aws-sdk-iam 1.51.0 → 1.56.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: da2f3310c1e0c3e983abee279939f07db44a1f231453146c9303ddeccb782aba
4
- data.tar.gz: 05eab24d49415cdb4eea13b751c23f80ded5526d20b4448d8a77f74b4ec89c58
3
+ metadata.gz: fdd198170d0f5626641dcd25f8a82d637e8c4c11028343988606faaf11693ea9
4
+ data.tar.gz: 989d01979086f4fb77dd71871115dc67df957fe116ef92a1d6ca1bf83dd581e8
5
5
  SHA512:
6
- metadata.gz: 16d1e77fe7a5fe2c1e2813997e1cce2d58425b16c802bbefea348c9bc34453d188173416527ef7eb91de0a2c7361e8f50dbdbb84f54aa480b3fd8cd14b777050
7
- data.tar.gz: ca25d723451eabc185720d22780e1273c0e9df896c4df88dada64abb85ffb7c442ee2b99a905bbbc140a77dfd1554edb376cb8d1a80c886c7451ec69d3524069
6
+ metadata.gz: e294ca45b3716bbaa3b8af307c7ca0cfe4b4bcb7e408011d8fcca2aae7875d3e1ad2835fb6f959f6b96637db0984e80537656befd6ea5e2350965f0adb600c2c
7
+ data.tar.gz: fcb1a3aeae751893ba38720fcbf97bedd8e9cd63efdf3e8efb199941b4a3929402022ac328ca72c13062b2066f354516f50217bbca3061d7f3ec925280a0a0fe
data/CHANGELOG.md CHANGED
@@ -1,6 +1,31 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.56.0 (2021-07-07)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
9
+ 1.55.0 (2021-06-02)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
14
+ 1.54.0 (2021-05-20)
15
+ ------------------
16
+
17
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
18
+
19
+ 1.53.0 (2021-05-19)
20
+ ------------------
21
+
22
+ * Feature - Add pagination to ListUserTags operation
23
+
24
+ 1.52.0 (2021-03-29)
25
+ ------------------
26
+
27
+ * Feature - AWS Identity and Access Management GetAccessKeyLastUsed API will throw a custom error if customer public key is not found for access keys.
28
+
4
29
  1.51.0 (2021-03-23)
5
30
  ------------------
6
31
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.51.0
1
+ 1.56.0
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.51.0'
73
+ GEM_VERSION = '1.56.0'
74
74
 
75
75
  end
@@ -288,8 +288,8 @@ module Aws::IAM
288
288
  # uses the default value of `false`. The result is that passwords do not
289
289
  # require at least one lowercase character.
290
290
  # @option options [Boolean] :allow_users_to_change_password
291
- # Allows all IAM users in your account to use the AWS Management Console
292
- # to change their own passwords. For more information, see [Letting IAM
291
+ # Allows all IAM users in your account to use the Management Console to
292
+ # change their own passwords. For more information, see [Letting IAM
293
293
  # users change their own passwords][1] in the *IAM User Guide*.
294
294
  #
295
295
  # If you do not specify a value for this parameter, then the operation
@@ -170,10 +170,10 @@ module Aws::IAM
170
170
  # @option options [required, String] :policy_document
171
171
  # The policy that grants an entity permission to assume the role.
172
172
  #
173
- # You must provide policies in JSON format in IAM. However, for AWS
173
+ # You must provide policies in JSON format in IAM. However, for
174
174
  # CloudFormation templates formatted in YAML, you can provide the policy
175
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
176
- # policy to JSON format before submitting it to IAM.
175
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
176
+ # to JSON format before submitting it to IAM.
177
177
  #
178
178
  # The [regex pattern][1] used to validate this parameter is a string of
179
179
  # characters consisting of the following:
@@ -376,10 +376,10 @@ module Aws::IAM
376
376
  # instance profile can contain only one role, and this quota cannot be
377
377
  # increased. You can remove the existing role and then add a different
378
378
  # role to an instance profile. You must then wait for the change to
379
- # appear across all of AWS because of [eventual consistency][1]. To
380
- # force the change, you must [disassociate the instance profile][2] and
381
- # then [associate the instance profile][3], or you can stop your
382
- # instance and then restart it.
379
+ # appear across all of Amazon Web Services because of [eventual
380
+ # consistency][1]. To force the change, you must [disassociate the
381
+ # instance profile][2] and then [associate the instance profile][3], or
382
+ # you can stop your instance and then restart it.
383
383
  #
384
384
  # <note markdown="1"> The caller of this operation must be granted the `PassRole` permission
385
385
  # on the IAM role by a permissions policy.
@@ -537,7 +537,7 @@ module Aws::IAM
537
537
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
538
538
  #
539
539
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
540
- # in the *AWS General Reference*.
540
+ # in the *Amazon Web Services General Reference*.
541
541
  #
542
542
  #
543
543
  #
@@ -611,7 +611,7 @@ module Aws::IAM
611
611
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
612
612
  #
613
613
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
614
- # in the *AWS General Reference*.
614
+ # in the *Amazon Web Services General Reference*.
615
615
  #
616
616
  #
617
617
  #
@@ -678,7 +678,7 @@ module Aws::IAM
678
678
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
679
679
  #
680
680
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
681
- # in the *AWS General Reference*.
681
+ # in the *Amazon Web Services General Reference*.
682
682
  #
683
683
  #
684
684
  #
@@ -713,14 +713,15 @@ module Aws::IAM
713
713
  end
714
714
 
715
715
  # Changes the password of the IAM user who is calling this operation.
716
- # This operation can be performed using the AWS CLI, the AWS API, or the
717
- # **My Security Credentials** page in the AWS Management Console. The
718
- # AWS account root user password is not affected by this operation.
716
+ # This operation can be performed using the CLI, the Amazon Web Services
717
+ # API, or the **My Security Credentials** page in the Management
718
+ # Console. The account root user password is not affected by this
719
+ # operation.
719
720
  #
720
- # Use UpdateLoginProfile to use the AWS CLI, the AWS API, or the
721
- # **Users** page in the IAM console to change the password for any IAM
722
- # user. For more information about modifying passwords, see [Managing
723
- # passwords][1] in the *IAM User Guide*.
721
+ # Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
722
+ # the **Users** page in the IAM console to change the password for any
723
+ # IAM user. For more information about modifying passwords, see
724
+ # [Managing passwords][1] in the *IAM User Guide*.
724
725
  #
725
726
  #
726
727
  #
@@ -730,7 +731,7 @@ module Aws::IAM
730
731
  # The IAM user's current password.
731
732
  #
732
733
  # @option params [required, String] :new_password
733
- # The new password. The new password must conform to the AWS account's
734
+ # The new password. The new password must conform to the account's
734
735
  # password policy, if one exists.
735
736
  #
736
737
  # The [regex pattern][1] that is used to validate this parameter is a
@@ -739,8 +740,8 @@ module Aws::IAM
739
740
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
740
741
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
741
742
  # of these characters are valid in a password. However, many tools, such
742
- # as the AWS Management Console, might restrict the ability to type
743
- # certain characters because they have special meaning within that tool.
743
+ # as the Management Console, might restrict the ability to type certain
744
+ # characters because they have special meaning within that tool.
744
745
  #
745
746
  #
746
747
  #
@@ -774,21 +775,20 @@ module Aws::IAM
774
775
  req.send_request(options)
775
776
  end
776
777
 
777
- # Creates a new AWS secret access key and corresponding AWS access key
778
- # ID for the specified user. The default status for new keys is
779
- # `Active`.
778
+ # Creates a new Amazon Web Services secret access key and corresponding
779
+ # Amazon Web Services access key ID for the specified user. The default
780
+ # status for new keys is `Active`.
780
781
  #
781
782
  # If you do not specify a user name, IAM determines the user name
782
- # implicitly based on the AWS access key ID signing the request. This
783
- # operation works for access keys under the AWS account. Consequently,
784
- # you can use this operation to manage AWS account root user
785
- # credentials. This is true even if the AWS account has no associated
786
- # users.
783
+ # implicitly based on the Amazon Web Services access key ID signing the
784
+ # request. This operation works for access keys under the account.
785
+ # Consequently, you can use this operation to manage account root user
786
+ # credentials. This is true even if the account has no associated users.
787
787
  #
788
788
  # For information about quotas on the number of keys you can create, see
789
789
  # [IAM and STS quotas][1] in the *IAM User Guide*.
790
790
  #
791
- # To ensure the security of your AWS account, the secret access key is
791
+ # To ensure the security of your account, the secret access key is
792
792
  # accessible only during key and user creation. You must save the key
793
793
  # (for example, in a text file) if you want to be able to access it
794
794
  # again. If a secret key is lost, you can delete the access keys for the
@@ -857,9 +857,9 @@ module Aws::IAM
857
857
  req.send_request(options)
858
858
  end
859
859
 
860
- # Creates an alias for your AWS account. For information about using an
861
- # AWS account alias, see [Using an alias for your AWS account ID][1] in
862
- # the *IAM User Guide*.
860
+ # Creates an alias for your account. For information about using an
861
+ # account alias, see [Using an alias for your account ID][1] in the *IAM
862
+ # User Guide*.
863
863
  #
864
864
  #
865
865
  #
@@ -1125,12 +1125,13 @@ module Aws::IAM
1125
1125
  end
1126
1126
 
1127
1127
  # Creates a password for the specified IAM user. A password allows an
1128
- # IAM user to access AWS services through the AWS Management Console.
1128
+ # IAM user to access Amazon Web Services services through the Management
1129
+ # Console.
1129
1130
  #
1130
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
1131
- # console to create a password for any IAM user. Use ChangePassword to
1132
- # update your own existing password in the **My Security Credentials**
1133
- # page in the AWS Management Console.
1131
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
1132
+ # page in the IAM console to create a password for any IAM user. Use
1133
+ # ChangePassword to update your own existing password in the **My
1134
+ # Security Credentials** page in the Management Console.
1134
1135
  #
1135
1136
  # For more information about managing passwords, see [Managing
1136
1137
  # passwords][1] in the *IAM User Guide*.
@@ -1161,8 +1162,8 @@ module Aws::IAM
1161
1162
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
1162
1163
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
1163
1164
  # of these characters are valid in a password. However, many tools, such
1164
- # as the AWS Management Console, might restrict the ability to type
1165
- # certain characters because they have special meaning within that tool.
1165
+ # as the Management Console, might restrict the ability to type certain
1166
+ # characters because they have special meaning within that tool.
1166
1167
  #
1167
1168
  #
1168
1169
  #
@@ -1225,21 +1226,29 @@ module Aws::IAM
1225
1226
  #
1226
1227
  # The OIDC provider that you create with this operation can be used as a
1227
1228
  # principal in a role's trust policy. Such a policy establishes a trust
1228
- # relationship between AWS and the OIDC provider.
1229
+ # relationship between Amazon Web Services and the OIDC provider.
1230
+ #
1231
+ # If you are using an OIDC identity provider from Google, Facebook, or
1232
+ # Amazon Cognito, you don't need to create a separate IAM identity
1233
+ # provider. These OIDC identity providers are already built-in to Amazon
1234
+ # Web Services and are available for your use. Instead, you can move
1235
+ # directly to creating new roles using your identity provider. To learn
1236
+ # more, see [Creating a role for web identity or OpenID connect
1237
+ # federation][2] in the *IAM User Guide*.
1229
1238
  #
1230
1239
  # When you create the IAM OIDC provider, you specify the following:
1231
1240
  #
1232
1241
  # * The URL of the OIDC identity provider (IdP) to trust
1233
1242
  #
1234
1243
  # * A list of client IDs (also known as audiences) that identify the
1235
- # application or applications that are allowed to authenticate using
1236
- # the OIDC provider
1244
+ # application or applications allowed to authenticate using the OIDC
1245
+ # provider
1237
1246
  #
1238
1247
  # * A list of thumbprints of one or more server certificates that the
1239
1248
  # IdP uses
1240
1249
  #
1241
1250
  # You get all of this information from the OIDC IdP that you want to use
1242
- # to access AWS.
1251
+ # to access Amazon Web Services.
1243
1252
  #
1244
1253
  # <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that
1245
1254
  # this operation creates. Therefore, it is best to limit access to the
@@ -1250,6 +1259,7 @@ module Aws::IAM
1250
1259
  #
1251
1260
  #
1252
1261
  # [1]: http://openid.net/connect/
1262
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html
1253
1263
  #
1254
1264
  # @option params [required, String] :url
1255
1265
  # The URL of the identity provider. The URL must begin with `https://`
@@ -1258,9 +1268,9 @@ module Aws::IAM
1258
1268
  # but query parameters are not. Typically the URL consists of only a
1259
1269
  # hostname, like `https://server.example.org` or `https://example.com`.
1260
1270
  #
1261
- # You cannot register the same provider multiple times in a single AWS
1271
+ # You cannot register the same provider multiple times in a single
1262
1272
  # account. If you try to submit a URL that has already been used for an
1263
- # OpenID Connect provider in the AWS account, you will get an error.
1273
+ # OpenID Connect provider in the account, you will get an error.
1264
1274
  #
1265
1275
  # @option params [Array<String>] :client_id_list
1266
1276
  # A list of client IDs (also known as audiences). When a mobile or web
@@ -1375,7 +1385,7 @@ module Aws::IAM
1375
1385
  req.send_request(options)
1376
1386
  end
1377
1387
 
1378
- # Creates a new managed policy for your AWS account.
1388
+ # Creates a new managed policy for your account.
1379
1389
  #
1380
1390
  # This operation creates a policy version with a version identifier of
1381
1391
  # `v1` and sets v1 as the policy's default version. For more
@@ -1426,12 +1436,20 @@ module Aws::IAM
1426
1436
  # The JSON policy document that you want to use as the content for the
1427
1437
  # new policy.
1428
1438
  #
1429
- # You must provide policies in JSON format in IAM. However, for AWS
1439
+ # You must provide policies in JSON format in IAM. However, for
1430
1440
  # CloudFormation templates formatted in YAML, you can provide the policy
1431
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1432
- # policy to JSON format before submitting it to IAM.
1441
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1442
+ # to JSON format before submitting it to IAM.
1433
1443
  #
1434
- # The [regex pattern][1] used to validate this parameter is a string of
1444
+ # The maximum length of the policy document that you can pass in this
1445
+ # operation, including whitespace, is listed below. To view the maximum
1446
+ # character counts of a managed policy with no whitespaces, see [IAM and
1447
+ # STS character quotas][1].
1448
+ #
1449
+ # To learn more about JSON policy grammar, see [Grammar of the IAM JSON
1450
+ # policy language][2] in the *IAM User Guide*.
1451
+ #
1452
+ # The [regex pattern][3] used to validate this parameter is a string of
1435
1453
  # characters consisting of the following:
1436
1454
  #
1437
1455
  # * Any printable ASCII character ranging from the space character
@@ -1445,7 +1463,9 @@ module Aws::IAM
1445
1463
  #
1446
1464
  #
1447
1465
  #
1448
- # [1]: http://wikipedia.org/wiki/regex
1466
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1467
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_grammar.html
1468
+ # [3]: http://wikipedia.org/wiki/regex
1449
1469
  #
1450
1470
  # @option params [String] :description
1451
1471
  # A friendly description of the policy.
@@ -1540,7 +1560,7 @@ module Aws::IAM
1540
1560
  # add a new version.
1541
1561
  #
1542
1562
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
1543
- # in the *AWS General Reference*.
1563
+ # in the *Amazon Web Services General Reference*.
1544
1564
  #
1545
1565
  #
1546
1566
  #
@@ -1550,12 +1570,17 @@ module Aws::IAM
1550
1570
  # The JSON policy document that you want to use as the content for this
1551
1571
  # new version of the policy.
1552
1572
  #
1553
- # You must provide policies in JSON format in IAM. However, for AWS
1573
+ # You must provide policies in JSON format in IAM. However, for
1554
1574
  # CloudFormation templates formatted in YAML, you can provide the policy
1555
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1556
- # policy to JSON format before submitting it to IAM.
1575
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1576
+ # to JSON format before submitting it to IAM.
1557
1577
  #
1558
- # The [regex pattern][1] used to validate this parameter is a string of
1578
+ # The maximum length of the policy document that you can pass in this
1579
+ # operation, including whitespace, is listed below. To view the maximum
1580
+ # character counts of a managed policy with no whitespaces, see [IAM and
1581
+ # STS character quotas][1].
1582
+ #
1583
+ # The [regex pattern][2] used to validate this parameter is a string of
1559
1584
  # characters consisting of the following:
1560
1585
  #
1561
1586
  # * Any printable ASCII character ranging from the space character
@@ -1569,7 +1594,8 @@ module Aws::IAM
1569
1594
  #
1570
1595
  #
1571
1596
  #
1572
- # [1]: http://wikipedia.org/wiki/regex
1597
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1598
+ # [2]: http://wikipedia.org/wiki/regex
1573
1599
  #
1574
1600
  # @option params [Boolean] :set_as_default
1575
1601
  # Specifies whether to set this version as the policy's default
@@ -1614,10 +1640,10 @@ module Aws::IAM
1614
1640
  req.send_request(options)
1615
1641
  end
1616
1642
 
