aws-sdk-iam 1.53.0 → 1.57.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 722e2b9f7154b9800c969c107df528c1b5c76f4a66538831dd029a7386285c92
4
- data.tar.gz: e421c2cf41df4c1f4b50a8ca67ad207411ee12c43a9a9c83e3e4735bc4b2d7bc
3
+ metadata.gz: 1ae7b51549cceb428fcbe5c1ad94860906ddefa627820cacf546bd7ff1c8ace2
4
+ data.tar.gz: 49641a153d51518e5974e8f83fc00ee9e355128118ea3b560f66ced338fc166e
5
5
  SHA512:
6
- metadata.gz: a827795f8899bd57776a3cbd1de6045a2f1fd3eaae4f780c0ca170303d7e1c314d8977d600c11f068833ba728e5870d0efc8d2c0c315a16c1a875f01121301ce
7
- data.tar.gz: 00d6ed484a45e5f87f47eb9738ca4174d7cf0b51cb8f26539c3973476e437b4c8880da8392232370df5c79ed864641df648257927481b3b34d353fa31b73761a
6
+ metadata.gz: ee208cfa74d294f5d3003a586dec4ed63c9e43c3b9e0de00575c86270081bb0e6b182c522425525d40a6350a64cdc789be15fb120d4ee0c83d9dc98b5220556d
7
+ data.tar.gz: d6d147ac9bbf7dc91e49e8615fd09ebb1d3ce3a01d3d14f092ea40de5cbe1f3e3a068ff92158991b8a208e2c1172e3cd0a8f4e09b7962331684e444082968075
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.57.0 (2021-07-21)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
9
+ 1.56.0 (2021-07-07)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
14
+ 1.55.0 (2021-06-02)
15
+ ------------------
16
+
17
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
18
+
19
+ 1.54.0 (2021-05-20)
20
+ ------------------
21
+
22
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
23
+
4
24
  1.53.0 (2021-05-19)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.53.0
1
+ 1.57.0
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.53.0'
73
+ GEM_VERSION = '1.57.0'
74
74
 
75
75
  end
@@ -288,8 +288,8 @@ module Aws::IAM
288
288
  # uses the default value of `false`. The result is that passwords do not
289
289
  # require at least one lowercase character.
290
290
  # @option options [Boolean] :allow_users_to_change_password
291
- # Allows all IAM users in your account to use the AWS Management Console
292
- # to change their own passwords. For more information, see [Letting IAM
291
+ # Allows all IAM users in your account to use the Management Console to
292
+ # change their own passwords. For more information, see [Letting IAM
293
293
  # users change their own passwords][1] in the *IAM User Guide*.
294
294
  #
295
295
  # If you do not specify a value for this parameter, then the operation
@@ -170,10 +170,10 @@ module Aws::IAM
170
170
  # @option options [required, String] :policy_document
171
171
  # The policy that grants an entity permission to assume the role.
172
172
  #
173
- # You must provide policies in JSON format in IAM. However, for AWS
173
+ # You must provide policies in JSON format in IAM. However, for
174
174
  # CloudFormation templates formatted in YAML, you can provide the policy
175
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
176
- # policy to JSON format before submitting it to IAM.
175
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
176
+ # to JSON format before submitting it to IAM.
177
177
  #
178
178
  # The [regex pattern][1] used to validate this parameter is a string of
179
179
  # characters consisting of the following:
@@ -376,10 +376,10 @@ module Aws::IAM
376
376
  # instance profile can contain only one role, and this quota cannot be
377
377
  # increased. You can remove the existing role and then add a different
378
378
  # role to an instance profile. You must then wait for the change to
379
- # appear across all of AWS because of [eventual consistency][1]. To
380
- # force the change, you must [disassociate the instance profile][2] and
381
- # then [associate the instance profile][3], or you can stop your
382
- # instance and then restart it.
379
+ # appear across all of Amazon Web Services because of [eventual
380
+ # consistency][1]. To force the change, you must [disassociate the
381
+ # instance profile][2] and then [associate the instance profile][3], or
382
+ # you can stop your instance and then restart it.
383
383
  #
384
384
  # <note markdown="1"> The caller of this operation must be granted the `PassRole` permission
385
385
  # on the IAM role by a permissions policy.
@@ -537,7 +537,7 @@ module Aws::IAM
537
537
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
538
538
  #
539
539
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
540
- # in the *AWS General Reference*.
540
+ # in the *Amazon Web Services General Reference*.
541
541
  #
542
542
  #
543
543
  #
@@ -611,7 +611,7 @@ module Aws::IAM
611
611
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
612
612
  #
613
613
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
614
- # in the *AWS General Reference*.
614
+ # in the *Amazon Web Services General Reference*.
615
615
  #
616
616
  #
617
617
  #
@@ -678,7 +678,7 @@ module Aws::IAM
678
678
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
679
679
  #
680
680
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
681
- # in the *AWS General Reference*.
681
+ # in the *Amazon Web Services General Reference*.
682
682
  #
683
683
  #
684
684
  #
@@ -713,14 +713,15 @@ module Aws::IAM
713
713
  end
714
714
 
715
715
  # Changes the password of the IAM user who is calling this operation.
716
- # This operation can be performed using the AWS CLI, the AWS API, or the
717
- # **My Security Credentials** page in the AWS Management Console. The
718
- # AWS account root user password is not affected by this operation.
716
+ # This operation can be performed using the CLI, the Amazon Web Services
717
+ # API, or the **My Security Credentials** page in the Management
718
+ # Console. The account root user password is not affected by this
719
+ # operation.
719
720
  #
720
- # Use UpdateLoginProfile to use the AWS CLI, the AWS API, or the
721
- # **Users** page in the IAM console to change the password for any IAM
722
- # user. For more information about modifying passwords, see [Managing
723
- # passwords][1] in the *IAM User Guide*.
721
+ # Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
722
+ # the **Users** page in the IAM console to change the password for any
723
+ # IAM user. For more information about modifying passwords, see
724
+ # [Managing passwords][1] in the *IAM User Guide*.
724
725
  #
725
726
  #
726
727
  #
@@ -730,7 +731,7 @@ module Aws::IAM
730
731
  # The IAM user's current password.
731
732
  #
732
733
  # @option params [required, String] :new_password
733
- # The new password. The new password must conform to the AWS account's
734
+ # The new password. The new password must conform to the account's
734
735
  # password policy, if one exists.
735
736
  #
736
737
  # The [regex pattern][1] that is used to validate this parameter is a
@@ -739,8 +740,8 @@ module Aws::IAM
739
740
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
740
741
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
741
742
  # of these characters are valid in a password. However, many tools, such
742
- # as the AWS Management Console, might restrict the ability to type
743
- # certain characters because they have special meaning within that tool.
743
+ # as the Management Console, might restrict the ability to type certain
744
+ # characters because they have special meaning within that tool.
744
745
  #
745
746
  #
746
747
  #
@@ -774,21 +775,20 @@ module Aws::IAM
774
775
  req.send_request(options)
775
776
  end
776
777
 
777
- # Creates a new AWS secret access key and corresponding AWS access key
778
- # ID for the specified user. The default status for new keys is
779
- # `Active`.
778
+ # Creates a new Amazon Web Services secret access key and corresponding
779
+ # Amazon Web Services access key ID for the specified user. The default
780
+ # status for new keys is `Active`.
780
781
  #
781
782
  # If you do not specify a user name, IAM determines the user name
782
- # implicitly based on the AWS access key ID signing the request. This
783
- # operation works for access keys under the AWS account. Consequently,
784
- # you can use this operation to manage AWS account root user
785
- # credentials. This is true even if the AWS account has no associated
786
- # users.
783
+ # implicitly based on the Amazon Web Services access key ID signing the
784
+ # request. This operation works for access keys under the account.
785
+ # Consequently, you can use this operation to manage account root user
786
+ # credentials. This is true even if the account has no associated users.
787
787
  #
788
788
  # For information about quotas on the number of keys you can create, see
789
789
  # [IAM and STS quotas][1] in the *IAM User Guide*.
790
790
  #
791
- # To ensure the security of your AWS account, the secret access key is
791
+ # To ensure the security of your account, the secret access key is
792
792
  # accessible only during key and user creation. You must save the key
793
793
  # (for example, in a text file) if you want to be able to access it
794
794
  # again. If a secret key is lost, you can delete the access keys for the
@@ -857,9 +857,9 @@ module Aws::IAM
857
857
  req.send_request(options)
858
858
  end
859
859
 
860
- # Creates an alias for your AWS account. For information about using an
861
- # AWS account alias, see [Using an alias for your AWS account ID][1] in
862
- # the *IAM User Guide*.
860
+ # Creates an alias for your account. For information about using an
861
+ # account alias, see [Using an alias for your account ID][1] in the *IAM
862
+ # User Guide*.
863
863
  #
864
864
  #
865
865
  #
@@ -1125,12 +1125,13 @@ module Aws::IAM
1125
1125
  end
1126
1126
 
1127
1127
  # Creates a password for the specified IAM user. A password allows an
1128
- # IAM user to access AWS services through the AWS Management Console.
1128
+ # IAM user to access Amazon Web Services services through the Management
1129
+ # Console.
1129
1130
  #
1130
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
1131
- # console to create a password for any IAM user. Use ChangePassword to
1132
- # update your own existing password in the **My Security Credentials**
1133
- # page in the AWS Management Console.
1131
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
1132
+ # page in the IAM console to create a password for any IAM user. Use
1133
+ # ChangePassword to update your own existing password in the **My
1134
+ # Security Credentials** page in the Management Console.
1134
1135
  #
1135
1136
  # For more information about managing passwords, see [Managing
1136
1137
  # passwords][1] in the *IAM User Guide*.
@@ -1161,8 +1162,8 @@ module Aws::IAM
1161
1162
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
1162
1163
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
1163
1164
  # of these characters are valid in a password. However, many tools, such
1164
- # as the AWS Management Console, might restrict the ability to type
1165
- # certain characters because they have special meaning within that tool.
1165
+ # as the Management Console, might restrict the ability to type certain
1166
+ # characters because they have special meaning within that tool.
1166
1167
  #
1167
1168
  #
1168
1169
  #
@@ -1225,21 +1226,39 @@ module Aws::IAM
1225
1226
  #
1226
1227
  # The OIDC provider that you create with this operation can be used as a
1227
1228
  # principal in a role's trust policy. Such a policy establishes a trust
1228
- # relationship between AWS and the OIDC provider.
1229
+ # relationship between Amazon Web Services and the OIDC provider.
1230
+ #
1231
+ # If you are using an OIDC identity provider from Google, Facebook, or
1232
+ # Amazon Cognito, you don't need to create a separate IAM identity
1233
+ # provider. These OIDC identity providers are already built-in to Amazon
1234
+ # Web Services and are available for your use. Instead, you can move
1235
+ # directly to creating new roles using your identity provider. To learn
1236
+ # more, see [Creating a role for web identity or OpenID connect
1237
+ # federation][2] in the *IAM User Guide*.
1229
1238
  #
1230
1239
  # When you create the IAM OIDC provider, you specify the following:
1231
1240
  #
1232
1241
  # * The URL of the OIDC identity provider (IdP) to trust
1233
1242
  #
1234
1243
  # * A list of client IDs (also known as audiences) that identify the
1235
- # application or applications that are allowed to authenticate using
1236
- # the OIDC provider
1244
+ # application or applications allowed to authenticate using the OIDC
1245
+ # provider
1237
1246
  #
1238
1247
  # * A list of thumbprints of one or more server certificates that the
1239
1248
  # IdP uses
1240
1249
  #
1241
1250
  # You get all of this information from the OIDC IdP that you want to use
1242
- # to access AWS.
1251
+ # to access Amazon Web Services.
1252
+ #
1253
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1254
+ # providers (IdPs) through our library of trusted certificate
1255
+ # authorities (CAs) instead of using a certificate thumbprint to verify
1256
+ # your IdP server certificate. These OIDC IdPs include Google, and those
1257
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
1258
+ # endpoint. In these cases, your legacy thumbprint remains in your
1259
+ # configuration, but is no longer used for validation.
1260
+ #
1261
+ # </note>
1243
1262
  #
1244
1263
  # <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that
1245
1264
  # this operation creates. Therefore, it is best to limit access to the
@@ -1250,6 +1269,7 @@ module Aws::IAM
1250
1269
  #
1251
1270
  #
1252
1271
  # [1]: http://openid.net/connect/
1272
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html
1253
1273
  #
1254
1274
  # @option params [required, String] :url
1255
1275
  # The URL of the identity provider. The URL must begin with `https://`
@@ -1258,9 +1278,9 @@ module Aws::IAM
1258
1278
  # but query parameters are not. Typically the URL consists of only a
1259
1279
  # hostname, like `https://server.example.org` or `https://example.com`.
1260
1280
  #
1261
- # You cannot register the same provider multiple times in a single AWS
1281
+ # You cannot register the same provider multiple times in a single
1262
1282
  # account. If you try to submit a URL that has already been used for an
1263
- # OpenID Connect provider in the AWS account, you will get an error.
1283
+ # OpenID Connect provider in the account, you will get an error.
1264
1284
  #
1265
1285
  # @option params [Array<String>] :client_id_list
1266
1286
  # A list of client IDs (also known as audiences). When a mobile or web
@@ -1375,7 +1395,7 @@ module Aws::IAM
1375
1395
  req.send_request(options)
1376
1396
  end
1377
1397
 
1378
- # Creates a new managed policy for your AWS account.
1398
+ # Creates a new managed policy for your account.
1379
1399
  #
1380
1400
  # This operation creates a policy version with a version identifier of
1381
1401
  # `v1` and sets v1 as the policy's default version. For more
@@ -1426,12 +1446,20 @@ module Aws::IAM
1426
1446
  # The JSON policy document that you want to use as the content for the
1427
1447
  # new policy.
1428
1448
  #
1429
- # You must provide policies in JSON format in IAM. However, for AWS
1449
+ # You must provide policies in JSON format in IAM. However, for
1430
1450
  # CloudFormation templates formatted in YAML, you can provide the policy
1431
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1432
- # policy to JSON format before submitting it to IAM.
1451
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1452
+ # to JSON format before submitting it to IAM.
1433
1453
  #
1434
- # The [regex pattern][1] used to validate this parameter is a string of
1454
+ # The maximum length of the policy document that you can pass in this
1455
+ # operation, including whitespace, is listed below. To view the maximum
1456
+ # character counts of a managed policy with no whitespaces, see [IAM and
1457
+ # STS character quotas][1].
1458
+ #
1459
+ # To learn more about JSON policy grammar, see [Grammar of the IAM JSON
1460
+ # policy language][2] in the *IAM User Guide*.
1461
+ #
1462
+ # The [regex pattern][3] used to validate this parameter is a string of
1435
1463
  # characters consisting of the following:
1436
1464
  #
1437
1465
  # * Any printable ASCII character ranging from the space character
@@ -1445,7 +1473,9 @@ module Aws::IAM
1445
1473
  #
1446
1474
  #
1447
1475
  #
1448
- # [1]: http://wikipedia.org/wiki/regex
1476
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1477
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_grammar.html
1478
+ # [3]: http://wikipedia.org/wiki/regex
1449
1479
  #
1450
1480
  # @option params [String] :description
1451
1481
  # A friendly description of the policy.
@@ -1540,7 +1570,7 @@ module Aws::IAM
1540
1570
  # add a new version.
1541
1571
  #
1542
1572
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
1543
- # in the *AWS General Reference*.
1573
+ # in the *Amazon Web Services General Reference*.
1544
1574
  #
1545
1575
  #
1546
1576
  #
@@ -1550,12 +1580,17 @@ module Aws::IAM
1550
1580
  # The JSON policy document that you want to use as the content for this
1551
1581
  # new version of the policy.
1552
1582
  #
1553
- # You must provide policies in JSON format in IAM. However, for AWS
1583
+ # You must provide policies in JSON format in IAM. However, for
1554
1584
  # CloudFormation templates formatted in YAML, you can provide the policy
1555
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1556
- # policy to JSON format before submitting it to IAM.
1585
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1586
+ # to JSON format before submitting it to IAM.
1557
1587
  #
1558
- # The [regex pattern][1] used to validate this parameter is a string of
1588
+ # The maximum length of the policy document that you can pass in this
1589
+ # operation, including whitespace, is listed below. To view the maximum
1590
+ # character counts of a managed policy with no whitespaces, see [IAM and
1591
+ # STS character quotas][1].
1592
+ #
1593
+ # The [regex pattern][2] used to validate this parameter is a string of
1559
1594
  # characters consisting of the following:
1560
1595
  #
1561
1596
  # * Any printable ASCII character ranging from the space character
@@ -1569,7 +1604,8 @@ module Aws::IAM
1569
1604
  #
1570
1605
  #
1571
1606
  #
1572
- # [1]: http://wikipedia.org/wiki/regex
1607
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1608
+ # [2]: http://wikipedia.org/wiki/regex
1573
1609
  #
1574
1610
  # @option params [Boolean] :set_as_default
1575
1611
  # Specifies whether to set this version as the policy's default
@@ -1614,10 +1650,10 @@ module Aws::IAM
1614
1650
  req.send_request(options)
1615
1651
  end
1616
1652
 
