aws-sdk-iam 1.54.0 → 1.58.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2270d440a509177a9e1999bf55af3136c5dcc0ec361c4a416e1bb933497e5f1d
4
- data.tar.gz: e09be8bc789484df173be8a29a316c99cf2922a8fae026344a7e1577dac7c5e8
3
+ metadata.gz: 5bd487f5369277f1b11761894e578727ea1450ed796809199fe6fbc9ef67d159
4
+ data.tar.gz: 881a6d6202ba4291ef62658a1e7af84bbc97d5f6bd2d72b29b58afa536448ac6
5
5
  SHA512:
6
- metadata.gz: 49953fa362c37a37b1057c568c1d347e7317a3b27793811516bd58209b346eff0781452e96e1e6ff67f5e799b0a2a0adaf52b86716d3efb252a3548b38875e6f
7
- data.tar.gz: a846acc0c69a305cd9e8b34ecb14f8e1dd6f44cbc1d75ae78f91df755754abc95287fdea719421799256e5037f13a8725dd1dd966bf436977caf6cc053c0ddd3
6
+ metadata.gz: 6054ee2734c1017ba7c66729299baad642a121350c44c9f109fd1fea0cf85626613900c10e62daf83f07626a54f9effb96f96dde96e654bd40f43b2e94d0b487
7
+ data.tar.gz: 334d3e03ffe18c7d9b60c565ba2a82b4d4c62c85095957390a659eccd2487bf9b32b66dd8517e17050661ccd82bfbf1b67a1a90aa66232cd3d1e5d6323e85f16
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.58.0 (2021-07-28)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.57.0 (2021-07-21)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
14
+ 1.56.0 (2021-07-07)
15
+ ------------------
16
+
17
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
18
+
19
+ 1.55.0 (2021-06-02)
20
+ ------------------
21
+
22
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
23
+
4
24
  1.54.0 (2021-05-20)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.54.0
1
+ 1.58.0
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.54.0'
73
+ GEM_VERSION = '1.58.0'
74
74
 
75
75
  end
@@ -288,8 +288,8 @@ module Aws::IAM
288
288
  # uses the default value of `false`. The result is that passwords do not
289
289
  # require at least one lowercase character.
290
290
  # @option options [Boolean] :allow_users_to_change_password
291
- # Allows all IAM users in your account to use the AWS Management Console
292
- # to change their own passwords. For more information, see [Letting IAM
291
+ # Allows all IAM users in your account to use the Management Console to
292
+ # change their own passwords. For more information, see [Letting IAM
293
293
  # users change their own passwords][1] in the *IAM User Guide*.
294
294
  #
295
295
  # If you do not specify a value for this parameter, then the operation
@@ -170,10 +170,10 @@ module Aws::IAM
170
170
  # @option options [required, String] :policy_document
171
171
  # The policy that grants an entity permission to assume the role.
172
172
  #
173
- # You must provide policies in JSON format in IAM. However, for AWS
173
+ # You must provide policies in JSON format in IAM. However, for
174
174
  # CloudFormation templates formatted in YAML, you can provide the policy
175
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
176
- # policy to JSON format before submitting it to IAM.
175
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
176
+ # to JSON format before submitting it to IAM.
177
177
  #
178
178
  # The [regex pattern][1] used to validate this parameter is a string of
179
179
  # characters consisting of the following:
@@ -376,10 +376,10 @@ module Aws::IAM
376
376
  # instance profile can contain only one role, and this quota cannot be
377
377
  # increased. You can remove the existing role and then add a different
378
378
  # role to an instance profile. You must then wait for the change to
379
- # appear across all of AWS because of [eventual consistency][1]. To
380
- # force the change, you must [disassociate the instance profile][2] and
381
- # then [associate the instance profile][3], or you can stop your
382
- # instance and then restart it.
379
+ # appear across all of Amazon Web Services because of [eventual
380
+ # consistency][1]. To force the change, you must [disassociate the
381
+ # instance profile][2] and then [associate the instance profile][3], or
382
+ # you can stop your instance and then restart it.
383
383
  #
384
384
  # <note markdown="1"> The caller of this operation must be granted the `PassRole` permission
385
385
  # on the IAM role by a permissions policy.
@@ -537,7 +537,7 @@ module Aws::IAM
537
537
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
538
538
  #
539
539
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
540
- # in the *AWS General Reference*.
540
+ # in the *Amazon Web Services General Reference*.
541
541
  #
542
542
  #
543
543
  #
@@ -611,7 +611,7 @@ module Aws::IAM
611
611
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
612
612
  #
613
613
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
614
- # in the *AWS General Reference*.
614
+ # in the *Amazon Web Services General Reference*.
615
615
  #
616
616
  #
617
617
  #
@@ -678,7 +678,7 @@ module Aws::IAM
678
678
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
679
679
  #
680
680
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
681
- # in the *AWS General Reference*.
681
+ # in the *Amazon Web Services General Reference*.
682
682
  #
683
683
  #
684
684
  #
@@ -713,14 +713,15 @@ module Aws::IAM
713
713
  end
714
714
 
715
715
  # Changes the password of the IAM user who is calling this operation.
716
- # This operation can be performed using the AWS CLI, the AWS API, or the
717
- # **My Security Credentials** page in the AWS Management Console. The
718
- # AWS account root user password is not affected by this operation.
716
+ # This operation can be performed using the CLI, the Amazon Web Services
717
+ # API, or the **My Security Credentials** page in the Management
718
+ # Console. The account root user password is not affected by this
719
+ # operation.
719
720
  #
720
- # Use UpdateLoginProfile to use the AWS CLI, the AWS API, or the
721
- # **Users** page in the IAM console to change the password for any IAM
722
- # user. For more information about modifying passwords, see [Managing
723
- # passwords][1] in the *IAM User Guide*.
721
+ # Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
722
+ # the **Users** page in the IAM console to change the password for any
723
+ # IAM user. For more information about modifying passwords, see
724
+ # [Managing passwords][1] in the *IAM User Guide*.
724
725
  #
725
726
  #
726
727
  #
@@ -730,7 +731,7 @@ module Aws::IAM
730
731
  # The IAM user's current password.
731
732
  #
732
733
  # @option params [required, String] :new_password
733
- # The new password. The new password must conform to the AWS account's
734
+ # The new password. The new password must conform to the account's
734
735
  # password policy, if one exists.
735
736
  #
736
737
  # The [regex pattern][1] that is used to validate this parameter is a
@@ -739,8 +740,8 @@ module Aws::IAM
739
740
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
740
741
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
741
742
  # of these characters are valid in a password. However, many tools, such
742
- # as the AWS Management Console, might restrict the ability to type
743
- # certain characters because they have special meaning within that tool.
743
+ # as the Management Console, might restrict the ability to type certain
744
+ # characters because they have special meaning within that tool.
744
745
  #
745
746
  #
746
747
  #
@@ -774,21 +775,20 @@ module Aws::IAM
774
775
  req.send_request(options)
775
776
  end
776
777
 
777
- # Creates a new AWS secret access key and corresponding AWS access key
778
- # ID for the specified user. The default status for new keys is
779
- # `Active`.
778
+ # Creates a new Amazon Web Services secret access key and corresponding
779
+ # Amazon Web Services access key ID for the specified user. The default
780
+ # status for new keys is `Active`.
780
781
  #
781
782
  # If you do not specify a user name, IAM determines the user name
782
- # implicitly based on the AWS access key ID signing the request. This
783
- # operation works for access keys under the AWS account. Consequently,
784
- # you can use this operation to manage AWS account root user
785
- # credentials. This is true even if the AWS account has no associated
786
- # users.
783
+ # implicitly based on the Amazon Web Services access key ID signing the
784
+ # request. This operation works for access keys under the account.
785
+ # Consequently, you can use this operation to manage account root user
786
+ # credentials. This is true even if the account has no associated users.
787
787
  #
788
788
  # For information about quotas on the number of keys you can create, see
789
789
  # [IAM and STS quotas][1] in the *IAM User Guide*.
790
790
  #
791
- # To ensure the security of your AWS account, the secret access key is
791
+ # To ensure the security of your account, the secret access key is
792
792
  # accessible only during key and user creation. You must save the key
793
793
  # (for example, in a text file) if you want to be able to access it
794
794
  # again. If a secret key is lost, you can delete the access keys for the
@@ -857,9 +857,9 @@ module Aws::IAM
857
857
  req.send_request(options)
858
858
  end
859
859
 
860
- # Creates an alias for your AWS account. For information about using an
861
- # AWS account alias, see [Using an alias for your AWS account ID][1] in
862
- # the *IAM User Guide*.
860
+ # Creates an alias for your account. For information about using an
861
+ # account alias, see [Using an alias for your account ID][1] in the *IAM
862
+ # User Guide*.
863
863
  #
864
864
  #
865
865
  #
@@ -1125,12 +1125,13 @@ module Aws::IAM
1125
1125
  end
1126
1126
 