1617
- # Creates a new role for your AWS account. For more information about
1618
- # roles, see [IAM roles][1]. For information about quotas for role names
1619
- # and the number of roles you can create, see [IAM and STS quotas][2] in
1620
- # the *IAM User Guide*.
1643
+ # Creates a new role for your account. For more information about roles,
1644
+ # see [IAM roles][1]. For information about quotas for role names and
1645
+ # the number of roles you can create, see [IAM and STS quotas][2] in the
1646
+ # *IAM User Guide*.
1621
1647
  #
1622
1648
  #
1623
1649
  #
@@ -1655,10 +1681,9 @@ module Aws::IAM
1655
1681
  # permission to assume the role.
1656
1682
  #
1657
1683
  # In IAM, you must provide a JSON policy that has been converted to a
1658
- # string. However, for AWS CloudFormation templates formatted in YAML,
1659
- # you can provide the policy in JSON or YAML format. AWS CloudFormation
1660
- # always converts a YAML policy to JSON format before submitting it to
1661
- # IAM.
1684
+ # string. However, for CloudFormation templates formatted in YAML, you
1685
+ # can provide the policy in JSON or YAML format. CloudFormation always
1686
+ # converts a YAML policy to JSON format before submitting it to IAM.
1662
1687
  #
1663
1688
  # The [regex pattern][1] used to validate this parameter is a string of
1664
1689
  # characters consisting of the following:
@@ -1688,7 +1713,7 @@ module Aws::IAM
1688
1713
  # default maximum of one hour is applied. This setting can have a value
1689
1714
  # from 1 hour to 12 hours.
1690
1715
  #
1691
- # Anyone who assumes the role from the AWS CLI or API can use the
1716
+ # Anyone who assumes the role from the or API can use the
1692
1717
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
1693
1718
  # parameter to request a longer session. The `MaxSessionDuration`
1694
1719
  # setting determines the maximum duration that can be requested using
@@ -1801,8 +1826,8 @@ module Aws::IAM
1801
1826
  # used as a principal in an IAM role's trust policy. Such a policy can
1802
1827
  # enable federated users who sign in using the SAML IdP to assume the
1803
1828
  # role. You can create an IAM role that supports Web-based single
1804
- # sign-on (SSO) to the AWS Management Console or one that supports API
1805
- # access to AWS.
1829
+ # sign-on (SSO) to the Management Console or one that supports API
1830
+ # access to Amazon Web Services.
1806
1831
  #
1807
1832
  # When you create the SAML provider resource, you upload a SAML metadata
1808
1833
  # document that you get from your IdP. That document includes the
@@ -1816,8 +1841,8 @@ module Aws::IAM
1816
1841
  # </note>
1817
1842
  #
1818
1843
  # For more information, see [Enabling SAML 2.0 federated users to access
1819
- # the AWS Management Console][2] and [About SAML 2.0-based
1820
- # federation][3] in the *IAM User Guide*.
1844
+ # the Management Console][2] and [About SAML 2.0-based federation][3] in
1845
+ # the *IAM User Guide*.
1821
1846
  #
1822
1847
  #
1823
1848
  #
@@ -1902,33 +1927,35 @@ module Aws::IAM
1902
1927
  req.send_request(options)
1903
1928
  end
1904
1929
 
1905
- # Creates an IAM role that is linked to a specific AWS service. The
1906
- # service controls the attached policies and when the role can be
1907
- # deleted. This helps ensure that the service is not broken by an
1908
- # unexpectedly changed or deleted role, which could put your AWS
1909
- # resources into an unknown state. Allowing the service to control the
1910
- # role helps improve service stability and proper cleanup when a service
1911
- # and its role are no longer needed. For more information, see [Using
1912
- # service-linked roles][1] in the *IAM User Guide*.
1930
+ # Creates an IAM role that is linked to a specific Amazon Web Services
1931
+ # service. The service controls the attached policies and when the role
1932
+ # can be deleted. This helps ensure that the service is not broken by an
1933
+ # unexpectedly changed or deleted role, which could put your Amazon Web
1934
+ # Services resources into an unknown state. Allowing the service to
1935
+ # control the role helps improve service stability and proper cleanup
1936
+ # when a service and its role are no longer needed. For more
1937
+ # information, see [Using service-linked roles][1] in the *IAM User
1938
+ # Guide*.
1913
1939
  #
1914
1940
  # To attach a policy to this service-linked role, you must make the
1915
- # request using the AWS service that depends on this role.
1941
+ # request using the Amazon Web Services service that depends on this
1942
+ # role.
1916
1943
  #
1917
1944
  #
1918
1945
  #
1919
1946
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/using-service-linked-roles.html
1920
1947
  #
1921
1948
  # @option params [required, String] :aws_service_name
1922
- # The service principal for the AWS service to which this role is
1923
- # attached. You use a string similar to a URL but without the http:// in
1924
- # front. For example: `elasticbeanstalk.amazonaws.com`.
1949
+ # The service principal for the Amazon Web Services service to which
1950
+ # this role is attached. You use a string similar to a URL but without
1951
+ # the http:// in front. For example: `elasticbeanstalk.amazonaws.com`.
1925
1952
  #
1926
1953
  # Service principals are unique and case-sensitive. To find the exact
1927
- # service principal for your service-linked role, see [AWS services that
1928
- # work with IAM][1] in the *IAM User Guide*. Look for the services that
1929
- # have <b>Yes </b>in the **Service-Linked Role** column. Choose the
1930
- # **Yes** link to view the service-linked role documentation for that
1931
- # service.
1954
+ # service principal for your service-linked role, see [Amazon Web
1955
+ # Services services that work with IAM][1] in the *IAM User Guide*. Look
1956
+ # for the services that have <b>Yes </b>in the **Service-Linked Role**
1957
+ # column. Choose the **Yes** link to view the service-linked role
1958
+ # documentation for that service.
1932
1959
  #
1933
1960
  #
1934
1961
  #
@@ -1995,15 +2022,15 @@ module Aws::IAM
1995
2022
  # You can have a maximum of two sets of service-specific credentials for
1996
2023
  # each supported service per user.
1997
2024
  #
1998
- # You can create service-specific credentials for AWS CodeCommit and
1999
- # Amazon Keyspaces (for Apache Cassandra).
2025
+ # You can create service-specific credentials for CodeCommit and Amazon
2026
+ # Keyspaces (for Apache Cassandra).
2000
2027
  #
2001
2028
  # You can reset the password to a new service-generated value by calling
2002
2029
  # ResetServiceSpecificCredential.
2003
2030
  #
2004
2031
  # For more information about service-specific credentials, see [Using
2005
- # IAM with AWS CodeCommit: Git credentials, SSH keys, and AWS access
2006
- # keys][1] in the *IAM User Guide*.
2032
+ # IAM with CodeCommit: Git credentials, SSH keys, and Amazon Web
2033
+ # Services access keys][1] in the *IAM User Guide*.
2007
2034
  #
2008
2035
  #
2009
2036
  #
@@ -2025,9 +2052,9 @@ module Aws::IAM
2025
2052
  # [1]: http://wikipedia.org/wiki/regex
2026
2053
  #
2027
2054
  # @option params [required, String] :service_name
2028
- # The name of the AWS service that is to be associated with the
2029
- # credentials. The service you specify here is the only service that can
2030
- # be accessed using these credentials.
2055
+ # The name of the Amazon Web Services service that is to be associated
2056
+ # with the credentials. The service you specify here is the only service
2057
+ # that can be accessed using these credentials.
2031
2058
  #
2032
2059
  # @return [Types::CreateServiceSpecificCredentialResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2033
2060
  #
@@ -2059,7 +2086,7 @@ module Aws::IAM
2059
2086
  req.send_request(options)
2060
2087
  end
2061
2088
 
2062
- # Creates a new IAM user for your AWS account.
2089
+ # Creates a new IAM user for your account.
2063
2090
  #
2064
2091
  # For information about quotas for the number of IAM users you can
2065
2092
  # create, see [IAM and STS quotas][1] in the *IAM User Guide*.
@@ -2174,20 +2201,20 @@ module Aws::IAM
2174
2201
  req.send_request(options)
2175
2202
  end
2176
2203
 
2177
- # Creates a new virtual MFA device for the AWS account. After creating
2178
- # the virtual MFA, use EnableMFADevice to attach the MFA device to an
2179
- # IAM user. For more information about creating and working with virtual
2180
- # MFA devices, see [Using a virtual MFA device][1] in the *IAM User
2181
- # Guide*.
2204
+ # Creates a new virtual MFA device for the account. After creating the
2205
+ # virtual MFA, use EnableMFADevice to attach the MFA device to an IAM
2206
+ # user. For more information about creating and working with virtual MFA
2207
+ # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
2182
2208
  #
2183
2209
  # For information about the maximum number of MFA devices you can
2184
2210
  # create, see [IAM and STS quotas][2] in the *IAM User Guide*.
2185
2211
  #
2186
2212
  # The seed information contained in the QR code and the Base32 string
2187
2213
  # should be treated like any other secret access information. In other
2188
- # words, protect the seed information as you would your AWS access keys
2189
- # or your passwords. After you provision your virtual device, you should
2190
- # ensure that the information is destroyed following secure procedures.
2214
+ # words, protect the seed information as you would your Amazon Web
2215
+ # Services access keys or your passwords. After you provision your
2216
+ # virtual device, you should ensure that the information is destroyed
2217
+ # following secure procedures.
2191
2218
  #
2192
2219
  #
2193
2220
  #
@@ -2346,10 +2373,10 @@ module Aws::IAM
2346
2373
  # Deletes the access key pair associated with the specified IAM user.
2347
2374
  #
2348
2375
  # If you do not specify a user name, IAM determines the user name
2349
- # implicitly based on the AWS access key ID signing the request. This
2350
- # operation works for access keys under the AWS account. Consequently,
2351
- # you can use this operation to manage AWS account root user credentials
2352
- # even if the AWS account has no associated users.
2376
+ # implicitly based on the Amazon Web Services access key ID signing the
2377
+ # request. This operation works for access keys under the account.
2378
+ # Consequently, you can use this operation to manage account root user
2379
+ # credentials even if the account has no associated users.
2353
2380
  #
2354
2381
  # @option params [String] :user_name
2355
2382
  # The name of the user whose access key pair you want to delete.
@@ -2403,9 +2430,9 @@ module Aws::IAM
2403
2430
  req.send_request(options)
2404
2431
  end
2405
2432
 
2406
- # Deletes the specified AWS account alias. For information about using
2407
- # an AWS account alias, see [Using an alias for your AWS account ID][1]
2408
- # in the *IAM User Guide*.
2433
+ # Deletes the specified account alias. For information about using an
2434
+ # Amazon Web Services account alias, see [Using an alias for your
2435
+ # account ID][1] in the *IAM User Guide*.
2409
2436
  #
2410
2437
  #
2411
2438
  #
@@ -2449,8 +2476,7 @@ module Aws::IAM
2449
2476
  req.send_request(options)
2450
2477
  end
2451
2478
 
2452
- # Deletes the password policy for the AWS account. There are no
2453
- # parameters.
2479
+ # Deletes the password policy for the account. There are no parameters.
2454
2480
  #
2455
2481
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2456
2482
  #
@@ -2622,19 +2648,19 @@ module Aws::IAM
2622
2648
  end
2623
2649
 
2624
2650
  # Deletes the password for the specified IAM user, which terminates the
2625
- # user's ability to access AWS services through the AWS Management
2626
- # Console.
2651
+ # user's ability to access Amazon Web Services services through the
2652
+ # Management Console.
2627
2653
  #
2628
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
2629
- # console to delete a password for any IAM user. You can use
2630
- # ChangePassword to update, but not delete, your own password in the
2631
- # **My Security Credentials** page in the AWS Management Console.
2654
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
2655
+ # page in the IAM console to delete a password for any IAM user. You can
2656
+ # use ChangePassword to update, but not delete, your own password in the
2657
+ # **My Security Credentials** page in the Management Console.
2632
2658
  #
2633
- # Deleting a user's password does not prevent a user from accessing AWS
2634
- # through the command line interface or the API. To prevent all user
2635
- # access, you must also either make any access keys inactive or delete
2636
- # them. For more information about making keys inactive or deleting
2637
- # them, see UpdateAccessKey and DeleteAccessKey.
2659
+ # Deleting a user's password does not prevent a user from accessing
2660
+ # Amazon Web Services through the command line interface or the API. To
2661
+ # prevent all user access, you must also either make any access keys
2662
+ # inactive or delete them. For more information about making keys
2663
+ # inactive or deleting them, see UpdateAccessKey and DeleteAccessKey.
2638
2664
  #
2639
2665
  # @option params [required, String] :user_name
2640
2666
  # The name of the user whose password you want to delete.
@@ -2739,7 +2765,7 @@ module Aws::IAM
2739
2765
  # The Amazon Resource Name (ARN) of the IAM policy you want to delete.
2740
2766
  #
2741
2767
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2742
- # in the *AWS General Reference*.
2768
+ # in the *Amazon Web Services General Reference*.
2743
2769
  #
2744
2770
  #
2745
2771
  #
@@ -2781,7 +2807,7 @@ module Aws::IAM
2781
2807
  # to delete a version.
2782
2808
  #
2783
2809
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2784
- # in the *AWS General Reference*.
2810
+ # in the *Amazon Web Services General Reference*.
2785
2811
  #
2786
2812
  #
2787
2813
  #
@@ -3002,10 +3028,10 @@ module Aws::IAM
3002
3028
  # Deletes the specified SSH public key.
3003
3029
  #
3004
3030
  # The SSH public key deleted by this operation is used only for
3005
- # authenticating the associated IAM user to an AWS CodeCommit
3006
- # repository. For more information about using SSH keys to authenticate
3007
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
3008
- # connections][1] in the *AWS CodeCommit User Guide*.
3031
+ # authenticating the associated IAM user to an CodeCommit repository.
3032
+ # For more information about using SSH keys to authenticate to an
3033
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
3034
+ # in the *CodeCommit User Guide*.
3009
3035
  #
3010
3036
  #
3011
3037
  #
@@ -3056,8 +3082,8 @@ module Aws::IAM
3056
3082
  #
3057
3083
  # For more information about working with server certificates, see
3058
3084
  # [Working with server certificates][1] in the *IAM User Guide*. This
3059
- # topic also includes a list of AWS services that can use the server
3060
- # certificates that you manage with IAM.
3085
+ # topic also includes a list of Amazon Web Services services that can
3086
+ # use the server certificates that you manage with IAM.
3061
3087
  #
3062
3088
  # If you are using a server certificate with Elastic Load Balancing,
3063
3089
  # deleting the certificate could have implications for your application.
@@ -3119,10 +3145,12 @@ module Aws::IAM
3119
3145
  # first remove those resources from the linked service and then submit
3120
3146
  # the deletion request again. Resources are specific to the service that
3121
3147
  # is linked to the role. For more information about removing resources
3122
- # from a service, see the [AWS documentation][1] for your service.
3148
+ # from a service, see the [Amazon Web Services documentation][1] for
3149
+ # your service.
3123
3150
  #
3124
3151
  # For more information about service-linked roles, see [Roles terms and
3125
- # concepts: AWS service-linked role][2] in the *IAM User Guide*.
3152
+ # concepts: Amazon Web Services service-linked role][2] in the *IAM User
3153
+ # Guide*.
3126
3154
  #
3127
3155
  #
3128
3156
  #
@@ -3204,10 +3232,10 @@ module Aws::IAM
3204
3232
  # Deletes a signing certificate associated with the specified IAM user.
3205
3233
  #
3206
3234
  # If you do not specify a user name, IAM determines the user name
3207
- # implicitly based on the AWS access key ID signing the request. This
3208
- # operation works for access keys under the AWS account. Consequently,
3209
- # you can use this operation to manage AWS account root user credentials
3210
- # even if the AWS account has no associated IAM users.
3235
+ # implicitly based on the Amazon Web Services access key ID signing the
3236
+ # request. This operation works for access keys under the account.
3237
+ # Consequently, you can use this operation to manage account root user
3238
+ # credentials even if the account has no associated IAM users.
3211
3239
  #
3212
3240
  # @option params [String] :user_name
3213
3241
  # The name of the user the signing certificate belongs to.
@@ -3260,11 +3288,11 @@ module Aws::IAM
3260
3288
  req.send_request(options)
3261
3289
  end
3262
3290
 
3263
- # Deletes the specified IAM user. Unlike the AWS Management Console,
3264
- # when you delete a user programmatically, you must delete the items
3265
- # attached to the user manually, or the deletion fails. For more
3266
- # information, see [Deleting an IAM user][1]. Before attempting to
3267
- # delete a user, remove the following items:
3291
+ # Deletes the specified IAM user. Unlike the Management Console, when
3292
+ # you delete a user programmatically, you must delete the items attached
3293
+ # to the user manually, or the deletion fails. For more information, see
3294
+ # [Deleting an IAM user][1]. Before attempting to delete a user, remove
3295
+ # the following items:
3268
3296
  #
3269
3297
  # * Password (DeleteLoginProfile)
3270
3298
  #
@@ -3493,7 +3521,7 @@ module Aws::IAM
3493
3521
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3494
3522
  #
3495
3523
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3496
- # in the *AWS General Reference*.
3524
+ # in the *Amazon Web Services General Reference*.
3497
3525
  #
3498
3526
  #
3499
3527
  #
@@ -3544,7 +3572,7 @@ module Aws::IAM
3544
3572
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3545
3573
  #
3546
3574
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3547
- # in the *AWS General Reference*.
3575
+ # in the *Amazon Web Services General Reference*.
3548
3576
  #
3549
3577
  #
3550
3578
  #
@@ -3595,7 +3623,7 @@ module Aws::IAM
3595
3623
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3596
3624
  #
3597
3625
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3598
- # in the *AWS General Reference*.
3626
+ # in the *Amazon Web Services General Reference*.
3599
3627
  #
3600
3628
  #
3601
3629
  #
@@ -3700,9 +3728,9 @@ module Aws::IAM
3700
3728
  req.send_request(options)
3701
3729
  end
3702
3730
 
3703
- # Generates a credential report for the AWS account. For more
3704
- # information about the credential report, see [Getting credential
3705
- # reports][1] in the *IAM User Guide*.
3731
+ # Generates a credential report for the account. For more information
3732
+ # about the credential report, see [Getting credential reports][1] in
3733
+ # the *IAM User Guide*.
3706
3734
  #
3707
3735
  #
3708
3736
  #
@@ -3727,18 +3755,17 @@ module Aws::IAM
3727
3755
  req.send_request(options)
3728
3756
  end
3729
3757
 
