance_profile(params = {})
|
11267
|
+
# @param [Hash] params ({})
|
11268
|
+
def untag_instance_profile(params = {}, options = {})
|
11269
|
+
req = build_request(:untag_instance_profile, params)
|
11270
|
+
req.send_request(options)
|
11271
|
+
end
|
11272
|
+
|
11273
|
+
# Removes the specified tags from the IAM virtual multi-factor
|
11274
|
+
# authentication (MFA) device. For more information about tagging, see
|
11275
|
+
# [Tagging IAM resources][1] in the *IAM User Guide*.
|
11276
|
+
#
|
11277
|
+
#
|
11278
|
+
#
|
11279
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11280
|
+
#
|
11281
|
+
# @option params [required, String] :serial_number
|
11282
|
+
# The unique identifier for the IAM virtual MFA device from which you
|
11283
|
+
# want to remove tags. For virtual MFA devices, the serial number is the
|
11284
|
+
# same as the ARN.
|
11285
|
+
#
|
11286
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
11287
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
11288
|
+
# with no spaces. You can also include any of the following characters:
|
11289
|
+
# =,.@-
|
11290
|
+
#
|
11291
|
+
#
|
11292
|
+
#
|
11293
|
+
# [1]: http://wikipedia.org/wiki/regex
|
11294
|
+
#
|
11295
|
+
# @option params [required, Array<String>] :tag_keys
|
11296
|
+
# A list of key names as a simple array of strings. The tags with
|
11297
|
+
# matching keys are removed from the specified instance profile.
|
11298
|
+
#
|
11299
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11300
|
+
#
|
11301
|
+
# @example Request syntax with placeholder values
|
11302
|
+
#
|
11303
|
+
# resp = client.untag_mfa_device({
|
11304
|
+
# serial_number: "serialNumberType", # required
|
11305
|
+
# tag_keys: ["tagKeyType"], # required
|
11306
|
+
# })
|
11307
|
+
#
|
11308
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UntagMFADevice AWS API Documentation
|
11309
|
+
#
|
11310
|
+
# @overload untag_mfa_device(params = {})
|
11311
|
+
# @param [Hash] params ({})
|
11312
|
+
def untag_mfa_device(params = {}, options = {})
|
11313
|
+
req = build_request(:untag_mfa_device, params)
|
11314
|
+
req.send_request(options)
|
11315
|
+
end
|
11316
|
+
|
11317
|
+
# Removes the specified tags from the specified OpenID Connect
|
11318
|
+
# (OIDC)-compatible identity provider in IAM. For more information about
|
11319
|
+
# OIDC providers, see [About web identity federation][1]. For more
|
11320
|
+
# information about tagging, see [Tagging IAM resources][2] in the *IAM
|
11321
|
+
# User Guide*.
|
11322
|
+
#
|
11323
|
+
#
|
11324
|
+
#
|
11325
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html
|
11326
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11327
|
+
#
|
11328
|
+
# @option params [required, String] :open_id_connect_provider_arn
|
11329
|
+
# The ARN of the OIDC provider in IAM from which you want to remove
|
11330
|
+
# tags.
|
11331
|
+
#
|
11332
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
11333
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
11334
|
+
# with no spaces. You can also include any of the following characters:
|
11335
|
+
# =,.@-
|
11336
|
+
#
|
11337
|
+
#
|
11338
|
+
#
|
11339
|
+
# [1]: http://wikipedia.org/wiki/regex
|
11340
|
+
#
|
11341
|
+
# @option params [required, Array<String>] :tag_keys
|
11342
|
+
# A list of key names as a simple array of strings. The tags with
|
11343
|
+
# matching keys are removed from the specified OIDC provider.
|
11344
|
+
#
|
11345
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11346
|
+
#
|
11347
|
+
# @example Request syntax with placeholder values
|
11348
|
+
#
|
11349
|
+
# resp = client.untag_open_id_connect_provider({
|
11350
|
+
# open_id_connect_provider_arn: "arnType", # required
|
11351
|
+
# tag_keys: ["tagKeyType"], # required
|
11352
|
+
# })
|
11353
|
+
#
|
11354
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UntagOpenIDConnectProvider AWS API Documentation
|
11355
|
+
#
|
11356
|
+
# @overload untag_open_id_connect_provider(params = {})
|
11357
|
+
# @param [Hash] params ({})
|
11358
|
+
def untag_open_id_connect_provider(params = {}, options = {})
|
11359
|
+
req = build_request(:untag_open_id_connect_provider, params)
|
11360
|
+
req.send_request(options)