1617
- # Creates a new role for your AWS account. For more information about
1618
- # roles, see [IAM roles][1]. For information about quotas for role names
1619
- # and the number of roles you can create, see [IAM and STS quotas][2] in
1620
- # the *IAM User Guide*.
1653
+ # Creates a new role for your account. For more information about roles,
1654
+ # see [IAM roles][1]. For information about quotas for role names and
1655
+ # the number of roles you can create, see [IAM and STS quotas][2] in the
1656
+ # *IAM User Guide*.
1621
1657
  #
1622
1658
  #
1623
1659
  #
@@ -1655,10 +1691,9 @@ module Aws::IAM
1655
1691
  # permission to assume the role.
1656
1692
  #
1657
1693
  # In IAM, you must provide a JSON policy that has been converted to a
1658
- # string. However, for AWS CloudFormation templates formatted in YAML,
1659
- # you can provide the policy in JSON or YAML format. AWS CloudFormation
1660
- # always converts a YAML policy to JSON format before submitting it to
1661
- # IAM.
1694
+ # string. However, for CloudFormation templates formatted in YAML, you
1695
+ # can provide the policy in JSON or YAML format. CloudFormation always
1696
+ # converts a YAML policy to JSON format before submitting it to IAM.
1662
1697
  #
1663
1698
  # The [regex pattern][1] used to validate this parameter is a string of
1664
1699
  # characters consisting of the following:
@@ -1688,7 +1723,7 @@ module Aws::IAM
1688
1723
  # default maximum of one hour is applied. This setting can have a value
1689
1724
  # from 1 hour to 12 hours.
1690
1725
  #
1691
- # Anyone who assumes the role from the AWS CLI or API can use the
1726
+ # Anyone who assumes the role from the or API can use the
1692
1727
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
1693
1728
  # parameter to request a longer session. The `MaxSessionDuration`
1694
1729
  # setting determines the maximum duration that can be requested using
@@ -1801,8 +1836,8 @@ module Aws::IAM
1801
1836
  # used as a principal in an IAM role's trust policy. Such a policy can
1802
1837
  # enable federated users who sign in using the SAML IdP to assume the
1803
1838
  # role. You can create an IAM role that supports Web-based single
1804
- # sign-on (SSO) to the AWS Management Console or one that supports API
1805
- # access to AWS.
1839
+ # sign-on (SSO) to the Management Console or one that supports API
1840
+ # access to Amazon Web Services.
1806
1841
  #
1807
1842
  # When you create the SAML provider resource, you upload a SAML metadata
1808
1843
  # document that you get from your IdP. That document includes the
@@ -1816,8 +1851,8 @@ module Aws::IAM
1816
1851
  # </note>
1817
1852
  #
1818
1853
  # For more information, see [Enabling SAML 2.0 federated users to access
1819
- # the AWS Management Console][2] and [About SAML 2.0-based
1820
- # federation][3] in the *IAM User Guide*.
1854
+ # the Management Console][2] and [About SAML 2.0-based federation][3] in
1855
+ # the *IAM User Guide*.
1821
1856
  #
1822
1857
  #
1823
1858
  #
@@ -1902,33 +1937,35 @@ module Aws::IAM
1902
1937
  req.send_request(options)
1903
1938
  end
1904
1939
 
1905
- # Creates an IAM role that is linked to a specific AWS service. The
1906
- # service controls the attached policies and when the role can be
1907
- # deleted. This helps ensure that the service is not broken by an
1908
- # unexpectedly changed or deleted role, which could put your AWS
1909
- # resources into an unknown state. Allowing the service to control the
1910
- # role helps improve service stability and proper cleanup when a service
1911
- # and its role are no longer needed. For more information, see [Using
1912
- # service-linked roles][1] in the *IAM User Guide*.
1940
+ # Creates an IAM role that is linked to a specific Amazon Web Services
1941
+ # service. The service controls the attached policies and when the role
1942
+ # can be deleted. This helps ensure that the service is not broken by an
1943
+ # unexpectedly changed or deleted role, which could put your Amazon Web
1944
+ # Services resources into an unknown state. Allowing the service to
1945
+ # control the role helps improve service stability and proper cleanup
1946
+ # when a service and its role are no longer needed. For more
1947
+ # information, see [Using service-linked roles][1] in the *IAM User
1948
+ # Guide*.
1913
1949
  #
1914
1950
  # To attach a policy to this service-linked role, you must make the
1915
- # request using the AWS service that depends on this role.
1951
+ # request using the Amazon Web Services service that depends on this
1952
+ # role.
1916
1953
  #
1917
1954
  #
1918
1955
  #
1919
1956
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/using-service-linked-roles.html
1920
1957
  #
1921
1958
  # @option params [required, String] :aws_service_name
1922
- # The service principal for the AWS service to which this role is
1923
- # attached. You use a string similar to a URL but without the http:// in
1924
- # front. For example: `elasticbeanstalk.amazonaws.com`.
1959
+ # The service principal for the Amazon Web Services service to which
1960
+ # this role is attached. You use a string similar to a URL but without
1961
+ # the http:// in front. For example: `elasticbeanstalk.amazonaws.com`.
1925
1962
  #
1926
1963
  # Service principals are unique and case-sensitive. To find the exact
1927
- # service principal for your service-linked role, see [AWS services that
1928
- # work with IAM][1] in the *IAM User Guide*. Look for the services that
1929
- # have <b>Yes </b>in the **Service-Linked Role** column. Choose the
1930
- # **Yes** link to view the service-linked role documentation for that
1931
- # service.
1964
+ # service principal for your service-linked role, see [Amazon Web
1965
+ # Services services that work with IAM][1] in the *IAM User Guide*. Look
1966
+ # for the services that have <b>Yes </b>in the **Service-Linked Role**
1967
+ # column. Choose the **Yes** link to view the service-linked role
1968
+ # documentation for that service.
1932
1969
  #
1933
1970
  #
1934
1971
  #
@@ -1995,15 +2032,15 @@ module Aws::IAM
1995
2032
  # You can have a maximum of two sets of service-specific credentials for
1996
2033
  # each supported service per user.
1997
2034
  #
1998
- # You can create service-specific credentials for AWS CodeCommit and
1999
- # Amazon Keyspaces (for Apache Cassandra).
2035
+ # You can create service-specific credentials for CodeCommit and Amazon
2036
+ # Keyspaces (for Apache Cassandra).
2000
2037
  #
2001
2038
  # You can reset the password to a new service-generated value by calling
2002
2039
  # ResetServiceSpecificCredential.
2003
2040
  #
2004
2041
  # For more information about service-specific credentials, see [Using
2005
- # IAM with AWS CodeCommit: Git credentials, SSH keys, and AWS access
2006
- # keys][1] in the *IAM User Guide*.
2042
+ # IAM with CodeCommit: Git credentials, SSH keys, and Amazon Web
2043
+ # Services access keys][1] in the *IAM User Guide*.
2007
2044
  #
2008
2045
  #
2009
2046
  #
@@ -2025,9 +2062,9 @@ module Aws::IAM
2025
2062
  # [1]: http://wikipedia.org/wiki/regex
2026
2063
  #
2027
2064
  # @option params [required, String] :service_name
2028
- # The name of the AWS service that is to be associated with the
2029
- # credentials. The service you specify here is the only service that can
2030
- # be accessed using these credentials.
2065
+ # The name of the Amazon Web Services service that is to be associated
2066
+ # with the credentials. The service you specify here is the only service
2067
+ # that can be accessed using these credentials.
2031
2068
  #
2032
2069
  # @return [Types::CreateServiceSpecificCredentialResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2033
2070
  #
@@ -2059,7 +2096,7 @@ module Aws::IAM
2059
2096
  req.send_request(options)
2060
2097
  end
2061
2098
 
2062
- # Creates a new IAM user for your AWS account.
2099
+ # Creates a new IAM user for your account.
2063
2100
  #
2064
2101
  # For information about quotas for the number of IAM users you can
2065
2102
  # create, see [IAM and STS quotas][1] in the *IAM User Guide*.
@@ -2174,20 +2211,20 @@ module Aws::IAM
2174
2211
  req.send_request(options)
2175
2212
  end
2176
2213
 
2177
- # Creates a new virtual MFA device for the AWS account. After creating
2178
- # the virtual MFA, use EnableMFADevice to attach the MFA device to an
2179
- # IAM user. For more information about creating and working with virtual
2180
- # MFA devices, see [Using a virtual MFA device][1] in the *IAM User
2181
- # Guide*.
2214
+ # Creates a new virtual MFA device for the account. After creating the
2215
+ # virtual MFA, use EnableMFADevice to attach the MFA device to an IAM
2216
+ # user. For more information about creating and working with virtual MFA
2217
+ # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
2182
2218
  #
2183
2219
  # For information about the maximum number of MFA devices you can
2184
2220
  # create, see [IAM and STS quotas][2] in the *IAM User Guide*.
2185
2221
  #
2186
2222
  # The seed information contained in the QR code and the Base32 string
2187
2223
  # should be treated like any other secret access information. In other
2188
- # words, protect the seed information as you would your AWS access keys
2189
- # or your passwords. After you provision your virtual device, you should
2190
- # ensure that the information is destroyed following secure procedures.
2224
+ # words, protect the seed information as you would your Amazon Web
2225
+ # Services access keys or your passwords. After you provision your
2226
+ # virtual device, you should ensure that the information is destroyed
2227
+ # following secure procedures.
2191
2228
  #
2192
2229
  #
2193
2230
  #
@@ -2346,10 +2383,10 @@ module Aws::IAM
2346
2383
  # Deletes the access key pair associated with the specified IAM user.
2347
2384
  #
2348
2385
  # If you do not specify a user name, IAM determines the user name
2349
- # implicitly based on the AWS access key ID signing the request. This
2350
- # operation works for access keys under the AWS account. Consequently,
2351
- # you can use this operation to manage AWS account root user credentials
2352
- # even if the AWS account has no associated users.
2386
+ # implicitly based on the Amazon Web Services access key ID signing the
2387
+ # request. This operation works for access keys under the account.
2388
+ # Consequently, you can use this operation to manage account root user
2389
+ # credentials even if the account has no associated users.
2353
2390
  #
2354
2391
  # @option params [String] :user_name
2355
2392
  # The name of the user whose access key pair you want to delete.
@@ -2403,9 +2440,9 @@ module Aws::IAM
2403
2440
  req.send_request(options)
2404
2441
  end
2405
2442
 
2406
- # Deletes the specified AWS account alias. For information about using
2407
- # an AWS account alias, see [Using an alias for your AWS account ID][1]
2408
- # in the *IAM User Guide*.
2443
+ # Deletes the specified account alias. For information about using an
2444
+ # Amazon Web Services account alias, see [Using an alias for your
2445
+ # account ID][1] in the *IAM User Guide*.
2409
2446
  #
2410
2447
  #
2411
2448
  #
@@ -2449,8 +2486,7 @@ module Aws::IAM
2449
2486
  req.send_request(options)
2450
2487
  end
2451
2488
 
2452
- # Deletes the password policy for the AWS account. There are no
2453
- # parameters.
2489
+ # Deletes the password policy for the account. There are no parameters.
2454
2490
  #
2455
2491
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2456
2492
  #
@@ -2622,19 +2658,19 @@ module Aws::IAM
2622
2658
  end
2623
2659
 
2624
2660
  # Deletes the password for the specified IAM user, which terminates the
2625
- # user's ability to access AWS services through the AWS Management
2626
- # Console.
2661
+ # user's ability to access Amazon Web Services services through the
2662
+ # Management Console.
2627
2663
  #
2628
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
2629
- # console to delete a password for any IAM user. You can use
2630
- # ChangePassword to update, but not delete, your own password in the
2631
- # **My Security Credentials** page in the AWS Management Console.
2664
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
2665
+ # page in the IAM console to delete a password for any IAM user. You can
2666
+ # use ChangePassword to update, but not delete, your own password in the
2667
+ # **My Security Credentials** page in the Management Console.
2632
2668
  #
2633
- # Deleting a user's password does not prevent a user from accessing AWS
2634
- # through the command line interface or the API. To prevent all user
2635
- # access, you must also either make any access keys inactive or delete
2636
- # them. For more information about making keys inactive or deleting
2637
- # them, see UpdateAccessKey and DeleteAccessKey.
2669
+ # Deleting a user's password does not prevent a user from accessing
2670
+ # Amazon Web Services through the command line interface or the API. To
2671
+ # prevent all user access, you must also either make any access keys
2672
+ # inactive or delete them. For more information about making keys
2673
+ # inactive or deleting them, see UpdateAccessKey and DeleteAccessKey.
2638
2674
  #
2639
2675
  # @option params [required, String] :user_name
2640
2676
  # The name of the user whose password you want to delete.
@@ -2739,7 +2775,7 @@ module Aws::IAM
2739
2775
  # The Amazon Resource Name (ARN) of the IAM policy you want to delete.
2740
2776
  #
2741
2777
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2742
- # in the *AWS General Reference*.
2778
+ # in the *Amazon Web Services General Reference*.
2743
2779
  #
2744
2780
  #
2745
2781
  #
@@ -2781,7 +2817,7 @@ module Aws::IAM
2781
2817
  # to delete a version.
2782
2818
  #
2783
2819
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2784
- # in the *AWS General Reference*.
2820
+ # in the *Amazon Web Services General Reference*.
2785
2821
  #
2786
2822
  #
2787
2823
  #
@@ -3002,10 +3038,10 @@ module Aws::IAM
3002
3038
  # Deletes the specified SSH public key.
3003
3039
  #
3004
3040
  # The SSH public key deleted by this operation is used only for
3005
- # authenticating the associated IAM user to an AWS CodeCommit
3006
- # repository. For more information about using SSH keys to authenticate
3007
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
3008
- # connections][1] in the *AWS CodeCommit User Guide*.
3041
+ # authenticating the associated IAM user to an CodeCommit repository.
3042
+ # For more information about using SSH keys to authenticate to an
3043
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
3044
+ # in the *CodeCommit User Guide*.
3009
3045
  #
3010
3046
  #
3011
3047
  #
@@ -3056,8 +3092,8 @@ module Aws::IAM
3056
3092
  #
3057
3093
  # For more information about working with server certificates, see
3058
3094
  # [Working with server certificates][1] in the *IAM User Guide*. This
3059
- # topic also includes a list of AWS services that can use the server
3060
- # certificates that you manage with IAM.
3095
+ # topic also includes a list of Amazon Web Services services that can
3096
+ # use the server certificates that you manage with IAM.
3061
3097
  #
3062
3098
  # If you are using a server certificate with Elastic Load Balancing,
3063
3099
  # deleting the certificate could have implications for your application.
@@ -3119,10 +3155,12 @@ module Aws::IAM
3119
3155
  # first remove those resources from the linked service and then submit
3120
3156
  # the deletion request again. Resources are specific to the service that
3121
3157
  # is linked to the role. For more information about removing resources
3122
- # from a service, see the [AWS documentation][1] for your service.
3158
+ # from a service, see the [Amazon Web Services documentation][1] for
3159
+ # your service.
3123
3160
  #
3124
3161
  # For more information about service-linked roles, see [Roles terms and
3125
- # concepts: AWS service-linked role][2] in the *IAM User Guide*.
3162
+ # concepts: Amazon Web Services service-linked role][2] in the *IAM User
3163
+ # Guide*.
3126
3164
  #
3127
3165
  #
3128
3166
  #
@@ -3204,10 +3242,10 @@ module Aws::IAM
3204
3242
  # Deletes a signing certificate associated with the specified IAM user.
3205
3243
  #
3206
3244
  # If you do not specify a user name, IAM determines the user name
3207
- # implicitly based on the AWS access key ID signing the request. This
3208
- # operation works for access keys under the AWS account. Consequently,
3209
- # you can use this operation to manage AWS account root user credentials
3210
- # even if the AWS account has no associated IAM users.
3245
+ # implicitly based on the Amazon Web Services access key ID signing the
3246
+ # request. This operation works for access keys under the account.
3247
+ # Consequently, you can use this operation to manage account root user
3248
+ # credentials even if the account has no associated IAM users.
3211
3249
  #
3212
3250
  # @option params [String] :user_name
3213
3251
  # The name of the user the signing certificate belongs to.
@@ -3260,11 +3298,11 @@ module Aws::IAM
3260
3298
  req.send_request(options)
3261
3299
  end
3262
3300
 
3263
- # Deletes the specified IAM user. Unlike the AWS Management Console,
3264
- # when you delete a user programmatically, you must delete the items
3265
- # attached to the user manually, or the deletion fails. For more
3266
- # information, see [Deleting an IAM user][1]. Before attempting to
3267
- # delete a user, remove the following items:
3301
+ # Deletes the specified IAM user. Unlike the Management Console, when
3302
+ # you delete a user programmatically, you must delete the items attached
3303
+ # to the user manually, or the deletion fails. For more information, see
3304
+ # [Deleting an IAM user][1]. Before attempting to delete a user, remove
3305
+ # the following items:
3268
3306
  #
3269
3307
  # * Password (DeleteLoginProfile)
3270
3308
  #
@@ -3493,7 +3531,7 @@ module Aws::IAM
3493
3531
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3494
3532
  #
3495
3533
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3496
- # in the *AWS General Reference*.
3534
+ # in the *Amazon Web Services General Reference*.
3497
3535
  #
3498
3536
  #
3499
3537
  #
@@ -3544,7 +3582,7 @@ module Aws::IAM
3544
3582
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3545
3583
  #
3546
3584
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3547
- # in the *AWS General Reference*.
3585
+ # in the *Amazon Web Services General Reference*.
3548
3586
  #
3549
3587
  #
3550
3588
  #
@@ -3595,7 +3633,7 @@ module Aws::IAM
3595
3633
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3596
3634
  #
3597
3635
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3598
- # in the *AWS General Reference*.
3636
+ # in the *Amazon Web Services General Reference*.
3599
3637
  #
3600
3638
  #
3601
3639
  #
@@ -3700,9 +3738,9 @@ module Aws::IAM
3700
3738
  req.send_request(options)
3701
3739
  end
3702
3740
 
3703
- # Generates a credential report for the AWS account. For more
3704
- # information about the credential report, see [Getting credential
3705
- # reports][1] in the *IAM User Guide*.
3741
+ # Generates a credential report for the account. For more information
3742
+ # about the credential report, see [Getting credential reports][1] in
3743
+ # the *IAM User Guide*.
3706
3744
  #
3707
3745
  #
3708
3746
  #
@@ -3727,18 +3765,17 @@ module Aws::IAM
3727
3765
  req.send_request(options)
3728
3766
  end
3729
3767
 