3730
- # Generates a report for service last accessed data for AWS
3731
- # Organizations. You can generate a report for any entities
3732
- # (organization root, organizational unit, or account) or policies in
3733
- # your organization.
3758
+ # Generates a report for service last accessed data for Organizations.
3759
+ # You can generate a report for any entities (organization root,
3760
+ # organizational unit, or account) or policies in your organization.
3734
3761
  #
3735
- # To call this operation, you must be signed in using your AWS
3736
- # Organizations management account credentials. You can use your
3737
- # long-term IAM user or root user credentials, or temporary credentials
3738
- # from assuming an IAM role. SCPs must be enabled for your organization
3739
- # root. You must have the required IAM and AWS Organizations
3740
- # permissions. For more information, see [Refining permissions using
3741
- # service last accessed data][1] in the *IAM User Guide*.
3762
+ # To call this operation, you must be signed in using your Organizations
3763
+ # management account credentials. You can use your long-term IAM user or
3764
+ # root user credentials, or temporary credentials from assuming an IAM
3765
+ # role. SCPs must be enabled for your organization root. You must have
3766
+ # the required IAM and Organizations permissions. For more information,
3767
+ # see [Refining permissions using service last accessed data][1] in the
3768
+ # *IAM User Guide*.
3742
3769
  #
3743
3770
  # You can generate a service last accessed data report for entities by
3744
3771
  # specifying only the entity's path. This data includes a list of
@@ -3746,8 +3773,8 @@ module Aws::IAM
3746
3773
  # apply to the entity.
3747
3774
  #
3748
3775
  # You can generate a service last accessed data report for a policy by
3749
- # specifying an entity's path and an optional AWS Organizations policy
3750
- # ID. This data includes a list of services that are allowed by the
3776
+ # specifying an entity's path and an optional Organizations policy ID.
3777
+ # This data includes a list of services that are allowed by the
3751
3778
  # specified SCP.
3752
3779
  #
3753
3780
  # For each service in both report types, the data includes the most
@@ -3757,15 +3784,16 @@ module Aws::IAM
3757
3784
  # troubleshooting, and supported Regions see [Reducing permissions using
3758
3785
  # service last accessed data][1] in the *IAM User Guide*.
3759
3786
  #
3760
- # The data includes all attempts to access AWS, not just the successful
3761
- # ones. This includes all attempts that were made using the AWS
3762
- # Management Console, the AWS API through any of the SDKs, or any of the
3763
- # command line tools. An unexpected entry in the service last accessed
3764
- # data does not mean that an account has been compromised, because the
3765
- # request might have been denied. Refer to your CloudTrail logs as the
3766
- # authoritative source for information about all API calls and whether
3767
- # they were successful or denied access. For more information,
3768
- # see [Logging IAM events with CloudTrail][2] in the *IAM User Guide*.
3787
+ # The data includes all attempts to access Amazon Web Services, not just
3788
+ # the successful ones. This includes all attempts that were made using
3789
+ # the Management Console, the Amazon Web Services API through any of the
3790
+ # SDKs, or any of the command line tools. An unexpected entry in the
3791
+ # service last accessed data does not mean that an account has been
3792
+ # compromised, because the request might have been denied. Refer to your
3793
+ # CloudTrail logs as the authoritative source for information about all
3794
+ # API calls and whether they were successful or denied access. For more
3795
+ # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3796
+ # User Guide*.
3769
3797
  #
3770
3798
  # This operation returns a `JobId`. Use this parameter in the `
3771
3799
  # GetOrganizationsAccessReport ` operation to check the status of the
@@ -3775,9 +3803,9 @@ module Aws::IAM
3775
3803
  # you can retrieve the report.
3776
3804
  #
3777
3805
  # To generate a service last accessed data report for entities, specify
3778
- # an entity path without specifying the optional AWS Organizations
3779
- # policy ID. The type of entity that you specify determines the data
3780
- # returned in the report.
3806
+ # an entity path without specifying the optional Organizations policy
3807
+ # ID. The type of entity that you specify determines the data returned
3808
+ # in the report.
3781
3809
  #
3782
3810
  # * **Root** – When you specify the organizations root as the entity,
3783
3811
  # the resulting report lists all of the services allowed by SCPs that
@@ -3793,9 +3821,9 @@ module Aws::IAM
3793
3821
  # not limited by SCPs.
3794
3822
  #
3795
3823
  # * **management account** – When you specify the management account,
3796
- # the resulting report lists all AWS services, because the management
3797
- # account is not limited by SCPs. For each service, the report
3798
- # includes data for only the management account.
3824
+ # the resulting report lists all Amazon Web Services services, because
3825
+ # the management account is not limited by SCPs. For each service, the
3826
+ # report includes data for only the management account.
3799
3827
  #
3800
3828
  # * **Account** – When you specify another account as the entity, the
3801
3829
  # resulting report lists all of the services allowed by SCPs that are
@@ -3803,9 +3831,8 @@ module Aws::IAM
3803
3831
  # report includes data for only the specified account.
3804
3832
  #
3805
3833
  # To generate a service last accessed data report for policies, specify
3806
- # an entity path and the optional AWS Organizations policy ID. The type
3807
- # of entity that you specify determines the data returned for each
3808
- # service.
3834
+ # an entity path and the optional Organizations policy ID. The type of
3835
+ # entity that you specify determines the data returned for each service.
3809
3836
  #
3810
3837
  # * **Root** – When you specify the root entity and a policy ID, the
3811
3838
  # resulting report lists all of the services that are allowed by the
@@ -3827,10 +3854,10 @@ module Aws::IAM
3827
3854
  # the report will return a list of services with no data.
3828
3855
  #
3829
3856
  # * **management account** – When you specify the management account,
3830
- # the resulting report lists all AWS services, because the management
3831
- # account is not limited by SCPs. If you specify a policy ID in the
3832
- # CLI or API, the policy is ignored. For each service, the report
3833
- # includes data for only the management account.
3857
+ # the resulting report lists all Amazon Web Services services, because
3858
+ # the management account is not limited by SCPs. If you specify a
3859
+ # policy ID in the CLI or API, the policy is ignored. For each
3860
+ # service, the report includes data for only the management account.
3834
3861
  #
3835
3862
  # * **Account** – When you specify another account entity and a policy
3836
3863
  # ID, the resulting report lists all of the services that are allowed
@@ -3859,21 +3886,21 @@ module Aws::IAM
3859
3886
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics
3860
3887
  #
3861
3888
  # @option params [required, String] :entity_path
3862
- # The path of the AWS Organizations entity (root, OU, or account). You
3863
- # can build an entity path using the known structure of your
3864
- # organization. For example, assume that your account ID is
3865
- # `123456789012` and its parent OU ID is `ou-rge0-awsabcde`. The
3866
- # organization root ID is `r-f6g7h8i9j0example` and your organization ID
3867
- # is `o-a1b2c3d4e5`. Your entity path is
3889
+ # The path of the Organizations entity (root, OU, or account). You can
3890
+ # build an entity path using the known structure of your organization.
3891
+ # For example, assume that your account ID is `123456789012` and its
3892
+ # parent OU ID is `ou-rge0-awsabcde`. The organization root ID is
3893
+ # `r-f6g7h8i9j0example` and your organization ID is `o-a1b2c3d4e5`. Your
3894
+ # entity path is
3868
3895
  # `o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-rge0-awsabcde/123456789012`.
3869
3896
  #
3870
3897
  # @option params [String] :organizations_policy_id
3871
- # The identifier of the AWS Organizations service control policy (SCP).
3872
- # This parameter is optional.
3898
+ # The identifier of the Organizations service control policy (SCP). This
3899
+ # parameter is optional.
3873
3900
  #
3874
3901
  # This ID is used to generate information about when an account
3875
- # principal that is limited by the SCP attempted to access an AWS
3876
- # service.
3902
+ # principal that is limited by the SCP attempted to access an Amazon Web
3903
+ # Services service.
3877
3904
  #
3878
3905
  # @return [Types::GenerateOrganizationsAccessReportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3879
3906
  #
@@ -3915,31 +3942,31 @@ module Aws::IAM
3915
3942
 
3916
3943
  # Generates a report that includes details about when an IAM resource
3917
3944
  # (user, group, role, or policy) was last used in an attempt to access
3918
- # AWS services. Recent activity usually appears within four hours. IAM
3919
- # reports activity for the last 365 days, or less if your Region began
3920
- # supporting this feature within the last year. For more information,
3921
- # see [Regions where data is tracked][1].
3922
- #
3923
- # The service last accessed data includes all attempts to access an AWS
3924
- # API, not just the successful ones. This includes all attempts that
3925
- # were made using the AWS Management Console, the AWS API through any of
3926
- # the SDKs, or any of the command line tools. An unexpected entry in the
3927
- # service last accessed data does not mean that your account has been
3928
- # compromised, because the request might have been denied. Refer to your
3929
- # CloudTrail logs as the authoritative source for information about all
3930
- # API calls and whether they were successful or denied access. For more
3931
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3932
- # User Guide*.
3945
+ # Amazon Web Services services. Recent activity usually appears within
3946
+ # four hours. IAM reports activity for the last 365 days, or less if
3947
+ # your Region began supporting this feature within the last year. For
3948
+ # more information, see [Regions where data is tracked][1].
3949
+ #
3950
+ # The service last accessed data includes all attempts to access an
3951
+ # Amazon Web Services API, not just the successful ones. This includes
3952
+ # all attempts that were made using the Management Console, the Amazon
3953
+ # Web Services API through any of the SDKs, or any of the command line
3954
+ # tools. An unexpected entry in the service last accessed data does not
3955
+ # mean that your account has been compromised, because the request might
3956
+ # have been denied. Refer to your CloudTrail logs as the authoritative
3957
+ # source for information about all API calls and whether they were
3958
+ # successful or denied access. For more information, see [Logging IAM
3959
+ # events with CloudTrail][2] in the *IAM User Guide*.
3933
3960
  #
3934
3961
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
3935
3962
  # Use this parameter in the following operations to retrieve the
3936
3963
  # following details from your report:
3937
3964
  #
3938
3965
  # * GetServiceLastAccessedDetails – Use this operation for users,
3939
- # groups, roles, or policies to list every AWS service that the
3940
- # resource could access using permissions policies. For each service,
3941
- # the response includes information about the most recent access
3942
- # attempt.
3966
+ # groups, roles, or policies to list every Amazon Web Services service
3967
+ # that the resource could access using permissions policies. For each
3968
+ # service, the response includes information about the most recent
3969
+ # access attempt.
3943
3970
  #
3944
3971
  # The `JobId` returned by `GenerateServiceLastAccessedDetail` must be
3945
3972
  # used by the same role within a session, or by the same user when
@@ -3947,8 +3974,8 @@ module Aws::IAM
3947
3974
  #
3948
3975
  # * GetServiceLastAccessedDetailsWithEntities – Use this operation for
3949
3976
  # groups and policies to list information about the associated
3950
- # entities (users or roles) that attempted to access a specific AWS
3951
- # service.
3977
+ # entities (users or roles) that attempted to access a specific Amazon
3978
+ # Web Services service.
3952
3979
  #
3953
3980
  # To check the status of the `GenerateServiceLastAccessedDetails`
3954
3981
  # request, use the `JobId` parameter in the same operations and test the
@@ -3961,10 +3988,10 @@ module Aws::IAM
3961
3988
  # <note markdown="1"> Service last accessed data does not use other policy types when
3962
3989
  # determining whether a resource could access a service. These other
3963
3990
  # policy types include resource-based policies, access control lists,
3964
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
3965
- # assume role policies. It only applies permissions policy logic. For
3966
- # more about the evaluation of policy types, see [Evaluating
3967
- # policies][3] in the *IAM User Guide*.
3991
+ # Organizations policies, IAM permissions boundaries, and STS assume
3992
+ # role policies. It only applies permissions policy logic. For more
3993
+ # about the evaluation of policy types, see [Evaluating policies][3] in
3994
+ # the *IAM User Guide*.
3968
3995
  #
3969
3996
  # </note>
3970
3997
  #
@@ -3982,7 +4009,7 @@ module Aws::IAM
3982
4009
  # @option params [required, String] :arn
3983
4010
  # The ARN of the IAM resource (user, group, role, or managed policy)
3984
4011
  # used to generate information about when the resource was last used in
3985
- # an attempt to access an AWS service.
4012
+ # an attempt to access an Amazon Web Services service.
3986
4013
  #
3987
4014
  # @option params [String] :granularity
3988
4015
  # The level of detail that you want to generate. You can specify whether
@@ -4032,8 +4059,8 @@ module Aws::IAM
4032
4059
 
4033
4060
  # Retrieves information about when the specified access key was last
4034
4061
  # used. The information includes the date and time of last use, along
4035
- # with the AWS service and Region that were specified in the last
4036
- # request made with that key.
4062
+ # with the Amazon Web Services service and Region that were specified in
4063
+ # the last request made with that key.
4037
4064
  #
4038
4065
  # @option params [required, String] :access_key_id
4039
4066
  # The identifier of an access key.
@@ -4074,9 +4101,10 @@ module Aws::IAM
4074
4101
  end
4075
4102
 
4076
4103
  # Retrieves information about all IAM users, groups, roles, and policies
4077
- # in your AWS account, including their relationships to one another. Use
4078
- # this operation to obtain a snapshot of the configuration of IAM
4079
- # permissions (users, groups, roles, and policies) in your account.
4104
+ # in your Amazon Web Services account, including their relationships to
4105
+ # one another. Use this operation to obtain a snapshot of the
4106
+ # configuration of IAM permissions (users, groups, roles, and policies)
4107
+ # in your account.
4080
4108
  #
4081
4109
  # <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
4082
4110
  # [RFC 3986][1]. You can use a URL decoding method to convert the policy
@@ -4246,7 +4274,7 @@ module Aws::IAM
4246
4274
  req.send_request(options)
4247
4275
  end
4248
4276
 
4249
- # Retrieves the password policy for the AWS account. This tells you the
4277
+ # Retrieves the password policy for the account. This tells you the
4250
4278
  # complexity requirements and mandatory rotation periods for the IAM
4251
4279
  # user passwords in your account. For more information about using a
4252
4280
  # password policy, see [Managing an IAM password policy][1].
@@ -4305,8 +4333,8 @@ module Aws::IAM
4305
4333
  req.send_request(options)
4306
4334
  end
4307
4335
 
4308
- # Retrieves information about IAM entity usage and IAM quotas in the AWS
4309
- # account.
4336
+ # Retrieves information about IAM entity usage and IAM quotas in the
4337
+ # Amazon Web Services account.
4310
4338
  #
4311
4339
  # For information about IAM quotas, see [IAM and STS quotas][1] in the
4312
4340
  # *IAM User Guide*.
@@ -4378,14 +4406,14 @@ module Aws::IAM
4378
4406
  # To get the context keys from policies associated with an IAM user,
4379
4407
  # group, or role, use GetContextKeysForPrincipalPolicy.
4380
4408
  #
4381
- # Context keys are variables maintained by AWS and its services that
4382
- # provide details about the context of an API query request. Context
4383
- # keys can be evaluated by testing against a value specified in an IAM
4384
- # policy. Use `GetContextKeysForCustomPolicy` to understand what key
4385
- # names and values you must supply when you call SimulateCustomPolicy.
4386
- # Note that all parameters are shown in unencoded form here for clarity
4387
- # but must be URL encoded to be included as a part of a real HTML
4388
- # request.
4409
+ # Context keys are variables maintained by Amazon Web Services and its
4410
+ # services that provide details about the context of an API query
4411
+ # request. Context keys can be evaluated by testing against a value
4412
+ # specified in an IAM policy. Use `GetContextKeysForCustomPolicy` to
4413
+ # understand what key names and values you must supply when you call
4414
+ # SimulateCustomPolicy. Note that all parameters are shown in unencoded
4415
+ # form here for clarity but must be URL encoded to be included as a part
4416
+ # of a real HTML request.
4389
4417
  #
4390
4418
  # @option params [required, Array<String>] :policy_input_list
4391
4419
  # A list of policies for which you want the list of context keys
@@ -4447,11 +4475,12 @@ module Aws::IAM
4447
4475
  # permissions, then consider allowing them to use
4448
4476
  # GetContextKeysForCustomPolicy instead.
4449
4477
  #
4450
- # Context keys are variables maintained by AWS and its services that
4451
- # provide details about the context of an API query request. Context
4452
- # keys can be evaluated by testing against a value in an IAM policy. Use
4453
- # GetContextKeysForPrincipalPolicy to understand what key names and
4454
- # values you must supply when you call SimulatePrincipalPolicy.
4478
+ # Context keys are variables maintained by Amazon Web Services and its
4479
+ # services that provide details about the context of an API query
4480
+ # request. Context keys can be evaluated by testing against a value in
4481
+ # an IAM policy. Use GetContextKeysForPrincipalPolicy to understand what
4482
+ # key names and values you must supply when you call
4483
+ # SimulatePrincipalPolicy.
4455
4484
  #
4456
4485
  # @option params [required, String] :policy_source_arn
4457
4486
  # The ARN of a user, group, or role whose policies contain the context
@@ -4464,7 +4493,7 @@ module Aws::IAM
4464
4493
  # URL encoded to be included as a part of a real HTML request.
4465
4494
  #
4466
4495
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4467
- # in the *AWS General Reference*.
4496
+ # in the *Amazon Web Services General Reference*.
4468
4497
  #
4469
4498
  #
4470
4499
  #
@@ -4515,9 +4544,9 @@ module Aws::IAM
4515
4544
  req.send_request(options)
4516
4545
  end
4517
4546
 
4518
- # Retrieves a credential report for the AWS account. For more
4519
- # information about the credential report, see [Getting credential
4520
- # reports][1] in the *IAM User Guide*.
4547
+ # Retrieves a credential report for the account. For more information
4548
+ # about the credential report, see [Getting credential reports][1] in
4549
+ # the *IAM User Guide*.
4521
4550
  #
4522
4551
  #
4523
4552
  #
@@ -4802,9 +4831,19 @@ module Aws::IAM
4802
4831
  req.send_request(options)
4803
4832
  end
4804
4833
 