1127
1127
  # Creates a password for the specified IAM user. A password allows an
1128
- # IAM user to access AWS services through the AWS Management Console.
1128
+ # IAM user to access Amazon Web Services services through the Management
1129
+ # Console.
1129
1130
  #
1130
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
1131
- # console to create a password for any IAM user. Use ChangePassword to
1132
- # update your own existing password in the **My Security Credentials**
1133
- # page in the AWS Management Console.
1131
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
1132
+ # page in the IAM console to create a password for any IAM user. Use
1133
+ # ChangePassword to update your own existing password in the **My
1134
+ # Security Credentials** page in the Management Console.
1134
1135
  #
1135
1136
  # For more information about managing passwords, see [Managing
1136
1137
  # passwords][1] in the *IAM User Guide*.
@@ -1161,8 +1162,8 @@ module Aws::IAM
1161
1162
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
1162
1163
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
1163
1164
  # of these characters are valid in a password. However, many tools, such
1164
- # as the AWS Management Console, might restrict the ability to type
1165
- # certain characters because they have special meaning within that tool.
1165
+ # as the Management Console, might restrict the ability to type certain
1166
+ # characters because they have special meaning within that tool.
1166
1167
  #
1167
1168
  #
1168
1169
  #
@@ -1225,29 +1226,39 @@ module Aws::IAM
1225
1226
  #
1226
1227
  # The OIDC provider that you create with this operation can be used as a
1227
1228
  # principal in a role's trust policy. Such a policy establishes a trust
1228
- # relationship between AWS and the OIDC provider.
1229
+ # relationship between Amazon Web Services and the OIDC provider.
1229
1230
  #
1230
1231
  # If you are using an OIDC identity provider from Google, Facebook, or
1231
1232
  # Amazon Cognito, you don't need to create a separate IAM identity
1232
- # provider. These OIDC identity providers are already built-in to AWS
1233
- # and are available for your use. Instead, you can move directly to
1234
- # creating new roles using your identity provider. To learn more, see
1235
- # [Creating a role for web identity or OpenID connect federation][2] in
1236
- # the *IAM User Guide*.
1233
+ # provider. These OIDC identity providers are already built-in to Amazon
1234
+ # Web Services and are available for your use. Instead, you can move
1235
+ # directly to creating new roles using your identity provider. To learn
1236
+ # more, see [Creating a role for web identity or OpenID connect
1237
+ # federation][2] in the *IAM User Guide*.
1237
1238
  #
1238
1239
  # When you create the IAM OIDC provider, you specify the following:
1239
1240
  #
1240
1241
  # * The URL of the OIDC identity provider (IdP) to trust
1241
1242
  #
1242
1243
  # * A list of client IDs (also known as audiences) that identify the
1243
- # application or applications that are allowed to authenticate using
1244
- # the OIDC provider
1244
+ # application or applications allowed to authenticate using the OIDC
1245
+ # provider
1245
1246
  #
1246
1247
  # * A list of thumbprints of one or more server certificates that the
1247
1248
  # IdP uses
1248
1249
  #
1249
1250
  # You get all of this information from the OIDC IdP that you want to use
1250
- # to access AWS.
1251
+ # to access Amazon Web Services.
1252
+ #
1253
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1254
+ # providers (IdPs) through our library of trusted certificate
1255
+ # authorities (CAs) instead of using a certificate thumbprint to verify
1256
+ # your IdP server certificate. These OIDC IdPs include Google, and those
1257
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
1258
+ # endpoint. In these cases, your legacy thumbprint remains in your
1259
+ # configuration, but is no longer used for validation.
1260
+ #
1261
+ # </note>
1251
1262
  #
1252
1263
  # <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that
1253
1264
  # this operation creates. Therefore, it is best to limit access to the
@@ -1267,9 +1278,9 @@ module Aws::IAM
1267
1278
  # but query parameters are not. Typically the URL consists of only a
1268
1279
  # hostname, like `https://server.example.org` or `https://example.com`.
1269
1280
  #
1270
- # You cannot register the same provider multiple times in a single AWS
1281
+ # You cannot register the same provider multiple times in a single
1271
1282
  # account. If you try to submit a URL that has already been used for an
1272
- # OpenID Connect provider in the AWS account, you will get an error.
1283
+ # OpenID Connect provider in the account, you will get an error.
1273
1284
  #
1274
1285
  # @option params [Array<String>] :client_id_list
1275
1286
  # A list of client IDs (also known as audiences). When a mobile or web
@@ -1384,7 +1395,7 @@ module Aws::IAM
1384
1395
  req.send_request(options)
1385
1396
  end
1386
1397
 
1387
- # Creates a new managed policy for your AWS account.
1398
+ # Creates a new managed policy for your account.
1388
1399
  #
1389
1400
  # This operation creates a policy version with a version identifier of
1390
1401
  # `v1` and sets v1 as the policy's default version. For more
@@ -1435,12 +1446,20 @@ module Aws::IAM
1435
1446
  # The JSON policy document that you want to use as the content for the
1436
1447
  # new policy.
1437
1448
  #
1438
- # You must provide policies in JSON format in IAM. However, for AWS
1449
+ # You must provide policies in JSON format in IAM. However, for
1439
1450
  # CloudFormation templates formatted in YAML, you can provide the policy
1440
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1441
- # policy to JSON format before submitting it to IAM.
1451
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1452
+ # to JSON format before submitting it to IAM.
1442
1453
  #
1443
- # The [regex pattern][1] used to validate this parameter is a string of
1454
+ # The maximum length of the policy document that you can pass in this
1455
+ # operation, including whitespace, is listed below. To view the maximum
1456
+ # character counts of a managed policy with no whitespaces, see [IAM and
1457
+ # STS character quotas][1].
1458
+ #
1459
+ # To learn more about JSON policy grammar, see [Grammar of the IAM JSON
1460
+ # policy language][2] in the *IAM User Guide*.
1461
+ #
1462
+ # The [regex pattern][3] used to validate this parameter is a string of
1444
1463
  # characters consisting of the following:
1445
1464
  #
1446
1465
  # * Any printable ASCII character ranging from the space character
@@ -1454,7 +1473,9 @@ module Aws::IAM
1454
1473
  #
1455
1474
  #
1456
1475
  #
1457
- # [1]: http://wikipedia.org/wiki/regex
1476
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1477
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_grammar.html
1478
+ # [3]: http://wikipedia.org/wiki/regex
1458
1479
  #
1459
1480
  # @option params [String] :description
1460
1481
  # A friendly description of the policy.
@@ -1549,7 +1570,7 @@ module Aws::IAM
1549
1570
  # add a new version.
1550
1571
  #
1551
1572
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
1552
- # in the *AWS General Reference*.
1573
+ # in the *Amazon Web Services General Reference*.
1553
1574
  #
1554
1575
  #
1555
1576
  #
@@ -1559,12 +1580,17 @@ module Aws::IAM
1559
1580
  # The JSON policy document that you want to use as the content for this
1560
1581
  # new version of the policy.
1561
1582
  #
1562
- # You must provide policies in JSON format in IAM. However, for AWS
1583
+ # You must provide policies in JSON format in IAM. However, for
1563
1584
  # CloudFormation templates formatted in YAML, you can provide the policy
1564
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1565
- # policy to JSON format before submitting it to IAM.
1585
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1586
+ # to JSON format before submitting it to IAM.
1566
1587
  #
1567
- # The [regex pattern][1] used to validate this parameter is a string of
1588
+ # The maximum length of the policy document that you can pass in this
1589
+ # operation, including whitespace, is listed below. To view the maximum
1590
+ # character counts of a managed policy with no whitespaces, see [IAM and
1591
+ # STS character quotas][1].
1592
+ #
1593
+ # The [regex pattern][2] used to validate this parameter is a string of
1568
1594
  # characters consisting of the following:
1569
1595
  #
1570
1596
  # * Any printable ASCII character ranging from the space character
@@ -1578,7 +1604,8 @@ module Aws::IAM
1578
1604
  #
1579
1605
  #
1580
1606
  #
1581
- # [1]: http://wikipedia.org/wiki/regex
1607
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1608
+ # [2]: http://wikipedia.org/wiki/regex
1582
1609
  #
1583
1610
  # @option params [Boolean] :set_as_default
1584
1611
  # Specifies whether to set this version as the policy's default
@@ -1623,10 +1650,10 @@ module Aws::IAM
1623
1650
  req.send_request(options)
1624
1651
  end
1625
1652
 
1626
- # Creates a new role for your AWS account. For more information about
1627
- # roles, see [IAM roles][1]. For information about quotas for role names
1628
- # and the number of roles you can create, see [IAM and STS quotas][2] in
1629
- # the *IAM User Guide*.
1653
+ # Creates a new role for your account. For more information about roles,
1654
+ # see [IAM roles][1]. For information about quotas for role names and
1655
+ # the number of roles you can create, see [IAM and STS quotas][2] in the
1656
+ # *IAM User Guide*.
1630
1657
  #
1631
1658
  #
1632
1659
  #
@@ -1664,10 +1691,9 @@ module Aws::IAM
1664
1691
  # permission to assume the role.
1665
1692
  #
1666
1693
  # In IAM, you must provide a JSON policy that has been converted to a
1667
- # string. However, for AWS CloudFormation templates formatted in YAML,
1668
- # you can provide the policy in JSON or YAML format. AWS CloudFormation
1669
- # always converts a YAML policy to JSON format before submitting it to
1670
- # IAM.
1694
+ # string. However, for CloudFormation templates formatted in YAML, you
1695
+ # can provide the policy in JSON or YAML format. CloudFormation always
1696
+ # converts a YAML policy to JSON format before submitting it to IAM.
1671
1697
  #
1672
1698
  # The [regex pattern][1] used to validate this parameter is a string of
1673
1699
  # characters consisting of the following:
@@ -1697,7 +1723,7 @@ module Aws::IAM
1697
1723
  # default maximum of one hour is applied. This setting can have a value
1698
1724
  # from 1 hour to 12 hours.
1699
1725
  #
1700
- # Anyone who assumes the role from the AWS CLI or API can use the
1726
+ # Anyone who assumes the role from the or API can use the
1701
1727
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
1702
1728
  # parameter to request a longer session. The `MaxSessionDuration`
1703
1729
  # setting determines the maximum duration that can be requested using
@@ -1810,8 +1836,8 @@ module Aws::IAM
1810
1836
  # used as a principal in an IAM role's trust policy. Such a policy can
1811
1837
  # enable federated users who sign in using the SAML IdP to assume the
1812
1838
  # role. You can create an IAM role that supports Web-based single
1813
- # sign-on (SSO) to the AWS Management Console or one that supports API
1814
- # access to AWS.
1839
+ # sign-on (SSO) to the Management Console or one that supports API
1840
+ # access to Amazon Web Services.
1815
1841
  #
1816
1842
  # When you create the SAML provider resource, you upload a SAML metadata
1817
1843
  # document that you get from your IdP. That document includes the
@@ -1825,8 +1851,8 @@ module Aws::IAM
1825
1851
  # </note>
1826
1852
  #
1827
1853
  # For more information, see [Enabling SAML 2.0 federated users to access
1828
- # the AWS Management Console][2] and [About SAML 2.0-based
1829
- # federation][3] in the *IAM User Guide*.
1854
+ # the Management Console][2] and [About SAML 2.0-based federation][3] in
1855
+ # the *IAM User Guide*.
1830
1856
  #
1831
1857
  #
1832
1858
  #
@@ -1911,33 +1937,35 @@ module Aws::IAM
1911
1937
  req.send_request(options)
1912
1938
  end
1913
1939
 