3730
- # Generates a report for service last accessed data for AWS
3731
- # Organizations. You can generate a report for any entities
3732
- # (organization root, organizational unit, or account) or policies in
3733
- # your organization.
3768
+ # Generates a report for service last accessed data for Organizations.
3769
+ # You can generate a report for any entities (organization root,
3770
+ # organizational unit, or account) or policies in your organization.
3734
3771
  #
3735
- # To call this operation, you must be signed in using your AWS
3736
- # Organizations management account credentials. You can use your
3737
- # long-term IAM user or root user credentials, or temporary credentials
3738
- # from assuming an IAM role. SCPs must be enabled for your organization
3739
- # root. You must have the required IAM and AWS Organizations
3740
- # permissions. For more information, see [Refining permissions using
3741
- # service last accessed data][1] in the *IAM User Guide*.
3772
+ # To call this operation, you must be signed in using your Organizations
3773
+ # management account credentials. You can use your long-term IAM user or
3774
+ # root user credentials, or temporary credentials from assuming an IAM
3775
+ # role. SCPs must be enabled for your organization root. You must have
3776
+ # the required IAM and Organizations permissions. For more information,
3777
+ # see [Refining permissions using service last accessed data][1] in the
3778
+ # *IAM User Guide*.
3742
3779
  #
3743
3780
  # You can generate a service last accessed data report for entities by
3744
3781
  # specifying only the entity's path. This data includes a list of
@@ -3746,8 +3783,8 @@ module Aws::IAM
3746
3783
  # apply to the entity.
3747
3784
  #
3748
3785
  # You can generate a service last accessed data report for a policy by
3749
- # specifying an entity's path and an optional AWS Organizations policy
3750
- # ID. This data includes a list of services that are allowed by the
3786
+ # specifying an entity's path and an optional Organizations policy ID.
3787
+ # This data includes a list of services that are allowed by the
3751
3788
  # specified SCP.
3752
3789
  #
3753
3790
  # For each service in both report types, the data includes the most
@@ -3757,15 +3794,16 @@ module Aws::IAM
3757
3794
  # troubleshooting, and supported Regions see [Reducing permissions using
3758
3795
  # service last accessed data][1] in the *IAM User Guide*.
3759
3796
  #
3760
- # The data includes all attempts to access AWS, not just the successful
3761
- # ones. This includes all attempts that were made using the AWS
3762
- # Management Console, the AWS API through any of the SDKs, or any of the
3763
- # command line tools. An unexpected entry in the service last accessed
3764
- # data does not mean that an account has been compromised, because the
3765
- # request might have been denied. Refer to your CloudTrail logs as the
3766
- # authoritative source for information about all API calls and whether
3767
- # they were successful or denied access. For more information,
3768
- # see [Logging IAM events with CloudTrail][2] in the *IAM User Guide*.
3797
+ # The data includes all attempts to access Amazon Web Services, not just
3798
+ # the successful ones. This includes all attempts that were made using
3799
+ # the Management Console, the Amazon Web Services API through any of the
3800
+ # SDKs, or any of the command line tools. An unexpected entry in the
3801
+ # service last accessed data does not mean that an account has been
3802
+ # compromised, because the request might have been denied. Refer to your
3803
+ # CloudTrail logs as the authoritative source for information about all
3804
+ # API calls and whether they were successful or denied access. For more
3805
+ # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3806
+ # User Guide*.
3769
3807
  #
3770
3808
  # This operation returns a `JobId`. Use this parameter in the `
3771
3809
  # GetOrganizationsAccessReport ` operation to check the status of the
@@ -3775,9 +3813,9 @@ module Aws::IAM
3775
3813
  # you can retrieve the report.
3776
3814
  #
3777
3815
  # To generate a service last accessed data report for entities, specify
3778
- # an entity path without specifying the optional AWS Organizations
3779
- # policy ID. The type of entity that you specify determines the data
3780
- # returned in the report.
3816
+ # an entity path without specifying the optional Organizations policy
3817
+ # ID. The type of entity that you specify determines the data returned
3818
+ # in the report.
3781
3819
  #
3782
3820
  # * **Root** – When you specify the organizations root as the entity,
3783
3821
  # the resulting report lists all of the services allowed by SCPs that
@@ -3793,9 +3831,9 @@ module Aws::IAM
3793
3831
  # not limited by SCPs.
3794
3832
  #
3795
3833
  # * **management account** – When you specify the management account,
3796
- # the resulting report lists all AWS services, because the management
3797
- # account is not limited by SCPs. For each service, the report
3798
- # includes data for only the management account.
3834
+ # the resulting report lists all Amazon Web Services services, because
3835
+ # the management account is not limited by SCPs. For each service, the
3836
+ # report includes data for only the management account.
3799
3837
  #
3800
3838
  # * **Account** – When you specify another account as the entity, the
3801
3839
  # resulting report lists all of the services allowed by SCPs that are
@@ -3803,9 +3841,8 @@ module Aws::IAM
3803
3841
  # report includes data for only the specified account.
3804
3842
  #
3805
3843
  # To generate a service last accessed data report for policies, specify
3806
- # an entity path and the optional AWS Organizations policy ID. The type
3807
- # of entity that you specify determines the data returned for each
3808
- # service.
3844
+ # an entity path and the optional Organizations policy ID. The type of
3845
+ # entity that you specify determines the data returned for each service.
3809
3846
  #
3810
3847
  # * **Root** – When you specify the root entity and a policy ID, the
3811
3848
  # resulting report lists all of the services that are allowed by the
@@ -3827,10 +3864,10 @@ module Aws::IAM
3827
3864
  # the report will return a list of services with no data.
3828
3865
  #
3829
3866
  # * **management account** – When you specify the management account,
3830
- # the resulting report lists all AWS services, because the management
3831
- # account is not limited by SCPs. If you specify a policy ID in the
3832
- # CLI or API, the policy is ignored. For each service, the report
3833
- # includes data for only the management account.
3867
+ # the resulting report lists all Amazon Web Services services, because
3868
+ # the management account is not limited by SCPs. If you specify a
3869
+ # policy ID in the CLI or API, the policy is ignored. For each
3870
+ # service, the report includes data for only the management account.
3834
3871
  #
3835
3872
  # * **Account** – When you specify another account entity and a policy
3836
3873
  # ID, the resulting report lists all of the services that are allowed
@@ -3859,21 +3896,21 @@ module Aws::IAM
3859
3896
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics
3860
3897
  #
3861
3898
  # @option params [required, String] :entity_path
3862
- # The path of the AWS Organizations entity (root, OU, or account). You
3863
- # can build an entity path using the known structure of your
3864
- # organization. For example, assume that your account ID is
3865
- # `123456789012` and its parent OU ID is `ou-rge0-awsabcde`. The
3866
- # organization root ID is `r-f6g7h8i9j0example` and your organization ID
3867
- # is `o-a1b2c3d4e5`. Your entity path is
3899
+ # The path of the Organizations entity (root, OU, or account). You can
3900
+ # build an entity path using the known structure of your organization.
3901
+ # For example, assume that your account ID is `123456789012` and its
3902
+ # parent OU ID is `ou-rge0-awsabcde`. The organization root ID is
3903
+ # `r-f6g7h8i9j0example` and your organization ID is `o-a1b2c3d4e5`. Your
3904
+ # entity path is
3868
3905
  # `o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-rge0-awsabcde/123456789012`.
3869
3906
  #
3870
3907
  # @option params [String] :organizations_policy_id
3871
- # The identifier of the AWS Organizations service control policy (SCP).
3872
- # This parameter is optional.
3908
+ # The identifier of the Organizations service control policy (SCP). This
3909
+ # parameter is optional.
3873
3910
  #
3874
3911
  # This ID is used to generate information about when an account
3875
- # principal that is limited by the SCP attempted to access an AWS
3876
- # service.
3912
+ # principal that is limited by the SCP attempted to access an Amazon Web
3913
+ # Services service.
3877
3914
  #
3878
3915
  # @return [Types::GenerateOrganizationsAccessReportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3879
3916
  #
@@ -3915,31 +3952,31 @@ module Aws::IAM
3915
3952
 
3916
3953
  # Generates a report that includes details about when an IAM resource
3917
3954
  # (user, group, role, or policy) was last used in an attempt to access
3918
- # AWS services. Recent activity usually appears within four hours. IAM
3919
- # reports activity for the last 365 days, or less if your Region began
3920
- # supporting this feature within the last year. For more information,
3921
- # see [Regions where data is tracked][1].
3922
- #
3923
- # The service last accessed data includes all attempts to access an AWS
3924
- # API, not just the successful ones. This includes all attempts that
3925
- # were made using the AWS Management Console, the AWS API through any of
3926
- # the SDKs, or any of the command line tools. An unexpected entry in the
3927
- # service last accessed data does not mean that your account has been
3928
- # compromised, because the request might have been denied. Refer to your
3929
- # CloudTrail logs as the authoritative source for information about all
3930
- # API calls and whether they were successful or denied access. For more
3931
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3932
- # User Guide*.
3955
+ # Amazon Web Services services. Recent activity usually appears within
3956
+ # four hours. IAM reports activity for the last 365 days, or less if
3957
+ # your Region began supporting this feature within the last year. For
3958
+ # more information, see [Regions where data is tracked][1].
3959
+ #
3960
+ # The service last accessed data includes all attempts to access an
3961
+ # Amazon Web Services API, not just the successful ones. This includes
3962
+ # all attempts that were made using the Management Console, the Amazon
3963
+ # Web Services API through any of the SDKs, or any of the command line
3964
+ # tools. An unexpected entry in the service last accessed data does not
3965
+ # mean that your account has been compromised, because the request might
3966
+ # have been denied. Refer to your CloudTrail logs as the authoritative
3967
+ # source for information about all API calls and whether they were
3968
+ # successful or denied access. For more information, see [Logging IAM
3969
+ # events with CloudTrail][2] in the *IAM User Guide*.
3933
3970
  #
3934
3971
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
3935
3972
  # Use this parameter in the following operations to retrieve the
3936
3973
  # following details from your report:
3937
3974
  #
3938
3975
  # * GetServiceLastAccessedDetails – Use this operation for users,
3939
- # groups, roles, or policies to list every AWS service that the
3940
- # resource could access using permissions policies. For each service,
3941
- # the response includes information about the most recent access
3942
- # attempt.
3976
+ # groups, roles, or policies to list every Amazon Web Services service
3977
+ # that the resource could access using permissions policies. For each
3978
+ # service, the response includes information about the most recent
3979
+ # access attempt.
3943
3980
  #
3944
3981
  # The `JobId` returned by `GenerateServiceLastAccessedDetail` must be
3945
3982
  # used by the same role within a session, or by the same user when
@@ -3947,8 +3984,8 @@ module Aws::IAM
3947
3984
  #
3948
3985
  # * GetServiceLastAccessedDetailsWithEntities – Use this operation for
3949
3986
  # groups and policies to list information about the associated
3950
- # entities (users or roles) that attempted to access a specific AWS
3951
- # service.
3987
+ # entities (users or roles) that attempted to access a specific Amazon
3988
+ # Web Services service.
3952
3989
  #
3953
3990
  # To check the status of the `GenerateServiceLastAccessedDetails`
3954
3991
  # request, use the `JobId` parameter in the same operations and test the
@@ -3961,10 +3998,10 @@ module Aws::IAM
3961
3998
  # <note markdown="1"> Service last accessed data does not use other policy types when
3962
3999
  # determining whether a resource could access a service. These other
3963
4000
  # policy types include resource-based policies, access control lists,
3964
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
3965
- # assume role policies. It only applies permissions policy logic. For
3966
- # more about the evaluation of policy types, see [Evaluating
3967
- # policies][3] in the *IAM User Guide*.
4001
+ # Organizations policies, IAM permissions boundaries, and STS assume
4002
+ # role policies. It only applies permissions policy logic. For more
4003
+ # about the evaluation of policy types, see [Evaluating policies][3] in
4004
+ # the *IAM User Guide*.
3968
4005
  #
3969
4006
  # </note>
3970
4007
  #
@@ -3982,7 +4019,7 @@ module Aws::IAM
3982
4019
  # @option params [required, String] :arn
3983
4020
  # The ARN of the IAM resource (user, group, role, or managed policy)
3984
4021
  # used to generate information about when the resource was last used in
3985
- # an attempt to access an AWS service.
4022
+ # an attempt to access an Amazon Web Services service.
3986
4023
  #
3987
4024
  # @option params [String] :granularity
3988
4025
  # The level of detail that you want to generate. You can specify whether
@@ -4032,8 +4069,8 @@ module Aws::IAM
4032
4069
 
4033
4070
  # Retrieves information about when the specified access key was last
4034
4071
  # used. The information includes the date and time of last use, along
4035
- # with the AWS service and Region that were specified in the last
4036
- # request made with that key.
4072
+ # with the Amazon Web Services service and Region that were specified in
4073
+ # the last request made with that key.
4037
4074
  #
4038
4075
  # @option params [required, String] :access_key_id
4039
4076
  # The identifier of an access key.
@@ -4074,9 +4111,10 @@ module Aws::IAM
4074
4111
  end
4075
4112
 
4076
4113
  # Retrieves information about all IAM users, groups, roles, and policies
4077
- # in your AWS account, including their relationships to one another. Use
4078
- # this operation to obtain a snapshot of the configuration of IAM
4079
- # permissions (users, groups, roles, and policies) in your account.
4114
+ # in your Amazon Web Services account, including their relationships to
4115
+ # one another. Use this operation to obtain a snapshot of the
4116
+ # configuration of IAM permissions (users, groups, roles, and policies)
4117
+ # in your account.
4080
4118
  #
4081
4119
  # <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
4082
4120
  # [RFC 3986][1]. You can use a URL decoding method to convert the policy
@@ -4246,7 +4284,7 @@ module Aws::IAM
4246
4284
  req.send_request(options)
4247
4285
  end
4248
4286
 
4249
- # Retrieves the password policy for the AWS account. This tells you the
4287
+ # Retrieves the password policy for the account. This tells you the
4250
4288
  # complexity requirements and mandatory rotation periods for the IAM
4251
4289
  # user passwords in your account. For more information about using a
4252
4290
  # password policy, see [Managing an IAM password policy][1].
@@ -4305,8 +4343,8 @@ module Aws::IAM
4305
4343
  req.send_request(options)
4306
4344
  end
4307
4345
 
4308
- # Retrieves information about IAM entity usage and IAM quotas in the AWS
4309
- # account.
4346
+ # Retrieves information about IAM entity usage and IAM quotas in the
4347
+ # Amazon Web Services account.
4310
4348
  #
4311
4349
  # For information about IAM quotas, see [IAM and STS quotas][1] in the
4312
4350
  # *IAM User Guide*.
@@ -4378,14 +4416,14 @@ module Aws::IAM
4378
4416
  # To get the context keys from policies associated with an IAM user,
4379
4417
  # group, or role, use GetContextKeysForPrincipalPolicy.
4380
4418
  #
4381
- # Context keys are variables maintained by AWS and its services that
4382
- # provide details about the context of an API query request. Context
4383
- # keys can be evaluated by testing against a value specified in an IAM
4384
- # policy. Use `GetContextKeysForCustomPolicy` to understand what key
4385
- # names and values you must supply when you call SimulateCustomPolicy.
4386
- # Note that all parameters are shown in unencoded form here for clarity
4387
- # but must be URL encoded to be included as a part of a real HTML
4388
- # request.
4419
+ # Context keys are variables maintained by Amazon Web Services and its
4420
+ # services that provide details about the context of an API query
4421
+ # request. Context keys can be evaluated by testing against a value
4422
+ # specified in an IAM policy. Use `GetContextKeysForCustomPolicy` to
4423
+ # understand what key names and values you must supply when you call
4424
+ # SimulateCustomPolicy. Note that all parameters are shown in unencoded
4425
+ # form here for clarity but must be URL encoded to be included as a part
4426
+ # of a real HTML request.
4389
4427
  #
4390
4428
  # @option params [required, Array<String>] :policy_input_list
4391
4429
  # A list of policies for which you want the list of context keys
@@ -4447,11 +4485,12 @@ module Aws::IAM
4447
4485
  # permissions, then consider allowing them to use
4448
4486
  # GetContextKeysForCustomPolicy instead.
4449
4487
  #
4450
- # Context keys are variables maintained by AWS and its services that
4451
- # provide details about the context of an API query request. Context
4452
- # keys can be evaluated by testing against a value in an IAM policy. Use
4453
- # GetContextKeysForPrincipalPolicy to understand what key names and
4454
- # values you must supply when you call SimulatePrincipalPolicy.
4488
+ # Context keys are variables maintained by Amazon Web Services and its
4489
+ # services that provide details about the context of an API query
4490
+ # request. Context keys can be evaluated by testing against a value in
4491
+ # an IAM policy. Use GetContextKeysForPrincipalPolicy to understand what
4492
+ # key names and values you must supply when you call
4493
+ # SimulatePrincipalPolicy.
4455
4494
  #
4456
4495
  # @option params [required, String] :policy_source_arn
4457
4496
  # The ARN of a user, group, or role whose policies contain the context
@@ -4464,7 +4503,7 @@ module Aws::IAM
4464
4503
  # URL encoded to be included as a part of a real HTML request.
4465
4504
  #
4466
4505
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4467
- # in the *AWS General Reference*.
4506
+ # in the *Amazon Web Services General Reference*.
4468
4507
  #
4469
4508
  #
4470
4509
  #
@@ -4515,9 +4554,9 @@ module Aws::IAM
4515
4554
  req.send_request(options)
4516
4555
  end
4517
4556
 
4518
- # Retrieves a credential report for the AWS account. For more
4519
- # information about the credential report, see [Getting credential
4520
- # reports][1] in the *IAM User Guide*.
4557
+ # Retrieves a credential report for the account. For more information
4558
+ # about the credential report, see [Getting credential reports][1] in
4559
+ # the *IAM User Guide*.
4521
4560
  #
4522
4561
  #
4523
4562
  #
@@ -4802,9 +4841,19 @@ module Aws::IAM
4802
4841
  req.send_request(options)
4803
4842
  end
4804
4843
 