|
11361
|
+
end
|
11362
|
+
|
11363
|
+
# Removes the specified tags from the customer managed policy. For more
|
11364
|
+
# information about tagging, see [Tagging IAM resources][1] in the *IAM
|
11365
|
+
# User Guide*.
|
11366
|
+
#
|
11367
|
+
#
|
11368
|
+
#
|
11369
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11370
|
+
#
|
11371
|
+
# @option params [required, String] :policy_arn
|
11372
|
+
# The ARN of the IAM customer managed policy from which you want to
|
11373
|
+
# remove tags.
|
11374
|
+
#
|
11375
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
11376
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
11377
|
+
# with no spaces. You can also include any of the following characters:
|
11378
|
+
# =,.@-
|
11379
|
+
#
|
11380
|
+
#
|
11381
|
+
#
|
11382
|
+
# [1]: http://wikipedia.org/wiki/regex
|
11383
|
+
#
|
11384
|
+
# @option params [required, Array<String>] :tag_keys
|
11385
|
+
# A list of key names as a simple array of strings. The tags with
|
11386
|
+
# matching keys are removed from the specified policy.
|
11387
|
+
#
|
11388
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11389
|
+
#
|
11390
|
+
# @example Request syntax with placeholder values
|
11391
|
+
#
|
11392
|
+
# resp = client.untag_policy({
|
11393
|
+
# policy_arn: "arnType", # required
|
11394
|
+
# tag_keys: ["tagKeyType"], # required
|
11395
|
+
# })
|
11396
|
+
#
|
11397
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UntagPolicy AWS API Documentation
|
11398
|
+
#
|
11399
|
+
# @overload untag_policy(params = {})
|
11400
|
+
# @param [Hash] params ({})
|
11401
|
+
def untag_policy(params = {}, options = {})
|
11402
|
+
req = build_request(:untag_policy, params)
|
11403
|
+
req.send_request(options)
|
11404
|
+
end
|
11405
|
+
|
10073
11406
|
# Removes the specified tags from the role. For more information about
|
10074
|
-
# tagging, see [Tagging IAM
|
11407
|
+
# tagging, see [Tagging IAM resources][1] in the *IAM User Guide*.
|
10075
11408
|
#
|
10076
11409
|
#
|
10077
11410
|
#
|
@@ -10123,8 +11456,106 @@ module Aws::IAM
|
|
10123
11456
|
req.send_request(options)