1914
- # Creates an IAM role that is linked to a specific AWS service. The
1915
- # service controls the attached policies and when the role can be
1916
- # deleted. This helps ensure that the service is not broken by an
1917
- # unexpectedly changed or deleted role, which could put your AWS
1918
- # resources into an unknown state. Allowing the service to control the
1919
- # role helps improve service stability and proper cleanup when a service
1920
- # and its role are no longer needed. For more information, see [Using
1921
- # service-linked roles][1] in the *IAM User Guide*.
1940
+ # Creates an IAM role that is linked to a specific Amazon Web Services
1941
+ # service. The service controls the attached policies and when the role
1942
+ # can be deleted. This helps ensure that the service is not broken by an
1943
+ # unexpectedly changed or deleted role, which could put your Amazon Web
1944
+ # Services resources into an unknown state. Allowing the service to
1945
+ # control the role helps improve service stability and proper cleanup
1946
+ # when a service and its role are no longer needed. For more
1947
+ # information, see [Using service-linked roles][1] in the *IAM User
1948
+ # Guide*.
1922
1949
  #
1923
1950
  # To attach a policy to this service-linked role, you must make the
1924
- # request using the AWS service that depends on this role.
1951
+ # request using the Amazon Web Services service that depends on this
1952
+ # role.
1925
1953
  #
1926
1954
  #
1927
1955
  #
1928
1956
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/using-service-linked-roles.html
1929
1957
  #
1930
1958
  # @option params [required, String] :aws_service_name
1931
- # The service principal for the AWS service to which this role is
1932
- # attached. You use a string similar to a URL but without the http:// in
1933
- # front. For example: `elasticbeanstalk.amazonaws.com`.
1959
+ # The service principal for the Amazon Web Services service to which
1960
+ # this role is attached. You use a string similar to a URL but without
1961
+ # the http:// in front. For example: `elasticbeanstalk.amazonaws.com`.
1934
1962
  #
1935
1963
  # Service principals are unique and case-sensitive. To find the exact
1936
- # service principal for your service-linked role, see [AWS services that
1937
- # work with IAM][1] in the *IAM User Guide*. Look for the services that
1938
- # have <b>Yes </b>in the **Service-Linked Role** column. Choose the
1939
- # **Yes** link to view the service-linked role documentation for that
1940
- # service.
1964
+ # service principal for your service-linked role, see [Amazon Web
1965
+ # Services services that work with IAM][1] in the *IAM User Guide*. Look
1966
+ # for the services that have <b>Yes </b>in the **Service-Linked Role**
1967
+ # column. Choose the **Yes** link to view the service-linked role
1968
+ # documentation for that service.
1941
1969
  #
1942
1970
  #
1943
1971
  #
@@ -2004,15 +2032,15 @@ module Aws::IAM
2004
2032
  # You can have a maximum of two sets of service-specific credentials for
2005
2033
  # each supported service per user.
2006
2034
  #
2007
- # You can create service-specific credentials for AWS CodeCommit and
2008
- # Amazon Keyspaces (for Apache Cassandra).
2035
+ # You can create service-specific credentials for CodeCommit and Amazon
2036
+ # Keyspaces (for Apache Cassandra).
2009
2037
  #
2010
2038
  # You can reset the password to a new service-generated value by calling
2011
2039
  # ResetServiceSpecificCredential.
2012
2040
  #
2013
2041
  # For more information about service-specific credentials, see [Using
2014
- # IAM with AWS CodeCommit: Git credentials, SSH keys, and AWS access
2015
- # keys][1] in the *IAM User Guide*.
2042
+ # IAM with CodeCommit: Git credentials, SSH keys, and Amazon Web
2043
+ # Services access keys][1] in the *IAM User Guide*.
2016
2044
  #
2017
2045
  #
2018
2046
  #
@@ -2034,9 +2062,9 @@ module Aws::IAM
2034
2062
  # [1]: http://wikipedia.org/wiki/regex
2035
2063
  #
2036
2064
  # @option params [required, String] :service_name
2037
- # The name of the AWS service that is to be associated with the
2038
- # credentials. The service you specify here is the only service that can
2039
- # be accessed using these credentials.
2065
+ # The name of the Amazon Web Services service that is to be associated
2066
+ # with the credentials. The service you specify here is the only service
2067
+ # that can be accessed using these credentials.
2040
2068
  #
2041
2069
  # @return [Types::CreateServiceSpecificCredentialResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2042
2070
  #
@@ -2068,7 +2096,7 @@ module Aws::IAM
2068
2096
  req.send_request(options)
2069
2097
  end
2070
2098
 
2071
- # Creates a new IAM user for your AWS account.
2099
+ # Creates a new IAM user for your account.
2072
2100
  #
2073
2101
  # For information about quotas for the number of IAM users you can
2074
2102
  # create, see [IAM and STS quotas][1] in the *IAM User Guide*.
@@ -2183,20 +2211,20 @@ module Aws::IAM
2183
2211
  req.send_request(options)
2184
2212
  end
2185
2213
 
2186
- # Creates a new virtual MFA device for the AWS account. After creating
2187
- # the virtual MFA, use EnableMFADevice to attach the MFA device to an
2188
- # IAM user. For more information about creating and working with virtual
2189
- # MFA devices, see [Using a virtual MFA device][1] in the *IAM User
2190
- # Guide*.
2214
+ # Creates a new virtual MFA device for the account. After creating the
2215
+ # virtual MFA, use EnableMFADevice to attach the MFA device to an IAM
2216
+ # user. For more information about creating and working with virtual MFA
2217
+ # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
2191
2218
  #
2192
2219
  # For information about the maximum number of MFA devices you can
2193
2220
  # create, see [IAM and STS quotas][2] in the *IAM User Guide*.
2194
2221
  #
2195
2222
  # The seed information contained in the QR code and the Base32 string
2196
2223
  # should be treated like any other secret access information. In other
2197
- # words, protect the seed information as you would your AWS access keys
2198
- # or your passwords. After you provision your virtual device, you should
2199
- # ensure that the information is destroyed following secure procedures.
2224
+ # words, protect the seed information as you would your Amazon Web
2225
+ # Services access keys or your passwords. After you provision your
2226
+ # virtual device, you should ensure that the information is destroyed
2227
+ # following secure procedures.
2200
2228
  #
2201
2229
  #
2202
2230
  #
@@ -2355,10 +2383,10 @@ module Aws::IAM
2355
2383
  # Deletes the access key pair associated with the specified IAM user.
2356
2384
  #
2357
2385
  # If you do not specify a user name, IAM determines the user name
2358
- # implicitly based on the AWS access key ID signing the request. This
2359
- # operation works for access keys under the AWS account. Consequently,
2360
- # you can use this operation to manage AWS account root user credentials
2361
- # even if the AWS account has no associated users.
2386
+ # implicitly based on the Amazon Web Services access key ID signing the
2387
+ # request. This operation works for access keys under the account.
2388
+ # Consequently, you can use this operation to manage account root user
2389
+ # credentials even if the account has no associated users.
2362
2390
  #
2363
2391
  # @option params [String] :user_name
2364
2392
  # The name of the user whose access key pair you want to delete.
@@ -2412,9 +2440,9 @@ module Aws::IAM
2412
2440
  req.send_request(options)
2413
2441
  end
2414
2442
 
2415
- # Deletes the specified AWS account alias. For information about using
2416
- # an AWS account alias, see [Using an alias for your AWS account ID][1]
2417
- # in the *IAM User Guide*.
2443
+ # Deletes the specified account alias. For information about using an
2444
+ # Amazon Web Services account alias, see [Using an alias for your
2445
+ # account ID][1] in the *IAM User Guide*.
2418
2446
  #
2419
2447
  #
2420
2448
  #
@@ -2458,8 +2486,7 @@ module Aws::IAM
2458
2486
  req.send_request(options)
2459
2487
  end
2460
2488
 
2461
- # Deletes the password policy for the AWS account. There are no
2462
- # parameters.
2489
+ # Deletes the password policy for the account. There are no parameters.
2463
2490
  #
2464
2491
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2465
2492
  #
@@ -2631,19 +2658,19 @@ module Aws::IAM
2631
2658
  end
2632
2659
 