4805
- # Retrieves the user name and password creation date for the specified
4806
- # IAM user. If the user has not been assigned a password, the operation
4807
- # returns a 404 (`NoSuchEntity`) error.
4834
+ # Retrieves the user name for the specified IAM user. A login profile is
4835
+ # created when you create a password for the user to access the
4836
+ # Management Console. If the user does not exist or does not have a
4837
+ # password, the operation returns a 404 (`NoSuchEntity`) error.
4838
+ #
4839
+ # If you create an IAM user with access to the console, the `CreateDate`
4840
+ # reflects the date you created the initial password for the user.
4841
+ #
4842
+ # If you create an IAM user with programmatic access, and then later add
4843
+ # a password for the user to access the Management Console, the
4844
+ # `CreateDate` reflects the initial password creation date. A user with
4845
+ # programmatic access does not have a login profile unless you create a
4846
+ # password for the user to access the Management Console.
4808
4847
  #
4809
4848
  # @option params [required, String] :user_name
4810
4849
  # The name of the user whose login profile you want to retrieve.
@@ -4869,7 +4908,7 @@ module Aws::IAM
4869
4908
  # resource ARNs by using the ListOpenIDConnectProviders operation.
4870
4909
  #
4871
4910
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4872
- # in the *AWS General Reference*.
4911
+ # in the *Amazon Web Services General Reference*.
4873
4912
  #
4874
4913
  #
4875
4914
  #
@@ -4910,10 +4949,10 @@ module Aws::IAM
4910
4949
  req.send_request(options)
4911
4950
  end
4912
4951
 
4913
- # Retrieves the service last accessed data report for AWS Organizations
4914
- # that was previously generated using the `
4915
- # GenerateOrganizationsAccessReport ` operation. This operation
4916
- # retrieves the status of your report job and the report contents.
4952
+ # Retrieves the service last accessed data report for Organizations that
4953
+ # was previously generated using the ` GenerateOrganizationsAccessReport
4954
+ # ` operation. This operation retrieves the status of your report job
4955
+ # and the report contents.
4917
4956
  #
4918
4957
  # Depending on the parameters that you passed when you generated the
4919
4958
  # report, the data returned could include different information. For
@@ -5080,7 +5119,7 @@ module Aws::IAM
5080
5119
  # information about.
5081
5120
  #
5082
5121
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5083
- # in the *AWS General Reference*.
5122
+ # in the *Amazon Web Services General Reference*.
5084
5123
  #
5085
5124
  #
5086
5125
  #
@@ -5162,7 +5201,7 @@ module Aws::IAM
5162
5201
  # information about.
5163
5202
  #
5164
5203
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5165
- # in the *AWS General Reference*.
5204
+ # in the *Amazon Web Services General Reference*.
5166
5205
  #
5167
5206
  #
5168
5207
  #
@@ -5401,7 +5440,7 @@ module Aws::IAM
5401
5440
  # IAM to get information about.
5402
5441
  #
5403
5442
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5404
- # in the *AWS General Reference*.
5443
+ # in the *Amazon Web Services General Reference*.
5405
5444
  #
5406
5445
  #
5407
5446
  #
@@ -5442,10 +5481,10 @@ module Aws::IAM
5442
5481
  # key.
5443
5482
  #
5444
5483
  # The SSH public key retrieved by this operation is used only for
5445
- # authenticating the associated IAM user to an AWS CodeCommit
5446
- # repository. For more information about using SSH keys to authenticate
5447
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
5448
- # connections][1] in the *AWS CodeCommit User Guide*.
5484
+ # authenticating the associated IAM user to an CodeCommit repository.
5485
+ # For more information about using SSH keys to authenticate to an
5486
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
5487
+ # in the *CodeCommit User Guide*.
5449
5488
  #
5450
5489
  #
5451
5490
  #
@@ -5514,8 +5553,8 @@ module Aws::IAM
5514
5553
  #
5515
5554
  # For more information about working with server certificates, see
5516
5555
  # [Working with server certificates][1] in the *IAM User Guide*. This
5517
- # topic includes a list of AWS services that can use the server
5518
- # certificates that you manage with IAM.
5556
+ # topic includes a list of Amazon Web Services services that can use the
5557
+ # server certificates that you manage with IAM.
5519
5558
  #
5520
5559
  #
5521
5560
  #
@@ -5571,17 +5610,17 @@ module Aws::IAM
5571
5610
  # `GenerateServiceLastAccessedDetails` operation. You can use the
5572
5611
  # `JobId` parameter in `GetServiceLastAccessedDetails` to retrieve the
5573
5612
  # status of your report job. When the report is complete, you can
5574
- # retrieve the generated report. The report includes a list of AWS
5575
- # services that the resource (user, group, role, or managed policy) can
5576
- # access.
5613
+ # retrieve the generated report. The report includes a list of Amazon
5614
+ # Web Services services that the resource (user, group, role, or managed
5615
+ # policy) can access.
5577
5616
  #
5578
5617
  # <note markdown="1"> Service last accessed data does not use other policy types when
5579
5618
  # determining whether a resource could access a service. These other
5580
5619
  # policy types include resource-based policies, access control lists,
5581
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
5582
- # assume role policies. It only applies permissions policy logic. For
5583
- # more about the evaluation of policy types, see [Evaluating
5584
- # policies][1] in the *IAM User Guide*.
5620
+ # Organizations policies, IAM permissions boundaries, and STS assume
5621
+ # role policies. It only applies permissions policy logic. For more
5622
+ # about the evaluation of policy types, see [Evaluating policies][1] in
5623
+ # the *IAM User Guide*.
5585
5624
  #
5586
5625
  # </note>
5587
5626
  #
@@ -5760,16 +5799,17 @@ module Aws::IAM
5760
5799
  # `GenerateServiceLastAccessedDetails` operation.
5761
5800
  #
5762
5801
  # @option params [required, String] :service_namespace
5763
- # The service namespace for an AWS service. Provide the service
5764
- # namespace to learn when the IAM entity last attempted to access the
5765
- # specified service.
5802
+ # The service namespace for an Amazon Web Services service. Provide the
5803
+ # service namespace to learn when the IAM entity last attempted to
5804
+ # access the specified service.
5766
5805
  #
5767
5806
  # To learn the service namespace for a service, see [Actions, resources,
5768
- # and condition keys for AWS services][1] in the *IAM User Guide*.
5769
- # Choose the name of the service to view details for that service. In
5770
- # the first paragraph, find the service prefix. For example, `(service
5771
- # prefix: a4b)`. For more information about service namespaces, see [AWS
5772
- # service namespaces][2] in the *AWS General Reference*.
5807
+ # and condition keys for Amazon Web Services services][1] in the *IAM
5808
+ # User Guide*. Choose the name of the service to view details for that
5809
+ # service. In the first paragraph, find the service prefix. For example,
5810
+ # `(service prefix: a4b)`. For more information about service
5811
+ # namespaces, see [Amazon Web Services service namespaces][2] in
5812
+ # the *Amazon Web Services General Reference*.
5773
5813
  #
5774
5814
  #
5775
5815
  #
@@ -5922,8 +5962,8 @@ module Aws::IAM
5922
5962
  # user's creation date, path, unique ID, and ARN.
5923
5963
  #
5924
5964
  # If you do not specify a user name, IAM determines the user name
5925
- # implicitly based on the AWS access key ID used to sign the request to
5926
- # this operation.
5965
+ # implicitly based on the Amazon Web Services access key ID used to sign
5966
+ # the request to this operation.
5927
5967
  #
5928
5968
  # @option params [String] :user_name
5929
5969
  # The name of the user to get information about.
@@ -6080,12 +6120,12 @@ module Aws::IAM
6080
6120
  # paginate the results using the `MaxItems` and `Marker` parameters.
6081
6121
  #
6082
6122
  # If the `UserName` field is not specified, the user name is determined
6083
- # implicitly based on the AWS access key ID used to sign the request.
6084
- # This operation works for access keys under the AWS account.
6085
- # Consequently, you can use this operation to manage AWS account root
6086
- # user credentials even if the AWS account has no associated users.
6123
+ # implicitly based on the Amazon Web Services access key ID used to sign
6124
+ # the request. This operation works for access keys under the account.
6125
+ # Consequently, you can use this operation to manage account root user
6126
+ # credentials even if the account has no associated users.
6087
6127
  #
6088
- # <note markdown="1"> To ensure the security of your AWS account, the secret access key is
6128
+ # <note markdown="1"> To ensure the security of your account, the secret access key is
6089
6129
  # accessible only during key and user creation.
6090
6130
  #
6091
6131
  # </note>
@@ -6181,9 +6221,9 @@ module Aws::IAM
6181
6221
  req.send_request(options)
6182
6222
  end
6183
6223
 
6184
- # Lists the account alias associated with the AWS account (Note: you can
6185
- # have only one). For information about using an AWS account alias, see
6186
- # [Using an alias for your AWS account ID][1] in the *IAM User Guide*.
6224
+ # Lists the account alias associated with the account (Note: you can
6225
+ # have only one). For information about using an account alias, see
6226
+ # [Using an alias for your account ID][1] in the *IAM User Guide*.
6187
6227
  #
6188
6228
  #
6189
6229
  #
@@ -6562,7 +6602,7 @@ module Aws::IAM
6562
6602
  # the versions.
6563
6603
  #
6564
6604
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
6565
- # in the *AWS General Reference*.
6605
+ # in the *Amazon Web Services General Reference*.
6566
6606
  #
6567
6607
  #
6568
6608
  #
@@ -6980,10 +7020,10 @@ module Aws::IAM
6980
7020
  # @option params [required, String] :instance_profile_name
6981
7021
  # The name of the IAM instance profile whose tags you want to see.
6982
7022
  #
6983
- # This parameter accepts (through its [regex pattern][1]) a string of
6984
- # characters that consist of upper and lowercase alphanumeric characters
7023
+ # This parameter allows (through its [regex pattern][1]) a string of
7024
+ # characters consisting of upper and lowercase alphanumeric characters
6985
7025
  # with no spaces. You can also include any of the following characters:
6986
- # =,.@-
7026
+ # \_+=,.@-
6987
7027
  #
6988
7028
  #
6989
7029
  #
@@ -6996,16 +7036,15 @@ module Aws::IAM
6996
7036
  # to indicate where the next call should start.
6997
7037
  #
6998
7038
  # @option params [Integer] :max_items
6999
- # (Optional) Use this only when paginating results to indicate the
7000
- # maximum number of items that you want in the response. If additional
7001
- # items exist beyond the maximum that you specify, the `IsTruncated`
7002
- # response element is `true`.
7039
+ # Use this only when paginating results to indicate the maximum number
7040
+ # of items you want in the response. If additional items exist beyond
7041
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7003
7042
  #
7004
- # If you do not include this parameter, it defaults to 100. Note that
7005
- # IAM might return fewer results, even when more results are available.
7006
- # In that case, the `IsTruncated` response element returns `true`, and
7007
- # `Marker` contains a value to include in the subsequent call that tells
7008
- # the service where to continue from.
7043
+ # If you do not include this parameter, the number of items defaults to
7044
+ # 100. Note that IAM might return fewer results, even when there are
7045
+ # more results available. In that case, the `IsTruncated` response
7046
+ # element returns `true`, and `Marker` contains a value to include in
7047
+ # the subsequent call that tells the service where to continue from.
7009
7048
  #
7010
7049
  # @return [Types::ListInstanceProfileTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7011
7050
  #
@@ -7257,10 +7296,10 @@ module Aws::IAM
7257
7296
  # want to see. For virtual MFA devices, the serial number is the same as
7258
7297
  # the ARN.
7259
7298
  #
7260
- # This parameter accepts (through its [regex pattern][1]) a string of
7261
- # characters that consist of upper and lowercase alphanumeric characters
7299
+ # This parameter allows (through its [regex pattern][1]) a string of
7300
+ # characters consisting of upper and lowercase alphanumeric characters
7262
7301
  # with no spaces. You can also include any of the following characters:
7263
- # =,.@-
7302
+ # \_+=,.@-
7264
7303
  #
7265
7304
  #
7266
7305
  #
@@ -7273,16 +7312,15 @@ module Aws::IAM
7273
7312
  # to indicate where the next call should start.
7274
7313
  #
7275
7314
  # @option params [Integer] :max_items
7276
- # (Optional) Use this only when paginating results to indicate the
7277
- # maximum number of items that you want in the response. If additional
7278
- # items exist beyond the maximum that you specify, the `IsTruncated`
7279
- # response element is `true`.
7315
+ # Use this only when paginating results to indicate the maximum number
7316
+ # of items you want in the response. If additional items exist beyond
7317
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7280
7318
  #
7281
- # If you do not include this parameter, it defaults to 100. Note that
7282
- # IAM might return fewer results, even when more results are available.
7283
- # In that case, the `IsTruncated` response element returns `true`, and
7284
- # `Marker` contains a value to include in the subsequent call that tells
7285
- # the service where to continue from.
7319
+ # If you do not include this parameter, the number of items defaults to
7320
+ # 100. Note that IAM might return fewer results, even when there are
7321
+ # more results available. In that case, the `IsTruncated` response
7322
+ # element returns `true`, and `Marker` contains a value to include in
7323
+ # the subsequent call that tells the service where to continue from.
7286
7324
  #
7287
7325
  # @return [Types::ListMFADeviceTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7288
7326
  #
@@ -7318,8 +7356,8 @@ module Aws::IAM
7318
7356
  # Lists the MFA devices for an IAM user. If the request includes a IAM
7319
7357
  # user name, then this operation lists all the MFA devices associated
7320
7358
  # with the specified user. If you do not specify a user name, IAM
7321
- # determines the user name implicitly based on the AWS access key ID
7322
- # signing the request for this operation.
7359
+ # determines the user name implicitly based on the Amazon Web Services
7360
+ # access key ID signing the request for this operation.
7323
7361
  #
7324
7362
  # You can paginate the results using the `MaxItems` and `Marker`
7325
7363
  # parameters.
@@ -7404,10 +7442,10 @@ module Aws::IAM
7404
7442
  # The ARN of the OpenID Connect (OIDC) identity provider whose tags you
7405
7443
  # want to see.
7406
7444
  #
7407
- # This parameter accepts (through its [regex pattern][1]) a string of
7408
- # characters that consist of upper and lowercase alphanumeric characters
7445
+ # This parameter allows (through its [regex pattern][1]) a string of
7446
+ # characters consisting of upper and lowercase alphanumeric characters
7409
7447
  # with no spaces. You can also include any of the following characters:
7410
- # =,.@-
7448
+ # \_+=,.@-
7411
7449
  #
7412
7450
  #
7413
7451
  #
@@ -7420,16 +7458,15 @@ module Aws::IAM
7420
7458
  # to indicate where the next call should start.
7421
7459
  #
7422
7460
  # @option params [Integer] :max_items
7423
- # (Optional) Use this only when paginating results to indicate the
7424
- # maximum number of items that you want in the response. If additional
7425
- # items exist beyond the maximum that you specify, the `IsTruncated`
7426
- # response element is `true`.
7461
+ # Use this only when paginating results to indicate the maximum number
7462
+ # of items you want in the response. If additional items exist beyond
7463
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7427
7464
  #
7428
- # If you do not include this parameter, it defaults to 100. Note that
7429
- # IAM might return fewer results, even when more results are available.
7430
- # In that case, the `IsTruncated` response element returns `true`, and
7431
- # `Marker` contains a value to include in the subsequent call that tells
7432
- # the service where to continue from.
7465
+ # If you do not include this parameter, the number of items defaults to
7466
+ # 100. Note that IAM might return fewer results, even when there are
7467
+ # more results available. In that case, the `IsTruncated` response
7468
+ # element returns `true`, and `Marker` contains a value to include in
7469
+ # the subsequent call that tells the service where to continue from.
7433
7470
  #
7434
7471
  # @return [Types::ListOpenIDConnectProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7435
7472
  #
@@ -7463,7 +7500,7 @@ module Aws::IAM
7463
7500
  end
7464
7501
 
7465
7502
  # Lists information about the IAM OpenID Connect (OIDC) provider
7466
- # resource objects defined in the AWS account.
7503
+ # resource objects defined in the account.
7467
7504
  #
7468
7505
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7469
7506
  # attributes for the resource. For example, this operation does not
@@ -7491,15 +7528,15 @@ module Aws::IAM
7491
7528
  req.send_request(options)
7492
7529
  end
7493
7530
 