4805
- # Retrieves the user name and password creation date for the specified
4806
- # IAM user. If the user has not been assigned a password, the operation
4807
- # returns a 404 (`NoSuchEntity`) error.
4844
+ # Retrieves the user name for the specified IAM user. A login profile is
4845
+ # created when you create a password for the user to access the
4846
+ # Management Console. If the user does not exist or does not have a
4847
+ # password, the operation returns a 404 (`NoSuchEntity`) error.
4848
+ #
4849
+ # If you create an IAM user with access to the console, the `CreateDate`
4850
+ # reflects the date you created the initial password for the user.
4851
+ #
4852
+ # If you create an IAM user with programmatic access, and then later add
4853
+ # a password for the user to access the Management Console, the
4854
+ # `CreateDate` reflects the initial password creation date. A user with
4855
+ # programmatic access does not have a login profile unless you create a
4856
+ # password for the user to access the Management Console.
4808
4857
  #
4809
4858
  # @option params [required, String] :user_name
4810
4859
  # The name of the user whose login profile you want to retrieve.
@@ -4869,7 +4918,7 @@ module Aws::IAM
4869
4918
  # resource ARNs by using the ListOpenIDConnectProviders operation.
4870
4919
  #
4871
4920
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4872
- # in the *AWS General Reference*.
4921
+ # in the *Amazon Web Services General Reference*.
4873
4922
  #
4874
4923
  #
4875
4924
  #
@@ -4910,10 +4959,10 @@ module Aws::IAM
4910
4959
  req.send_request(options)
4911
4960
  end
4912
4961
 
4913
- # Retrieves the service last accessed data report for AWS Organizations
4914
- # that was previously generated using the `
4915
- # GenerateOrganizationsAccessReport ` operation. This operation
4916
- # retrieves the status of your report job and the report contents.
4962
+ # Retrieves the service last accessed data report for Organizations that
4963
+ # was previously generated using the ` GenerateOrganizationsAccessReport
4964
+ # ` operation. This operation retrieves the status of your report job
4965
+ # and the report contents.
4917
4966
  #
4918
4967
  # Depending on the parameters that you passed when you generated the
4919
4968
  # report, the data returned could include different information. For
@@ -5080,7 +5129,7 @@ module Aws::IAM
5080
5129
  # information about.
5081
5130
  #
5082
5131
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5083
- # in the *AWS General Reference*.
5132
+ # in the *Amazon Web Services General Reference*.
5084
5133
  #
5085
5134
  #
5086
5135
  #
@@ -5162,7 +5211,7 @@ module Aws::IAM
5162
5211
  # information about.
5163
5212
  #
5164
5213
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5165
- # in the *AWS General Reference*.
5214
+ # in the *Amazon Web Services General Reference*.
5166
5215
  #
5167
5216
  #
5168
5217
  #
@@ -5401,7 +5450,7 @@ module Aws::IAM
5401
5450
  # IAM to get information about.
5402
5451
  #
5403
5452
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5404
- # in the *AWS General Reference*.
5453
+ # in the *Amazon Web Services General Reference*.
5405
5454
  #
5406
5455
  #
5407
5456
  #
@@ -5442,10 +5491,10 @@ module Aws::IAM
5442
5491
  # key.
5443
5492
  #
5444
5493
  # The SSH public key retrieved by this operation is used only for
5445
- # authenticating the associated IAM user to an AWS CodeCommit
5446
- # repository. For more information about using SSH keys to authenticate
5447
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
5448
- # connections][1] in the *AWS CodeCommit User Guide*.
5494
+ # authenticating the associated IAM user to an CodeCommit repository.
5495
+ # For more information about using SSH keys to authenticate to an
5496
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
5497
+ # in the *CodeCommit User Guide*.
5449
5498
  #
5450
5499
  #
5451
5500
  #
@@ -5514,8 +5563,8 @@ module Aws::IAM
5514
5563
  #
5515
5564
  # For more information about working with server certificates, see
5516
5565
  # [Working with server certificates][1] in the *IAM User Guide*. This
5517
- # topic includes a list of AWS services that can use the server
5518
- # certificates that you manage with IAM.
5566
+ # topic includes a list of Amazon Web Services services that can use the
5567
+ # server certificates that you manage with IAM.
5519
5568
  #
5520
5569
  #
5521
5570
  #
@@ -5571,17 +5620,17 @@ module Aws::IAM
5571
5620
  # `GenerateServiceLastAccessedDetails` operation. You can use the
5572
5621
  # `JobId` parameter in `GetServiceLastAccessedDetails` to retrieve the
5573
5622
  # status of your report job. When the report is complete, you can
5574
- # retrieve the generated report. The report includes a list of AWS
5575
- # services that the resource (user, group, role, or managed policy) can
5576
- # access.
5623
+ # retrieve the generated report. The report includes a list of Amazon
5624
+ # Web Services services that the resource (user, group, role, or managed
5625
+ # policy) can access.
5577
5626
  #
5578
5627
  # <note markdown="1"> Service last accessed data does not use other policy types when
5579
5628
  # determining whether a resource could access a service. These other
5580
5629
  # policy types include resource-based policies, access control lists,
5581
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
5582
- # assume role policies. It only applies permissions policy logic. For
5583
- # more about the evaluation of policy types, see [Evaluating
5584
- # policies][1] in the *IAM User Guide*.
5630
+ # Organizations policies, IAM permissions boundaries, and STS assume
5631
+ # role policies. It only applies permissions policy logic. For more
5632
+ # about the evaluation of policy types, see [Evaluating policies][1] in
5633
+ # the *IAM User Guide*.
5585
5634
  #
5586
5635
  # </note>
5587
5636
  #
@@ -5760,16 +5809,17 @@ module Aws::IAM
5760
5809
  # `GenerateServiceLastAccessedDetails` operation.
5761
5810
  #
5762
5811
  # @option params [required, String] :service_namespace
5763
- # The service namespace for an AWS service. Provide the service
5764
- # namespace to learn when the IAM entity last attempted to access the
5765
- # specified service.
5812
+ # The service namespace for an Amazon Web Services service. Provide the
5813
+ # service namespace to learn when the IAM entity last attempted to
5814
+ # access the specified service.
5766
5815
  #
5767
5816
  # To learn the service namespace for a service, see [Actions, resources,
5768
- # and condition keys for AWS services][1] in the *IAM User Guide*.
5769
- # Choose the name of the service to view details for that service. In
5770
- # the first paragraph, find the service prefix. For example, `(service
5771
- # prefix: a4b)`. For more information about service namespaces, see [AWS
5772
- # service namespaces][2] in the *AWS General Reference*.
5817
+ # and condition keys for Amazon Web Services services][1] in the *IAM
5818
+ # User Guide*. Choose the name of the service to view details for that
5819
+ # service. In the first paragraph, find the service prefix. For example,
5820
+ # `(service prefix: a4b)`. For more information about service
5821
+ # namespaces, see [Amazon Web Services service namespaces][2] in
5822
+ # the *Amazon Web Services General Reference*.
5773
5823
  #
5774
5824
  #
5775
5825
  #
@@ -5922,8 +5972,8 @@ module Aws::IAM
5922
5972
  # user's creation date, path, unique ID, and ARN.
5923
5973
  #
5924
5974
  # If you do not specify a user name, IAM determines the user name
5925
- # implicitly based on the AWS access key ID used to sign the request to
5926
- # this operation.
5975
+ # implicitly based on the Amazon Web Services access key ID used to sign
5976
+ # the request to this operation.
5927
5977
  #
5928
5978
  # @option params [String] :user_name
5929
5979
  # The name of the user to get information about.
@@ -6080,12 +6130,12 @@ module Aws::IAM
6080
6130
  # paginate the results using the `MaxItems` and `Marker` parameters.
6081
6131
  #
6082
6132
  # If the `UserName` field is not specified, the user name is determined
6083
- # implicitly based on the AWS access key ID used to sign the request.
6084
- # This operation works for access keys under the AWS account.
6085
- # Consequently, you can use this operation to manage AWS account root
6086
- # user credentials even if the AWS account has no associated users.
6133
+ # implicitly based on the Amazon Web Services access key ID used to sign
6134
+ # the request. This operation works for access keys under the account.
6135
+ # Consequently, you can use this operation to manage account root user
6136
+ # credentials even if the account has no associated users.
6087
6137
  #
6088
- # <note markdown="1"> To ensure the security of your AWS account, the secret access key is
6138
+ # <note markdown="1"> To ensure the security of your account, the secret access key is
6089
6139
  # accessible only during key and user creation.
6090
6140
  #
6091
6141
  # </note>
@@ -6181,9 +6231,9 @@ module Aws::IAM
6181
6231
  req.send_request(options)
6182
6232
  end
6183
6233
 
6184
- # Lists the account alias associated with the AWS account (Note: you can
6185
- # have only one). For information about using an AWS account alias, see
6186
- # [Using an alias for your AWS account ID][1] in the *IAM User Guide*.
6234
+ # Lists the account alias associated with the account (Note: you can
6235
+ # have only one). For information about using an account alias, see
6236
+ # [Using an alias for your account ID][1] in the *IAM User Guide*.
6187
6237
  #
6188
6238
  #
6189
6239
  #
@@ -6562,7 +6612,7 @@ module Aws::IAM
6562
6612
  # the versions.
6563
6613
  #
6564
6614
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
6565
- # in the *AWS General Reference*.
6615
+ # in the *Amazon Web Services General Reference*.
6566
6616
  #
6567
6617
  #
6568
6618
  #
@@ -6980,10 +7030,10 @@ module Aws::IAM
6980
7030
  # @option params [required, String] :instance_profile_name
6981
7031
  # The name of the IAM instance profile whose tags you want to see.
6982
7032
  #
6983
- # This parameter accepts (through its [regex pattern][1]) a string of
6984
- # characters that consist of upper and lowercase alphanumeric characters
7033
+ # This parameter allows (through its [regex pattern][1]) a string of
7034
+ # characters consisting of upper and lowercase alphanumeric characters
6985
7035
  # with no spaces. You can also include any of the following characters:
6986
- # =,.@-
7036
+ # \_+=,.@-
6987
7037
  #
6988
7038
  #
6989
7039
  #
@@ -6996,16 +7046,15 @@ module Aws::IAM
6996
7046
  # to indicate where the next call should start.
6997
7047
  #
6998
7048
  # @option params [Integer] :max_items
6999
- # (Optional) Use this only when paginating results to indicate the
7000
- # maximum number of items that you want in the response. If additional
7001
- # items exist beyond the maximum that you specify, the `IsTruncated`
7002
- # response element is `true`.
7049
+ # Use this only when paginating results to indicate the maximum number
7050
+ # of items you want in the response. If additional items exist beyond
7051
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7003
7052
  #
7004
- # If you do not include this parameter, it defaults to 100. Note that
7005
- # IAM might return fewer results, even when more results are available.
7006
- # In that case, the `IsTruncated` response element returns `true`, and
7007
- # `Marker` contains a value to include in the subsequent call that tells
7008
- # the service where to continue from.
7053
+ # If you do not include this parameter, the number of items defaults to
7054
+ # 100. Note that IAM might return fewer results, even when there are
7055
+ # more results available. In that case, the `IsTruncated` response
7056
+ # element returns `true`, and `Marker` contains a value to include in
7057
+ # the subsequent call that tells the service where to continue from.
7009
7058
  #
7010
7059
  # @return [Types::ListInstanceProfileTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7011
7060
  #
@@ -7257,10 +7306,10 @@ module Aws::IAM
7257
7306
  # want to see. For virtual MFA devices, the serial number is the same as
7258
7307
  # the ARN.
7259
7308
  #
7260
- # This parameter accepts (through its [regex pattern][1]) a string of
7261
- # characters that consist of upper and lowercase alphanumeric characters
7309
+ # This parameter allows (through its [regex pattern][1]) a string of
7310
+ # characters consisting of upper and lowercase alphanumeric characters
7262
7311
  # with no spaces. You can also include any of the following characters:
7263
- # =,.@-
7312
+ # \_+=,.@-
7264
7313
  #
7265
7314
  #
7266
7315
  #
@@ -7273,16 +7322,15 @@ module Aws::IAM
7273
7322
  # to indicate where the next call should start.
7274
7323
  #
7275
7324
  # @option params [Integer] :max_items
7276
- # (Optional) Use this only when paginating results to indicate the
7277
- # maximum number of items that you want in the response. If additional
7278
- # items exist beyond the maximum that you specify, the `IsTruncated`
7279
- # response element is `true`.
7325
+ # Use this only when paginating results to indicate the maximum number
7326
+ # of items you want in the response. If additional items exist beyond
7327
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7280
7328
  #
7281
- # If you do not include this parameter, it defaults to 100. Note that
7282
- # IAM might return fewer results, even when more results are available.
7283
- # In that case, the `IsTruncated` response element returns `true`, and
7284
- # `Marker` contains a value to include in the subsequent call that tells
7285
- # the service where to continue from.
7329
+ # If you do not include this parameter, the number of items defaults to
7330
+ # 100. Note that IAM might return fewer results, even when there are
7331
+ # more results available. In that case, the `IsTruncated` response
7332
+ # element returns `true`, and `Marker` contains a value to include in
7333
+ # the subsequent call that tells the service where to continue from.
7286
7334
  #
7287
7335
  # @return [Types::ListMFADeviceTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7288
7336
  #
@@ -7318,8 +7366,8 @@ module Aws::IAM
7318
7366
  # Lists the MFA devices for an IAM user. If the request includes a IAM
7319
7367
  # user name, then this operation lists all the MFA devices associated
7320
7368
  # with the specified user. If you do not specify a user name, IAM
7321
- # determines the user name implicitly based on the AWS access key ID
7322
- # signing the request for this operation.
7369
+ # determines the user name implicitly based on the Amazon Web Services
7370
+ # access key ID signing the request for this operation.
7323
7371
  #
7324
7372
  # You can paginate the results using the `MaxItems` and `Marker`
7325
7373
  # parameters.
@@ -7404,10 +7452,10 @@ module Aws::IAM
7404
7452
  # The ARN of the OpenID Connect (OIDC) identity provider whose tags you
7405
7453
  # want to see.
7406
7454
  #
7407
- # This parameter accepts (through its [regex pattern][1]) a string of
7408
- # characters that consist of upper and lowercase alphanumeric characters
7455
+ # This parameter allows (through its [regex pattern][1]) a string of
7456
+ # characters consisting of upper and lowercase alphanumeric characters
7409
7457
  # with no spaces. You can also include any of the following characters:
7410
- # =,.@-
7458
+ # \_+=,.@-
7411
7459
  #
7412
7460
  #
7413
7461
  #
@@ -7420,16 +7468,15 @@ module Aws::IAM
7420
7468
  # to indicate where the next call should start.
7421
7469
  #
7422
7470
  # @option params [Integer] :max_items
7423
- # (Optional) Use this only when paginating results to indicate the
7424
- # maximum number of items that you want in the response. If additional
7425
- # items exist beyond the maximum that you specify, the `IsTruncated`
7426
- # response element is `true`.
7471
+ # Use this only when paginating results to indicate the maximum number
7472
+ # of items you want in the response. If additional items exist beyond
7473
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7427
7474
  #
7428
- # If you do not include this parameter, it defaults to 100. Note that
7429
- # IAM might return fewer results, even when more results are available.
7430
- # In that case, the `IsTruncated` response element returns `true`, and
7431
- # `Marker` contains a value to include in the subsequent call that tells
7432
- # the service where to continue from.
7475
+ # If you do not include this parameter, the number of items defaults to
7476
+ # 100. Note that IAM might return fewer results, even when there are
7477
+ # more results available. In that case, the `IsTruncated` response
7478
+ # element returns `true`, and `Marker` contains a value to include in
7479
+ # the subsequent call that tells the service where to continue from.
7433
7480
  #
7434
7481
  # @return [Types::ListOpenIDConnectProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7435
7482
  #
@@ -7463,7 +7510,7 @@ module Aws::IAM
7463
7510
  end
7464
7511
 
7465
7512
  # Lists information about the IAM OpenID Connect (OIDC) provider
7466
- # resource objects defined in the AWS account.
7513
+ # resource objects defined in the account.
7467
7514
  #
7468
7515
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7469
7516
  # attributes for the resource. For example, this operation does not
@@ -7491,15 +7538,15 @@ module Aws::IAM
7491
7538
  req.send_request(options)
7492
7539
  end
7493
7540
 