2633
2660
  # Deletes the password for the specified IAM user, which terminates the
2634
- # user's ability to access AWS services through the AWS Management
2635
- # Console.
2661
+ # user's ability to access Amazon Web Services services through the
2662
+ # Management Console.
2636
2663
  #
2637
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
2638
- # console to delete a password for any IAM user. You can use
2639
- # ChangePassword to update, but not delete, your own password in the
2640
- # **My Security Credentials** page in the AWS Management Console.
2664
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
2665
+ # page in the IAM console to delete a password for any IAM user. You can
2666
+ # use ChangePassword to update, but not delete, your own password in the
2667
+ # **My Security Credentials** page in the Management Console.
2641
2668
  #
2642
- # Deleting a user's password does not prevent a user from accessing AWS
2643
- # through the command line interface or the API. To prevent all user
2644
- # access, you must also either make any access keys inactive or delete
2645
- # them. For more information about making keys inactive or deleting
2646
- # them, see UpdateAccessKey and DeleteAccessKey.
2669
+ # Deleting a user's password does not prevent a user from accessing
2670
+ # Amazon Web Services through the command line interface or the API. To
2671
+ # prevent all user access, you must also either make any access keys
2672
+ # inactive or delete them. For more information about making keys
2673
+ # inactive or deleting them, see UpdateAccessKey and DeleteAccessKey.
2647
2674
  #
2648
2675
  # @option params [required, String] :user_name
2649
2676
  # The name of the user whose password you want to delete.
@@ -2748,7 +2775,7 @@ module Aws::IAM
2748
2775
  # The Amazon Resource Name (ARN) of the IAM policy you want to delete.
2749
2776
  #
2750
2777
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2751
- # in the *AWS General Reference*.
2778
+ # in the *Amazon Web Services General Reference*.
2752
2779
  #
2753
2780
  #
2754
2781
  #
@@ -2790,7 +2817,7 @@ module Aws::IAM
2790
2817
  # to delete a version.
2791
2818
  #
2792
2819
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2793
- # in the *AWS General Reference*.
2820
+ # in the *Amazon Web Services General Reference*.
2794
2821
  #
2795
2822
  #
2796
2823
  #
@@ -3011,10 +3038,10 @@ module Aws::IAM
3011
3038
  # Deletes the specified SSH public key.
3012
3039
  #
3013
3040
  # The SSH public key deleted by this operation is used only for
3014
- # authenticating the associated IAM user to an AWS CodeCommit
3015
- # repository. For more information about using SSH keys to authenticate
3016
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
3017
- # connections][1] in the *AWS CodeCommit User Guide*.
3041
+ # authenticating the associated IAM user to an CodeCommit repository.
3042
+ # For more information about using SSH keys to authenticate to an
3043
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
3044
+ # in the *CodeCommit User Guide*.
3018
3045
  #
3019
3046
  #
3020
3047
  #
@@ -3065,8 +3092,8 @@ module Aws::IAM
3065
3092
  #
3066
3093
  # For more information about working with server certificates, see
3067
3094
  # [Working with server certificates][1] in the *IAM User Guide*. This
3068
- # topic also includes a list of AWS services that can use the server
3069
- # certificates that you manage with IAM.
3095
+ # topic also includes a list of Amazon Web Services services that can
3096
+ # use the server certificates that you manage with IAM.
3070
3097
  #
3071
3098
  # If you are using a server certificate with Elastic Load Balancing,
3072
3099
  # deleting the certificate could have implications for your application.
@@ -3128,10 +3155,12 @@ module Aws::IAM
3128
3155
  # first remove those resources from the linked service and then submit
3129
3156
  # the deletion request again. Resources are specific to the service that
3130
3157
  # is linked to the role. For more information about removing resources
3131
- # from a service, see the [AWS documentation][1] for your service.
3158
+ # from a service, see the [Amazon Web Services documentation][1] for
3159
+ # your service.
3132
3160
  #
3133
3161
  # For more information about service-linked roles, see [Roles terms and
3134
- # concepts: AWS service-linked role][2] in the *IAM User Guide*.
3162
+ # concepts: Amazon Web Services service-linked role][2] in the *IAM User
3163
+ # Guide*.
3135
3164
  #
3136
3165
  #
3137
3166
  #
@@ -3213,10 +3242,10 @@ module Aws::IAM
3213
3242
  # Deletes a signing certificate associated with the specified IAM user.
3214
3243
  #
3215
3244
  # If you do not specify a user name, IAM determines the user name
3216
- # implicitly based on the AWS access key ID signing the request. This
3217
- # operation works for access keys under the AWS account. Consequently,
3218
- # you can use this operation to manage AWS account root user credentials
3219
- # even if the AWS account has no associated IAM users.
3245
+ # implicitly based on the Amazon Web Services access key ID signing the
3246
+ # request. This operation works for access keys under the account.
3247
+ # Consequently, you can use this operation to manage account root user
3248
+ # credentials even if the account has no associated IAM users.
3220
3249
  #
3221
3250
  # @option params [String] :user_name
3222
3251
  # The name of the user the signing certificate belongs to.
@@ -3269,11 +3298,11 @@ module Aws::IAM
3269
3298
  req.send_request(options)
3270
3299
  end
3271
3300
 
3272
- # Deletes the specified IAM user. Unlike the AWS Management Console,
3273
- # when you delete a user programmatically, you must delete the items
3274
- # attached to the user manually, or the deletion fails. For more
3275
- # information, see [Deleting an IAM user][1]. Before attempting to
3276
- # delete a user, remove the following items:
3301
+ # Deletes the specified IAM user. Unlike the Management Console, when
3302
+ # you delete a user programmatically, you must delete the items attached
3303
+ # to the user manually, or the deletion fails. For more information, see
3304
+ # [Deleting an IAM user][1]. Before attempting to delete a user, remove
3305
+ # the following items:
3277
3306
  #
3278
3307
  # * Password (DeleteLoginProfile)
3279
3308
  #
@@ -3502,7 +3531,7 @@ module Aws::IAM
3502
3531
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3503
3532
  #
3504
3533
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3505
- # in the *AWS General Reference*.
3534
+ # in the *Amazon Web Services General Reference*.
3506
3535
  #
3507
3536
  #
3508
3537
  #
@@ -3553,7 +3582,7 @@ module Aws::IAM
3553
3582
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3554
3583
  #
3555
3584
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3556
- # in the *AWS General Reference*.
3585
+ # in the *Amazon Web Services General Reference*.
3557
3586
  #
3558
3587
  #
3559
3588
  #
@@ -3604,7 +3633,7 @@ module Aws::IAM
3604
3633
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3605
3634
  #
3606
3635
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3607
- # in the *AWS General Reference*.
3636
+ # in the *Amazon Web Services General Reference*.
3608
3637
  #
3609
3638
  #
3610
3639
  #
@@ -3709,9 +3738,9 @@ module Aws::IAM
3709
3738
  req.send_request(options)
3710
3739
  end
3711
3740
 
3712
- # Generates a credential report for the AWS account. For more
3713
- # information about the credential report, see [Getting credential
3714
- # reports][1] in the *IAM User Guide*.
3741
+ # Generates a credential report for the account. For more information
3742
+ # about the credential report, see [Getting credential reports][1] in
3743
+ # the *IAM User Guide*.
3715
3744
  #
3716
3745
  #
3717
3746
  #
@@ -3736,18 +3765,17 @@ module Aws::IAM
3736
3765
  req.send_request(options)
3737
3766
  end
3738
3767
 
3739
- # Generates a report for service last accessed data for AWS
3740
- # Organizations. You can generate a report for any entities
3741
- # (organization root, organizational unit, or account) or policies in
3742
- # your organization.
3768
+ # Generates a report for service last accessed data for Organizations.
3769
+ # You can generate a report for any entities (organization root,
3770
+ # organizational unit, or account) or policies in your organization.
3743
3771
  #
3744
- # To call this operation, you must be signed in using your AWS
3745
- # Organizations management account credentials. You can use your
3746
- # long-term IAM user or root user credentials, or temporary credentials
3747
- # from assuming an IAM role. SCPs must be enabled for your organization
3748
- # root. You must have the required IAM and AWS Organizations
3749
- # permissions. For more information, see [Refining permissions using
3750
- # service last accessed data][1] in the *IAM User Guide*.
3772
+ # To call this operation, you must be signed in using your Organizations
3773
+ # management account credentials. You can use your long-term IAM user or
3774
+ # root user credentials, or temporary credentials from assuming an IAM
3775
+ # role. SCPs must be enabled for your organization root. You must have
3776
+ # the required IAM and Organizations permissions. For more information,
3777
+ # see [Refining permissions using service last accessed data][1] in the
3778
+ # *IAM User Guide*.
3751
3779
  #
3752
3780
  # You can generate a service last accessed data report for entities by
3753
3781
  # specifying only the entity's path. This data includes a list of
@@ -3755,8 +3783,8 @@ module Aws::IAM
3755
3783
  # apply to the entity.
3756
3784
  #
3757
3785
  # You can generate a service last accessed data report for a policy by
3758
- # specifying an entity's path and an optional AWS Organizations policy
3759
- # ID. This data includes a list of services that are allowed by the
3786
+ # specifying an entity's path and an optional Organizations policy ID.
3787
+ # This data includes a list of services that are allowed by the
3760
3788
  # specified SCP.
3761
3789
  #
3762
3790
  # For each service in both report types, the data includes the most
@@ -3766,15 +3794,16 @@ module Aws::IAM
3766
3794
  # troubleshooting, and supported Regions see [Reducing permissions using
3767
3795
  # service last accessed data][1] in the *IAM User Guide*.
3768
3796
  #
3769
- # The data includes all attempts to access AWS, not just the successful
3770
- # ones. This includes all attempts that were made using the AWS
3771
- # Management Console, the AWS API through any of the SDKs, or any of the
3772
- # command line tools. An unexpected entry in the service last accessed
3773
- # data does not mean that an account has been compromised, because the
3774
- # request might have been denied. Refer to your CloudTrail logs as the
3775
- # authoritative source for information about all API calls and whether
3776
- # they were successful or denied access. For more information,
3777
- # see [Logging IAM events with CloudTrail][2] in the *IAM User Guide*.
3797
+ # The data includes all attempts to access Amazon Web Services, not just
3798
+ # the successful ones. This includes all attempts that were made using
3799
+ # the Management Console, the Amazon Web Services API through any of the
3800
+ # SDKs, or any of the command line tools. An unexpected entry in the
3801
+ # service last accessed data does not mean that an account has been
3802
+ # compromised, because the request might have been denied. Refer to your
3803
+ # CloudTrail logs as the authoritative source for information about all
3804
+ # API calls and whether they were successful or denied access. For more
3805
+ # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3806
+ # User Guide*.
3778
3807
  #
3779
3808
  # This operation returns a `JobId`. Use this parameter in the `
3780
3809
  # GetOrganizationsAccessReport ` operation to check the status of the
@@ -3784,9 +3813,9 @@ module Aws::IAM
3784
3813
  # you can retrieve the report.
3785
3814
  #
3786
3815
  # To generate a service last accessed data report for entities, specify
3787
- # an entity path without specifying the optional AWS Organizations
3788
- # policy ID. The type of entity that you specify determines the data
3789
- # returned in the report.
3816
+ # an entity path without specifying the optional Organizations policy
3817
+ # ID. The type of entity that you specify determines the data returned
3818
+ # in the report.
3790
3819
  #
3791
3820
  # * **Root** – When you specify the organizations root as the entity,
3792
3821
  # the resulting report lists all of the services allowed by SCPs that
@@ -3802,9 +3831,9 @@ module Aws::IAM
3802
3831
  # not limited by SCPs.
3803
3832
  #
3804
3833
  # * **management account** – When you specify the management account,
3805
- # the resulting report lists all AWS services, because the management
3806
- # account is not limited by SCPs. For each service, the report
3807
- # includes data for only the management account.
3834
+ # the resulting report lists all Amazon Web Services services, because
3835
+ # the management account is not limited by SCPs. For each service, the
3836
+ # report includes data for only the management account.
3808
3837
  #
3809
3838
  # * **Account** – When you specify another account as the entity, the
3810
3839
  # resulting report lists all of the services allowed by SCPs that are
@@ -3812,9 +3841,8 @@ module Aws::IAM
3812
3841
  # report includes data for only the specified account.
3813
3842
  #
3814
3843
  # To generate a service last accessed data report for policies, specify
3815
- # an entity path and the optional AWS Organizations policy ID. The type
3816
- # of entity that you specify determines the data returned for each
3817
- # service.
3844
+ # an entity path and the optional Organizations policy ID. The type of
3845
+ # entity that you specify determines the data returned for each service.
3818
3846
  #
3819
3847
  # * **Root** – When you specify the root entity and a policy ID, the
3820
3848
  # resulting report lists all of the services that are allowed by the
@@ -3836,10 +3864,10 @@ module Aws::IAM
3836
3864
  # the report will return a list of services with no data.
3837
3865
  #
3838
3866
  # * **management account** – When you specify the management account,
3839
- # the resulting report lists all AWS services, because the management
3840
- # account is not limited by SCPs. If you specify a policy ID in the
3841
- # CLI or API, the policy is ignored. For each service, the report
3842
- # includes data for only the management account.
3867
+ # the resulting report lists all Amazon Web Services services, because
3868
+ # the management account is not limited by SCPs. If you specify a
3869
+ # policy ID in the CLI or API, the policy is ignored. For each
3870
+ # service, the report includes data for only the management account.
3843
3871
  #
3844
3872
  # * **Account** – When you specify another account entity and a policy
3845
3873
  # ID, the resulting report lists all of the services that are allowed
@@ -3868,21 +3896,21 @@ module Aws::IAM
3868
3896
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics
3869
3897
  #
3870
3898
  # @option params [required, String] :entity_path
3871
- # The path of the AWS Organizations entity (root, OU, or account). You
3872
- # can build an entity path using the known structure of your
3873
- # organization. For example, assume that your account ID is
3874
- # `123456789012` and its parent OU ID is `ou-rge0-awsabcde`. The
3875
- # organization root ID is `r-f6g7h8i9j0example` and your organization ID
3876
- # is `o-a1b2c3d4e5`. Your entity path is
3899
+ # The path of the Organizations entity (root, OU, or account). You can
3900
+ # build an entity path using the known structure of your organization.
3901
+ # For example, assume that your account ID is `123456789012` and its
3902
+ # parent OU ID is `ou-rge0-awsabcde`. The organization root ID is
3903
+ # `r-f6g7h8i9j0example` and your organization ID is `o-a1b2c3d4e5`. Your
3904
+ # entity path is
3877
3905
  # `o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-rge0-awsabcde/123456789012`.
3878
3906
  #
3879
3907
  # @option params [String] :organizations_policy_id
3880
- # The identifier of the AWS Organizations service control policy (SCP).
3881
- # This parameter is optional.
3908
+ # The identifier of the Organizations service control policy (SCP). This
3909
+ # parameter is optional.
3882
3910
  #
3883
3911
  # This ID is used to generate information about when an account
3884
- # principal that is limited by the SCP attempted to access an AWS
3885
- # service.
3912
+ # principal that is limited by the SCP attempted to access an Amazon Web
3913
+ # Services service.
3886
3914
  #
3887
3915
  # @return [Types::GenerateOrganizationsAccessReportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3888
3916
  #
@@ -3924,31 +3952,31 @@ module Aws::IAM
3924
3952
 