7494
- # Lists all the managed policies that are available in your AWS account,
7495
- # including your own customer-defined managed policies and all AWS
7496
- # managed policies.
7531
+ # Lists all the managed policies that are available in your account,
7532
+ # including your own customer-defined managed policies and all Amazon
7533
+ # Web Services managed policies.
7497
7534
  #
7498
7535
  # You can filter the list of policies that is returned using the
7499
7536
  # optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
7500
- # example, to list only the customer managed policies in your AWS
7501
- # account, set `Scope` to `Local`. To list only AWS managed policies,
7502
- # set `Scope` to `AWS`.
7537
+ # example, to list only the customer managed policies in your Amazon Web
7538
+ # Services account, set `Scope` to `Local`. To list only Amazon Web
7539
+ # Services managed policies, set `Scope` to `AWS`.
7503
7540
  #
7504
7541
  # You can paginate the results using the `MaxItems` and `Marker`
7505
7542
  # parameters.
@@ -7522,9 +7559,9 @@ module Aws::IAM
7522
7559
  # @option params [String] :scope
7523
7560
  # The scope to use for filtering the results.
7524
7561
  #
7525
- # To list only AWS managed policies, set `Scope` to `AWS`. To list only
7526
- # the customer managed policies in your AWS account, set `Scope` to
7527
- # `Local`.
7562
+ # To list only Amazon Web Services managed policies, set `Scope` to
7563
+ # `AWS`. To list only the customer managed policies in your account, set
7564
+ # `Scope` to `Local`.
7528
7565
  #
7529
7566
  # This parameter is optional. If it is not included, or if it is set to
7530
7567
  # `All`, all policies are returned.
@@ -7632,11 +7669,10 @@ module Aws::IAM
7632
7669
  #
7633
7670
  # <note markdown="1"> This operation does not use other policy types when determining
7634
7671
  # whether a resource could access a service. These other policy types
7635
- # include resource-based policies, access control lists, AWS
7636
- # Organizations policies, IAM permissions boundaries, and AWS STS assume
7637
- # role policies. It only applies permissions policy logic. For more
7638
- # about the evaluation of policy types, see [Evaluating policies][1] in
7639
- # the *IAM User Guide*.
7672
+ # include resource-based policies, access control lists, Organizations
7673
+ # policies, IAM permissions boundaries, and STS assume role policies. It
7674
+ # only applies permissions policy logic. For more about the evaluation
7675
+ # of policy types, see [Evaluating policies][1] in the *IAM User Guide*.
7640
7676
  #
7641
7677
  # </note>
7642
7678
  #
@@ -7682,15 +7718,16 @@ module Aws::IAM
7682
7718
  # want to list.
7683
7719
  #
7684
7720
  # @option params [required, Array<String>] :service_namespaces
7685
- # The service namespace for the AWS services whose policies you want to
7686
- # list.
7721
+ # The service namespace for the Amazon Web Services services whose
7722
+ # policies you want to list.
7687
7723
  #
7688
7724
  # To learn the service namespace for a service, see [Actions, resources,
7689
- # and condition keys for AWS services][1] in the *IAM User Guide*.
7690
- # Choose the name of the service to view details for that service. In
7691
- # the first paragraph, find the service prefix. For example, `(service
7692
- # prefix: a4b)`. For more information about service namespaces, see [AWS
7693
- # service namespaces][2] in the *AWS General Reference*.
7725
+ # and condition keys for Amazon Web Services services][1] in the *IAM
7726
+ # User Guide*. Choose the name of the service to view details for that
7727
+ # service. In the first paragraph, find the service prefix. For example,
7728
+ # `(service prefix: a4b)`. For more information about service
7729
+ # namespaces, see [Amazon Web Services service namespaces][2] in
7730
+ # the *Amazon Web Services General Reference*.
7694
7731
  #
7695
7732
  #
7696
7733
  #
@@ -7791,10 +7828,10 @@ module Aws::IAM
7791
7828
  # @option params [required, String] :policy_arn
7792
7829
  # The ARN of the IAM customer managed policy whose tags you want to see.
7793
7830
  #
7794
- # This parameter accepts (through its [regex pattern][1]) a string of
7795
- # characters that consist of upper and lowercase alphanumeric characters
7831
+ # This parameter allows (through its [regex pattern][1]) a string of
7832
+ # characters consisting of upper and lowercase alphanumeric characters
7796
7833
  # with no spaces. You can also include any of the following characters:
7797
- # =,.@-
7834
+ # \_+=,.@-
7798
7835
  #
7799
7836
  #
7800
7837
  #
@@ -7807,16 +7844,15 @@ module Aws::IAM
7807
7844
  # to indicate where the next call should start.
7808
7845
  #
7809
7846
  # @option params [Integer] :max_items
7810
- # (Optional) Use this only when paginating results to indicate the
7811
- # maximum number of items that you want in the response. If additional
7812
- # items exist beyond the maximum that you specify, the `IsTruncated`
7813
- # response element is `true`.
7847
+ # Use this only when paginating results to indicate the maximum number
7848
+ # of items you want in the response. If additional items exist beyond
7849
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7814
7850
  #
7815
- # If you do not include this parameter, it defaults to 100. Note that
7816
- # IAM might return fewer results, even when more results are available.
7817
- # In that case, the `IsTruncated` response element returns `true`, and
7818
- # `Marker` contains a value to include in the subsequent call that tells
7819
- # the service where to continue from.
7851
+ # If you do not include this parameter, the number of items defaults to
7852
+ # 100. Note that IAM might return fewer results, even when there are
7853
+ # more results available. In that case, the `IsTruncated` response
7854
+ # element returns `true`, and `Marker` contains a value to include in
7855
+ # the subsequent call that tells the service where to continue from.
7820
7856
  #
7821
7857
  # @return [Types::ListPolicyTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7822
7858
  #
@@ -7865,7 +7901,7 @@ module Aws::IAM
7865
7901
  # the versions.
7866
7902
  #
7867
7903
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
7868
- # in the *AWS General Reference*.
7904
+ # in the *Amazon Web Services General Reference*.
7869
7905
  #
7870
7906
  #
7871
7907
  #
@@ -8027,16 +8063,15 @@ module Aws::IAM
8027
8063
  # to indicate where the next call should start.
8028
8064
  #
8029
8065
  # @option params [Integer] :max_items
8030
- # (Optional) Use this only when paginating results to indicate the
8031
- # maximum number of items that you want in the response. If additional
8032
- # items exist beyond the maximum that you specify, the `IsTruncated`
8033
- # response element is `true`.
8066
+ # Use this only when paginating results to indicate the maximum number
8067
+ # of items you want in the response. If additional items exist beyond
8068
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8034
8069
  #
8035
- # If you do not include this parameter, it defaults to 100. Note that
8036
- # IAM might return fewer results, even when more results are available.
8037
- # In that case, the `IsTruncated` response element returns `true`, and
8038
- # `Marker` contains a value to include in the subsequent call that tells
8039
- # the service where to continue from.
8070
+ # If you do not include this parameter, the number of items defaults to
8071
+ # 100. Note that IAM might return fewer results, even when there are
8072
+ # more results available. In that case, the `IsTruncated` response
8073
+ # element returns `true`, and `Marker` contains a value to include in
8074
+ # the subsequent call that tells the service where to continue from.
8040
8075
  #
8041
8076
  # @return [Types::ListRoleTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8042
8077
  #
@@ -8208,10 +8243,10 @@ module Aws::IAM
8208
8243
  # The ARN of the Security Assertion Markup Language (SAML) identity
8209
8244
  # provider whose tags you want to see.
8210
8245
  #
8211
- # This parameter accepts (through its [regex pattern][1]) a string of
8212
- # characters that consist of upper and lowercase alphanumeric characters
8246
+ # This parameter allows (through its [regex pattern][1]) a string of
8247
+ # characters consisting of upper and lowercase alphanumeric characters
8213
8248
  # with no spaces. You can also include any of the following characters:
8214
- # =,.@-
8249
+ # \_+=,.@-
8215
8250
  #
8216
8251
  #
8217
8252
  #
@@ -8224,16 +8259,15 @@ module Aws::IAM
8224
8259
  # to indicate where the next call should start.
8225
8260
  #
8226
8261
  # @option params [Integer] :max_items
8227
- # (Optional) Use this only when paginating results to indicate the
8228
- # maximum number of items that you want in the response. If additional
8229
- # items exist beyond the maximum that you specify, the `IsTruncated`
8230
- # response element is `true`.
8262
+ # Use this only when paginating results to indicate the maximum number
8263
+ # of items you want in the response. If additional items exist beyond
8264
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8231
8265
  #
8232
- # If you do not include this parameter, it defaults to 100. Note that
8233
- # IAM might return fewer results, even when more results are available.
8234
- # In that case, the `IsTruncated` response element returns `true`, and
8235
- # `Marker` contains a value to include in the subsequent call that tells
8236
- # the service where to continue from.
8266
+ # If you do not include this parameter, the number of items defaults to
8267
+ # 100. Note that IAM might return fewer results, even when there are
8268
+ # more results available. In that case, the `IsTruncated` response
8269
+ # element returns `true`, and `Marker` contains a value to include in
8270
+ # the subsequent call that tells the service where to continue from.
8237
8271
  #
8238
8272
  # @return [Types::ListSAMLProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8239
8273
  #
@@ -8304,10 +8338,10 @@ module Aws::IAM
8304
8338
  # list.
8305
8339
  #
8306
8340
  # The SSH public keys returned by this operation are used only for
8307
- # authenticating the IAM user to an AWS CodeCommit repository. For more
8308
- # information about using SSH keys to authenticate to an AWS CodeCommit
8309
- # repository, see [Set up AWS CodeCommit for SSH connections][1] in the
8310
- # *AWS CodeCommit User Guide*.
8341
+ # authenticating the IAM user to an CodeCommit repository. For more
8342
+ # information about using SSH keys to authenticate to an CodeCommit
8343
+ # repository, see [Set up CodeCommit for SSH connections][1] in the
8344
+ # *CodeCommit User Guide*.
8311
8345
  #
8312
8346
  # Although each user is limited to a small number of keys, you can still
8313
8347
  # paginate the results using the `MaxItems` and `Marker` parameters.
@@ -8319,7 +8353,7 @@ module Aws::IAM
8319
8353
  # @option params [String] :user_name
8320
8354
  # The name of the IAM user to list SSH public keys for. If none is
8321
8355
  # specified, the `UserName` field is determined implicitly based on the
8322
- # AWS access key used to sign the request.
8356
+ # Amazon Web Services access key used to sign the request.
8323
8357
  #
8324
8358
  # This parameter allows (through its [regex pattern][1]) a string of
8325
8359
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8387,11 +8421,11 @@ module Aws::IAM
8387
8421
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
8388
8422
  # User Guide*.
8389
8423
  #
8390
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
8391
- # (ACM), we recommend that you don't use IAM server certificates.
8392
- # Instead, use ACM to provision, manage, and deploy your server
8393
- # certificates. For more information about IAM server certificates,
8394
- # [Working with server certificates][2] in the *IAM User Guide*.
8424
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
8425
+ # we recommend that you don't use IAM server certificates. Instead, use
8426
+ # ACM to provision, manage, and deploy your server certificates. For
8427
+ # more information about IAM server certificates, [Working with server
8428
+ # certificates][2] in the *IAM User Guide*.
8395
8429
  #
8396
8430
  # </note>
8397
8431
  #
@@ -8403,10 +8437,10 @@ module Aws::IAM
8403
8437
  # @option params [required, String] :server_certificate_name
8404
8438
  # The name of the IAM server certificate whose tags you want to see.
8405
8439
  #
8406
- # This parameter accepts (through its [regex pattern][1]) a string of
8407
- # characters that consist of upper and lowercase alphanumeric characters
8440
+ # This parameter allows (through its [regex pattern][1]) a string of
8441
+ # characters consisting of upper and lowercase alphanumeric characters
8408
8442
  # with no spaces. You can also include any of the following characters:
8409
- # =,.@-
8443
+ # \_+=,.@-
8410
8444
  #
8411
8445
  #
8412
8446
  #
@@ -8419,16 +8453,15 @@ module Aws::IAM
8419
8453
  # to indicate where the next call should start.
8420
8454
  #
8421
8455
  # @option params [Integer] :max_items
8422
- # (Optional) Use this only when paginating results to indicate the
8423
- # maximum number of items that you want in the response. If additional
8424
- # items exist beyond the maximum that you specify, the `IsTruncated`
8425
- # response element is `true`.
8456
+ # Use this only when paginating results to indicate the maximum number
8457
+ # of items you want in the response. If additional items exist beyond
8458
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8426
8459
  #
8427
- # If you do not include this parameter, it defaults to 100. Note that
8428
- # IAM might return fewer results, even when more results are available.
8429
- # In that case, the `IsTruncated` response element returns `true`, and
8430
- # `Marker` contains a value to include in the subsequent call that tells
8431
- # the service where to continue from.
8460
+ # If you do not include this parameter, the number of items defaults to
8461
+ # 100. Note that IAM might return fewer results, even when there are
8462
+ # more results available. In that case, the `IsTruncated` response
8463
+ # element returns `true`, and `Marker` contains a value to include in
8464
+ # the subsequent call that tells the service where to continue from.
8432
8465
  #
8433
8466
  # @return [Types::ListServerCertificateTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8434
8467
  #
@@ -8469,8 +8502,8 @@ module Aws::IAM
8469
8502
  #
8470
8503
  # For more information about working with server certificates, see
8471
8504
  # [Working with server certificates][1] in the *IAM User Guide*. This
8472
- # topic also includes a list of AWS services that can use the server
8473
- # certificates that you manage with IAM.
8505
+ # topic also includes a list of Amazon Web Services services that can
8506
+ # use the server certificates that you manage with IAM.
8474
8507
  #
8475
8508
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8476
8509
  # attributes for the resource. For example, this operation does not
@@ -8561,8 +8594,8 @@ module Aws::IAM
8561
8594
  # empty list. The service-specific credentials returned by this
8562
8595
  # operation are used only for authenticating the IAM user to a specific
8563
8596
  # service. For more information about using service-specific credentials
8564
- # to authenticate to an AWS service, see [Set up service-specific
8565
- # credentials][1] in the AWS CodeCommit User Guide.
8597
+ # to authenticate to an Amazon Web Services service, see [Set up
8598
+ # service-specific credentials][1] in the CodeCommit User Guide.
8566
8599
  #
8567
8600
  #
8568
8601
  #
@@ -8583,9 +8616,9 @@ module Aws::IAM
8583
8616
  # [1]: http://wikipedia.org/wiki/regex
8584
8617
  #
8585
8618
  # @option params [String] :service_name
8586
- # Filters the returned results to only those for the specified AWS
8587
- # service. If not specified, then AWS returns service-specific
8588
- # credentials for all services.
8619
+ # Filters the returned results to only those for the specified Amazon
8620
+ # Web Services service. If not specified, then Amazon Web Services
8621
+ # returns service-specific credentials for all services.
8589
8622
  #
8590
8623
  # @return [Types::ListServiceSpecificCredentialsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8591
8624
  #
@@ -8626,11 +8659,11 @@ module Aws::IAM
8626
8659
  # and `Marker` parameters.
8627
8660
  #
8628
8661
  # If the `UserName` field is not specified, the user name is determined
8629
- # implicitly based on the AWS access key ID used to sign the request for
8630
- # this operation. This operation works for access keys under the AWS
8631
- # account. Consequently, you can use this operation to manage AWS
8632
- # account root user credentials even if the AWS account has no
8633
- # associated users.
8662
+ # implicitly based on the Amazon Web Services access key ID used to sign
8663
+ # the request for this operation. This operation works for access keys
8664
+ # under the account. Consequently, you can use this operation to manage
8665
+ # account root user credentials even if the account has no associated
8666
+ # users.
8634
8667
  #
8635
8668
  # @option params [String] :user_name
8636
8669
  # The name of the IAM user whose signing certificates you want to
@@ -8808,10 +8841,10 @@ module Aws::IAM
8808
8841
  # @option params [required, String] :user_name
8809
8842
  # The name of the IAM user whose tags you want to see.
8810
8843
  #
8811
- # This parameter accepts (through its [regex pattern][1]) a string of
8812
- # characters that consist of upper and lowercase alphanumeric characters
8844
+ # This parameter allows (through its [regex pattern][1]) a string of
8845
+ # characters consisting of upper and lowercase alphanumeric characters
8813
8846
  # with no spaces. You can also include any of the following characters:
8814
- # =,.@-
8847
+ # \_+=,.@-
8815
8848
  #
8816
8849
  #
8817
8850
  #
@@ -8824,16 +8857,15 @@ module Aws::IAM
8824
8857
  # to indicate where the next call should start.
8825
8858
  #
8826
8859
  # @option params [Integer] :max_items
8827
- # (Optional) Use this only when paginating results to indicate the
8828
- # maximum number of items that you want in the response. If additional
8829
- # items exist beyond the maximum that you specify, the `IsTruncated`
8830
- # response element is `true`.
8860
+ # Use this only when paginating results to indicate the maximum number
8861
+ # of items you want in the response. If additional items exist beyond
8862
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8831
8863
  #
8832
- # If you do not include this parameter, it defaults to 100. Note that
8833
- # IAM might return fewer results, even when more results are available.
8834
- # In that case, the `IsTruncated` response element returns `true`, and
8835
- # `Marker` contains a value to include in the subsequent call that tells
8836
- # the service where to continue from.
8864
+ # If you do not include this parameter, the number of items defaults to
8865
+ # 100. Note that IAM might return fewer results, even when there are
8866
+ # more results available. In that case, the `IsTruncated` response
8867
+ # element returns `true`, and `Marker` contains a value to include in
8868
+ # the subsequent call that tells the service where to continue from.
8837
8869
  #
8838
8870
  # @return [Types::ListUserTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8839
8871
  #
@@ -8841,6 +8873,8 @@ module Aws::IAM
8841
8873
  # * {Types::ListUserTagsResponse#is_truncated #is_truncated} => Boolean
8842
8874
  # * {Types::ListUserTagsResponse#marker #marker} => String
8843
8875
  #
8876
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
8877
+ #
8844
8878
  #
8845
8879
  # @example Example: To list the tags attached to an IAM user
8846
8880
  #
@@ -8891,8 +8925,8 @@ module Aws::IAM
8891
8925
  end
8892
8926
 
8893
8927
  # Lists the IAM users that have the specified path prefix. If no path
8894
- # prefix is specified, the operation returns all users in the AWS
8895
- # account. If there are none, the operation returns an empty list.
8928
+ # prefix is specified, the operation returns all users in the account.
8929
+ # If there are none, the operation returns an empty list.
8896
8930
  #
8897
8931
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8898
8932
  # attributes for the resource. For example, this operation does not
@@ -9010,7 +9044,7 @@ module Aws::IAM
9010
9044
  req.send_request(options)
9011
9045
  end
9012
9046
 
9013
- # Lists the virtual MFA devices defined in the AWS account by assignment
9047
+ # Lists the virtual MFA devices defined in the account by assignment
9014
9048
  # status. If you do not specify an assignment status, the operation
9015
9049
  # returns a list of all virtual MFA devices. Assignment status can be
9016
9050
  # `Assigned`, `Unassigned`, or `Any`.
@@ -9169,10 +9203,10 @@ module Aws::IAM
9169
9203
  # @option params [required, String] :policy_document
9170
9204
  # The policy document.
9171
9205
  #
9172
- # You must provide policies in JSON format in IAM. However, for AWS
9206
+ # You must provide policies in JSON format in IAM. However, for
9173
9207
  # CloudFormation templates formatted in YAML, you can provide the policy
9174
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9175
- # policy to JSON format before submitting it to IAM.
9208
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9209
+ # to JSON format before submitting it to = IAM.
9176
9210
  #
9177
9211
  # The [regex pattern][1] used to validate this parameter is a string of
9178
9212
  # characters consisting of the following:
@@ -9221,11 +9255,11 @@ module Aws::IAM
9221
9255
  end
9222
9256
 