|
10124
11457
|
end
|
10125
11458
|
|
11459
|
+
# Removes the specified tags from the specified Security Assertion
|
11460
|
+
# Markup Language (SAML) identity provider in IAM. For more information
|
11461
|
+
# about these providers, see [About web identity federation][1]. For
|
11462
|
+
# more information about tagging, see [Tagging IAM resources][2] in the
|
11463
|
+
# *IAM User Guide*.
|
11464
|
+
#
|
11465
|
+
#
|
11466
|
+
#
|
11467
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html
|
11468
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11469
|
+
#
|
11470
|
+
# @option params [required, String] :saml_provider_arn
|
11471
|
+
# The ARN of the SAML identity provider in IAM from which you want to
|
11472
|
+
# remove tags.
|
11473
|
+
#
|
11474
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
11475
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
11476
|
+
# with no spaces. You can also include any of the following characters:
|
11477
|
+
# =,.@-
|
11478
|
+
#
|
11479
|
+
#
|
11480
|
+
#
|
11481
|
+
# [1]: http://wikipedia.org/wiki/regex
|
11482
|
+
#
|
11483
|
+
# @option params [required, Array<String>] :tag_keys
|
11484
|
+
# A list of key names as a simple array of strings. The tags with
|
11485
|
+
# matching keys are removed from the specified SAML identity provider.
|
11486
|
+
#
|
11487
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11488
|
+
#
|
11489
|
+
# @example Request syntax with placeholder values
|
11490
|
+
#
|
11491
|
+
# resp = client.untag_saml_provider({
|
11492
|
+
# saml_provider_arn: "arnType", # required
|
11493
|
+
# tag_keys: ["tagKeyType"], # required
|
11494
|
+
# })
|
11495
|
+
#
|
11496
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UntagSAMLProvider AWS API Documentation
|
11497
|
+
#
|
11498
|
+
# @overload untag_saml_provider(params = {})
|
11499
|
+
# @param [Hash] params ({})
|
11500
|
+
def untag_saml_provider(params = {}, options = {})
|
11501
|
+
req = build_request(:untag_saml_provider, params)
|
11502
|
+
req.send_request(options)
|
11503
|
+
end
|
11504
|
+
|
11505
|
+
# Removes the specified tags from the IAM server certificate. For more
|
11506
|
+
# information about tagging, see [Tagging IAM resources][1] in the *IAM
|
11507
|
+
# User Guide*.
|
11508
|
+
#
|
11509
|
+
# <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
|
11510
|
+
# (ACM), we recommend that you don't use IAM server certificates.
|
11511
|
+
# Instead, use ACM to provision, manage, and deploy your server
|
11512
|
+
# certificates. For more information about IAM server certificates,
|
11513
|
+
# [Working with server certificates][2] in the *IAM User Guide*.
|
11514
|
+
#
|
11515
|
+
# </note>
|
11516
|
+
#
|
11517
|
+
#
|
11518
|
+
#
|
11519
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
11520
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
|
11521
|
+
#
|
11522
|
+
# @option params [required, String] :server_certificate_name
|
11523
|
+
# The name of the IAM server certificate from which you want to remove
|
11524
|
+
# tags.
|
11525
|
+
#
|
11526
|
+
# This parameter accepts (through its [regex pattern][1]) a string of
|
11527
|
+
# characters that consist of upper and lowercase alphanumeric characters
|
11528
|
+
# with no spaces. You can also include any of the following characters:
|
11529
|
+
# =,.@-
|
11530
|
+
#
|
11531
|
+
#
|
11532
|
+
#
|
11533
|
+
# [1]: http://wikipedia.org/wiki/regex
|
11534
|
+
#
|
11535
|
+
# @option params [required, Array<String>] :tag_keys
|
11536
|
+
# A list of key names as a simple array of strings. The tags with
|
11537
|
+
# matching keys are removed from the specified IAM server certificate.
|
11538
|
+
#
|
11539
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11540
|
+
#
|
11541
|
+
# @example Request syntax with placeholder values
|
11542
|
+
#
|
11543
|
+
# resp = client.untag_server_certificate({
|
11544
|
+
# server_certificate_name: "serverCertificateNameType", # required
|
11545
|
+
# tag_keys: ["tagKeyType"], # required
|
11546
|
+
# })
|
11547
|
+
#
|
11548
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UntagServerCertificate AWS API Documentation
|
11549
|
+
#
|
11550
|
+
# @overload untag_server_certificate(params = {})
|
11551
|
+
# @param [Hash] params ({})
|
11552
|
+
def untag_server_certificate(params = {}, options = {})
|
11553
|
+
req = build_request(:untag_server_certificate, params)
|
11554
|
+
req.send_request(options)