3925
3953
  # Generates a report that includes details about when an IAM resource
3926
3954
  # (user, group, role, or policy) was last used in an attempt to access
3927
- # AWS services. Recent activity usually appears within four hours. IAM
3928
- # reports activity for the last 365 days, or less if your Region began
3929
- # supporting this feature within the last year. For more information,
3930
- # see [Regions where data is tracked][1].
3931
- #
3932
- # The service last accessed data includes all attempts to access an AWS
3933
- # API, not just the successful ones. This includes all attempts that
3934
- # were made using the AWS Management Console, the AWS API through any of
3935
- # the SDKs, or any of the command line tools. An unexpected entry in the
3936
- # service last accessed data does not mean that your account has been
3937
- # compromised, because the request might have been denied. Refer to your
3938
- # CloudTrail logs as the authoritative source for information about all
3939
- # API calls and whether they were successful or denied access. For more
3940
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3941
- # User Guide*.
3955
+ # Amazon Web Services services. Recent activity usually appears within
3956
+ # four hours. IAM reports activity for the last 365 days, or less if
3957
+ # your Region began supporting this feature within the last year. For
3958
+ # more information, see [Regions where data is tracked][1].
3959
+ #
3960
+ # The service last accessed data includes all attempts to access an
3961
+ # Amazon Web Services API, not just the successful ones. This includes
3962
+ # all attempts that were made using the Management Console, the Amazon
3963
+ # Web Services API through any of the SDKs, or any of the command line
3964
+ # tools. An unexpected entry in the service last accessed data does not
3965
+ # mean that your account has been compromised, because the request might
3966
+ # have been denied. Refer to your CloudTrail logs as the authoritative
3967
+ # source for information about all API calls and whether they were
3968
+ # successful or denied access. For more information, see [Logging IAM
3969
+ # events with CloudTrail][2] in the *IAM User Guide*.
3942
3970
  #
3943
3971
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
3944
3972
  # Use this parameter in the following operations to retrieve the
3945
3973
  # following details from your report:
3946
3974
  #
3947
3975
  # * GetServiceLastAccessedDetails – Use this operation for users,
3948
- # groups, roles, or policies to list every AWS service that the
3949
- # resource could access using permissions policies. For each service,
3950
- # the response includes information about the most recent access
3951
- # attempt.
3976
+ # groups, roles, or policies to list every Amazon Web Services service
3977
+ # that the resource could access using permissions policies. For each
3978
+ # service, the response includes information about the most recent
3979
+ # access attempt.
3952
3980
  #
3953
3981
  # The `JobId` returned by `GenerateServiceLastAccessedDetail` must be
3954
3982
  # used by the same role within a session, or by the same user when
@@ -3956,8 +3984,8 @@ module Aws::IAM
3956
3984
  #
3957
3985
  # * GetServiceLastAccessedDetailsWithEntities – Use this operation for
3958
3986
  # groups and policies to list information about the associated
3959
- # entities (users or roles) that attempted to access a specific AWS
3960
- # service.
3987
+ # entities (users or roles) that attempted to access a specific Amazon
3988
+ # Web Services service.
3961
3989
  #
3962
3990
  # To check the status of the `GenerateServiceLastAccessedDetails`
3963
3991
  # request, use the `JobId` parameter in the same operations and test the
@@ -3970,10 +3998,10 @@ module Aws::IAM
3970
3998
  # <note markdown="1"> Service last accessed data does not use other policy types when
3971
3999
  # determining whether a resource could access a service. These other
3972
4000
  # policy types include resource-based policies, access control lists,
3973
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
3974
- # assume role policies. It only applies permissions policy logic. For
3975
- # more about the evaluation of policy types, see [Evaluating
3976
- # policies][3] in the *IAM User Guide*.
4001
+ # Organizations policies, IAM permissions boundaries, and STS assume
4002
+ # role policies. It only applies permissions policy logic. For more
4003
+ # about the evaluation of policy types, see [Evaluating policies][3] in
4004
+ # the *IAM User Guide*.
3977
4005
  #
3978
4006
  # </note>
3979
4007
  #
@@ -3991,7 +4019,7 @@ module Aws::IAM
3991
4019
  # @option params [required, String] :arn
3992
4020
  # The ARN of the IAM resource (user, group, role, or managed policy)
3993
4021
  # used to generate information about when the resource was last used in
3994
- # an attempt to access an AWS service.
4022
+ # an attempt to access an Amazon Web Services service.
3995
4023
  #
3996
4024
  # @option params [String] :granularity
3997
4025
  # The level of detail that you want to generate. You can specify whether
@@ -4041,8 +4069,8 @@ module Aws::IAM
4041
4069
 
4042
4070
  # Retrieves information about when the specified access key was last
4043
4071
  # used. The information includes the date and time of last use, along
4044
- # with the AWS service and Region that were specified in the last
4045
- # request made with that key.
4072
+ # with the Amazon Web Services service and Region that were specified in
4073
+ # the last request made with that key.
4046
4074
  #
4047
4075
  # @option params [required, String] :access_key_id
4048
4076
  # The identifier of an access key.
@@ -4083,9 +4111,10 @@ module Aws::IAM
4083
4111
  end
4084
4112
 
4085
4113
  # Retrieves information about all IAM users, groups, roles, and policies
4086
- # in your AWS account, including their relationships to one another. Use
4087
- # this operation to obtain a snapshot of the configuration of IAM
4088
- # permissions (users, groups, roles, and policies) in your account.
4114
+ # in your Amazon Web Services account, including their relationships to
4115
+ # one another. Use this operation to obtain a snapshot of the
4116
+ # configuration of IAM permissions (users, groups, roles, and policies)
4117
+ # in your account.
4089
4118
  #
4090
4119
  # <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
4091
4120
  # [RFC 3986][1]. You can use a URL decoding method to convert the policy
@@ -4255,7 +4284,7 @@ module Aws::IAM
4255
4284
  req.send_request(options)
4256
4285
  end
4257
4286
 
4258
- # Retrieves the password policy for the AWS account. This tells you the
4287
+ # Retrieves the password policy for the account. This tells you the
4259
4288
  # complexity requirements and mandatory rotation periods for the IAM
4260
4289
  # user passwords in your account. For more information about using a
4261
4290
  # password policy, see [Managing an IAM password policy][1].
@@ -4314,8 +4343,8 @@ module Aws::IAM
4314
4343
  req.send_request(options)
4315
4344
  end
4316
4345
 