9223
9257
  # Adds or updates the policy that is specified as the IAM role's
9224
- # permissions boundary. You can use an AWS managed policy or a customer
9225
- # managed policy to set the boundary for a role. Use the boundary to
9226
- # control the maximum permissions that the role can have. Setting a
9227
- # permissions boundary is an advanced feature that can affect the
9228
- # permissions for the role.
9258
+ # permissions boundary. You can use an Amazon Web Services managed
9259
+ # policy or a customer managed policy to set the boundary for a role.
9260
+ # Use the boundary to control the maximum permissions that the role can
9261
+ # have. Setting a permissions boundary is an advanced feature that can
9262
+ # affect the permissions for the role.
9229
9263
  #
9230
9264
  # You cannot set the boundary for a service-linked role.
9231
9265
  #
@@ -9324,10 +9358,10 @@ module Aws::IAM
9324
9358
  # @option params [required, String] :policy_document
9325
9359
  # The policy document.
9326
9360
  #
9327
- # You must provide policies in JSON format in IAM. However, for AWS
9361
+ # You must provide policies in JSON format in IAM. However, for
9328
9362
  # CloudFormation templates formatted in YAML, you can provide the policy
9329
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9330
- # policy to JSON format before submitting it to IAM.
9363
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9364
+ # to JSON format before submitting it to IAM.
9331
9365
  #
9332
9366
  # The [regex pattern][1] used to validate this parameter is a string of
9333
9367
  # characters consisting of the following:
@@ -9376,11 +9410,11 @@ module Aws::IAM
9376
9410
  end
9377
9411
 
9378
9412
  # Adds or updates the policy that is specified as the IAM user's
9379
- # permissions boundary. You can use an AWS managed policy or a customer
9380
- # managed policy to set the boundary for a user. Use the boundary to
9381
- # control the maximum permissions that the user can have. Setting a
9382
- # permissions boundary is an advanced feature that can affect the
9383
- # permissions for the user.
9413
+ # permissions boundary. You can use an Amazon Web Services managed
9414
+ # policy or a customer managed policy to set the boundary for a user.
9415
+ # Use the boundary to control the maximum permissions that the user can
9416
+ # have. Setting a permissions boundary is an advanced feature that can
9417
+ # affect the permissions for the user.
9384
9418
  #
9385
9419
  # Policies that are used as permissions boundaries do not provide
9386
9420
  # permissions. You must also attach a permissions policy to the user. To
@@ -9469,10 +9503,10 @@ module Aws::IAM
9469
9503
  # @option params [required, String] :policy_document
9470
9504
  # The policy document.
9471
9505
  #
9472
- # You must provide policies in JSON format in IAM. However, for AWS
9506
+ # You must provide policies in JSON format in IAM. However, for
9473
9507
  # CloudFormation templates formatted in YAML, you can provide the policy
9474
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9475
- # policy to JSON format before submitting it to IAM.
9508
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9509
+ # to JSON format before submitting it to IAM.
9476
9510
  #
9477
9511
  # The [regex pattern][1] used to validate this parameter is a string of
9478
9512
  # characters consisting of the following:
@@ -9533,7 +9567,7 @@ module Aws::IAM
9533
9567
  # using the ListOpenIDConnectProviders operation.
9534
9568
  #
9535
9569
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9536
- # in the *AWS General Reference*.
9570
+ # in the *Amazon Web Services General Reference*.
9537
9571
  #
9538
9572
  #
9539
9573
  #
@@ -9686,9 +9720,10 @@ module Aws::IAM
9686
9720
  end
9687
9721
 
9688
9722
  # Resets the password for a service-specific credential. The new
9689
- # password is AWS generated and cryptographically strong. It cannot be
9690
- # configured by the user. Resetting the password immediately invalidates
9691
- # the previous password associated with this user.
9723
+ # password is Amazon Web Services generated and cryptographically
9724
+ # strong. It cannot be configured by the user. Resetting the password
9725
+ # immediately invalidates the previous password associated with this
9726
+ # user.
9692
9727
  #
9693
9728
  # @option params [String] :user_name
9694
9729
  # The name of the IAM user associated with the service-specific
@@ -9746,7 +9781,7 @@ module Aws::IAM
9746
9781
  end
9747
9782
 
9748
9783
  # Synchronizes the specified MFA device with its IAM resource object on
9749
- # the AWS servers.
9784
+ # the Amazon Web Services servers.
9750
9785
  #
9751
9786
  # For more information about creating and working with virtual MFA
9752
9787
  # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
@@ -9828,7 +9863,7 @@ module Aws::IAM
9828
9863
  # you want to set.
9829
9864
  #
9830
9865
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9831
- # in the *AWS General Reference*.
9866
+ # in the *Amazon Web Services General Reference*.
9832
9867
  #
9833
9868
  #
9834
9869
  #
@@ -9863,25 +9898,25 @@ module Aws::IAM
9863
9898
  end
9864
9899
 
9865
9900
  # Sets the specified version of the global endpoint token as the token
9866
- # version used for the AWS account.
9901
+ # version used for the account.
9867
9902
  #
9868
- # By default, AWS Security Token Service (STS) is available as a global
9903
+ # By default, Security Token Service (STS) is available as a global
9869
9904
  # service, and all STS requests go to a single endpoint at
9870
- # `https://sts.amazonaws.com`. AWS recommends using Regional STS
9871
- # endpoints to reduce latency, build in redundancy, and increase session
9872
- # token availability. For information about Regional endpoints for STS,
9873
- # see [AWS AWS Security Token Service endpoints and quotas][1] in the
9874
- # *AWS General Reference*.
9905
+ # `https://sts.amazonaws.com`. Amazon Web Services recommends using
9906
+ # Regional STS endpoints to reduce latency, build in redundancy, and
9907
+ # increase session token availability. For information about Regional
9908
+ # endpoints for STS, see [Security Token Service endpoints and
9909
+ # quotas][1] in the *Amazon Web Services General Reference*.
9875
9910
  #
9876
9911
  # If you make an STS call to the global endpoint, the resulting session
9877
9912
  # tokens might be valid in some Regions but not others. It depends on
9878
9913
  # the version that is set in this operation. Version 1 tokens are valid
9879
- # only in AWS Regions that are available by default. These tokens do not
9914
+ # only in Regions that are available by default. These tokens do not
9880
9915
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9881
9916
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9882
9917
  # are longer and might affect systems where you temporarily store
9883
9918
  # tokens. For information, see [Activating and deactivating STS in an
9884
- # AWS region][2] in the *IAM User Guide*.
9919
+ # Region][2] in the *IAM User Guide*.
9885
9920
  #
9886
9921
  # To view the current session token version, see the
9887
9922
  # `GlobalEndpointTokenVersion` entry in the response of the
@@ -9894,14 +9929,14 @@ module Aws::IAM
9894
9929
  #
9895
9930
  # @option params [required, String] :global_endpoint_token_version
9896
9931
  # The version of the global endpoint token. Version 1 tokens are valid
9897
- # only in AWS Regions that are available by default. These tokens do not
9932
+ # only in Regions that are available by default. These tokens do not
9898
9933
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9899
9934
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9900
9935
  # are longer and might affect systems where you temporarily store
9901
9936
  # tokens.
9902
9937
  #
9903
- # For information, see [Activating and deactivating STS in an AWS
9904
- # region][1] in the *IAM User Guide*.
9938
+ # For information, see [Activating and deactivating STS in an Region][1]
9939
+ # in the *IAM User Guide*.
9905
9940
  #
9906
9941
  #
9907
9942
  #
@@ -9934,9 +9969,9 @@ module Aws::IAM
9934
9969
  end
9935
9970
 
9936
9971
  # Simulate how a set of IAM policies and optionally a resource-based
9937
- # policy works with a list of API operations and AWS resources to
9938
- # determine the policies' effective permissions. The policies are
9939
- # provided as strings.
9972
+ # policy works with a list of API operations and Amazon Web Services
9973
+ # resources to determine the policies' effective permissions. The
9974
+ # policies are provided as strings.
9940
9975
  #
9941
9976
  # The simulation does not perform the API operations; it only checks the
9942
9977
  # authorization to determine if the simulated policies allow or deny the
@@ -9946,11 +9981,12 @@ module Aws::IAM
9946
9981
  # If you want to simulate existing policies that are attached to an IAM
9947
9982
  # user, group, or role, use SimulatePrincipalPolicy instead.
9948
9983
  #
9949
- # Context keys are variables that are maintained by AWS and its services
9950
- # and which provide details about the context of an API query request.
9951
- # You can use the `Condition` element of an IAM policy to evaluate
9952
- # context keys. To get the list of context keys that the policies
9953
- # require for correct simulation, use GetContextKeysForCustomPolicy.
9984
+ # Context keys are variables that are maintained by Amazon Web Services
9985
+ # and its services and which provide details about the context of an API
9986
+ # query request. You can use the `Condition` element of an IAM policy to
9987
+ # evaluate context keys. To get the list of context keys that the
9988
+ # policies require for correct simulation, use
9989
+ # GetContextKeysForCustomPolicy.
9954
9990
  #
9955
9991
  # If the output is long, you can use `MaxItems` and `Marker` parameters
9956
9992
  # to paginate the results.
@@ -9974,7 +10010,12 @@ module Aws::IAM
9974
10010
  # In other words, do not use policies designed to restrict what a user
9975
10011
  # can do while using the temporary credentials.
9976
10012
  #
9977
- # The [regex pattern][3] used to validate this parameter is a string of
10013
+ # The maximum length of the policy document that you can pass in this
10014
+ # operation, including whitespace, is listed below. To view the maximum
10015
+ # character counts of a managed policy with no whitespaces, see [IAM and
10016
+ # STS character quotas][3].
10017
+ #
10018
+ # The [regex pattern][4] used to validate this parameter is a string of
9978
10019
  # characters consisting of the following:
9979
10020
  #
9980
10021
  # * Any printable ASCII character ranging from the space character
@@ -9990,7 +10031,8 @@ module Aws::IAM
9990
10031
  #
9991
10032
  # [1]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetFederationToken.html
9992
10033
  # [2]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_AssumeRole.html
9993
- # [3]: http://wikipedia.org/wiki/regex
10034
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10035
+ # [4]: http://wikipedia.org/wiki/regex
9994
10036
  #
9995
10037
  # @option params [Array<String>] :permissions_boundary_policy_input_list
9996
10038
  # The IAM permissions boundary policy to simulate. The permissions
@@ -10001,7 +10043,12 @@ module Aws::IAM
10001
10043
  # The policy input is specified as a string that contains the complete,
10002
10044
  # valid JSON text of a permissions boundary policy.
10003
10045
  #
10004
- # The [regex pattern][2] used to validate this parameter is a string of
10046
+ # The maximum length of the policy document that you can pass in this
10047
+ # operation, including whitespace, is listed below. To view the maximum
10048
+ # character counts of a managed policy with no whitespaces, see [IAM and
10049
+ # STS character quotas][2].
10050
+ #
10051
+ # The [regex pattern][3] used to validate this parameter is a string of
10005
10052
  # characters consisting of the following:
10006
10053
  #
10007
10054
  # * Any printable ASCII character ranging from the space character
@@ -10016,7 +10063,8 @@ module Aws::IAM
10016
10063
  #
10017
10064
  #
10018
10065
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10019
- # [2]: http://wikipedia.org/wiki/regex
10066
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10067
+ # [3]: http://wikipedia.org/wiki/regex
10020
10068
  #
10021
10069
  # @option params [required, Array<String>] :action_names
10022
10070
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10025,13 +10073,13 @@ module Aws::IAM
10025
10073
  # operation does not support using wildcards (*) in an action name.
10026
10074
  #
10027
10075
  # @option params [Array<String>] :resource_arns
10028
- # A list of ARNs of AWS resources to include in the simulation. If this
10029
- # parameter is not provided, then the value defaults to `*` (all
10030
- # resources). Each API in the `ActionNames` parameter is evaluated for
10031
- # each resource in this list. The simulation determines the access
10032
- # result (allowed or denied) of each combination and reports it in the
10033
- # response. You can simulate resources that don't exist in your
10034
- # account.
10076
+ # A list of ARNs of Amazon Web Services resources to include in the
10077
+ # simulation. If this parameter is not provided, then the value defaults
10078
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10079
+ # evaluated for each resource in this list. The simulation determines
10080
+ # the access result (allowed or denied) of each combination and reports
10081
+ # it in the response. You can simulate resources that don't exist in
10082
+ # your account.
10035
10083
  #
10036
10084
  # The simulation does not automatically retrieve policies for the
10037
10085
  # specified resources. If you want to include a resource policy in the
@@ -10043,7 +10091,7 @@ module Aws::IAM
10043
10091
  # input error.
10044
10092
  #
10045
10093
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10046
- # in the *AWS General Reference*.
10094
+ # in the *Amazon Web Services General Reference*.
10047
10095
  #
10048
10096
  #
10049
10097
  #
@@ -10055,7 +10103,12 @@ module Aws::IAM
10055
10103
  # policy attached. You can include only one resource-based policy in a
10056
10104
  # simulation.
10057
10105
  #
10058
- # The [regex pattern][1] used to validate this parameter is a string of
10106
+ # The maximum length of the policy document that you can pass in this
10107
+ # operation, including whitespace, is listed below. To view the maximum
10108
+ # character counts of a managed policy with no whitespaces, see [IAM and
10109
+ # STS character quotas][1].
10110
+ #
10111
+ # The [regex pattern][2] used to validate this parameter is a string of
10059
10112
  # characters consisting of the following:
10060
10113
  #
10061
10114
  # * Any printable ASCII character ranging from the space character
@@ -10069,10 +10122,11 @@ module Aws::IAM
10069
10122
  #
10070
10123
  #
10071
10124
  #
10072
- # [1]: http://wikipedia.org/wiki/regex
10125
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10126
+ # [2]: http://wikipedia.org/wiki/regex
10073
10127
  #
10074
10128
  # @option params [String] :resource_owner
10075
- # An ARN representing the AWS account ID that specifies the owner of any
10129
+ # An ARN representing the account ID that specifies the owner of any
10076
10130
  # simulated resource that does not identify its owner in the resource
10077
10131
  # ARN. Examples of resource ARNs include an S3 bucket or object. If
10078
10132
  # `ResourceOwner` is specified, it is also used as the account owner of
@@ -10243,11 +10297,11 @@ module Aws::IAM
10243
10297
  end
10244
10298
 