|
11555
|
+
end
|
11556
|
+
|
10126
11557
|
# Removes the specified tags from the user. For more information about
|
10127
|
-
# tagging, see [Tagging IAM
|
11558
|
+
# tagging, see [Tagging IAM resources][1] in the *IAM User Guide*.
|
10128
11559
|
#
|
10129
11560
|
#
|
10130
11561
|
#
|
@@ -10186,8 +11617,8 @@ module Aws::IAM
|
|
10186
11617
|
# Consequently, you can use this operation to manage AWS account root
|
10187
11618
|
# user credentials even if the AWS account has no associated users.
|
10188
11619
|
#
|
10189
|
-
# For information about rotating keys, see [Managing
|
10190
|
-
#
|
11620
|
+
# For information about rotating keys, see [Managing keys and
|
11621
|
+
# certificates][1] in the *IAM User Guide*.
|
10191
11622
|
#
|
10192
11623
|
#
|
10193
11624
|
#
|
@@ -10218,8 +11649,8 @@ module Aws::IAM
|
|
10218
11649
|
#
|
10219
11650
|
# @option params [required, String] :status
|
10220
11651
|
# The status you want to assign to the secret access key. `Active` means
|
10221
|
-
# that the key can be used for
|
10222
|
-
# that the key cannot be used.
|
11652
|
+
# that the key can be used for programmatic calls to AWS, while
|
11653
|
+
# `Inactive` means that the key cannot be used.
|
10223
11654
|
#
|
10224
11655
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
10225
11656
|
#
|
@@ -10267,7 +11698,7 @@ module Aws::IAM
|
|
10267
11698
|
# </note>
|
10268
11699
|
#
|
10269
11700
|
# For more information about using a password policy, see [Managing an
|
10270
|
-
# IAM
|
11701
|
+
# IAM password policy][1] in the *IAM User Guide*.
|
10271
11702
|
#
|
10272
11703
|
#
|
10273
11704
|
#
|
@@ -10316,7 +11747,7 @@ module Aws::IAM
|
|
10316
11747
|
# @option params [Boolean] :allow_users_to_change_password
|
10317
11748
|
# Allows all IAM users in your account to use the AWS Management Console
|
10318
11749
|
# to change their own passwords. For more information, see [Letting IAM
|
10319
|
-
#
|
11750
|
+
# users change their own passwords][1] in the *IAM User Guide*.
|
10320
11751
|
#
|
10321
11752
|
# If you do not specify a value for this parameter, then the operation
|
10322
11753
|
# uses the default value of `false`. The result is that IAM users in the
|
@@ -10390,8 +11821,8 @@ module Aws::IAM
|
|
10390
11821
|
|
10391
11822
|
# Updates the policy that grants an IAM entity permission to assume a
|
10392
11823
|
# role. This is typically referred to as the "role trust policy". For
|
10393
|
-
# more information about roles,
|
10394
|
-
#
|
11824
|
+
# more information about roles, see [Using roles to delegate permissions
|
11825
|
+
# and federate identities][1].
|
10395
11826
|
#
|
10396
11827
|
#
|
10397
11828
|
#
|
@@ -10464,7 +11895,7 @@ module Aws::IAM
|
|
10464
11895
|
# Updates the name and/or the path of the specified IAM group.
|
10465
11896
|
#
|
10466
11897
|
# You should understand the implications of changing a group's path or
|
10467
|
-
# name. For more information, see [Renaming
|
11898
|
+
# name. For more information, see [Renaming users and groups][1] in the
|
10468
11899
|
# *IAM User Guide*.
|
10469
11900
|
#
|
10470
11901
|
# <note markdown="1"> The person making the request (the principal), must have permission to
|
@@ -10473,7 +11904,7 @@ module Aws::IAM
|
|
10473
11904
|
# have a policy that allows them to update both groups. If the principal
|
10474
11905
|
# has permission to update the `Managers` group, but not the `MGRs`
|
10475
11906
|
# group, then the update fails. For more information about permissions,
|
10476
|
-
# see [Access
|
11907
|
+
# see [Access management][2].
|
10477
11908
|
#
|
10478
11909
|
# </note>
|
10479
11910
|
#
|
@@ -10547,11 +11978,14 @@ module Aws::IAM
|
|
10547
11978
|
req.send_request(options)