4317
- # Retrieves information about IAM entity usage and IAM quotas in the AWS
4318
- # account.
4346
+ # Retrieves information about IAM entity usage and IAM quotas in the
4347
+ # Amazon Web Services account.
4319
4348
  #
4320
4349
  # For information about IAM quotas, see [IAM and STS quotas][1] in the
4321
4350
  # *IAM User Guide*.
@@ -4387,14 +4416,14 @@ module Aws::IAM
4387
4416
  # To get the context keys from policies associated with an IAM user,
4388
4417
  # group, or role, use GetContextKeysForPrincipalPolicy.
4389
4418
  #
4390
- # Context keys are variables maintained by AWS and its services that
4391
- # provide details about the context of an API query request. Context
4392
- # keys can be evaluated by testing against a value specified in an IAM
4393
- # policy. Use `GetContextKeysForCustomPolicy` to understand what key
4394
- # names and values you must supply when you call SimulateCustomPolicy.
4395
- # Note that all parameters are shown in unencoded form here for clarity
4396
- # but must be URL encoded to be included as a part of a real HTML
4397
- # request.
4419
+ # Context keys are variables maintained by Amazon Web Services and its
4420
+ # services that provide details about the context of an API query
4421
+ # request. Context keys can be evaluated by testing against a value
4422
+ # specified in an IAM policy. Use `GetContextKeysForCustomPolicy` to
4423
+ # understand what key names and values you must supply when you call
4424
+ # SimulateCustomPolicy. Note that all parameters are shown in unencoded
4425
+ # form here for clarity but must be URL encoded to be included as a part
4426
+ # of a real HTML request.
4398
4427
  #
4399
4428
  # @option params [required, Array<String>] :policy_input_list
4400
4429
  # A list of policies for which you want the list of context keys
@@ -4456,11 +4485,12 @@ module Aws::IAM
4456
4485
  # permissions, then consider allowing them to use
4457
4486
  # GetContextKeysForCustomPolicy instead.
4458
4487
  #
4459
- # Context keys are variables maintained by AWS and its services that
4460
- # provide details about the context of an API query request. Context
4461
- # keys can be evaluated by testing against a value in an IAM policy. Use
4462
- # GetContextKeysForPrincipalPolicy to understand what key names and
4463
- # values you must supply when you call SimulatePrincipalPolicy.
4488
+ # Context keys are variables maintained by Amazon Web Services and its
4489
+ # services that provide details about the context of an API query
4490
+ # request. Context keys can be evaluated by testing against a value in
4491
+ # an IAM policy. Use GetContextKeysForPrincipalPolicy to understand what
4492
+ # key names and values you must supply when you call
4493
+ # SimulatePrincipalPolicy.
4464
4494
  #
4465
4495
  # @option params [required, String] :policy_source_arn
4466
4496
  # The ARN of a user, group, or role whose policies contain the context
@@ -4473,7 +4503,7 @@ module Aws::IAM
4473
4503
  # URL encoded to be included as a part of a real HTML request.
4474
4504
  #
4475
4505
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4476
- # in the *AWS General Reference*.
4506
+ # in the *Amazon Web Services General Reference*.
4477
4507
  #
4478
4508
  #
4479
4509
  #
@@ -4524,9 +4554,9 @@ module Aws::IAM
4524
4554
  req.send_request(options)
4525
4555
  end
4526
4556
 
4527
- # Retrieves a credential report for the AWS account. For more
4528
- # information about the credential report, see [Getting credential
4529
- # reports][1] in the *IAM User Guide*.
4557
+ # Retrieves a credential report for the account. For more information
4558
+ # about the credential report, see [Getting credential reports][1] in
4559
+ # the *IAM User Guide*.
4530
4560
  #
4531
4561
  #
4532
4562
  #
@@ -4811,9 +4841,19 @@ module Aws::IAM
4811
4841
  req.send_request(options)
4812
4842
  end
4813
4843
 
4814
- # Retrieves the user name and password creation date for the specified
4815
- # IAM user. If the user has not been assigned a password, the operation
4816
- # returns a 404 (`NoSuchEntity`) error.
4844
+ # Retrieves the user name for the specified IAM user. A login profile is
4845
+ # created when you create a password for the user to access the
4846
+ # Management Console. If the user does not exist or does not have a
4847
+ # password, the operation returns a 404 (`NoSuchEntity`) error.
4848
+ #
4849
+ # If you create an IAM user with access to the console, the `CreateDate`
4850
+ # reflects the date you created the initial password for the user.
4851
+ #
4852
+ # If you create an IAM user with programmatic access, and then later add
4853
+ # a password for the user to access the Management Console, the
4854
+ # `CreateDate` reflects the initial password creation date. A user with
4855
+ # programmatic access does not have a login profile unless you create a
4856
+ # password for the user to access the Management Console.
4817
4857
  #
4818
4858
  # @option params [required, String] :user_name
4819
4859
  # The name of the user whose login profile you want to retrieve.
@@ -4878,7 +4918,7 @@ module Aws::IAM
4878
4918
  # resource ARNs by using the ListOpenIDConnectProviders operation.
4879
4919
  #
4880
4920
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4881
- # in the *AWS General Reference*.
4921
+ # in the *Amazon Web Services General Reference*.
4882
4922
  #
4883
4923
  #
4884
4924
  #
@@ -4919,10 +4959,10 @@ module Aws::IAM
4919
4959
  req.send_request(options)
4920
4960
  end
4921
4961
 
4922
- # Retrieves the service last accessed data report for AWS Organizations
4923
- # that was previously generated using the `
4924
- # GenerateOrganizationsAccessReport ` operation. This operation
4925
- # retrieves the status of your report job and the report contents.
4962
+ # Retrieves the service last accessed data report for Organizations that
4963
+ # was previously generated using the ` GenerateOrganizationsAccessReport
4964
+ # ` operation. This operation retrieves the status of your report job
4965
+ # and the report contents.
4926
4966
  #
4927
4967
  # Depending on the parameters that you passed when you generated the
4928
4968
  # report, the data returned could include different information. For
@@ -5089,7 +5129,7 @@ module Aws::IAM
5089
5129
  # information about.
5090
5130
  #
5091
5131
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5092
- # in the *AWS General Reference*.
5132
+ # in the *Amazon Web Services General Reference*.
5093
5133
  #
5094
5134
  #
5095
5135
  #
@@ -5171,7 +5211,7 @@ module Aws::IAM
5171
5211
  # information about.
5172
5212
  #
5173
5213
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5174
- # in the *AWS General Reference*.
5214
+ # in the *Amazon Web Services General Reference*.
5175
5215
  #
5176
5216
  #
5177
5217
  #
@@ -5410,7 +5450,7 @@ module Aws::IAM
5410
5450
  # IAM to get information about.
5411
5451
  #
5412
5452
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5413
- # in the *AWS General Reference*.
5453
+ # in the *Amazon Web Services General Reference*.
5414
5454
  #
5415
5455
  #
5416
5456
  #
@@ -5451,10 +5491,10 @@ module Aws::IAM
5451
5491
  # key.
5452
5492
  #
5453
5493
  # The SSH public key retrieved by this operation is used only for
5454
- # authenticating the associated IAM user to an AWS CodeCommit
5455
- # repository. For more information about using SSH keys to authenticate
5456
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
5457
- # connections][1] in the *AWS CodeCommit User Guide*.
5494
+ # authenticating the associated IAM user to an CodeCommit repository.
5495
+ # For more information about using SSH keys to authenticate to an
5496
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
5497
+ # in the *CodeCommit User Guide*.
5458
5498
  #
5459
5499
  #
5460
5500
  #
@@ -5523,8 +5563,8 @@ module Aws::IAM
5523
5563
  #
5524
5564
  # For more information about working with server certificates, see
5525
5565
  # [Working with server certificates][1] in the *IAM User Guide*. This
5526
- # topic includes a list of AWS services that can use the server
5527
- # certificates that you manage with IAM.
5566
+ # topic includes a list of Amazon Web Services services that can use the
5567
+ # server certificates that you manage with IAM.
5528
5568
  #
5529
5569
  #
5530
5570
  #
@@ -5580,17 +5620,17 @@ module Aws::IAM
5580
5620
  # `GenerateServiceLastAccessedDetails` operation. You can use the
5581
5621
  # `JobId` parameter in `GetServiceLastAccessedDetails` to retrieve the
5582
5622
  # status of your report job. When the report is complete, you can
5583
- # retrieve the generated report. The report includes a list of AWS
5584
- # services that the resource (user, group, role, or managed policy) can
5585
- # access.
5623
+ # retrieve the generated report. The report includes a list of Amazon
5624
+ # Web Services services that the resource (user, group, role, or managed
5625
+ # policy) can access.
5586
5626
  #
5587
5627
  # <note markdown="1"> Service last accessed data does not use other policy types when
5588
5628
  # determining whether a resource could access a service. These other
5589
5629
  # policy types include resource-based policies, access control lists,
5590
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
5591
- # assume role policies. It only applies permissions policy logic. For
5592
- # more about the evaluation of policy types, see [Evaluating
5593
- # policies][1] in the *IAM User Guide*.
5630
+ # Organizations policies, IAM permissions boundaries, and STS assume
5631
+ # role policies. It only applies permissions policy logic. For more
5632
+ # about the evaluation of policy types, see [Evaluating policies][1] in
5633
+ # the *IAM User Guide*.
5594
5634
  #
5595
5635
  # </note>
5596
5636
  #
@@ -5769,16 +5809,17 @@ module Aws::IAM
5769
5809
  # `GenerateServiceLastAccessedDetails` operation.
5770
5810
  #
5771
5811
  # @option params [required, String] :service_namespace
5772
- # The service namespace for an AWS service. Provide the service
5773
- # namespace to learn when the IAM entity last attempted to access the
5774
- # specified service.
5812
+ # The service namespace for an Amazon Web Services service. Provide the
5813
+ # service namespace to learn when the IAM entity last attempted to
5814
+ # access the specified service.
5775
5815
  #
5776
5816
  # To learn the service namespace for a service, see [Actions, resources,
5777
- # and condition keys for AWS services][1] in the *IAM User Guide*.
5778
- # Choose the name of the service to view details for that service. In
5779
- # the first paragraph, find the service prefix. For example, `(service
5780
- # prefix: a4b)`. For more information about service namespaces, see [AWS
5781
- # service namespaces][2] in the *AWS General Reference*.
5817
+ # and condition keys for Amazon Web Services services][1] in the *IAM
5818
+ # User Guide*. Choose the name of the service to view details for that
5819
+ # service. In the first paragraph, find the service prefix. For example,
5820
+ # `(service prefix: a4b)`. For more information about service
5821
+ # namespaces, see [Amazon Web Services service namespaces][2] in
5822
+ # the *Amazon Web Services General Reference*.
5782
5823
  #
5783
5824
  #
5784
5825
  #
@@ -5931,8 +5972,8 @@ module Aws::IAM
5931
5972
  # user's creation date, path, unique ID, and ARN.
5932
5973
  #
5933
5974
  # If you do not specify a user name, IAM determines the user name
5934
- # implicitly based on the AWS access key ID used to sign the request to
5935
- # this operation.
5975
+ # implicitly based on the Amazon Web Services access key ID used to sign
5976
+ # the request to this operation.
5936
5977
  #
5937
5978
  # @option params [String] :user_name
5938
5979
  # The name of the user to get information about.
@@ -6089,12 +6130,12 @@ module Aws::IAM
6089
6130
  # paginate the results using the `MaxItems` and `Marker` parameters.
6090
6131
  #
6091
6132
  # If the `UserName` field is not specified, the user name is determined
6092
- # implicitly based on the AWS access key ID used to sign the request.
6093
- # This operation works for access keys under the AWS account.
6094
- # Consequently, you can use this operation to manage AWS account root
6095
- # user credentials even if the AWS account has no associated users.
6133
+ # implicitly based on the Amazon Web Services access key ID used to sign
6134
+ # the request. This operation works for access keys under the account.
6135
+ # Consequently, you can use this operation to manage account root user
6136
+ # credentials even if the account has no associated users.
6096
6137
  #
6097
- # <note markdown="1"> To ensure the security of your AWS account, the secret access key is
6138
+ # <note markdown="1"> To ensure the security of your account, the secret access key is
6098
6139
  # accessible only during key and user creation.
6099
6140
  #
6100
6141
  # </note>
@@ -6190,9 +6231,9 @@ module Aws::IAM
6190
6231
  req.send_request(options)
6191
6232
  end
6192
6233
 