10245
10299
  # Simulate how a set of IAM policies attached to an IAM entity works
10246
- # with a list of API operations and AWS resources to determine the
10247
- # policies' effective permissions. The entity can be an IAM user,
10248
- # group, or role. If you specify a user, then the simulation also
10249
- # includes all of the policies that are attached to groups that the user
10250
- # belongs to. You can simulate resources that don't exist in your
10300
+ # with a list of API operations and Amazon Web Services resources to
10301
+ # determine the policies' effective permissions. The entity can be an
10302
+ # IAM user, group, or role. If you specify a user, then the simulation
10303
+ # also includes all of the policies that are attached to groups that the
10304
+ # user belongs to. You can simulate resources that don't exist in your
10251
10305
  # account.
10252
10306
  #
10253
10307
  # You can optionally include a list of one or more additional policies
@@ -10267,11 +10321,12 @@ module Aws::IAM
10267
10321
  # permissions, then consider allowing them to use SimulateCustomPolicy
10268
10322
  # instead.
10269
10323
  #
10270
- # Context keys are variables maintained by AWS and its services that
10271
- # provide details about the context of an API query request. You can use
10272
- # the `Condition` element of an IAM policy to evaluate context keys. To
10273
- # get the list of context keys that the policies require for correct
10274
- # simulation, use GetContextKeysForPrincipalPolicy.
10324
+ # Context keys are variables maintained by Amazon Web Services and its
10325
+ # services that provide details about the context of an API query
10326
+ # request. You can use the `Condition` element of an IAM policy to
10327
+ # evaluate context keys. To get the list of context keys that the
10328
+ # policies require for correct simulation, use
10329
+ # GetContextKeysForPrincipalPolicy.
10275
10330
  #
10276
10331
  # If the output is long, you can use the `MaxItems` and `Marker`
10277
10332
  # parameters to paginate the results.
@@ -10292,12 +10347,18 @@ module Aws::IAM
10292
10347
  # also includes all policies that are attached to any groups the user
10293
10348
  # belongs to.
10294
10349
  #
10295
- # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10296
- # in the *AWS General Reference*.
10350
+ # The maximum length of the policy document that you can pass in this
10351
+ # operation, including whitespace, is listed below. To view the maximum
10352
+ # character counts of a managed policy with no whitespaces, see [IAM and
10353
+ # STS character quotas][1].
10297
10354
  #
10355
+ # For more information about ARNs, see [Amazon Resource Names (ARNs)][2]
10356
+ # in the *Amazon Web Services General Reference*.
10298
10357
  #
10299
10358
  #
10300
- # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10359
+ #
10360
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10361
+ # [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10301
10362
  #
10302
10363
  # @option params [Array<String>] :policy_input_list
10303
10364
  # An optional list of additional policy documents to include in the
@@ -10333,7 +10394,12 @@ module Aws::IAM
10333
10394
  # Guide*. The policy input is specified as a string containing the
10334
10395
  # complete, valid JSON text of a permissions boundary policy.
10335
10396
  #
10336
- # The [regex pattern][2] used to validate this parameter is a string of
10397
+ # The maximum length of the policy document that you can pass in this
10398
+ # operation, including whitespace, is listed below. To view the maximum
10399
+ # character counts of a managed policy with no whitespaces, see [IAM and
10400
+ # STS character quotas][2].
10401
+ #
10402
+ # The [regex pattern][3] used to validate this parameter is a string of
10337
10403
  # characters consisting of the following:
10338
10404
  #
10339
10405
  # * Any printable ASCII character ranging from the space character
@@ -10348,7 +10414,8 @@ module Aws::IAM
10348
10414
  #
10349
10415
  #
10350
10416
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10351
- # [2]: http://wikipedia.org/wiki/regex
10417
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10418
+ # [3]: http://wikipedia.org/wiki/regex
10352
10419
  #
10353
10420
  # @option params [required, Array<String>] :action_names
10354
10421
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10356,13 +10423,13 @@ module Aws::IAM
10356
10423
  # the service identifier, such as `iam:CreateUser`.
10357
10424
  #
10358
10425
  # @option params [Array<String>] :resource_arns
10359
- # A list of ARNs of AWS resources to include in the simulation. If this
10360
- # parameter is not provided, then the value defaults to `*` (all
10361
- # resources). Each API in the `ActionNames` parameter is evaluated for
10362
- # each resource in this list. The simulation determines the access
10363
- # result (allowed or denied) of each combination and reports it in the
10364
- # response. You can simulate resources that don't exist in your
10365
- # account.
10426
+ # A list of ARNs of Amazon Web Services resources to include in the
10427
+ # simulation. If this parameter is not provided, then the value defaults
10428
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10429
+ # evaluated for each resource in this list. The simulation determines
10430
+ # the access result (allowed or denied) of each combination and reports
10431
+ # it in the response. You can simulate resources that don't exist in
10432
+ # your account.
10366
10433
  #
10367
10434
  # The simulation does not automatically retrieve policies for the
10368
10435
  # specified resources. If you want to include a resource policy in the
@@ -10370,7 +10437,7 @@ module Aws::IAM
10370
10437
  # `ResourcePolicy` parameter.
10371
10438
  #
10372
10439
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10373
- # in the *AWS General Reference*.
10440
+ # in the *Amazon Web Services General Reference*.
10374
10441
  #
10375
10442
  #
10376
10443
  #
@@ -10382,7 +10449,12 @@ module Aws::IAM
10382
10449
  # policy attached. You can include only one resource-based policy in a
10383
10450
  # simulation.
10384
10451
  #
10385
- # The [regex pattern][1] used to validate this parameter is a string of
10452
+ # The maximum length of the policy document that you can pass in this
10453
+ # operation, including whitespace, is listed below. To view the maximum
10454
+ # character counts of a managed policy with no whitespaces, see [IAM and
10455
+ # STS character quotas][1].
10456
+ #
10457
+ # The [regex pattern][2] used to validate this parameter is a string of
10386
10458
  # characters consisting of the following:
10387
10459
  #
10388
10460
  # * Any printable ASCII character ranging from the space character
@@ -10396,19 +10468,20 @@ module Aws::IAM
10396
10468
  #
10397
10469
  #
10398
10470
  #
10399
- # [1]: http://wikipedia.org/wiki/regex
10471
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10472
+ # [2]: http://wikipedia.org/wiki/regex
10400
10473
  #
10401
10474
  # @option params [String] :resource_owner
10402
- # An AWS account ID that specifies the owner of any simulated resource
10403
- # that does not identify its owner in the resource ARN. Examples of
10404
- # resource ARNs include an S3 bucket or object. If `ResourceOwner` is
10405
- # specified, it is also used as the account owner of any
10406
- # `ResourcePolicy` included in the simulation. If the `ResourceOwner`
10407
- # parameter is not specified, then the owner of the resources and the
10408
- # resource policy defaults to the account of the identity provided in
10409
- # `CallerArn`. This parameter is required only if you specify a
10410
- # resource-based policy and account that owns the resource is different
10411
- # from the account that owns the simulated calling user `CallerArn`.
10475
+ # An account ID that specifies the owner of any simulated resource that
10476
+ # does not identify its owner in the resource ARN. Examples of resource
10477
+ # ARNs include an S3 bucket or object. If `ResourceOwner` is specified,
10478
+ # it is also used as the account owner of any `ResourcePolicy` included
10479
+ # in the simulation. If the `ResourceOwner` parameter is not specified,
10480
+ # then the owner of the resources and the resource policy defaults to
10481
+ # the account of the identity provided in `CallerArn`. This parameter is
10482
+ # required only if you specify a resource-based policy and account that
10483
+ # owns the resource is different from the account that owns the
10484
+ # simulated calling user `CallerArn`.
10412
10485
  #
10413
10486
  # @option params [String] :caller_arn
10414
10487
  # The ARN of the IAM user that you want to specify as the simulated
@@ -10429,7 +10502,7 @@ module Aws::IAM
10429
10502
  # use in evaluating the policy.
10430
10503
  #
10431
10504
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10432
- # in the *AWS General Reference*.
10505
+ # in the *Amazon Web Services General Reference*.
10433
10506
  #
10434
10507
  #
10435
10508
  #
@@ -10604,9 +10677,10 @@ module Aws::IAM
10604
10677
  # resource is not created. For more information about tagging, see
10605
10678
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10606
10679
  #
10607
- # * AWS always interprets the tag `Value` as a single string. If you
10608
- # need to store an array, you can store comma-separated values in the
10609
- # string. However, you must interpret the value in your code.
10680
+ # * Amazon Web Services always interprets the tag `Value` as a single
10681
+ # string. If you need to store an array, you can store comma-separated
10682
+ # values in the string. However, you must interpret the value in your
10683
+ # code.
10610
10684
  #
10611
10685
  # </note>
10612
10686
  #
@@ -10618,10 +10692,10 @@ module Aws::IAM
10618
10692
  # @option params [required, String] :instance_profile_name
10619
10693
  # The name of the IAM instance profile to which you want to add tags.
10620
10694
  #
10621
- # This parameter accepts (through its [regex pattern][1]) a string of
10622
- # characters that consist of upper and lowercase alphanumeric characters
10695
+ # This parameter allows (through its [regex pattern][1]) a string of
10696
+ # characters consisting of upper and lowercase alphanumeric characters
10623
10697
  # with no spaces. You can also include any of the following characters:
10624
- # =,.@-
10698
+ # \_+=,.@-
10625
10699
  #
10626
10700
  #
10627
10701
  #
@@ -10678,9 +10752,10 @@ module Aws::IAM
10678
10752
  # resource is not created. For more information about tagging, see
10679
10753
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10680
10754
  #
10681
- # * AWS always interprets the tag `Value` as a single string. If you
10682
- # need to store an array, you can store comma-separated values in the
10683
- # string. However, you must interpret the value in your code.
10755
+ # * Amazon Web Services always interprets the tag `Value` as a single
10756
+ # string. If you need to store an array, you can store comma-separated
10757
+ # values in the string. However, you must interpret the value in your
10758
+ # code.
10684
10759
  #
10685
10760
  # </note>
10686
10761
  #
@@ -10694,10 +10769,10 @@ module Aws::IAM
10694
10769
  # to add tags. For virtual MFA devices, the serial number is the same as
10695
10770
  # the ARN.
10696
10771
  #
10697
- # This parameter accepts (through its [regex pattern][1]) a string of
10698
- # characters that consist of upper and lowercase alphanumeric characters
10772
+ # This parameter allows (through its [regex pattern][1]) a string of
10773
+ # characters consisting of upper and lowercase alphanumeric characters
10699
10774
  # with no spaces. You can also include any of the following characters:
10700
- # =,.@-
10775
+ # \_+=,.@-
10701
10776
  #
10702
10777
  #
10703
10778
  #
@@ -10755,9 +10830,10 @@ module Aws::IAM
10755
10830
  # resource is not created. For more information about tagging, see
10756
10831
  # [Tagging IAM resources][3] in the *IAM User Guide*.
10757
10832
  #
10758
- # * AWS always interprets the tag `Value` as a single string. If you
10759
- # need to store an array, you can store comma-separated values in the
10760
- # string. However, you must interpret the value in your code.
10833
+ # * Amazon Web Services always interprets the tag `Value` as a single
10834
+ # string. If you need to store an array, you can store comma-separated
10835
+ # values in the string. However, you must interpret the value in your
10836
+ # code.
10761
10837
  #
10762
10838
  # </note>
10763
10839
  #
@@ -10771,10 +10847,10 @@ module Aws::IAM
10771
10847
  # The ARN of the OIDC identity provider in IAM to which you want to add
10772
10848
  # tags.
10773
10849
  #
10774
- # This parameter accepts (through its [regex pattern][1]) a string of
10775
- # characters that consist of upper and lowercase alphanumeric characters
10850
+ # This parameter allows (through its [regex pattern][1]) a string of
10851
+ # characters consisting of upper and lowercase alphanumeric characters
10776
10852
  # with no spaces. You can also include any of the following characters:
10777
- # =,.@-
10853
+ # \_+=,.@-
10778
10854
  #
10779
10855
  #
10780
10856
  #
@@ -10832,9 +10908,10 @@ module Aws::IAM
10832
10908
  # resource is not created. For more information about tagging, see
10833
10909
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10834
10910
  #
10835
- # * AWS always interprets the tag `Value` as a single string. If you
10836
- # need to store an array, you can store comma-separated values in the
10837
- # string. However, you must interpret the value in your code.
10911
+ # * Amazon Web Services always interprets the tag `Value` as a single
10912
+ # string. If you need to store an array, you can store comma-separated
10913
+ # values in the string. However, you must interpret the value in your
10914
+ # code.
10838
10915
  #
10839
10916
  # </note>
10840
10917
  #
@@ -10847,10 +10924,10 @@ module Aws::IAM
10847
10924
  # The ARN of the IAM customer managed policy to which you want to add
10848
10925
  # tags.
10849
10926
  #
10850
- # This parameter accepts (through its [regex pattern][1]) a string of
10851
- # characters that consist of upper and lowercase alphanumeric characters
10927
+ # This parameter allows (through its [regex pattern][1]) a string of
10928
+ # characters consisting of upper and lowercase alphanumeric characters
10852
10929
  # with no spaces. You can also include any of the following characters:
10853
- # =,.@-
10930
+ # \_+=,.@-
10854
10931
  #
10855
10932
  #
10856
10933
  #
@@ -10904,16 +10981,17 @@ module Aws::IAM
10904
10981
  # see [Control access using IAM tags][1] in the *IAM User Guide*.
10905
10982
  #
10906
10983
  # * **Cost allocation** - Use tags to help track which individuals and
10907
- # teams are using which AWS resources.
10984
+ # teams are using which Amazon Web Services resources.
10908
10985
  #
10909
10986
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
10910
10987
  # maximum number of tags, then the entire request fails and the
10911
10988
  # resource is not created. For more information about tagging, see
10912
10989
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10913
10990
  #
10914
- # * AWS always interprets the tag `Value` as a single string. If you
10915
- # need to store an array, you can store comma-separated values in the
10916
- # string. However, you must interpret the value in your code.
10991
+ # * Amazon Web Services always interprets the tag `Value` as a single
10992
+ # string. If you need to store an array, you can store comma-separated
10993
+ # values in the string. However, you must interpret the value in your
10994
+ # code.
10917
10995
  #
10918
10996
  # </note>
10919
10997
  #
@@ -11008,9 +11086,10 @@ module Aws::IAM
11008
11086
  # resource is not created. For more information about tagging, see
11009
11087
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11010
11088
  #
11011
- # * AWS always interprets the tag `Value` as a single string. If you
11012
- # need to store an array, you can store comma-separated values in the
11013
- # string. However, you must interpret the value in your code.
11089
+ # * Amazon Web Services always interprets the tag `Value` as a single
11090
+ # string. If you need to store an array, you can store comma-separated
11091
+ # values in the string. However, you must interpret the value in your
11092
+ # code.
11014
11093
  #
11015
11094
  # </note>
11016
11095
  #
@@ -11024,10 +11103,10 @@ module Aws::IAM
11024
11103
  # The ARN of the SAML identity provider in IAM to which you want to add
11025
11104
  # tags.
11026
11105
  #
11027
- # This parameter accepts (through its [regex pattern][1]) a string of
11028
- # characters that consist of upper and lowercase alphanumeric characters
11106
+ # This parameter allows (through its [regex pattern][1]) a string of
11107
+ # characters consisting of upper and lowercase alphanumeric characters
11029
11108
  # with no spaces. You can also include any of the following characters:
11030
- # =,.@-
11109
+ # \_+=,.@-
11031
11110
  #
11032
11111
  #
11033
11112
  #
@@ -11064,11 +11143,11 @@ module Aws::IAM
11064
11143
  # same key name already exists, then that tag is overwritten with the
11065
11144
  # new value.
11066
11145
  #
11067
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11068
- # (ACM), we recommend that you don't use IAM server certificates.
11069
- # Instead, use ACM to provision, manage, and deploy your server
11070
- # certificates. For more information about IAM server certificates,
11071
- # [Working with server certificates][1] in the *IAM User Guide*.
11146
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11147
+ # we recommend that you don't use IAM server certificates. Instead, use
11148
+ # ACM to provision, manage, and deploy your server certificates. For
11149
+ # more information about IAM server certificates, [Working with server
11150
+ # certificates][1] in the *IAM User Guide*.
11072
11151
  #
11073
11152
  # </note>
11074
11153
  #
@@ -11088,16 +11167,17 @@ module Aws::IAM
11088
11167
  # [Control access using IAM tags][2] in the *IAM User Guide*.
11089
11168
  #
11090
11169
  # * **Cost allocation** - Use tags to help track which individuals and
11091
- # teams are using which AWS resources.
11170
+ # teams are using which Amazon Web Services resources.
11092
11171
  #
11093
11172
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11094
11173
  # maximum number of tags, then the entire request fails and the
11095
11174
  # resource is not created. For more information about tagging, see
11096
11175
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11097
11176
  #
11098
- # * AWS always interprets the tag `Value` as a single string. If you
11099
- # need to store an array, you can store comma-separated values in the
11100
- # string. However, you must interpret the value in your code.
11177
+ # * Amazon Web Services always interprets the tag `Value` as a single
11178
+ # string. If you need to store an array, you can store comma-separated
11179
+ # values in the string. However, you must interpret the value in your
11180
+ # code.
11101
11181
  #
11102
11182
  # </note>
11103
11183
  #
@@ -11110,10 +11190,10 @@ module Aws::IAM
11110
11190
  # @option params [required, String] :server_certificate_name
11111
11191
  # The name of the IAM server certificate to which you want to add tags.
11112
11192
  #
11113
- # This parameter accepts (through its [regex pattern][1]) a string of
11114
- # characters that consist of upper and lowercase alphanumeric characters
11193
+ # This parameter allows (through its [regex pattern][1]) a string of
11194
+ # characters consisting of upper and lowercase alphanumeric characters
11115
11195
  # with no spaces. You can also include any of the following characters:
11116
- # =,.@-
11196
+ # \_+=,.@-
11117
11197
  #
11118
11198
  #
11119
11199
  #
@@ -11167,16 +11247,17 @@ module Aws::IAM
11167
11247
  # User Guide*.
11168
11248
  #
11169
11249
  # * **Cost allocation** - Use tags to help track which individuals and
11170
- # teams are using which AWS resources.
11250
+ # teams are using which Amazon Web Services resources.
11171
11251
  #
11172
11252
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11173
11253
  # maximum number of tags, then the entire request fails and the
11174
11254
  # resource is not created. For more information about tagging, see
11175
11255
  # [Tagging IAM resources][2] in the *IAM User Guide*.
11176
11256
  #
11177
- # * AWS always interprets the tag `Value` as a single string. If you
11178
- # need to store an array, you can store comma-separated values in the
11179
- # string. However, you must interpret the value in your code.
11257
+ # * Amazon Web Services always interprets the tag `Value` as a single
11258
+ # string. If you need to store an array, you can store comma-separated
11259
+ # values in the string. However, you must interpret the value in your
11260
+ # code.
11180
11261
  #
11181
11262
  # </note>
11182
11263
  #
@@ -11191,10 +11272,10 @@ module Aws::IAM
11191
11272
  # @option params [required, String] :user_name
11192
11273
  # The name of the IAM user to which you want to add tags.
11193
11274
  #
11194
- # This parameter accepts (through its [regex pattern][1]) a string of
11195
- # characters that consist of upper and lowercase alphanumeric characters
11275
+ # This parameter allows (through its [regex pattern][1]) a string of
11276
+ # characters consisting of upper and lowercase alphanumeric characters
11196
11277
  # with no spaces. You can also include any of the following characters:
11197
- # =,.@-
11278
+ # \_+=,.@-
11198
11279
  #
11199
11280
  #
11200
11281
  #
@@ -11258,10 +11339,10 @@ module Aws::IAM
11258
11339
  # The name of the IAM instance profile from which you want to remove
11259
11340
  # tags.
11260
11341
  #
11261
- # This parameter accepts (through its [regex pattern][1]) a string of
11262
- # characters that consist of upper and lowercase alphanumeric characters
11342
+ # This parameter allows (through its [regex pattern][1]) a string of
11343
+ # characters consisting of upper and lowercase alphanumeric characters
11263
11344
  # with no spaces. You can also include any of the following characters:
11264
- # =,.@-
11345
+ # \_+=,.@-
11265
11346
  #
11266
11347
  #
11267
11348
  #
@@ -11302,10 +11383,10 @@ module Aws::IAM
11302
11383
  # want to remove tags. For virtual MFA devices, the serial number is the
11303
11384
  # same as the ARN.
11304
11385
  #
11305
- # This parameter accepts (through its [regex pattern][1]) a string of
11306
- # characters that consist of upper and lowercase alphanumeric characters
11386
+ # This parameter allows (through its [regex pattern][1]) a string of
11387
+ # characters consisting of upper and lowercase alphanumeric characters
11307
11388
  # with no spaces. You can also include any of the following characters:
11308
- # =,.@-
11389
+ # \_+=,.@-
11309
11390
  #
11310
11391
  #
11311
11392
  #
@@ -11348,10 +11429,10 @@ module Aws::IAM
11348
11429
  # The ARN of the OIDC provider in IAM from which you want to remove
11349
11430
  # tags.
11350
11431
  #
11351
- # This parameter accepts (through its [regex pattern][1]) a string of
11352
- # characters that consist of upper and lowercase alphanumeric characters
11432
+ # This parameter allows (through its [regex pattern][1]) a string of
11433
+ # characters consisting of upper and lowercase alphanumeric characters
11353
11434
  # with no spaces. You can also include any of the following characters:
11354
- # =,.@-
11435
+ # \_+=,.@-
11355
11436
  #
11356
11437
  #
11357
11438
  #
@@ -11391,10 +11472,10 @@ module Aws::IAM
11391
11472
  # The ARN of the IAM customer managed policy from which you want to
11392
11473
  # remove tags.
11393
11474
  #
11394
- # This parameter accepts (through its [regex pattern][1]) a string of
11395
- # characters that consist of upper and lowercase alphanumeric characters
11475
+ # This parameter allows (through its [regex pattern][1]) a string of
11476
+ # characters consisting of upper and lowercase alphanumeric characters
11396
11477
  # with no spaces. You can also include any of the following characters:
11397
- # =,.@-
11478
+ # \_+=,.@-
11398
11479
  #
11399
11480
  #
11400
11481
  #
@@ -11490,10 +11571,10 @@ module Aws::IAM
11490
11571
  # The ARN of the SAML identity provider in IAM from which you want to
11491
11572
  # remove tags.
11492
11573
  #
11493
- # This parameter accepts (through its [regex pattern][1]) a string of
11494
- # characters that consist of upper and lowercase alphanumeric characters
11574
+ # This parameter allows (through its [regex pattern][1]) a string of
11575
+ # characters consisting of upper and lowercase alphanumeric characters
11495
11576
  # with no spaces. You can also include any of the following characters:
11496
- # =,.@-
11577
+ # \_+=,.@-
11497
11578
  #
11498
11579
  #
11499
11580
  #
@@ -11525,11 +11606,11 @@ module Aws::IAM
11525
11606
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
11526
11607
  # User Guide*.
11527
11608
  #
11528
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11529
- # (ACM), we recommend that you don't use IAM server certificates.
11530
- # Instead, use ACM to provision, manage, and deploy your server
11531
- # certificates. For more information about IAM server certificates,
11532
- # [Working with server certificates][2] in the *IAM User Guide*.
11609
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11610
+ # we recommend that you don't use IAM server certificates. Instead, use
11611
+ # ACM to provision, manage, and deploy your server certificates. For
11612
+ # more information about IAM server certificates, [Working with server
11613
+ # certificates][2] in the *IAM User Guide*.
11533
11614
  #
11534
11615
  # </note>
11535
11616
  #
@@ -11542,10 +11623,10 @@ module Aws::IAM
11542
11623
  # The name of the IAM server certificate from which you want to remove
11543
11624
  # tags.
11544
11625
  #
11545
- # This parameter accepts (through its [regex pattern][1]) a string of
11546
- # characters that consist of upper and lowercase alphanumeric characters
11626
+ # This parameter allows (through its [regex pattern][1]) a string of
11627
+ # characters consisting of upper and lowercase alphanumeric characters
11547
11628
  # with no spaces. You can also include any of the following characters:
11548
- # =,.@-
11629
+ # \_+=,.@-
11549
11630
  #
11550
11631
  #
11551
11632
  #
@@ -11583,10 +11664,10 @@ module Aws::IAM
11583
11664
  # @option params [required, String] :user_name
11584
11665
  # The name of the IAM user from which you want to remove tags.
11585
11666
  #
11586
- # This parameter accepts (through its [regex pattern][1]) a string of
11587
- # characters that consist of upper and lowercase alphanumeric characters
11667
+ # This parameter allows (through its [regex pattern][1]) a string of
11668
+ # characters consisting of upper and lowercase alphanumeric characters
11588
11669
  # with no spaces. You can also include any of the following characters:
11589
- # =,.@-
11670
+ # \_+=,.@-
11590
11671
  #
11591
11672
  #
11592
11673
  #
@@ -11631,10 +11712,10 @@ module Aws::IAM
11631
11712
  # user's key as part of a key rotation workflow.
11632
11713
  #
11633
11714
  # If the `UserName` is not specified, the user name is determined
11634
- # implicitly based on the AWS access key ID used to sign the request.
11635
- # This operation works for access keys under the AWS account.
11636
- # Consequently, you can use this operation to manage AWS account root
11637
- # user credentials even if the AWS account has no associated users.
11715
+ # implicitly based on the Amazon Web Services access key ID used to sign
11716
+ # the request. This operation works for access keys under the account.
11717
+ # Consequently, you can use this operation to manage account root user
11718
+ # credentials even if the account has no associated users.
11638
11719
  #
11639
11720
  # For information about rotating keys, see [Managing keys and
11640
11721
  # certificates][1] in the *IAM User Guide*.
@@ -11668,8 +11749,8 @@ module Aws::IAM
11668
11749
  #
11669
11750
  # @option params [required, String] :status
11670
11751
  # The status you want to assign to the secret access key. `Active` means
11671
- # that the key can be used for programmatic calls to AWS, while
11672
- # `Inactive` means that the key cannot be used.
11752
+ # that the key can be used for programmatic calls to Amazon Web
11753
+ # Services, while `Inactive` means that the key cannot be used.
11673
11754
  #
11674
11755
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
11675
11756
  #
@@ -11702,7 +11783,7 @@ module Aws::IAM
11702
11783
  req.send_request(options)
11703
11784
  end
11704
11785
 