|
10548
11979
|
end
|
10549
11980
|
|
10550
|
-
# Changes the password for the specified IAM user.
|
11981
|
+
# Changes the password for the specified IAM user. You can use the AWS
|
11982
|
+
# CLI, the AWS API, or the **Users** page in the IAM console to change
|
11983
|
+
# the password for any IAM user. Use ChangePassword to change your own
|
11984
|
+
# password in the **My Security Credentials** page in the AWS Management
|
11985
|
+
# Console.
|
10551
11986
|
#
|
10552
|
-
# IAM users can change their own passwords by calling ChangePassword.
|
10553
11987
|
# For more information about modifying passwords, see [Managing
|
10554
|
-
#
|
11988
|
+
# passwords][1] in the *IAM User Guide*.
|
10555
11989
|
#
|
10556
11990
|
#
|
10557
11991
|
#
|
@@ -10651,8 +12085,8 @@ module Aws::IAM
|
|
10651
12085
|
# of OIDC provider ARNs by using the ListOpenIDConnectProviders
|
10652
12086
|
# operation.
|
10653
12087
|
#
|
10654
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
10655
|
-
#
|
12088
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
12089
|
+
# in the *AWS General Reference*.
|
10656
12090
|
#
|
10657
12091
|
#
|
10658
12092
|
#
|
@@ -10704,7 +12138,7 @@ module Aws::IAM
|
|
10704
12138
|
# for one hour by default. This applies when you use the `AssumeRole*`
|
10705
12139
|
# API operations or the `assume-role*` CLI operations but does not apply
|
10706
12140
|
# when you use those operations to create a console URL. For more
|
10707
|
-
# information, see [Using IAM
|
12141
|
+
# information, see [Using IAM roles][1] in the *IAM User Guide*.
|
10708
12142
|
#
|
10709
12143
|
#
|
10710
12144
|
#
|
@@ -10801,8 +12235,8 @@ module Aws::IAM
|
|
10801
12235
|
# @option params [required, String] :saml_provider_arn
|
10802
12236
|
# The Amazon Resource Name (ARN) of the SAML provider to update.
|
10803
12237
|
#
|
10804
|
-
# For more information about ARNs, see [Amazon Resource Names (ARNs)
|
10805
|
-
#
|
12238
|
+
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
12239
|
+
# in the *AWS General Reference*.
|
10806
12240
|
#
|
10807
12241
|
#
|
10808
12242
|
#
|
@@ -10841,7 +12275,7 @@ module Aws::IAM
|
|
10841
12275
|
# authenticating the associated IAM user to an AWS CodeCommit
|
10842
12276
|
# repository. For more information about using SSH keys to authenticate
|
10843
12277
|
# to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
|
10844
|
-
#
|
12278
|
+
# connections][1] in the *AWS CodeCommit User Guide*.
|
10845
12279
|
#
|
10846
12280
|
#
|
10847
12281
|
#
|
@@ -10898,13 +12332,13 @@ module Aws::IAM
|
|
10898
12332
|
# stored in IAM.
|
10899
12333
|
#
|
10900
12334
|
# For more information about working with server certificates, see
|
10901
|
-
# [Working with
|
12335
|
+
# [Working with server certificates][1] in the *IAM User Guide*. This
|
10902
12336
|
# topic also includes a list of AWS services that can use the server
|
10903
12337
|
# certificates that you manage with IAM.
|
10904
12338
|
#
|
10905
12339
|
# You should understand the implications of changing a server
|
10906
12340
|
# certificate's path or name. For more information, see [Renaming a
|
10907
|
-
#
|
12341
|
+
# server certificate][2] in the *IAM User Guide*.
|
10908
12342
|
#
|
10909
12343
|
# <note markdown="1"> The person making the request (the principal), must have permission to
|
10910
12344
|
# change the server certificate with the old name and the new name. For
|
@@ -10913,7 +12347,7 @@ module Aws::IAM
|
|
10913
12347
|
# update both certificates. If the principal has permission to update
|
10914
12348
|
# the `ProductionCert` group, but not the `ProdCert` certificate, then
|
10915
12349
|
# the update fails. For more information about permissions, see [Access
|
10916
|
-
#
|
12350
|
+
# management][3] in the *IAM User Guide*.
|
10917
12351
|
#
|
10918
12352
|
# </note>
|
10919
12353
|
#
|
@@ -11072,8 +12506,8 @@ module Aws::IAM
|
|
11072
12506
|
#
|
11073
12507
|
# @option params [required, String] :status
|
11074
12508
|
# The status you want to assign to the certificate. `Active` means that
|
11075
|
-
# the certificate can be used for
|
11076
|
-
# the certificate cannot be used.
|
12509
|
+
# the certificate can be used for programmatic calls to AWS `Inactive`
|
12510
|
+
# means that the certificate cannot be used.
|
11077
12511
|
#
|
11078
12512