6193
- # Lists the account alias associated with the AWS account (Note: you can
6194
- # have only one). For information about using an AWS account alias, see
6195
- # [Using an alias for your AWS account ID][1] in the *IAM User Guide*.
6234
+ # Lists the account alias associated with the account (Note: you can
6235
+ # have only one). For information about using an account alias, see
6236
+ # [Using an alias for your account ID][1] in the *IAM User Guide*.
6196
6237
  #
6197
6238
  #
6198
6239
  #
@@ -6571,7 +6612,7 @@ module Aws::IAM
6571
6612
  # the versions.
6572
6613
  #
6573
6614
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
6574
- # in the *AWS General Reference*.
6615
+ # in the *Amazon Web Services General Reference*.
6575
6616
  #
6576
6617
  #
6577
6618
  #
@@ -6989,10 +7030,10 @@ module Aws::IAM
6989
7030
  # @option params [required, String] :instance_profile_name
6990
7031
  # The name of the IAM instance profile whose tags you want to see.
6991
7032
  #
6992
- # This parameter accepts (through its [regex pattern][1]) a string of
6993
- # characters that consist of upper and lowercase alphanumeric characters
7033
+ # This parameter allows (through its [regex pattern][1]) a string of
7034
+ # characters consisting of upper and lowercase alphanumeric characters
6994
7035
  # with no spaces. You can also include any of the following characters:
6995
- # =,.@-
7036
+ # \_+=,.@-
6996
7037
  #
6997
7038
  #
6998
7039
  #
@@ -7005,16 +7046,15 @@ module Aws::IAM
7005
7046
  # to indicate where the next call should start.
7006
7047
  #
7007
7048
  # @option params [Integer] :max_items
7008
- # (Optional) Use this only when paginating results to indicate the
7009
- # maximum number of items that you want in the response. If additional
7010
- # items exist beyond the maximum that you specify, the `IsTruncated`
7011
- # response element is `true`.
7049
+ # Use this only when paginating results to indicate the maximum number
7050
+ # of items you want in the response. If additional items exist beyond
7051
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7012
7052
  #
7013
- # If you do not include this parameter, it defaults to 100. Note that
7014
- # IAM might return fewer results, even when more results are available.
7015
- # In that case, the `IsTruncated` response element returns `true`, and
7016
- # `Marker` contains a value to include in the subsequent call that tells
7017
- # the service where to continue from.
7053
+ # If you do not include this parameter, the number of items defaults to
7054
+ # 100. Note that IAM might return fewer results, even when there are
7055
+ # more results available. In that case, the `IsTruncated` response
7056
+ # element returns `true`, and `Marker` contains a value to include in
7057
+ # the subsequent call that tells the service where to continue from.
7018
7058
  #
7019
7059
  # @return [Types::ListInstanceProfileTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7020
7060
  #
@@ -7266,10 +7306,10 @@ module Aws::IAM
7266
7306
  # want to see. For virtual MFA devices, the serial number is the same as
7267
7307
  # the ARN.
7268
7308
  #
7269
- # This parameter accepts (through its [regex pattern][1]) a string of
7270
- # characters that consist of upper and lowercase alphanumeric characters
7309
+ # This parameter allows (through its [regex pattern][1]) a string of
7310
+ # characters consisting of upper and lowercase alphanumeric characters
7271
7311
  # with no spaces. You can also include any of the following characters:
7272
- # =,.@-
7312
+ # \_+=,.@-
7273
7313
  #
7274
7314
  #
7275
7315
  #
@@ -7282,16 +7322,15 @@ module Aws::IAM
7282
7322
  # to indicate where the next call should start.
7283
7323
  #
7284
7324
  # @option params [Integer] :max_items
7285
- # (Optional) Use this only when paginating results to indicate the
7286
- # maximum number of items that you want in the response. If additional
7287
- # items exist beyond the maximum that you specify, the `IsTruncated`
7288
- # response element is `true`.
7325
+ # Use this only when paginating results to indicate the maximum number
7326
+ # of items you want in the response. If additional items exist beyond
7327
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7289
7328
  #
7290
- # If you do not include this parameter, it defaults to 100. Note that
7291
- # IAM might return fewer results, even when more results are available.
7292
- # In that case, the `IsTruncated` response element returns `true`, and
7293
- # `Marker` contains a value to include in the subsequent call that tells
7294
- # the service where to continue from.
7329
+ # If you do not include this parameter, the number of items defaults to
7330
+ # 100. Note that IAM might return fewer results, even when there are
7331
+ # more results available. In that case, the `IsTruncated` response
7332
+ # element returns `true`, and `Marker` contains a value to include in
7333
+ # the subsequent call that tells the service where to continue from.
7295
7334
  #
7296
7335
  # @return [Types::ListMFADeviceTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7297
7336
  #
@@ -7327,8 +7366,8 @@ module Aws::IAM
7327
7366
  # Lists the MFA devices for an IAM user. If the request includes a IAM
7328
7367
  # user name, then this operation lists all the MFA devices associated
7329
7368
  # with the specified user. If you do not specify a user name, IAM
7330
- # determines the user name implicitly based on the AWS access key ID
7331
- # signing the request for this operation.
7369
+ # determines the user name implicitly based on the Amazon Web Services
7370
+ # access key ID signing the request for this operation.
7332
7371
  #
7333
7372
  # You can paginate the results using the `MaxItems` and `Marker`
7334
7373
  # parameters.
@@ -7413,10 +7452,10 @@ module Aws::IAM
7413
7452
  # The ARN of the OpenID Connect (OIDC) identity provider whose tags you
7414
7453
  # want to see.
7415
7454
  #
7416
- # This parameter accepts (through its [regex pattern][1]) a string of
7417
- # characters that consist of upper and lowercase alphanumeric characters
7455
+ # This parameter allows (through its [regex pattern][1]) a string of
7456
+ # characters consisting of upper and lowercase alphanumeric characters
7418
7457
  # with no spaces. You can also include any of the following characters:
7419
- # =,.@-
7458
+ # \_+=,.@-
7420
7459
  #
7421
7460
  #
7422
7461
  #
@@ -7429,16 +7468,15 @@ module Aws::IAM
7429
7468
  # to indicate where the next call should start.
7430
7469
  #
7431
7470
  # @option params [Integer] :max_items
7432
- # (Optional) Use this only when paginating results to indicate the
7433
- # maximum number of items that you want in the response. If additional
7434
- # items exist beyond the maximum that you specify, the `IsTruncated`
7435
- # response element is `true`.
7471
+ # Use this only when paginating results to indicate the maximum number
7472
+ # of items you want in the response. If additional items exist beyond
7473
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7436
7474
  #
7437
- # If you do not include this parameter, it defaults to 100. Note that
7438
- # IAM might return fewer results, even when more results are available.
7439
- # In that case, the `IsTruncated` response element returns `true`, and
7440
- # `Marker` contains a value to include in the subsequent call that tells
7441
- # the service where to continue from.
7475
+ # If you do not include this parameter, the number of items defaults to
7476
+ # 100. Note that IAM might return fewer results, even when there are
7477
+ # more results available. In that case, the `IsTruncated` response
7478
+ # element returns `true`, and `Marker` contains a value to include in
7479
+ # the subsequent call that tells the service where to continue from.
7442
7480
  #
7443
7481
  # @return [Types::ListOpenIDConnectProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7444
7482
  #
@@ -7472,7 +7510,7 @@ module Aws::IAM
7472
7510
  end
7473
7511
 
7474
7512
  # Lists information about the IAM OpenID Connect (OIDC) provider
7475
- # resource objects defined in the AWS account.
7513
+ # resource objects defined in the account.
7476
7514
  #
7477
7515
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7478
7516
  # attributes for the resource. For example, this operation does not
@@ -7500,15 +7538,15 @@ module Aws::IAM
7500
7538
  req.send_request(options)
7501
7539
  end
7502
7540
 