11705
- # Updates the password policy settings for the AWS account.
11786
+ # Updates the password policy settings for the account.
11706
11787
  #
11707
11788
  # <note markdown="1"> * This operation does not support partial updates. No parameters are
11708
11789
  # required, but if you do not specify a parameter, that parameter's
@@ -11764,8 +11845,8 @@ module Aws::IAM
11764
11845
  # require at least one lowercase character.
11765
11846
  #
11766
11847
  # @option params [Boolean] :allow_users_to_change_password
11767
- # Allows all IAM users in your account to use the AWS Management Console
11768
- # to change their own passwords. For more information, see [Letting IAM
11848
+ # Allows all IAM users in your account to use the Management Console to
11849
+ # change their own passwords. For more information, see [Letting IAM
11769
11850
  # users change their own passwords][1] in the *IAM User Guide*.
11770
11851
  #
11771
11852
  # If you do not specify a value for this parameter, then the operation
@@ -11862,10 +11943,10 @@ module Aws::IAM
11862
11943
  # @option params [required, String] :policy_document
11863
11944
  # The policy that grants an entity permission to assume the role.
11864
11945
  #
11865
- # You must provide policies in JSON format in IAM. However, for AWS
11946
+ # You must provide policies in JSON format in IAM. However, for
11866
11947
  # CloudFormation templates formatted in YAML, you can provide the policy
11867
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
11868
- # policy to JSON format before submitting it to IAM.
11948
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
11949
+ # to JSON format before submitting it to IAM.
11869
11950
  #
11870
11951
  # The [regex pattern][1] used to validate this parameter is a string of
11871
11952
  # characters consisting of the following:
@@ -11997,11 +12078,11 @@ module Aws::IAM
11997
12078
  req.send_request(options)
11998
12079
  end
11999
12080
 
12000
- # Changes the password for the specified IAM user. You can use the AWS
12001
- # CLI, the AWS API, or the **Users** page in the IAM console to change
12002
- # the password for any IAM user. Use ChangePassword to change your own
12003
- # password in the **My Security Credentials** page in the AWS Management
12004
- # Console.
12081
+ # Changes the password for the specified IAM user. You can use the CLI,
12082
+ # the Amazon Web Services API, or the **Users** page in the IAM console
12083
+ # to change the password for any IAM user. Use ChangePassword to change
12084
+ # your own password in the **My Security Credentials** page in the
12085
+ # Management Console.
12005
12086
  #
12006
12087
  # For more information about modifying passwords, see [Managing
12007
12088
  # passwords][1] in the *IAM User Guide*.
@@ -12038,8 +12119,8 @@ module Aws::IAM
12038
12119
  # carriage return (`\u000D`)
12039
12120
  #
12040
12121
  # However, the format can be further restricted by the account
12041
- # administrator by setting a password policy on the AWS account. For
12042
- # more information, see UpdateAccountPasswordPolicy.
12122
+ # administrator by setting a password policy on the account. For more
12123
+ # information, see UpdateAccountPasswordPolicy.
12043
12124
  #
12044
12125
  #
12045
12126
  #
@@ -12105,7 +12186,7 @@ module Aws::IAM
12105
12186
  # operation.
12106
12187
  #
12107
12188
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12108
- # in the *AWS General Reference*.
12189
+ # in the *Amazon Web Services General Reference*.
12109
12190
  #
12110
12191
  #
12111
12192
  #
@@ -12148,7 +12229,7 @@ module Aws::IAM
12148
12229
  # default maximum of one hour is applied. This setting can have a value
12149
12230
  # from 1 hour to 12 hours.
12150
12231
  #
12151
- # Anyone who assumes the role from the AWS CLI or API can use the
12232
+ # Anyone who assumes the role from the CLI or API can use the
12152
12233
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
12153
12234
  # parameter to request a longer session. The `MaxSessionDuration`
12154
12235
  # setting determines the maximum duration that can be requested using
@@ -12255,7 +12336,7 @@ module Aws::IAM
12255
12336
  # The Amazon Resource Name (ARN) of the SAML provider to update.
12256
12337
  #
12257
12338
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12258
- # in the *AWS General Reference*.
12339
+ # in the *Amazon Web Services General Reference*.
12259
12340
  #
12260
12341
  #
12261
12342
  #
@@ -12291,10 +12372,10 @@ module Aws::IAM
12291
12372
  # public key as part of a key rotation work flow.
12292
12373
  #
12293
12374
  # The SSH public key affected by this operation is used only for
12294
- # authenticating the associated IAM user to an AWS CodeCommit
12295
- # repository. For more information about using SSH keys to authenticate
12296
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12297
- # connections][1] in the *AWS CodeCommit User Guide*.
12375
+ # authenticating the associated IAM user to an CodeCommit repository.
12376
+ # For more information about using SSH keys to authenticate to an
12377
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12378
+ # in the *CodeCommit User Guide*.
12298
12379
  #
12299
12380
  #
12300
12381
  #
@@ -12325,7 +12406,7 @@ module Aws::IAM
12325
12406
  #
12326
12407
  # @option params [required, String] :status
12327
12408
  # The status to assign to the SSH public key. `Active` means that the
12328
- # key can be used for authentication with an AWS CodeCommit repository.
12409
+ # key can be used for authentication with an CodeCommit repository.
12329
12410
  # `Inactive` means that the key cannot be used.
12330
12411
  #
12331
12412
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
@@ -12352,8 +12433,8 @@ module Aws::IAM
12352
12433
  #
12353
12434
  # For more information about working with server certificates, see
12354
12435
  # [Working with server certificates][1] in the *IAM User Guide*. This
12355
- # topic also includes a list of AWS services that can use the server
12356
- # certificates that you manage with IAM.
12436
+ # topic also includes a list of Amazon Web Services services that can
12437
+ # use the server certificates that you manage with IAM.
12357
12438
  #
12358
12439
  # You should understand the implications of changing a server
12359
12440
  # certificate's path or name. For more information, see [Renaming a
@@ -12495,10 +12576,10 @@ module Aws::IAM
12495
12576
  # rotation work flow.
12496
12577
  #
12497
12578
  # If the `UserName` field is not specified, the user name is determined
12498
- # implicitly based on the AWS access key ID used to sign the request.
12499
- # This operation works for access keys under the AWS account.
12500
- # Consequently, you can use this operation to manage AWS account root
12501
- # user credentials even if the AWS account has no associated users.
12579
+ # implicitly based on the Amazon Web Services access key ID used to sign
12580
+ # the request. This operation works for access keys under the account.
12581
+ # Consequently, you can use this operation to manage account root user
12582
+ # credentials even if the account has no associated users.
12502
12583
  #
12503
12584
  # @option params [String] :user_name
12504
12585
  # The name of the IAM user the signing certificate belongs to.
@@ -12525,8 +12606,8 @@ module Aws::IAM
12525
12606
  #
12526
12607
  # @option params [required, String] :status
12527
12608
  # The status you want to assign to the certificate. `Active` means that
12528
- # the certificate can be used for programmatic calls to AWS `Inactive`
12529
- # means that the certificate cannot be used.
12609
+ # the certificate can be used for programmatic calls to Amazon Web
12610
+ # Services `Inactive` means that the certificate cannot be used.
12530
12611
  #
12531
12612
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
12532
12613
  #
@@ -12647,10 +12728,10 @@ module Aws::IAM
12647
12728
  # user.
12648
12729
  #
12649
12730
  # The SSH public key uploaded by this operation can be used only for
12650
- # authenticating the associated IAM user to an AWS CodeCommit
12651
- # repository. For more information about using SSH keys to authenticate
12652
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12653
- # connections][1] in the *AWS CodeCommit User Guide*.
12731
+ # authenticating the associated IAM user to an CodeCommit repository.
12732
+ # For more information about using SSH keys to authenticate to an
12733
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12734
+ # in the *CodeCommit User Guide*.
12654
12735
  #
12655
12736
  #
12656
12737
  #
@@ -12719,21 +12800,21 @@ module Aws::IAM
12719
12800
  req.send_request(options)
12720
12801
  end
12721
12802
 
12722
- # Uploads a server certificate entity for the AWS account. The server
12803
+ # Uploads a server certificate entity for the account. The server
12723
12804
  # certificate entity includes a public key certificate, a private key,
12724
12805
  # and an optional certificate chain, which should all be PEM-encoded.
12725
12806
  #
12726
- # We recommend that you use [AWS Certificate Manager][1] to provision,
12807
+ # We recommend that you use [Certificate Manager][1] to provision,
12727
12808
  # manage, and deploy your server certificates. With ACM you can request
12728
- # a certificate, deploy it to AWS resources, and let ACM handle
12729
- # certificate renewals for you. Certificates provided by ACM are free.
12730
- # For more information about using ACM, see the [AWS Certificate Manager
12731
- # User Guide][2].
12809
+ # a certificate, deploy it to Amazon Web Services resources, and let ACM
12810
+ # handle certificate renewals for you. Certificates provided by ACM are
12811
+ # free. For more information about using ACM, see the [Certificate
12812
+ # Manager User Guide][2].
12732
12813
  #
12733
12814
  # For more information about working with server certificates, see
12734
12815
  # [Working with server certificates][3] in the *IAM User Guide*. This
12735
- # topic includes a list of AWS services that can use the server
12736
- # certificates that you manage with IAM.
12816
+ # topic includes a list of Amazon Web Services services that can use the
12817
+ # server certificates that you manage with IAM.
12737
12818
  #
12738
12819
  # For information about the number of server certificates you can
12739
12820
  # upload, see [IAM and STS quotas][4] in the *IAM User Guide*.
@@ -12741,10 +12822,11 @@ module Aws::IAM
12741
12822
  # <note markdown="1"> Because the body of the public key certificate, private key, and the
12742
12823
  # certificate chain can be large, you should use POST rather than GET
12743
12824
  # when calling `UploadServerCertificate`. For information about setting
12744
- # up signatures and authorization through the API, see [Signing AWS API
12745
- # requests][5] in the *AWS General Reference*. For general information
12746
- # about using the Query API with IAM, see [Calling the API by making
12747
- # HTTP query requests][6] in the *IAM User Guide*.
12825
+ # up signatures and authorization through the API, see [Signing Amazon
12826
+ # Web Services API requests][5] in the *Amazon Web Services General
12827
+ # Reference*. For general information about using the Query API with
12828
+ # IAM, see [Calling the API by making HTTP query requests][6] in the
12829
+ # *IAM User Guide*.
12748
12830
  #
12749
12831
  # </note>
12750
12832
  #
@@ -12935,25 +13017,27 @@ module Aws::IAM
12935
13017
  end
12936
13018
 
12937
13019
  # Uploads an X.509 signing certificate and associates it with the
12938
- # specified IAM user. Some AWS services require you to use certificates
12939
- # to validate requests that are signed with a corresponding private key.
12940
- # When you upload the certificate, its default status is `Active`.
13020
+ # specified IAM user. Some Amazon Web Services services require you to
13021
+ # use certificates to validate requests that are signed with a
13022
+ # corresponding private key. When you upload the certificate, its
13023
+ # default status is `Active`.
12941
13024
  #
12942
13025
  # For information about when you would use an X.509 signing certificate,
12943
13026
  # see [Managing server certificates in IAM][1] in the *IAM User Guide*.
12944
13027
  #
12945
13028
  # If the `UserName` is not specified, the IAM user name is determined
12946
- # implicitly based on the AWS access key ID used to sign the request.
12947
- # This operation works for access keys under the AWS account.
12948
- # Consequently, you can use this operation to manage AWS account root
12949
- # user credentials even if the AWS account has no associated users.
13029
+ # implicitly based on the Amazon Web Services access key ID used to sign
13030
+ # the request. This operation works for access keys under the account.
13031
+ # Consequently, you can use this operation to manage account root user
13032
+ # credentials even if the account has no associated users.
12950
13033
  #
12951
13034
  # <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
12952
13035
  # POST rather than GET when calling `UploadSigningCertificate`. For
12953
13036
  # information about setting up signatures and authorization through the
12954
- # API, see [Signing AWS API requests][2] in the *AWS General Reference*.
12955
- # For general information about using the Query API with IAM, see
12956
- # [Making query requests][3] in the *IAM User Guide*.
13037
+ # API, see [Signing Amazon Web Services API requests][2] in the *Amazon
13038
+ # Web Services General Reference*. For general information about using
13039
+ # the Query API with IAM, see [Making query requests][3] in the *IAM
13040
+ # User Guide*.
12957
13041
  #
12958
13042
  # </note>
12959
13043
  #
@@ -13056,7 +13140,7 @@ module Aws::IAM
13056
13140
  params: params,
13057
13141
  config: config)
13058
13142
  context[:gem_name] = 'aws-sdk-iam'
13059
- context[:gem_version] = '1.51.0'
13143
+ context[:gem_version] = '1.56.0'
13060
13144
  Seahorse::Client::Request.new(handlers, context)
13061
13145
  end
13062
13146