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
11079
12513
|
#
|
@@ -11108,14 +12542,14 @@ module Aws::IAM
|
|
11108
12542
|
# Updates the name and/or the path of the specified IAM user.
|
11109
12543
|
#
|
11110
12544
|
# You should understand the implications of changing an IAM user's path
|
11111
|
-
# or name. For more information, see [Renaming an IAM
|
11112
|
-
# [Renaming an IAM
|
12545
|
+
# or name. For more information, see [Renaming an IAM user][1] and
|
12546
|
+
# [Renaming an IAM group][2] in the *IAM User Guide*.
|
11113
12547
|
#
|
11114
12548
|
# <note markdown="1"> To change a user name, the requester must have appropriate permissions
|
11115
12549
|
# on both the source object and the target object. For example, to
|
11116
12550
|
# change Bob to Robert, the entity making the request must have
|
11117
12551
|
# permission on Bob and Robert, or must have permission on all (*). For
|
11118
|
-
# more information about permissions, see [Permissions and
|
12552
|
+
# more information about permissions, see [Permissions and policies][3].
|
11119
12553
|
#
|
11120
12554
|
# </note>
|
11121
12555
|
#
|
@@ -11197,7 +12631,7 @@ module Aws::IAM
|
|
11197
12631
|
# authenticating the associated IAM user to an AWS CodeCommit
|
11198
12632
|
# repository. For more information about using SSH keys to authenticate
|
11199
12633
|
# to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
|
11200
|
-
#
|
12634
|
+
# connections][1] in the *AWS CodeCommit User Guide*.
|
11201
12635
|
#
|
11202
12636
|
#
|
11203
12637
|
#
|
@@ -11278,21 +12712,20 @@ module Aws::IAM
|
|
11278
12712
|
# User Guide][2].
|
11279
12713
|
#
|
11280
12714
|
# For more information about working with server certificates, see
|
11281
|
-
# [Working with
|
12715
|
+
# [Working with server certificates][3] in the *IAM User Guide*. This
|
11282
12716
|
# topic includes a list of AWS services that can use the server
|
11283
12717
|
# certificates that you manage with IAM.
|
11284
12718
|
#
|
11285
12719
|
# For information about the number of server certificates you can
|
11286
|
-
# upload, see [
|
11287
|
-
# User Guide*.
|
12720
|
+
# upload, see [IAM and STS quotas][4] in the *IAM User Guide*.
|
11288
12721
|
#
|
11289
12722
|
# <note markdown="1"> Because the body of the public key certificate, private key, and the
|
11290
12723
|
# certificate chain can be large, you should use POST rather than GET
|
11291
12724
|
# when calling `UploadServerCertificate`. For information about setting
|
11292
|
-
# up signatures and authorization through the API,
|
11293
|
-
#
|
11294
|
-
#
|
11295
|
-
#
|
12725
|
+
# up signatures and authorization through the API, see [Signing AWS API
|
12726
|
+
# requests][5] in the *AWS General Reference*. For general information
|
12727
|
+
# about using the Query API with IAM, see [Calling the API by making
|
12728
|
+
# HTTP query requests][6] in the *IAM User Guide*.
|
11296
12729
|
#
|
11297
12730
|
# </note>
|
11298
12731
|
#
|
@@ -11301,13 +12734,13 @@ module Aws::IAM
|
|
11301
12734
|
# [1]: https://docs.aws.amazon.com/acm/
|
11302
12735
|
# [2]: https://docs.aws.amazon.com/acm/latest/userguide/
|
11303
12736
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
|
11304
|
-
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-
|
12737
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html
|
11305
12738
|
# [5]: https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html
|
11306
12739
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/programming.html
|
11307
12740
|
#
|
11308
12741
|
# @option params [String] :path
|
11309
12742
|
# The path for the server certificate. For more information about paths,
|
11310
|
-
# see [IAM
|
12743
|
+
# see [IAM identifiers][1] in the *IAM User Guide*.
|
11311
12744
|
#
|
11312
12745
|
# This parameter is optional. If it is not included, it defaults to a
|
11313
12746
|
# slash (/). This parameter allows (through its [regex pattern][2]) a
|
@@ -11400,9 +12833,26 @@ module Aws::IAM
|
|
11400
12833
|
#
|
11401
12834
|
# [1]: http://wikipedia.org/wiki/regex
|
11402
12835
|
#
|
12836
|
+
# @option params [Array<Types::Tag>] :tags
|
12837
|
+
# A list of tags that you want to attach to the new IAM server
|
12838
|
+
# certificate resource. Each tag consists of a key name and an
|
12839
|
+