7494
- # Lists all the managed policies that are available in your AWS account,
7495
- # including your own customer-defined managed policies and all AWS
7496
- # managed policies.
7541
+ # Lists all the managed policies that are available in your account,
7542
+ # including your own customer-defined managed policies and all Amazon
7543
+ # Web Services managed policies.
7497
7544
  #
7498
7545
  # You can filter the list of policies that is returned using the
7499
7546
  # optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
7500
- # example, to list only the customer managed policies in your AWS
7501
- # account, set `Scope` to `Local`. To list only AWS managed policies,
7502
- # set `Scope` to `AWS`.
7547
+ # example, to list only the customer managed policies in your Amazon Web
7548
+ # Services account, set `Scope` to `Local`. To list only Amazon Web
7549
+ # Services managed policies, set `Scope` to `AWS`.
7503
7550
  #
7504
7551
  # You can paginate the results using the `MaxItems` and `Marker`
7505
7552
  # parameters.
@@ -7522,9 +7569,9 @@ module Aws::IAM
7522
7569
  # @option params [String] :scope
7523
7570
  # The scope to use for filtering the results.
7524
7571
  #
7525
- # To list only AWS managed policies, set `Scope` to `AWS`. To list only
7526
- # the customer managed policies in your AWS account, set `Scope` to
7527
- # `Local`.
7572
+ # To list only Amazon Web Services managed policies, set `Scope` to
7573
+ # `AWS`. To list only the customer managed policies in your account, set
7574
+ # `Scope` to `Local`.
7528
7575
  #
7529
7576
  # This parameter is optional. If it is not included, or if it is set to
7530
7577
  # `All`, all policies are returned.
@@ -7632,11 +7679,10 @@ module Aws::IAM
7632
7679
  #
7633
7680
  # <note markdown="1"> This operation does not use other policy types when determining
7634
7681
  # whether a resource could access a service. These other policy types
7635
- # include resource-based policies, access control lists, AWS
7636
- # Organizations policies, IAM permissions boundaries, and AWS STS assume
7637
- # role policies. It only applies permissions policy logic. For more
7638
- # about the evaluation of policy types, see [Evaluating policies][1] in
7639
- # the *IAM User Guide*.
7682
+ # include resource-based policies, access control lists, Organizations
7683
+ # policies, IAM permissions boundaries, and STS assume role policies. It
7684
+ # only applies permissions policy logic. For more about the evaluation
7685
+ # of policy types, see [Evaluating policies][1] in the *IAM User Guide*.
7640
7686
  #
7641
7687
  # </note>
7642
7688
  #
@@ -7682,15 +7728,16 @@ module Aws::IAM
7682
7728
  # want to list.
7683
7729
  #
7684
7730
  # @option params [required, Array<String>] :service_namespaces
7685
- # The service namespace for the AWS services whose policies you want to
7686
- # list.
7731
+ # The service namespace for the Amazon Web Services services whose
7732
+ # policies you want to list.
7687
7733
  #
7688
7734
  # To learn the service namespace for a service, see [Actions, resources,
7689
- # and condition keys for AWS services][1] in the *IAM User Guide*.
7690
- # Choose the name of the service to view details for that service. In
7691
- # the first paragraph, find the service prefix. For example, `(service
7692
- # prefix: a4b)`. For more information about service namespaces, see [AWS
7693
- # service namespaces][2] in the *AWS General Reference*.
7735
+ # and condition keys for Amazon Web Services services][1] in the *IAM
7736
+ # User Guide*. Choose the name of the service to view details for that
7737
+ # service. In the first paragraph, find the service prefix. For example,
7738
+ # `(service prefix: a4b)`. For more information about service
7739
+ # namespaces, see [Amazon Web Services service namespaces][2] in
7740
+ # the *Amazon Web Services General Reference*.
7694
7741
  #
7695
7742
  #
7696
7743
  #
@@ -7791,10 +7838,10 @@ module Aws::IAM
7791
7838
  # @option params [required, String] :policy_arn
7792
7839
  # The ARN of the IAM customer managed policy whose tags you want to see.
7793
7840
  #
7794
- # This parameter accepts (through its [regex pattern][1]) a string of
7795
- # characters that consist of upper and lowercase alphanumeric characters
7841
+ # This parameter allows (through its [regex pattern][1]) a string of
7842
+ # characters consisting of upper and lowercase alphanumeric characters
7796
7843
  # with no spaces. You can also include any of the following characters:
7797
- # =,.@-
7844
+ # \_+=,.@-
7798
7845
  #
7799
7846
  #
7800
7847
  #
@@ -7807,16 +7854,15 @@ module Aws::IAM
7807
7854
  # to indicate where the next call should start.
7808
7855
  #
7809
7856
  # @option params [Integer] :max_items
7810
- # (Optional) Use this only when paginating results to indicate the
7811
- # maximum number of items that you want in the response. If additional
7812
- # items exist beyond the maximum that you specify, the `IsTruncated`
7813
- # response element is `true`.
7857
+ # Use this only when paginating results to indicate the maximum number
7858
+ # of items you want in the response. If additional items exist beyond
7859
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7814
7860
  #
7815
- # If you do not include this parameter, it defaults to 100. Note that
7816
- # IAM might return fewer results, even when more results are available.
7817
- # In that case, the `IsTruncated` response element returns `true`, and
7818
- # `Marker` contains a value to include in the subsequent call that tells
7819
- # the service where to continue from.
7861
+ # If you do not include this parameter, the number of items defaults to
7862
+ # 100. Note that IAM might return fewer results, even when there are
7863
+ # more results available. In that case, the `IsTruncated` response
7864
+ # element returns `true`, and `Marker` contains a value to include in
7865
+ # the subsequent call that tells the service where to continue from.
7820
7866
  #
7821
7867
  # @return [Types::ListPolicyTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7822
7868
  #
@@ -7865,7 +7911,7 @@ module Aws::IAM
7865
7911
  # the versions.
7866
7912
  #
7867
7913
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
7868
- # in the *AWS General Reference*.
7914
+ # in the *Amazon Web Services General Reference*.
7869
7915
  #
7870
7916
  #
7871
7917
  #
@@ -8027,16 +8073,15 @@ module Aws::IAM
8027
8073
  # to indicate where the next call should start.
8028
8074
  #
8029
8075
  # @option params [Integer] :max_items
8030
- # (Optional) Use this only when paginating results to indicate the
8031
- # maximum number of items that you want in the response. If additional
8032
- # items exist beyond the maximum that you specify, the `IsTruncated`
8033
- # response element is `true`.
8076
+ # Use this only when paginating results to indicate the maximum number
8077
+ # of items you want in the response. If additional items exist beyond
8078
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8034
8079
  #
8035
- # If you do not include this parameter, it defaults to 100. Note that
8036
- # IAM might return fewer results, even when more results are available.
8037
- # In that case, the `IsTruncated` response element returns `true`, and
8038
- # `Marker` contains a value to include in the subsequent call that tells
8039
- # the service where to continue from.
8080
+ # If you do not include this parameter, the number of items defaults to
8081
+ # 100. Note that IAM might return fewer results, even when there are
8082
+ # more results available. In that case, the `IsTruncated` response
8083
+ # element returns `true`, and `Marker` contains a value to include in
8084
+ # the subsequent call that tells the service where to continue from.
8040
8085
  #
8041
8086
  # @return [Types::ListRoleTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8042
8087
  #
@@ -8208,10 +8253,10 @@ module Aws::IAM
8208
8253
  # The ARN of the Security Assertion Markup Language (SAML) identity
8209
8254
  # provider whose tags you want to see.
8210
8255
  #
8211
- # This parameter accepts (through its [regex pattern][1]) a string of
8212
- # characters that consist of upper and lowercase alphanumeric characters
8256
+ # This parameter allows (through its [regex pattern][1]) a string of
8257
+ # characters consisting of upper and lowercase alphanumeric characters
8213
8258
  # with no spaces. You can also include any of the following characters:
8214
- # =,.@-
8259
+ # \_+=,.@-
8215
8260
  #
8216
8261
  #
8217
8262
  #
@@ -8224,16 +8269,15 @@ module Aws::IAM
8224
8269
  # to indicate where the next call should start.
8225
8270
  #
8226
8271
  # @option params [Integer] :max_items
8227
- # (Optional) Use this only when paginating results to indicate the
8228
- # maximum number of items that you want in the response. If additional
8229
- # items exist beyond the maximum that you specify, the `IsTruncated`
8230
- # response element is `true`.
8272
+ # Use this only when paginating results to indicate the maximum number
8273
+ # of items you want in the response. If additional items exist beyond
8274
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8231
8275
  #
8232
- # If you do not include this parameter, it defaults to 100. Note that
8233
- # IAM might return fewer results, even when more results are available.
8234
- # In that case, the `IsTruncated` response element returns `true`, and
8235
- # `Marker` contains a value to include in the subsequent call that tells
8236
- # the service where to continue from.
8276
+ # If you do not include this parameter, the number of items defaults to
8277
+ # 100. Note that IAM might return fewer results, even when there are
8278
+ # more results available. In that case, the `IsTruncated` response
8279
+ # element returns `true`, and `Marker` contains a value to include in
8280
+ # the subsequent call that tells the service where to continue from.
8237
8281
  #
8238
8282
  # @return [Types::ListSAMLProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8239
8283
  #
@@ -8304,10 +8348,10 @@ module Aws::IAM
8304
8348
  # list.
8305
8349
  #
8306
8350
  # The SSH public keys returned by this operation are used only for
8307
- # authenticating the IAM user to an AWS CodeCommit repository. For more
8308
- # information about using SSH keys to authenticate to an AWS CodeCommit
8309
- # repository, see [Set up AWS CodeCommit for SSH connections][1] in the
8310
- # *AWS CodeCommit User Guide*.
8351
+ # authenticating the IAM user to an CodeCommit repository. For more
8352
+ # information about using SSH keys to authenticate to an CodeCommit
8353
+ # repository, see [Set up CodeCommit for SSH connections][1] in the
8354
+ # *CodeCommit User Guide*.
8311
8355
  #
8312
8356
  # Although each user is limited to a small number of keys, you can still
8313
8357
  # paginate the results using the `MaxItems` and `Marker` parameters.
@@ -8319,7 +8363,7 @@ module Aws::IAM
8319
8363
  # @option params [String] :user_name
8320
8364
  # The name of the IAM user to list SSH public keys for. If none is
8321
8365
  # specified, the `UserName` field is determined implicitly based on the
8322
- # AWS access key used to sign the request.
8366
+ # Amazon Web Services access key used to sign the request.
8323
8367
  #
8324
8368
  # This parameter allows (through its [regex pattern][1]) a string of
8325
8369
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8387,11 +8431,11 @@ module Aws::IAM
8387
8431
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
8388
8432
  # User Guide*.
8389
8433
  #
8390
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
8391
- # (ACM), we recommend that you don't use IAM server certificates.
8392
- # Instead, use ACM to provision, manage, and deploy your server
8393
- # certificates. For more information about IAM server certificates,
8394
- # [Working with server certificates][2] in the *IAM User Guide*.
8434
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
8435
+ # we recommend that you don't use IAM server certificates. Instead, use
8436
+ # ACM to provision, manage, and deploy your server certificates. For
8437
+ # more information about IAM server certificates, [Working with server
8438
+ # certificates][2] in the *IAM User Guide*.
8395
8439
  #
8396
8440
  # </note>
8397
8441
  #
@@ -8403,10 +8447,10 @@ module Aws::IAM
8403
8447
  # @option params [required, String] :server_certificate_name
8404
8448
  # The name of the IAM server certificate whose tags you want to see.
8405
8449
  #
8406
- # This parameter accepts (through its [regex pattern][1]) a string of
8407
- # characters that consist of upper and lowercase alphanumeric characters
8450
+ # This parameter allows (through its [regex pattern][1]) a string of
8451
+ # characters consisting of upper and lowercase alphanumeric characters
8408
8452
  # with no spaces. You can also include any of the following characters:
8409
- # =,.@-
8453
+ # \_+=,.@-
8410
8454
  #
8411
8455
  #
8412
8456
  #
@@ -8419,16 +8463,15 @@ module Aws::IAM
8419
8463
  # to indicate where the next call should start.
8420
8464
  #
8421
8465
  # @option params [Integer] :max_items
8422
- # (Optional) Use this only when paginating results to indicate the
8423
- # maximum number of items that you want in the response. If additional
8424
- # items exist beyond the maximum that you specify, the `IsTruncated`
8425
- # response element is `true`.
8466
+ # Use this only when paginating results to indicate the maximum number
8467
+ # of items you want in the response. If additional items exist beyond
8468
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8426
8469
  #
8427
- # If you do not include this parameter, it defaults to 100. Note that
8428
- # IAM might return fewer results, even when more results are available.
8429
- # In that case, the `IsTruncated` response element returns `true`, and
8430
- # `Marker` contains a value to include in the subsequent call that tells
8431
- # the service where to continue from.
8470
+ # If you do not include this parameter, the number of items defaults to
8471
+ # 100. Note that IAM might return fewer results, even when there are
8472
+ # more results available. In that case, the `IsTruncated` response
8473
+ # element returns `true`, and `Marker` contains a value to include in
8474
+ # the subsequent call that tells the service where to continue from.
8432
8475
  #
8433
8476
  # @return [Types::ListServerCertificateTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8434
8477
  #
@@ -8469,8 +8512,8 @@ module Aws::IAM
8469
8512
  #
8470
8513
  # For more information about working with server certificates, see
8471
8514
  # [Working with server certificates][1] in the *IAM User Guide*. This
8472
- # topic also includes a list of AWS services that can use the server
8473
- # certificates that you manage with IAM.
8515
+ # topic also includes a list of Amazon Web Services services that can
8516
+ # use the server certificates that you manage with IAM.
8474
8517
  #
8475
8518
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8476
8519
  # attributes for the resource. For example, this operation does not
@@ -8561,8 +8604,8 @@ module Aws::IAM
8561
8604
  # empty list. The service-specific credentials returned by this
8562
8605
  # operation are used only for authenticating the IAM user to a specific
8563
8606
  # service. For more information about using service-specific credentials
8564
- # to authenticate to an AWS service, see [Set up service-specific
8565
- # credentials][1] in the AWS CodeCommit User Guide.
8607
+ # to authenticate to an Amazon Web Services service, see [Set up
8608
+ # service-specific credentials][1] in the CodeCommit User Guide.
8566
8609
  #
8567
8610
  #
8568
8611
  #
@@ -8583,9 +8626,9 @@ module Aws::IAM
8583
8626
  # [1]: http://wikipedia.org/wiki/regex
8584
8627
  #
8585
8628
  # @option params [String] :service_name
8586
- # Filters the returned results to only those for the specified AWS
8587
- # service. If not specified, then AWS returns service-specific
8588
- # credentials for all services.
8629
+ # Filters the returned results to only those for the specified Amazon
8630
+ # Web Services service. If not specified, then Amazon Web Services
8631
+ # returns service-specific credentials for all services.
8589
8632
  #
8590
8633
  # @return [Types::ListServiceSpecificCredentialsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8591
8634
  #
@@ -8626,11 +8669,11 @@ module Aws::IAM
8626
8669
  # and `Marker` parameters.
8627
8670
  #
8628
8671
  # If the `UserName` field is not specified, the user name is determined
8629
- # implicitly based on the AWS access key ID used to sign the request for
8630
- # this operation. This operation works for access keys under the AWS
8631
- # account. Consequently, you can use this operation to manage AWS
8632
- # account root user credentials even if the AWS account has no
8633
- # associated users.
8672
+ # implicitly based on the Amazon Web Services access key ID used to sign
8673
+ # the request for this operation. This operation works for access keys
8674
+ # under the account. Consequently, you can use this operation to manage
8675
+ # account root user credentials even if the account has no associated
8676
+ # users.
8634
8677
  #
8635
8678
  # @option params [String] :user_name
8636
8679
  # The name of the IAM user whose signing certificates you want to
@@ -8808,10 +8851,10 @@ module Aws::IAM
8808
8851
  # @option params [required, String] :user_name
8809
8852
  # The name of the IAM user whose tags you want to see.
8810
8853
  #
8811
- # This parameter accepts (through its [regex pattern][1]) a string of
8812
- # characters that consist of upper and lowercase alphanumeric characters
8854
+ # This parameter allows (through its [regex pattern][1]) a string of
8855
+ # characters consisting of upper and lowercase alphanumeric characters
8813
8856
  # with no spaces. You can also include any of the following characters:
8814
- # =,.@-
8857
+ # \_+=,.@-
8815
8858
  #
8816
8859
  #
8817
8860
  #
@@ -8824,16 +8867,15 @@ module Aws::IAM
8824
8867
  # to indicate where the next call should start.
8825
8868
  #
8826
8869
  # @option params [Integer] :max_items
8827
- # (Optional) Use this only when paginating results to indicate the
8828
- # maximum number of items that you want in the response. If additional
8829
- # items exist beyond the maximum that you specify, the `IsTruncated`
8830
- # response element is `true`.
8870
+ # Use this only when paginating results to indicate the maximum number
8871
+ # of items you want in the response. If additional items exist beyond
8872
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8831
8873
  #
8832
- # If you do not include this parameter, it defaults to 100. Note that
8833
- # IAM might return fewer results, even when more results are available.
8834
- # In that case, the `IsTruncated` response element returns `true`, and
8835
- # `Marker` contains a value to include in the subsequent call that tells
8836
- # the service where to continue from.
8874
+ # If you do not include this parameter, the number of items defaults to
8875
+ # 100. Note that IAM might return fewer results, even when there are
8876
+ # more results available. In that case, the `IsTruncated` response
8877
+ # element returns `true`, and `Marker` contains a value to include in
8878
+ # the subsequent call that tells the service where to continue from.
8837
8879
  #
8838
8880
  # @return [Types::ListUserTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8839
8881
  #
@@ -8893,8 +8935,8 @@ module Aws::IAM
8893
8935
  end
8894
8936
 
8895
8937
  # Lists the IAM users that have the specified path prefix. If no path
8896
- # prefix is specified, the operation returns all users in the AWS
8897
- # account. If there are none, the operation returns an empty list.
8938
+ # prefix is specified, the operation returns all users in the account.
8939
+ # If there are none, the operation returns an empty list.
8898
8940
  #
8899
8941
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8900
8942
  # attributes for the resource. For example, this operation does not
@@ -9012,7 +9054,7 @@ module Aws::IAM
9012
9054
  req.send_request(options)
9013
9055
  end
9014
9056
 
9015
- # Lists the virtual MFA devices defined in the AWS account by assignment
9057
+ # Lists the virtual MFA devices defined in the account by assignment
9016
9058
  # status. If you do not specify an assignment status, the operation
9017
9059
  # returns a list of all virtual MFA devices. Assignment status can be
9018
9060
  # `Assigned`, `Unassigned`, or `Any`.
@@ -9171,10 +9213,10 @@ module Aws::IAM
9171
9213
  # @option params [required, String] :policy_document
9172
9214
  # The policy document.
9173
9215
  #
9174
- # You must provide policies in JSON format in IAM. However, for AWS
9216
+ # You must provide policies in JSON format in IAM. However, for
9175
9217
  # CloudFormation templates formatted in YAML, you can provide the policy
9176
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9177
- # policy to JSON format before submitting it to IAM.
9218
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9219
+ # to JSON format before submitting it to = IAM.
9178
9220
  #
9179
9221
  # The [regex pattern][1] used to validate this parameter is a string of
9180
9222
  # characters consisting of the following:
@@ -9223,11 +9265,11 @@ module Aws::IAM
9223
9265
  end
9224
9266
 
9225
9267
  # Adds or updates the policy that is specified as the IAM role's
9226
- # permissions boundary. You can use an AWS managed policy or a customer
9227
- # managed policy to set the boundary for a role. Use the boundary to
9228
- # control the maximum permissions that the role can have. Setting a
9229
- # permissions boundary is an advanced feature that can affect the
9230
- # permissions for the role.
9268
+ # permissions boundary. You can use an Amazon Web Services managed
9269
+ # policy or a customer managed policy to set the boundary for a role.
9270
+ # Use the boundary to control the maximum permissions that the role can
9271
+ # have. Setting a permissions boundary is an advanced feature that can
9272
+ # affect the permissions for the role.
9231
9273
  #
9232
9274
  # You cannot set the boundary for a service-linked role.
9233
9275
  #
@@ -9326,10 +9368,10 @@ module Aws::IAM
9326
9368
  # @option params [required, String] :policy_document
9327
9369
  # The policy document.
9328
9370
  #
9329
- # You must provide policies in JSON format in IAM. However, for AWS
9371
+ # You must provide policies in JSON format in IAM. However, for
9330
9372
  # CloudFormation templates formatted in YAML, you can provide the policy
9331
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9332
- # policy to JSON format before submitting it to IAM.
9373
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9374
+ # to JSON format before submitting it to IAM.
9333
9375
  #
9334
9376
  # The [regex pattern][1] used to validate this parameter is a string of
9335
9377
  # characters consisting of the following:
@@ -9378,11 +9420,11 @@ module Aws::IAM
9378
9420
  end
9379
9421
 
9380
9422
  # Adds or updates the policy that is specified as the IAM user's
9381
- # permissions boundary. You can use an AWS managed policy or a customer
9382
- # managed policy to set the boundary for a user. Use the boundary to
9383
- # control the maximum permissions that the user can have. Setting a
9384
- # permissions boundary is an advanced feature that can affect the
9385
- # permissions for the user.
9423
+ # permissions boundary. You can use an Amazon Web Services managed
9424
+ # policy or a customer managed policy to set the boundary for a user.
9425
+ # Use the boundary to control the maximum permissions that the user can
9426
+ # have. Setting a permissions boundary is an advanced feature that can
9427
+ # affect the permissions for the user.
9386
9428
  #
9387
9429
  # Policies that are used as permissions boundaries do not provide
9388
9430
  # permissions. You must also attach a permissions policy to the user. To
@@ -9471,10 +9513,10 @@ module Aws::IAM
9471
9513
  # @option params [required, String] :policy_document
9472
9514
  # The policy document.
9473
9515
  #
9474
- # You must provide policies in JSON format in IAM. However, for AWS
9516
+ # You must provide policies in JSON format in IAM. However, for
9475
9517
  # CloudFormation templates formatted in YAML, you can provide the policy
9476
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9477
- # policy to JSON format before submitting it to IAM.
9518
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9519
+ # to JSON format before submitting it to IAM.
9478
9520
  #
9479
9521
  # The [regex pattern][1] used to validate this parameter is a string of
9480
9522
  # characters consisting of the following:
@@ -9535,7 +9577,7 @@ module Aws::IAM
9535
9577
  # using the ListOpenIDConnectProviders operation.
9536
9578
  #
9537
9579
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9538
- # in the *AWS General Reference*.
9580
+ # in the *Amazon Web Services General Reference*.
9539
9581
  #
9540
9582
  #
9541
9583
  #
@@ -9688,9 +9730,10 @@ module Aws::IAM
9688
9730
  end
9689
9731
 
9690
9732
  # Resets the password for a service-specific credential. The new
9691
- # password is AWS generated and cryptographically strong. It cannot be
9692
- # configured by the user. Resetting the password immediately invalidates
9693
- # the previous password associated with this user.
9733
+ # password is Amazon Web Services generated and cryptographically
9734
+ # strong. It cannot be configured by the user. Resetting the password
9735
+ # immediately invalidates the previous password associated with this
9736
+ # user.
9694
9737
  #
9695
9738
  # @option params [String] :user_name
9696
9739
  # The name of the IAM user associated with the service-specific
@@ -9748,7 +9791,7 @@ module Aws::IAM
9748
9791
  end
9749
9792
 
9750
9793
  # Synchronizes the specified MFA device with its IAM resource object on
9751
- # the AWS servers.
9794
+ # the Amazon Web Services servers.
9752
9795
  #
9753
9796
  # For more information about creating and working with virtual MFA
9754
9797
  # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
@@ -9830,7 +9873,7 @@ module Aws::IAM
9830
9873
  # you want to set.
9831
9874
  #
9832
9875
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9833
- # in the *AWS General Reference*.
9876
+ # in the *Amazon Web Services General Reference*.
9834
9877
  #
9835
9878
  #
9836
9879
  #
@@ -9865,25 +9908,25 @@ module Aws::IAM
9865
9908
  end
9866
9909
 
9867
9910
  # Sets the specified version of the global endpoint token as the token
9868
- # version used for the AWS account.
9911
+ # version used for the account.
9869
9912
  #
9870
- # By default, AWS Security Token Service (STS) is available as a global
9913
+ # By default, Security Token Service (STS) is available as a global
9871
9914
  # service, and all STS requests go to a single endpoint at
9872
- # `https://sts.amazonaws.com`. AWS recommends using Regional STS
9873
- # endpoints to reduce latency, build in redundancy, and increase session
9874
- # token availability. For information about Regional endpoints for STS,
9875
- # see [AWS AWS Security Token Service endpoints and quotas][1] in the
9876
- # *AWS General Reference*.
9915
+ # `https://sts.amazonaws.com`. Amazon Web Services recommends using
9916
+ # Regional STS endpoints to reduce latency, build in redundancy, and
9917
+ # increase session token availability. For information about Regional
9918
+ # endpoints for STS, see [Security Token Service endpoints and
9919
+ # quotas][1] in the *Amazon Web Services General Reference*.
9877
9920
  #
9878
9921
  # If you make an STS call to the global endpoint, the resulting session
9879
9922
  # tokens might be valid in some Regions but not others. It depends on
9880
9923
  # the version that is set in this operation. Version 1 tokens are valid
9881
- # only in AWS Regions that are available by default. These tokens do not
9924
+ # only in Regions that are available by default. These tokens do not
9882
9925
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9883
9926
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9884
9927
  # are longer and might affect systems where you temporarily store
9885
9928
  # tokens. For information, see [Activating and deactivating STS in an
9886
- # AWS region][2] in the *IAM User Guide*.
9929
+ # Region][2] in the *IAM User Guide*.
9887
9930
  #
9888
9931
  # To view the current session token version, see the
9889
9932
  # `GlobalEndpointTokenVersion` entry in the response of the
@@ -9896,14 +9939,14 @@ module Aws::IAM
9896
9939
  #
9897
9940
  # @option params [required, String] :global_endpoint_token_version
9898
9941
  # The version of the global endpoint token. Version 1 tokens are valid
9899
- # only in AWS Regions that are available by default. These tokens do not
9942
+ # only in Regions that are available by default. These tokens do not
9900
9943
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9901
9944
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9902
9945
  # are longer and might affect systems where you temporarily store
9903
9946
  # tokens.
9904
9947
  #
9905
- # For information, see [Activating and deactivating STS in an AWS
9906
- # region][1] in the *IAM User Guide*.
9948
+ # For information, see [Activating and deactivating STS in an Region][1]
9949
+ # in the *IAM User Guide*.
9907
9950
  #
9908
9951
  #
9909
9952
  #
@@ -9936,9 +9979,9 @@ module Aws::IAM
9936
9979
  end
9937
9980
 
9938
9981
  # Simulate how a set of IAM policies and optionally a resource-based
9939
- # policy works with a list of API operations and AWS resources to
9940
- # determine the policies' effective permissions. The policies are
9941
- # provided as strings.
9982
+ # policy works with a list of API operations and Amazon Web Services
9983
+ # resources to determine the policies' effective permissions. The
9984
+ # policies are provided as strings.
9942
9985
  #
9943
9986
  # The simulation does not perform the API operations; it only checks the
9944
9987
  # authorization to determine if the simulated policies allow or deny the
@@ -9948,11 +9991,12 @@ module Aws::IAM
9948
9991
  # If you want to simulate existing policies that are attached to an IAM
9949
9992
  # user, group, or role, use SimulatePrincipalPolicy instead.
9950
9993
  #
9951
- # Context keys are variables that are maintained by AWS and its services
9952
- # and which provide details about the context of an API query request.
9953
- # You can use the `Condition` element of an IAM policy to evaluate
9954
- # context keys. To get the list of context keys that the policies
9955
- # require for correct simulation, use GetContextKeysForCustomPolicy.
9994
+ # Context keys are variables that are maintained by Amazon Web Services
9995
+ # and its services and which provide details about the context of an API
9996
+ # query request. You can use the `Condition` element of an IAM policy to
9997
+ # evaluate context keys. To get the list of context keys that the
9998
+ # policies require for correct simulation, use
9999
+ # GetContextKeysForCustomPolicy.
9956
10000
  #
9957
10001
  # If the output is long, you can use `MaxItems` and `Marker` parameters
9958
10002
  # to paginate the results.
@@ -9976,7 +10020,12 @@ module Aws::IAM
9976
10020
  # In other words, do not use policies designed to restrict what a user
9977
10021
  # can do while using the temporary credentials.
9978
10022
  #
9979
- # The [regex pattern][3] used to validate this parameter is a string of
10023
+ # The maximum length of the policy document that you can pass in this
10024
+ # operation, including whitespace, is listed below. To view the maximum
10025
+ # character counts of a managed policy with no whitespaces, see [IAM and
10026
+ # STS character quotas][3].
10027
+ #
10028
+ # The [regex pattern][4] used to validate this parameter is a string of
9980
10029
  # characters consisting of the following:
9981
10030
  #
9982
10031
  # * Any printable ASCII character ranging from the space character
@@ -9992,7 +10041,8 @@ module Aws::IAM
9992
10041
  #
9993
10042
  # [1]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetFederationToken.html
9994
10043
  # [2]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_AssumeRole.html
9995
- # [3]: http://wikipedia.org/wiki/regex
10044
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10045
+ # [4]: http://wikipedia.org/wiki/regex
9996
10046
  #
9997
10047
  # @option params [Array<String>] :permissions_boundary_policy_input_list
9998
10048
  # The IAM permissions boundary policy to simulate. The permissions
@@ -10003,7 +10053,12 @@ module Aws::IAM
10003
10053
  # The policy input is specified as a string that contains the complete,
10004
10054
  # valid JSON text of a permissions boundary policy.
10005
10055
  #
10006
- # The [regex pattern][2] used to validate this parameter is a string of
10056
+ # The maximum length of the policy document that you can pass in this
10057
+ # operation, including whitespace, is listed below. To view the maximum
10058
+ # character counts of a managed policy with no whitespaces, see [IAM and
10059
+ # STS character quotas][2].
10060
+ #
10061
+ # The [regex pattern][3] used to validate this parameter is a string of
10007
10062
  # characters consisting of the following:
10008
10063
  #
10009
10064
  # * Any printable ASCII character ranging from the space character
@@ -10018,7 +10073,8 @@ module Aws::IAM
10018
10073
  #
10019
10074
  #
10020
10075
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10021
- # [2]: http://wikipedia.org/wiki/regex
10076
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10077
+ # [3]: http://wikipedia.org/wiki/regex
10022
10078
  #
10023
10079
  # @option params [required, Array<String>] :action_names
10024
10080
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10027,13 +10083,13 @@ module Aws::IAM
10027
10083
  # operation does not support using wildcards (*) in an action name.
10028
10084
  #
10029
10085
  # @option params [Array<String>] :resource_arns
10030
- # A list of ARNs of AWS resources to include in the simulation. If this
10031
- # parameter is not provided, then the value defaults to `*` (all
10032
- # resources). Each API in the `ActionNames` parameter is evaluated for
10033
- # each resource in this list. The simulation determines the access
10034
- # result (allowed or denied) of each combination and reports it in the
10035
- # response. You can simulate resources that don't exist in your
10036
- # account.
10086
+ # A list of ARNs of Amazon Web Services resources to include in the
10087
+ # simulation. If this parameter is not provided, then the value defaults
10088
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10089
+ # evaluated for each resource in this list. The simulation determines
10090
+ # the access result (allowed or denied) of each combination and reports
10091
+ # it in the response. You can simulate resources that don't exist in
10092
+ # your account.
10037
10093
  #
10038
10094
  # The simulation does not automatically retrieve policies for the
10039
10095
  # specified resources. If you want to include a resource policy in the
@@ -10045,7 +10101,7 @@ module Aws::IAM
10045
10101
  # input error.
10046
10102
  #
10047
10103
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10048
- # in the *AWS General Reference*.
10104
+ # in the *Amazon Web Services General Reference*.
10049
10105
  #
10050
10106
  #
10051
10107
  #
@@ -10057,7 +10113,12 @@ module Aws::IAM
10057
10113
  # policy attached. You can include only one resource-based policy in a
10058
10114
  # simulation.
10059
10115
  #
10060
- # The [regex pattern][1] used to validate this parameter is a string of
10116
+ # The maximum length of the policy document that you can pass in this
10117
+ # operation, including whitespace, is listed below. To view the maximum
10118
+ # character counts of a managed policy with no whitespaces, see [IAM and
10119
+ # STS character quotas][1].
10120
+ #
10121
+ # The [regex pattern][2] used to validate this parameter is a string of
10061
10122
  # characters consisting of the following:
10062
10123
  #
10063
10124
  # * Any printable ASCII character ranging from the space character
@@ -10071,10 +10132,11 @@ module Aws::IAM
10071
10132
  #
10072
10133
  #
10073
10134
  #
10074
- # [1]: http://wikipedia.org/wiki/regex
10135
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10136
+ # [2]: http://wikipedia.org/wiki/regex
10075
10137
  #
10076
10138
  # @option params [String] :resource_owner
10077
- # An ARN representing the AWS account ID that specifies the owner of any
10139
+ # An ARN representing the account ID that specifies the owner of any
10078
10140
  # simulated resource that does not identify its owner in the resource
10079
10141
  # ARN. Examples of resource ARNs include an S3 bucket or object. If
10080
10142
  # `ResourceOwner` is specified, it is also used as the account owner of
@@ -10245,11 +10307,11 @@ module Aws::IAM
10245
10307
  end
10246
10308
 