# associated value. For more information about tagging, see [Tagging IAM
|
12840
|
+
# resources][1] in the *IAM User Guide*.
|
12841
|
+
#
|
12842
|
+
# <note markdown="1"> If any one of the tags is invalid or if you exceed the allowed maximum
|
12843
|
+
# number of tags, then the entire request fails and the resource is not
|
12844
|
+
# created.
|
12845
|
+
#
|
12846
|
+
# </note>
|
12847
|
+
#
|
12848
|
+
#
|
12849
|
+
#
|
12850
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html
|
12851
|
+
#
|
11403
12852
|
# @return [Types::UploadServerCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
11404
12853
|
#
|
11405
12854
|
# * {Types::UploadServerCertificateResponse#server_certificate_metadata #server_certificate_metadata} => Types::ServerCertificateMetadata
|
12855
|
+
# * {Types::UploadServerCertificateResponse#tags #tags} => Array<Types::Tag>
|
11406
12856
|
#
|
11407
12857
|
#
|
11408
12858
|
# @example Example: To upload a server certificate to your AWS account
|
@@ -11436,6 +12886,12 @@ module Aws::IAM
|
|
11436
12886
|
# certificate_body: "certificateBodyType", # required
|
11437
12887
|
# private_key: "privateKeyType", # required
|
11438
12888
|
# certificate_chain: "certificateChainType",
|
12889
|
+
# tags: [
|
12890
|
+
# {
|
12891
|
+
# key: "tagKeyType", # required
|
12892
|
+
# value: "tagValueType", # required
|
12893
|
+
# },
|
12894
|
+
# ],
|
11439
12895
|
# })
|
11440
12896
|
#
|
11441
12897
|
# @example Response structure
|
@@ -11446,6 +12902,9 @@ module Aws::IAM
|
|
11446
12902
|
# resp.server_certificate_metadata.arn #=> String
|
11447
12903
|
# resp.server_certificate_metadata.upload_date #=> Time
|
11448
12904
|
# resp.server_certificate_metadata.expiration #=> Time
|
12905
|
+
# resp.tags #=> Array
|
12906
|
+
# resp.tags[0].key #=> String
|
12907
|
+
# resp.tags[0].value #=> String
|
11449
12908
|
#
|
11450
12909
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UploadServerCertificate AWS API Documentation
|
11451
12910
|
#
|
@@ -11457,10 +12916,13 @@ module Aws::IAM
|
|
11457
12916
|
end
|
11458
12917
|
|
11459
12918
|
# Uploads an X.509 signing certificate and associates it with the
|
11460
|
-
# specified IAM user. Some AWS services
|
12919
|
+
# specified IAM user. Some AWS services require you to use certificates
|
11461
12920
|
# to validate requests that are signed with a corresponding private key.
|
11462
12921
|
# When you upload the certificate, its default status is `Active`.
|
11463
12922
|
#
|
12923
|
+
# For information about when you would use an X.509 signing certificate,
|
12924
|
+
# see [Managing server certificates in IAM][1] in the *IAM User Guide*.
|
12925
|
+
#
|
11464
12926
|
# If the `UserName` is not specified, the IAM user name is determined
|
11465
12927
|
# implicitly based on the AWS access key ID used to sign the request.
|
11466
12928
|
# This operation works for access keys under the AWS account.
|
@@ -11470,16 +12932,17 @@ module Aws::IAM
|
|
11470
12932
|
# <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
|
11471
12933
|
# POST rather than GET when calling `UploadSigningCertificate`. For
|
11472
12934
|
# information about setting up signatures and authorization through the
|
11473
|
-
# API,
|
11474
|
-
#
|
11475
|
-
#
|
12935
|
+
# API, see [Signing AWS API requests][2] in the *AWS General Reference*.
|
12936
|
+
# For general information about using the Query API with IAM, see
|
12937
|
+
# [Making query requests][3] in the *IAM User Guide*.
|
11476
12938
|
#
|
11477
12939
|
# </note>
|
11478
12940
|
#
|
11479
12941
|
#
|
11480
12942
|
#
|
11481
|
-
# [1]: https://docs.aws.amazon.com/
|
11482
|
-
# [2]: https://docs.aws.amazon.com/
|
12943
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
|
12944
|
+
# [2]: https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html
|
12945
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html
|
11483
12946
|
#
|
11484
12947
|
# @option params [String] :user_name
|
11485
12948
|
# The name of the user the signing certificate is for.
|
@@ -11574,7 +13037,7 @@ module Aws::IAM
|
|
11574
13037
|
params: params,
|
11575
13038
|
config: config)
|
11576
13039
|
context[:gem_name] = 'aws-sdk-iam'
|
11577
|
-
context[:gem_version] = '1.
|
13040
|
+
context[:gem_version] = '1.48.0'
|
11578
13041
|
Seahorse::Client::Request.new(handlers, context)
|
11579
13042
|
end
|
11580
13043
|
|