10247
10309
  # Simulate how a set of IAM policies attached to an IAM entity works
10248
- # with a list of API operations and AWS resources to determine the
10249
- # policies' effective permissions. The entity can be an IAM user,
10250
- # group, or role. If you specify a user, then the simulation also
10251
- # includes all of the policies that are attached to groups that the user
10252
- # belongs to. You can simulate resources that don't exist in your
10310
+ # with a list of API operations and Amazon Web Services resources to
10311
+ # determine the policies' effective permissions. The entity can be an
10312
+ # IAM user, group, or role. If you specify a user, then the simulation
10313
+ # also includes all of the policies that are attached to groups that the
10314
+ # user belongs to. You can simulate resources that don't exist in your
10253
10315
  # account.
10254
10316
  #
10255
10317
  # You can optionally include a list of one or more additional policies
@@ -10269,11 +10331,12 @@ module Aws::IAM
10269
10331
  # permissions, then consider allowing them to use SimulateCustomPolicy
10270
10332
  # instead.
10271
10333
  #
10272
- # Context keys are variables maintained by AWS and its services that
10273
- # provide details about the context of an API query request. You can use
10274
- # the `Condition` element of an IAM policy to evaluate context keys. To
10275
- # get the list of context keys that the policies require for correct
10276
- # simulation, use GetContextKeysForPrincipalPolicy.
10334
+ # Context keys are variables maintained by Amazon Web Services and its
10335
+ # services that provide details about the context of an API query
10336
+ # request. You can use the `Condition` element of an IAM policy to
10337
+ # evaluate context keys. To get the list of context keys that the
10338
+ # policies require for correct simulation, use
10339
+ # GetContextKeysForPrincipalPolicy.
10277
10340
  #
10278
10341
  # If the output is long, you can use the `MaxItems` and `Marker`
10279
10342
  # parameters to paginate the results.
@@ -10294,12 +10357,18 @@ module Aws::IAM
10294
10357
  # also includes all policies that are attached to any groups the user
10295
10358
  # belongs to.
10296
10359
  #
10297
- # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10298
- # in the *AWS General Reference*.
10360
+ # The maximum length of the policy document that you can pass in this
10361
+ # operation, including whitespace, is listed below. To view the maximum
10362
+ # character counts of a managed policy with no whitespaces, see [IAM and
10363
+ # STS character quotas][1].
10299
10364
  #
10365
+ # For more information about ARNs, see [Amazon Resource Names (ARNs)][2]
10366
+ # in the *Amazon Web Services General Reference*.
10300
10367
  #
10301
10368
  #
10302
- # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10369
+ #
10370
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10371
+ # [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10303
10372
  #
10304
10373
  # @option params [Array<String>] :policy_input_list
10305
10374
  # An optional list of additional policy documents to include in the
@@ -10335,7 +10404,12 @@ module Aws::IAM
10335
10404
  # Guide*. The policy input is specified as a string containing the
10336
10405
  # complete, valid JSON text of a permissions boundary policy.
10337
10406
  #
10338
- # The [regex pattern][2] used to validate this parameter is a string of
10407
+ # The maximum length of the policy document that you can pass in this
10408
+ # operation, including whitespace, is listed below. To view the maximum
10409
+ # character counts of a managed policy with no whitespaces, see [IAM and
10410
+ # STS character quotas][2].
10411
+ #
10412
+ # The [regex pattern][3] used to validate this parameter is a string of
10339
10413
  # characters consisting of the following:
10340
10414
  #
10341
10415
  # * Any printable ASCII character ranging from the space character
@@ -10350,7 +10424,8 @@ module Aws::IAM
10350
10424
  #
10351
10425
  #
10352
10426
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10353
- # [2]: http://wikipedia.org/wiki/regex
10427
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10428
+ # [3]: http://wikipedia.org/wiki/regex
10354
10429
  #
10355
10430
  # @option params [required, Array<String>] :action_names
10356
10431
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10358,13 +10433,13 @@ module Aws::IAM
10358
10433
  # the service identifier, such as `iam:CreateUser`.
10359
10434
  #
10360
10435
  # @option params [Array<String>] :resource_arns
10361
- # A list of ARNs of AWS resources to include in the simulation. If this
10362
- # parameter is not provided, then the value defaults to `*` (all
10363
- # resources). Each API in the `ActionNames` parameter is evaluated for
10364
- # each resource in this list. The simulation determines the access
10365
- # result (allowed or denied) of each combination and reports it in the
10366
- # response. You can simulate resources that don't exist in your
10367
- # account.
10436
+ # A list of ARNs of Amazon Web Services resources to include in the
10437
+ # simulation. If this parameter is not provided, then the value defaults
10438
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10439
+ # evaluated for each resource in this list. The simulation determines
10440
+ # the access result (allowed or denied) of each combination and reports
10441
+ # it in the response. You can simulate resources that don't exist in
10442
+ # your account.
10368
10443
  #
10369
10444
  # The simulation does not automatically retrieve policies for the
10370
10445
  # specified resources. If you want to include a resource policy in the
@@ -10372,7 +10447,7 @@ module Aws::IAM
10372
10447
  # `ResourcePolicy` parameter.
10373
10448
  #
10374
10449
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10375
- # in the *AWS General Reference*.
10450
+ # in the *Amazon Web Services General Reference*.
10376
10451
  #
10377
10452
  #
10378
10453
  #
@@ -10384,7 +10459,12 @@ module Aws::IAM
10384
10459
  # policy attached. You can include only one resource-based policy in a
10385
10460
  # simulation.
10386
10461
  #
10387
- # The [regex pattern][1] used to validate this parameter is a string of
10462
+ # The maximum length of the policy document that you can pass in this
10463
+ # operation, including whitespace, is listed below. To view the maximum
10464
+ # character counts of a managed policy with no whitespaces, see [IAM and
10465
+ # STS character quotas][1].
10466
+ #
10467
+ # The [regex pattern][2] used to validate this parameter is a string of
10388
10468
  # characters consisting of the following:
10389
10469
  #
10390
10470
  # * Any printable ASCII character ranging from the space character
@@ -10398,19 +10478,20 @@ module Aws::IAM
10398
10478
  #
10399
10479
  #
10400
10480
  #
10401
- # [1]: http://wikipedia.org/wiki/regex
10481
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10482
+ # [2]: http://wikipedia.org/wiki/regex
10402
10483
  #
10403
10484
  # @option params [String] :resource_owner
10404
- # An AWS account ID that specifies the owner of any simulated resource
10405
- # that does not identify its owner in the resource ARN. Examples of
10406
- # resource ARNs include an S3 bucket or object. If `ResourceOwner` is
10407
- # specified, it is also used as the account owner of any
10408
- # `ResourcePolicy` included in the simulation. If the `ResourceOwner`
10409
- # parameter is not specified, then the owner of the resources and the
10410
- # resource policy defaults to the account of the identity provided in
10411
- # `CallerArn`. This parameter is required only if you specify a
10412
- # resource-based policy and account that owns the resource is different
10413
- # from the account that owns the simulated calling user `CallerArn`.
10485
+ # An account ID that specifies the owner of any simulated resource that
10486
+ # does not identify its owner in the resource ARN. Examples of resource
10487
+ # ARNs include an S3 bucket or object. If `ResourceOwner` is specified,
10488
+ # it is also used as the account owner of any `ResourcePolicy` included
10489
+ # in the simulation. If the `ResourceOwner` parameter is not specified,
10490
+ # then the owner of the resources and the resource policy defaults to
10491
+ # the account of the identity provided in `CallerArn`. This parameter is
10492
+ # required only if you specify a resource-based policy and account that
10493
+ # owns the resource is different from the account that owns the
10494
+ # simulated calling user `CallerArn`.
10414
10495
  #
10415
10496
  # @option params [String] :caller_arn
10416
10497
  # The ARN of the IAM user that you want to specify as the simulated
@@ -10431,7 +10512,7 @@ module Aws::IAM
10431
10512
  # use in evaluating the policy.
10432
10513
  #
10433
10514
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10434
- # in the *AWS General Reference*.
10515
+ # in the *Amazon Web Services General Reference*.
10435
10516
  #
10436
10517
  #
10437
10518
  #
@@ -10606,9 +10687,10 @@ module Aws::IAM
10606
10687
  # resource is not created. For more information about tagging, see
10607
10688
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10608
10689
  #
10609
- # * AWS always interprets the tag `Value` as a single string. If you
10610
- # need to store an array, you can store comma-separated values in the
10611
- # string. However, you must interpret the value in your code.
10690
+ # * Amazon Web Services always interprets the tag `Value` as a single
10691
+ # string. If you need to store an array, you can store comma-separated
10692
+ # values in the string. However, you must interpret the value in your
10693
+ # code.
10612
10694
  #
10613
10695
  # </note>
10614
10696
  #
@@ -10620,10 +10702,10 @@ module Aws::IAM
10620
10702
  # @option params [required, String] :instance_profile_name
10621
10703
  # The name of the IAM instance profile to which you want to add tags.
10622
10704
  #
10623
- # This parameter accepts (through its [regex pattern][1]) a string of
10624
- # characters that consist of upper and lowercase alphanumeric characters
10705
+ # This parameter allows (through its [regex pattern][1]) a string of
10706
+ # characters consisting of upper and lowercase alphanumeric characters
10625
10707
  # with no spaces. You can also include any of the following characters:
10626
- # =,.@-
10708
+ # \_+=,.@-
10627
10709
  #
10628
10710
  #
10629
10711
  #
@@ -10680,9 +10762,10 @@ module Aws::IAM
10680
10762
  # resource is not created. For more information about tagging, see
10681
10763
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10682
10764
  #
10683
- # * AWS always interprets the tag `Value` as a single string. If you
10684
- # need to store an array, you can store comma-separated values in the
10685
- # string. However, you must interpret the value in your code.
10765
+ # * Amazon Web Services always interprets the tag `Value` as a single
10766
+ # string. If you need to store an array, you can store comma-separated
10767
+ # values in the string. However, you must interpret the value in your
10768
+ # code.
10686
10769
  #
10687
10770
  # </note>
10688
10771
  #
@@ -10696,10 +10779,10 @@ module Aws::IAM
10696
10779
  # to add tags. For virtual MFA devices, the serial number is the same as
10697
10780
  # the ARN.
10698
10781
  #
10699
- # This parameter accepts (through its [regex pattern][1]) a string of
10700
- # characters that consist of upper and lowercase alphanumeric characters
10782
+ # This parameter allows (through its [regex pattern][1]) a string of
10783
+ # characters consisting of upper and lowercase alphanumeric characters
10701
10784
  # with no spaces. You can also include any of the following characters:
10702
- # =,.@-
10785
+ # \_+=,.@-
10703
10786
  #
10704
10787
  #
10705
10788
  #
@@ -10757,9 +10840,10 @@ module Aws::IAM
10757
10840
  # resource is not created. For more information about tagging, see
10758
10841
  # [Tagging IAM resources][3] in the *IAM User Guide*.
10759
10842
  #
10760
- # * AWS always interprets the tag `Value` as a single string. If you
10761
- # need to store an array, you can store comma-separated values in the
10762
- # string. However, you must interpret the value in your code.
10843
+ # * Amazon Web Services always interprets the tag `Value` as a single
10844
+ # string. If you need to store an array, you can store comma-separated
10845
+ # values in the string. However, you must interpret the value in your
10846
+ # code.
10763
10847
  #
10764
10848
  # </note>
10765
10849
  #
@@ -10773,10 +10857,10 @@ module Aws::IAM
10773
10857
  # The ARN of the OIDC identity provider in IAM to which you want to add
10774
10858
  # tags.
10775
10859
  #
10776
- # This parameter accepts (through its [regex pattern][1]) a string of
10777
- # characters that consist of upper and lowercase alphanumeric characters
10860
+ # This parameter allows (through its [regex pattern][1]) a string of
10861
+ # characters consisting of upper and lowercase alphanumeric characters
10778
10862
  # with no spaces. You can also include any of the following characters:
10779
- # =,.@-
10863
+ # \_+=,.@-
10780
10864
  #
10781
10865
  #
10782
10866
  #
@@ -10834,9 +10918,10 @@ module Aws::IAM
10834
10918
  # resource is not created. For more information about tagging, see
10835
10919
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10836
10920
  #
10837
- # * AWS always interprets the tag `Value` as a single string. If you
10838
- # need to store an array, you can store comma-separated values in the
10839
- # string. However, you must interpret the value in your code.
10921
+ # * Amazon Web Services always interprets the tag `Value` as a single
10922
+ # string. If you need to store an array, you can store comma-separated
10923
+ # values in the string. However, you must interpret the value in your
10924
+ # code.
10840
10925
  #
10841
10926
  # </note>
10842
10927
  #
@@ -10849,10 +10934,10 @@ module Aws::IAM
10849
10934
  # The ARN of the IAM customer managed policy to which you want to add
10850
10935
  # tags.
10851
10936
  #
10852
- # This parameter accepts (through its [regex pattern][1]) a string of
10853
- # characters that consist of upper and lowercase alphanumeric characters
10937
+ # This parameter allows (through its [regex pattern][1]) a string of
10938
+ # characters consisting of upper and lowercase alphanumeric characters
10854
10939
  # with no spaces. You can also include any of the following characters:
10855
- # =,.@-
10940
+ # \_+=,.@-
10856
10941
  #
10857
10942
  #
10858
10943
  #
@@ -10906,16 +10991,17 @@ module Aws::IAM
10906
10991
  # see [Control access using IAM tags][1] in the *IAM User Guide*.
10907
10992
  #
10908
10993
  # * **Cost allocation** - Use tags to help track which individuals and
10909
- # teams are using which AWS resources.
10994
+ # teams are using which Amazon Web Services resources.
10910
10995
  #
10911
10996
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
10912
10997
  # maximum number of tags, then the entire request fails and the
10913
10998
  # resource is not created. For more information about tagging, see
10914
10999
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10915
11000
  #
10916
- # * AWS always interprets the tag `Value` as a single string. If you
10917
- # need to store an array, you can store comma-separated values in the
10918
- # string. However, you must interpret the value in your code.
11001
+ # * Amazon Web Services always interprets the tag `Value` as a single
11002
+ # string. If you need to store an array, you can store comma-separated
11003
+ # values in the string. However, you must interpret the value in your
11004
+ # code.
10919
11005
  #
10920
11006
  # </note>
10921
11007
  #
@@ -11010,9 +11096,10 @@ module Aws::IAM
11010
11096
  # resource is not created. For more information about tagging, see
11011
11097
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11012
11098
  #
11013
- # * AWS always interprets the tag `Value` as a single string. If you
11014
- # need to store an array, you can store comma-separated values in the
11015
- # string. However, you must interpret the value in your code.
11099
+ # * Amazon Web Services always interprets the tag `Value` as a single
11100
+ # string. If you need to store an array, you can store comma-separated
11101
+ # values in the string. However, you must interpret the value in your
11102
+ # code.
11016
11103
  #
11017
11104
  # </note>
11018
11105
  #
@@ -11026,10 +11113,10 @@ module Aws::IAM
11026
11113
  # The ARN of the SAML identity provider in IAM to which you want to add
11027
11114
  # tags.
11028
11115
  #
11029
- # This parameter accepts (through its [regex pattern][1]) a string of
11030
- # characters that consist of upper and lowercase alphanumeric characters
11116
+ # This parameter allows (through its [regex pattern][1]) a string of
11117
+ # characters consisting of upper and lowercase alphanumeric characters
11031
11118
  # with no spaces. You can also include any of the following characters:
11032
- # =,.@-
11119
+ # \_+=,.@-
11033
11120
  #
11034
11121
  #
11035
11122
  #
@@ -11066,11 +11153,11 @@ module Aws::IAM
11066
11153
  # same key name already exists, then that tag is overwritten with the
11067
11154
  # new value.
11068
11155
  #
11069
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11070
- # (ACM), we recommend that you don't use IAM server certificates.
11071
- # Instead, use ACM to provision, manage, and deploy your server
11072
- # certificates. For more information about IAM server certificates,
11073
- # [Working with server certificates][1] in the *IAM User Guide*.
11156
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11157
+ # we recommend that you don't use IAM server certificates. Instead, use
11158
+ # ACM to provision, manage, and deploy your server certificates. For
11159
+ # more information about IAM server certificates, [Working with server
11160
+ # certificates][1] in the *IAM User Guide*.
11074
11161
  #
11075
11162
  # </note>
11076
11163
  #
@@ -11090,16 +11177,17 @@ module Aws::IAM
11090
11177
  # [Control access using IAM tags][2] in the *IAM User Guide*.
11091
11178
  #
11092
11179
  # * **Cost allocation** - Use tags to help track which individuals and
11093
- # teams are using which AWS resources.
11180
+ # teams are using which Amazon Web Services resources.
11094
11181
  #
11095
11182
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11096
11183
  # maximum number of tags, then the entire request fails and the
11097
11184
  # resource is not created. For more information about tagging, see
11098
11185
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11099
11186
  #
11100
- # * AWS always interprets the tag `Value` as a single string. If you
11101
- # need to store an array, you can store comma-separated values in the
11102
- # string. However, you must interpret the value in your code.
11187
+ # * Amazon Web Services always interprets the tag `Value` as a single
11188
+ # string. If you need to store an array, you can store comma-separated
11189
+ # values in the string. However, you must interpret the value in your
11190
+ # code.
11103
11191
  #
11104
11192
  # </note>
11105
11193
  #
@@ -11112,10 +11200,10 @@ module Aws::IAM
11112
11200
  # @option params [required, String] :server_certificate_name
11113
11201
  # The name of the IAM server certificate to which you want to add tags.
11114
11202
  #
11115
- # This parameter accepts (through its [regex pattern][1]) a string of
11116
- # characters that consist of upper and lowercase alphanumeric characters
11203
+ # This parameter allows (through its [regex pattern][1]) a string of
11204
+ # characters consisting of upper and lowercase alphanumeric characters
11117
11205
  # with no spaces. You can also include any of the following characters:
11118
- # =,.@-
11206
+ # \_+=,.@-
11119
11207
  #
11120
11208
  #
11121
11209
  #
@@ -11169,16 +11257,17 @@ module Aws::IAM
11169
11257
  # User Guide*.
11170
11258
  #
11171
11259
  # * **Cost allocation** - Use tags to help track which individuals and
11172
- # teams are using which AWS resources.
11260
+ # teams are using which Amazon Web Services resources.
11173
11261
  #
11174
11262
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11175
11263
  # maximum number of tags, then the entire request fails and the
11176
11264
  # resource is not created. For more information about tagging, see
11177
11265
  # [Tagging IAM resources][2] in the *IAM User Guide*.
11178
11266
  #
11179
- # * AWS always interprets the tag `Value` as a single string. If you
11180
- # need to store an array, you can store comma-separated values in the
11181
- # string. However, you must interpret the value in your code.
11267
+ # * Amazon Web Services always interprets the tag `Value` as a single
11268
+ # string. If you need to store an array, you can store comma-separated
11269
+ # values in the string. However, you must interpret the value in your
11270
+ # code.
11182
11271
  #
11183
11272
  # </note>
11184
11273
  #
@@ -11193,10 +11282,10 @@ module Aws::IAM
11193
11282
  # @option params [required, String] :user_name
11194
11283
  # The name of the IAM user to which you want to add tags.
11195
11284
  #
11196
- # This parameter accepts (through its [regex pattern][1]) a string of
11197
- # characters that consist of upper and lowercase alphanumeric characters
11285
+ # This parameter allows (through its [regex pattern][1]) a string of
11286
+ # characters consisting of upper and lowercase alphanumeric characters
11198
11287
  # with no spaces. You can also include any of the following characters:
11199
- # =,.@-
11288
+ # \_+=,.@-
11200
11289
  #
11201
11290
  #
11202
11291
  #
@@ -11260,10 +11349,10 @@ module Aws::IAM
11260
11349
  # The name of the IAM instance profile from which you want to remove
11261
11350
  # tags.
11262
11351
  #
11263
- # This parameter accepts (through its [regex pattern][1]) a string of
11264
- # characters that consist of upper and lowercase alphanumeric characters
11352
+ # This parameter allows (through its [regex pattern][1]) a string of
11353
+ # characters consisting of upper and lowercase alphanumeric characters
11265
11354
  # with no spaces. You can also include any of the following characters:
11266
- # =,.@-
11355
+ # \_+=,.@-
11267
11356
  #
11268
11357
  #
11269
11358
  #
@@ -11304,10 +11393,10 @@ module Aws::IAM
11304
11393
  # want to remove tags. For virtual MFA devices, the serial number is the
11305
11394
  # same as the ARN.
11306
11395
  #
11307
- # This parameter accepts (through its [regex pattern][1]) a string of
11308
- # characters that consist of upper and lowercase alphanumeric characters
11396
+ # This parameter allows (through its [regex pattern][1]) a string of
11397
+ # characters consisting of upper and lowercase alphanumeric characters
11309
11398
  # with no spaces. You can also include any of the following characters:
11310
- # =,.@-
11399
+ # \_+=,.@-
11311
11400
  #
11312
11401
  #
11313
11402
  #
@@ -11350,10 +11439,10 @@ module Aws::IAM
11350
11439
  # The ARN of the OIDC provider in IAM from which you want to remove
11351
11440
  # tags.
11352
11441
  #
11353
- # This parameter accepts (through its [regex pattern][1]) a string of
11354
- # characters that consist of upper and lowercase alphanumeric characters
11442
+ # This parameter allows (through its [regex pattern][1]) a string of
11443
+ # characters consisting of upper and lowercase alphanumeric characters
11355
11444
  # with no spaces. You can also include any of the following characters:
11356
- # =,.@-
11445
+ # \_+=,.@-
11357
11446
  #
11358
11447
  #
11359
11448
  #
@@ -11393,10 +11482,10 @@ module Aws::IAM
11393
11482
  # The ARN of the IAM customer managed policy from which you want to
11394
11483
  # remove tags.
11395
11484
  #
11396
- # This parameter accepts (through its [regex pattern][1]) a string of
11397
- # characters that consist of upper and lowercase alphanumeric characters
11485
+ # This parameter allows (through its [regex pattern][1]) a string of
11486
+ # characters consisting of upper and lowercase alphanumeric characters
11398
11487
  # with no spaces. You can also include any of the following characters:
11399
- # =,.@-
11488
+ # \_+=,.@-
11400
11489
  #
11401
11490
  #
11402
11491
  #
@@ -11492,10 +11581,10 @@ module Aws::IAM
11492
11581
  # The ARN of the SAML identity provider in IAM from which you want to
11493
11582
  # remove tags.
11494
11583
  #
11495
- # This parameter accepts (through its [regex pattern][1]) a string of
11496
- # characters that consist of upper and lowercase alphanumeric characters
11584
+ # This parameter allows (through its [regex pattern][1]) a string of
11585
+ # characters consisting of upper and lowercase alphanumeric characters
11497
11586
  # with no spaces. You can also include any of the following characters:
11498
- # =,.@-
11587
+ # \_+=,.@-
11499
11588
  #
11500
11589
  #
11501
11590
  #
@@ -11527,11 +11616,11 @@ module Aws::IAM
11527
11616
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
11528
11617
  # User Guide*.
11529
11618
  #
11530
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11531
- # (ACM), we recommend that you don't use IAM server certificates.
11532
- # Instead, use ACM to provision, manage, and deploy your server
11533
- # certificates. For more information about IAM server certificates,
11534
- # [Working with server certificates][2] in the *IAM User Guide*.
11619
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11620
+ # we recommend that you don't use IAM server certificates. Instead, use
11621
+ # ACM to provision, manage, and deploy your server certificates. For
11622
+ # more information about IAM server certificates, [Working with server
11623
+ # certificates][2] in the *IAM User Guide*.
11535
11624
  #
11536
11625
  # </note>
11537
11626
  #
@@ -11544,10 +11633,10 @@ module Aws::IAM
11544
11633
  # The name of the IAM server certificate from which you want to remove
11545
11634
  # tags.
11546
11635
  #
11547
- # This parameter accepts (through its [regex pattern][1]) a string of
11548
- # characters that consist of upper and lowercase alphanumeric characters
11636
+ # This parameter allows (through its [regex pattern][1]) a string of
11637
+ # characters consisting of upper and lowercase alphanumeric characters
11549
11638
  # with no spaces. You can also include any of the following characters:
11550
- # =,.@-
11639
+ # \_+=,.@-
11551
11640
  #
11552
11641
  #
11553
11642
  #
@@ -11585,10 +11674,10 @@ module Aws::IAM
11585
11674
  # @option params [required, String] :user_name
11586
11675
  # The name of the IAM user from which you want to remove tags.
11587
11676
  #
11588
- # This parameter accepts (through its [regex pattern][1]) a string of
11589
- # characters that consist of upper and lowercase alphanumeric characters
11677
+ # This parameter allows (through its [regex pattern][1]) a string of
11678
+ # characters consisting of upper and lowercase alphanumeric characters
11590
11679
  # with no spaces. You can also include any of the following characters:
11591
- # =,.@-
11680
+ # \_+=,.@-
11592
11681
  #
11593
11682
  #
11594
11683
  #
@@ -11633,10 +11722,10 @@ module Aws::IAM
11633
11722
  # user's key as part of a key rotation workflow.
11634
11723
  #
11635
11724
  # If the `UserName` is not specified, the user name is determined
11636
- # implicitly based on the AWS access key ID used to sign the request.
11637
- # This operation works for access keys under the AWS account.
11638
- # Consequently, you can use this operation to manage AWS account root
11639
- # user credentials even if the AWS account has no associated users.
11725
+ # implicitly based on the Amazon Web Services access key ID used to sign
11726
+ # the request. This operation works for access keys under the account.
11727
+ # Consequently, you can use this operation to manage account root user
11728
+ # credentials even if the account has no associated users.
11640
11729
  #
11641
11730
  # For information about rotating keys, see [Managing keys and
11642
11731
  # certificates][1] in the *IAM User Guide*.
@@ -11670,8 +11759,8 @@ module Aws::IAM
11670
11759
  #
11671
11760
  # @option params [required, String] :status
11672
11761
  # The status you want to assign to the secret access key. `Active` means
11673
- # that the key can be used for programmatic calls to AWS, while
11674
- # `Inactive` means that the key cannot be used.
11762
+ # that the key can be used for programmatic calls to Amazon Web
11763
+ # Services, while `Inactive` means that the key cannot be used.
11675
11764
  #
11676
11765
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
11677
11766
  #
@@ -11704,7 +11793,7 @@ module Aws::IAM
11704
11793
  req.send_request(options)
11705
11794
  end
11706
11795
 
11707
- # Updates the password policy settings for the AWS account.
11796
+ # Updates the password policy settings for the account.
11708
11797
  #
11709
11798
  # <note markdown="1"> * This operation does not support partial updates. No parameters are
11710
11799
  # required, but if you do not specify a parameter, that parameter's
@@ -11766,8 +11855,8 @@ module Aws::IAM
11766
11855
  # require at least one lowercase character.
11767
11856
  #
11768
11857
  # @option params [Boolean] :allow_users_to_change_password
11769
- # Allows all IAM users in your account to use the AWS Management Console
11770
- # to change their own passwords. For more information, see [Letting IAM
11858
+ # Allows all IAM users in your account to use the Management Console to
11859
+ # change their own passwords. For more information, see [Letting IAM
11771
11860
  # users change their own passwords][1] in the *IAM User Guide*.
11772
11861
  #
11773
11862
  # If you do not specify a value for this parameter, then the operation
@@ -11864,10 +11953,10 @@ module Aws::IAM
11864
11953
  # @option params [required, String] :policy_document
11865
11954
  # The policy that grants an entity permission to assume the role.
11866
11955
  #
11867
- # You must provide policies in JSON format in IAM. However, for AWS
11956
+ # You must provide policies in JSON format in IAM. However, for
11868
11957
  # CloudFormation templates formatted in YAML, you can provide the policy
11869
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
11870
- # policy to JSON format before submitting it to IAM.
11958
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
11959
+ # to JSON format before submitting it to IAM.
11871
11960
  #
11872
11961
  # The [regex pattern][1] used to validate this parameter is a string of
11873
11962
  # characters consisting of the following:
@@ -11999,11 +12088,11 @@ module Aws::IAM
11999
12088
  req.send_request(options)
12000
12089
  end
12001
12090
 
12002
- # Changes the password for the specified IAM user. You can use the AWS
12003
- # CLI, the AWS API, or the **Users** page in the IAM console to change
12004
- # the password for any IAM user. Use ChangePassword to change your own
12005
- # password in the **My Security Credentials** page in the AWS Management
12006
- # Console.
12091
+ # Changes the password for the specified IAM user. You can use the CLI,
12092
+ # the Amazon Web Services API, or the **Users** page in the IAM console
12093
+ # to change the password for any IAM user. Use ChangePassword to change
12094
+ # your own password in the **My Security Credentials** page in the
12095
+ # Management Console.
12007
12096
  #
12008
12097
  # For more information about modifying passwords, see [Managing
12009
12098
  # passwords][1] in the *IAM User Guide*.
@@ -12040,8 +12129,8 @@ module Aws::IAM
12040
12129
  # carriage return (`\u000D`)
12041
12130
  #
12042
12131
  # However, the format can be further restricted by the account
12043
- # administrator by setting a password policy on the AWS account. For
12044
- # more information, see UpdateAccountPasswordPolicy.
12132
+ # administrator by setting a password policy on the account. For more
12133
+ # information, see UpdateAccountPasswordPolicy.
12045
12134
  #
12046
12135
  #
12047
12136
  #
@@ -12088,15 +12177,25 @@ module Aws::IAM
12088
12177
  # existing list of thumbprints. (The lists are not merged.)
12089
12178
  #
12090
12179
  # Typically, you need to update a thumbprint only when the identity
12091
- # provider's certificate changes, which occurs rarely. However, if the
12180
+ # provider certificate changes, which occurs rarely. However, if the
12092
12181
  # provider's certificate *does* change, any attempt to assume an IAM
12093
12182
  # role that specifies the OIDC provider as a principal fails until the
12094
12183
  # certificate thumbprint is updated.
12095
12184
  #
12096
- # <note markdown="1"> Trust for the OIDC provider is derived from the provider's
12097
- # certificate and is validated by the thumbprint. Therefore, it is best
12098
- # to limit access to the `UpdateOpenIDConnectProviderThumbprint`
12099
- # operation to highly privileged users.
12185
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12186
+ # providers (IdPs) through our library of trusted certificate
12187
+ # authorities (CAs) instead of using a certificate thumbprint to verify
12188
+ # your IdP server certificate. These OIDC IdPs include Google, and those
12189
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
12190
+ # endpoint. In these cases, your legacy thumbprint remains in your
12191
+ # configuration, but is no longer used for validation.
12192
+ #
12193
+ # </note>
12194
+ #
12195
+ # <note markdown="1"> Trust for the OIDC provider is derived from the provider certificate
12196
+ # and is validated by the thumbprint. Therefore, it is best to limit
12197
+ # access to the `UpdateOpenIDConnectProviderThumbprint` operation to
12198
+ # highly privileged users.
12100
12199
  #
12101
12200
  # </note>
12102
12201
  #
@@ -12107,7 +12206,7 @@ module Aws::IAM
12107
12206
  # operation.
12108
12207
  #
12109
12208
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12110
- # in the *AWS General Reference*.
12209
+ # in the *Amazon Web Services General Reference*.
12111
12210
  #
12112
12211
  #
12113
12212
  #
@@ -12150,7 +12249,7 @@ module Aws::IAM
12150
12249
  # default maximum of one hour is applied. This setting can have a value
12151
12250
  # from 1 hour to 12 hours.
12152
12251
  #
12153
- # Anyone who assumes the role from the AWS CLI or API can use the
12252
+ # Anyone who assumes the role from the CLI or API can use the
12154
12253
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
12155
12254
  # parameter to request a longer session. The `MaxSessionDuration`
12156
12255
  # setting determines the maximum duration that can be requested using
@@ -12257,7 +12356,7 @@ module Aws::IAM
12257
12356
  # The Amazon Resource Name (ARN) of the SAML provider to update.
12258
12357
  #
12259
12358
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12260
- # in the *AWS General Reference*.
12359
+ # in the *Amazon Web Services General Reference*.
12261
12360
  #
12262
12361
  #
12263
12362
  #
@@ -12293,10 +12392,10 @@ module Aws::IAM
12293
12392
  # public key as part of a key rotation work flow.
12294
12393
  #
12295
12394
  # The SSH public key affected by this operation is used only for
12296
- # authenticating the associated IAM user to an AWS CodeCommit
12297
- # repository. For more information about using SSH keys to authenticate
12298
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12299
- # connections][1] in the *AWS CodeCommit User Guide*.
12395
+ # authenticating the associated IAM user to an CodeCommit repository.
12396
+ # For more information about using SSH keys to authenticate to an
12397
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12398
+ # in the *CodeCommit User Guide*.
12300
12399
  #
12301
12400
  #
12302
12401
  #
@@ -12327,7 +12426,7 @@ module Aws::IAM
12327
12426
  #
12328
12427
  # @option params [required, String] :status
12329
12428
  # The status to assign to the SSH public key. `Active` means that the
12330
- # key can be used for authentication with an AWS CodeCommit repository.
12429
+ # key can be used for authentication with an CodeCommit repository.
12331
12430
  # `Inactive` means that the key cannot be used.
12332
12431
  #
12333
12432
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
@@ -12354,8 +12453,8 @@ module Aws::IAM
12354
12453
  #
12355
12454
  # For more information about working with server certificates, see
12356
12455
  # [Working with server certificates][1] in the *IAM User Guide*. This
12357
- # topic also includes a list of AWS services that can use the server
12358
- # certificates that you manage with IAM.
12456
+ # topic also includes a list of Amazon Web Services services that can
12457
+ # use the server certificates that you manage with IAM.
12359
12458
  #
12360
12459
  # You should understand the implications of changing a server
12361
12460
  # certificate's path or name. For more information, see [Renaming a
@@ -12497,10 +12596,10 @@ module Aws::IAM
12497
12596
  # rotation work flow.
12498
12597
  #
12499
12598
  # If the `UserName` field is not specified, the user name is determined
12500
- # implicitly based on the AWS access key ID used to sign the request.
12501
- # This operation works for access keys under the AWS account.
12502
- # Consequently, you can use this operation to manage AWS account root
12503
- # user credentials even if the AWS account has no associated users.
12599
+ # implicitly based on the Amazon Web Services access key ID used to sign
12600
+ # the request. This operation works for access keys under the account.
12601
+ # Consequently, you can use this operation to manage account root user
12602
+ # credentials even if the account has no associated users.
12504
12603
  #
12505
12604
  # @option params [String] :user_name
12506
12605
  # The name of the IAM user the signing certificate belongs to.
@@ -12527,8 +12626,8 @@ module Aws::IAM
12527
12626
  #
12528
12627
  # @option params [required, String] :status
12529
12628
  # The status you want to assign to the certificate. `Active` means that
12530
- # the certificate can be used for programmatic calls to AWS `Inactive`
12531
- # means that the certificate cannot be used.
12629
+ # the certificate can be used for programmatic calls to Amazon Web
12630
+ # Services `Inactive` means that the certificate cannot be used.
12532
12631
  #
12533
12632
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
12534
12633
  #
@@ -12649,10 +12748,10 @@ module Aws::IAM
12649
12748
  # user.
12650
12749
  #
12651
12750
  # The SSH public key uploaded by this operation can be used only for
12652
- # authenticating the associated IAM user to an AWS CodeCommit
12653
- # repository. For more information about using SSH keys to authenticate
12654
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12655
- # connections][1] in the *AWS CodeCommit User Guide*.
12751
+ # authenticating the associated IAM user to an CodeCommit repository.
12752
+ # For more information about using SSH keys to authenticate to an
12753
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12754
+ # in the *CodeCommit User Guide*.
12656
12755
  #
12657
12756
  #
12658
12757
  #
@@ -12721,21 +12820,21 @@ module Aws::IAM
12721
12820
  req.send_request(options)
12722
12821
  end
12723
12822
 
12724
- # Uploads a server certificate entity for the AWS account. The server
12823
+ # Uploads a server certificate entity for the account. The server
12725
12824
  # certificate entity includes a public key certificate, a private key,
12726
12825
  # and an optional certificate chain, which should all be PEM-encoded.
12727
12826
  #
12728
- # We recommend that you use [AWS Certificate Manager][1] to provision,
12827
+ # We recommend that you use [Certificate Manager][1] to provision,
12729
12828
  # manage, and deploy your server certificates. With ACM you can request
12730
- # a certificate, deploy it to AWS resources, and let ACM handle
12731
- # certificate renewals for you. Certificates provided by ACM are free.
12732
- # For more information about using ACM, see the [AWS Certificate Manager
12733
- # User Guide][2].
12829
+ # a certificate, deploy it to Amazon Web Services resources, and let ACM
12830
+ # handle certificate renewals for you. Certificates provided by ACM are
12831
+ # free. For more information about using ACM, see the [Certificate
12832
+ # Manager User Guide][2].
12734
12833
  #
12735
12834
  # For more information about working with server certificates, see
12736
12835
  # [Working with server certificates][3] in the *IAM User Guide*. This
12737
- # topic includes a list of AWS services that can use the server
12738
- # certificates that you manage with IAM.
12836
+ # topic includes a list of Amazon Web Services services that can use the
12837
+ # server certificates that you manage with IAM.
12739
12838
  #
12740
12839
  # For information about the number of server certificates you can
12741
12840
  # upload, see [IAM and STS quotas][4] in the *IAM User Guide*.
@@ -12743,10 +12842,11 @@ module Aws::IAM
12743
12842
  # <note markdown="1"> Because the body of the public key certificate, private key, and the
12744
12843
  # certificate chain can be large, you should use POST rather than GET
12745
12844
  # when calling `UploadServerCertificate`. For information about setting
12746
- # up signatures and authorization through the API, see [Signing AWS API
12747
- # requests][5] in the *AWS General Reference*. For general information
12748
- # about using the Query API with IAM, see [Calling the API by making
12749
- # HTTP query requests][6] in the *IAM User Guide*.
12845
+ # up signatures and authorization through the API, see [Signing Amazon
12846
+ # Web Services API requests][5] in the *Amazon Web Services General
12847
+ # Reference*. For general information about using the Query API with
12848
+ # IAM, see [Calling the API by making HTTP query requests][6] in the
12849
+ # *IAM User Guide*.
12750
12850
  #
12751
12851
  # </note>
12752
12852
  #
@@ -12937,25 +13037,27 @@ module Aws::IAM
12937
13037
  end
12938
13038
 
12939
13039
  # Uploads an X.509 signing certificate and associates it with the
12940
- # specified IAM user. Some AWS services require you to use certificates
12941
- # to validate requests that are signed with a corresponding private key.
12942
- # When you upload the certificate, its default status is `Active`.
13040
+ # specified IAM user. Some Amazon Web Services services require you to
13041
+ # use certificates to validate requests that are signed with a
13042
+ # corresponding private key. When you upload the certificate, its
13043
+ # default status is `Active`.
12943
13044
  #
12944
13045
  # For information about when you would use an X.509 signing certificate,
12945
13046
  # see [Managing server certificates in IAM][1] in the *IAM User Guide*.
12946
13047
  #
12947
13048
  # If the `UserName` is not specified, the IAM user name is determined
12948
- # implicitly based on the AWS access key ID used to sign the request.
12949
- # This operation works for access keys under the AWS account.
12950
- # Consequently, you can use this operation to manage AWS account root
12951
- # user credentials even if the AWS account has no associated users.
13049
+ # implicitly based on the Amazon Web Services access key ID used to sign
13050
+ # the request. This operation works for access keys under the account.
13051
+ # Consequently, you can use this operation to manage account root user
13052
+ # credentials even if the account has no associated users.
12952
13053
  #
12953
13054
  # <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
12954
13055
  # POST rather than GET when calling `UploadSigningCertificate`. For
12955
13056
  # information about setting up signatures and authorization through the
12956
- # API, see [Signing AWS API requests][2] in the *AWS General Reference*.
12957
- # For general information about using the Query API with IAM, see
12958
- # [Making query requests][3] in the *IAM User Guide*.
13057
+ # API, see [Signing Amazon Web Services API requests][2] in the *Amazon
13058
+ # Web Services General Reference*. For general information about using
13059
+ # the Query API with IAM, see [Making query requests][3] in the *IAM
13060
+ # User Guide*.
12959
13061
  #
12960
13062
  # </note>
12961
13063
  #
@@ -13058,7 +13160,7 @@ module Aws::IAM
13058
13160
  params: params,
13059
13161
  config: config)
13060
13162
  context[:gem_name] = 'aws-sdk-iam'
13061
- context[:gem_version] = '1.53.0'
13163
+ context[:gem_version] = '1.57.0'
13062
13164
  Seahorse::Client::Request.new(handlers, context)
13063
13165
  end
13064
13166