7503
- # Lists all the managed policies that are available in your AWS account,
7504
- # including your own customer-defined managed policies and all AWS
7505
- # managed policies.
7541
+ # Lists all the managed policies that are available in your account,
7542
+ # including your own customer-defined managed policies and all Amazon
7543
+ # Web Services managed policies.
7506
7544
  #
7507
7545
  # You can filter the list of policies that is returned using the
7508
7546
  # optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
7509
- # example, to list only the customer managed policies in your AWS
7510
- # account, set `Scope` to `Local`. To list only AWS managed policies,
7511
- # set `Scope` to `AWS`.
7547
+ # example, to list only the customer managed policies in your Amazon Web
7548
+ # Services account, set `Scope` to `Local`. To list only Amazon Web
7549
+ # Services managed policies, set `Scope` to `AWS`.
7512
7550
  #
7513
7551
  # You can paginate the results using the `MaxItems` and `Marker`
7514
7552
  # parameters.
@@ -7531,9 +7569,9 @@ module Aws::IAM
7531
7569
  # @option params [String] :scope
7532
7570
  # The scope to use for filtering the results.
7533
7571
  #
7534
- # To list only AWS managed policies, set `Scope` to `AWS`. To list only
7535
- # the customer managed policies in your AWS account, set `Scope` to
7536
- # `Local`.
7572
+ # To list only Amazon Web Services managed policies, set `Scope` to
7573
+ # `AWS`. To list only the customer managed policies in your account, set
7574
+ # `Scope` to `Local`.
7537
7575
  #
7538
7576
  # This parameter is optional. If it is not included, or if it is set to
7539
7577
  # `All`, all policies are returned.
@@ -7641,11 +7679,10 @@ module Aws::IAM
7641
7679
  #
7642
7680
  # <note markdown="1"> This operation does not use other policy types when determining
7643
7681
  # whether a resource could access a service. These other policy types
7644
- # include resource-based policies, access control lists, AWS
7645
- # Organizations policies, IAM permissions boundaries, and AWS STS assume
7646
- # role policies. It only applies permissions policy logic. For more
7647
- # about the evaluation of policy types, see [Evaluating policies][1] in
7648
- # the *IAM User Guide*.
7682
+ # include resource-based policies, access control lists, Organizations
7683
+ # policies, IAM permissions boundaries, and STS assume role policies. It
7684
+ # only applies permissions policy logic. For more about the evaluation
7685
+ # of policy types, see [Evaluating policies][1] in the *IAM User Guide*.
7649
7686
  #
7650
7687
  # </note>
7651
7688
  #
@@ -7691,15 +7728,16 @@ module Aws::IAM
7691
7728
  # want to list.
7692
7729
  #
7693
7730
  # @option params [required, Array<String>] :service_namespaces
7694
- # The service namespace for the AWS services whose policies you want to
7695
- # list.
7731
+ # The service namespace for the Amazon Web Services services whose
7732
+ # policies you want to list.
7696
7733
  #
7697
7734
  # To learn the service namespace for a service, see [Actions, resources,
7698
- # and condition keys for AWS services][1] in the *IAM User Guide*.
7699
- # Choose the name of the service to view details for that service. In
7700
- # the first paragraph, find the service prefix. For example, `(service
7701
- # prefix: a4b)`. For more information about service namespaces, see [AWS
7702
- # service namespaces][2] in the *AWS General Reference*.
7735
+ # and condition keys for Amazon Web Services services][1] in the *IAM
7736
+ # User Guide*. Choose the name of the service to view details for that
7737
+ # service. In the first paragraph, find the service prefix. For example,
7738
+ # `(service prefix: a4b)`. For more information about service
7739
+ # namespaces, see [Amazon Web Services service namespaces][2] in
7740
+ # the *Amazon Web Services General Reference*.
7703
7741
  #
7704
7742
  #
7705
7743
  #
@@ -7800,10 +7838,10 @@ module Aws::IAM
7800
7838
  # @option params [required, String] :policy_arn
7801
7839
  # The ARN of the IAM customer managed policy whose tags you want to see.
7802
7840
  #
7803
- # This parameter accepts (through its [regex pattern][1]) a string of
7804
- # characters that consist of upper and lowercase alphanumeric characters
7841
+ # This parameter allows (through its [regex pattern][1]) a string of
7842
+ # characters consisting of upper and lowercase alphanumeric characters
7805
7843
  # with no spaces. You can also include any of the following characters:
7806
- # =,.@-
7844
+ # \_+=,.@-
7807
7845
  #
7808
7846
  #
7809
7847
  #
@@ -7816,16 +7854,15 @@ module Aws::IAM
7816
7854
  # to indicate where the next call should start.
7817
7855
  #
7818
7856
  # @option params [Integer] :max_items
7819
- # (Optional) Use this only when paginating results to indicate the
7820
- # maximum number of items that you want in the response. If additional
7821
- # items exist beyond the maximum that you specify, the `IsTruncated`
7822
- # response element is `true`.
7857
+ # Use this only when paginating results to indicate the maximum number
7858
+ # of items you want in the response. If additional items exist beyond
7859
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7823
7860
  #
7824
- # If you do not include this parameter, it defaults to 100. Note that
7825
- # IAM might return fewer results, even when more results are available.
7826
- # In that case, the `IsTruncated` response element returns `true`, and
7827
- # `Marker` contains a value to include in the subsequent call that tells
7828
- # the service where to continue from.
7861
+ # If you do not include this parameter, the number of items defaults to
7862
+ # 100. Note that IAM might return fewer results, even when there are
7863
+ # more results available. In that case, the `IsTruncated` response
7864
+ # element returns `true`, and `Marker` contains a value to include in
7865
+ # the subsequent call that tells the service where to continue from.
7829
7866
  #
7830
7867
  # @return [Types::ListPolicyTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7831
7868
  #
@@ -7874,7 +7911,7 @@ module Aws::IAM
7874
7911
  # the versions.
7875
7912
  #
7876
7913
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
7877
- # in the *AWS General Reference*.
7914
+ # in the *Amazon Web Services General Reference*.
7878
7915
  #
7879
7916
  #
7880
7917
  #
@@ -8036,16 +8073,15 @@ module Aws::IAM
8036
8073
  # to indicate where the next call should start.
8037
8074
  #
8038
8075
  # @option params [Integer] :max_items
8039
- # (Optional) Use this only when paginating results to indicate the
8040
- # maximum number of items that you want in the response. If additional
8041
- # items exist beyond the maximum that you specify, the `IsTruncated`
8042
- # response element is `true`.
8076
+ # Use this only when paginating results to indicate the maximum number
8077
+ # of items you want in the response. If additional items exist beyond
8078
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8043
8079
  #
8044
- # If you do not include this parameter, it defaults to 100. Note that
8045
- # IAM might return fewer results, even when more results are available.
8046
- # In that case, the `IsTruncated` response element returns `true`, and
8047
- # `Marker` contains a value to include in the subsequent call that tells
8048
- # the service where to continue from.
8080
+ # If you do not include this parameter, the number of items defaults to
8081
+ # 100. Note that IAM might return fewer results, even when there are
8082
+ # more results available. In that case, the `IsTruncated` response
8083
+ # element returns `true`, and `Marker` contains a value to include in
8084
+ # the subsequent call that tells the service where to continue from.
8049
8085
  #
8050
8086
  # @return [Types::ListRoleTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8051
8087
  #
@@ -8217,10 +8253,10 @@ module Aws::IAM
8217
8253
  # The ARN of the Security Assertion Markup Language (SAML) identity
8218
8254
  # provider whose tags you want to see.
8219
8255
  #
8220
- # This parameter accepts (through its [regex pattern][1]) a string of
8221
- # characters that consist of upper and lowercase alphanumeric characters
8256
+ # This parameter allows (through its [regex pattern][1]) a string of
8257
+ # characters consisting of upper and lowercase alphanumeric characters
8222
8258
  # with no spaces. You can also include any of the following characters:
8223
- # =,.@-
8259
+ # \_+=,.@-
8224
8260
  #
8225
8261
  #
8226
8262
  #
@@ -8233,16 +8269,15 @@ module Aws::IAM
8233
8269
  # to indicate where the next call should start.
8234
8270
  #
8235
8271
  # @option params [Integer] :max_items
8236
- # (Optional) Use this only when paginating results to indicate the
8237
- # maximum number of items that you want in the response. If additional
8238
- # items exist beyond the maximum that you specify, the `IsTruncated`
8239
- # response element is `true`.
8272
+ # Use this only when paginating results to indicate the maximum number
8273
+ # of items you want in the response. If additional items exist beyond
8274
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8240
8275
  #
8241
- # If you do not include this parameter, it defaults to 100. Note that
8242
- # IAM might return fewer results, even when more results are available.
8243
- # In that case, the `IsTruncated` response element returns `true`, and
8244
- # `Marker` contains a value to include in the subsequent call that tells
8245
- # the service where to continue from.
8276
+ # If you do not include this parameter, the number of items defaults to
8277
+ # 100. Note that IAM might return fewer results, even when there are
8278
+ # more results available. In that case, the `IsTruncated` response
8279
+ # element returns `true`, and `Marker` contains a value to include in
8280
+ # the subsequent call that tells the service where to continue from.
8246
8281
  #
8247
8282
  # @return [Types::ListSAMLProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8248
8283
  #
@@ -8313,10 +8348,10 @@ module Aws::IAM
8313
8348
  # list.
8314
8349
  #
8315
8350
  # The SSH public keys returned by this operation are used only for
8316
- # authenticating the IAM user to an AWS CodeCommit repository. For more
8317
- # information about using SSH keys to authenticate to an AWS CodeCommit
8318
- # repository, see [Set up AWS CodeCommit for SSH connections][1] in the
8319
- # *AWS CodeCommit User Guide*.
8351
+ # authenticating the IAM user to an CodeCommit repository. For more
8352
+ # information about using SSH keys to authenticate to an CodeCommit
8353
+ # repository, see [Set up CodeCommit for SSH connections][1] in the
8354
+ # *CodeCommit User Guide*.
8320
8355
  #
8321
8356
  # Although each user is limited to a small number of keys, you can still
8322
8357
  # paginate the results using the `MaxItems` and `Marker` parameters.
@@ -8328,7 +8363,7 @@ module Aws::IAM
8328
8363
  # @option params [String] :user_name
8329
8364
  # The name of the IAM user to list SSH public keys for. If none is
8330
8365
  # specified, the `UserName` field is determined implicitly based on the
8331
- # AWS access key used to sign the request.
8366
+ # Amazon Web Services access key used to sign the request.
8332
8367
  #
8333
8368
  # This parameter allows (through its [regex pattern][1]) a string of
8334
8369
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8396,11 +8431,11 @@ module Aws::IAM
8396
8431
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
8397
8432
  # User Guide*.
8398
8433
  #
8399
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
8400
- # (ACM), we recommend that you don't use IAM server certificates.
8401
- # Instead, use ACM to provision, manage, and deploy your server
8402
- # certificates. For more information about IAM server certificates,
8403
- # [Working with server certificates][2] in the *IAM User Guide*.
8434
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
8435
+ # we recommend that you don't use IAM server certificates. Instead, use
8436
+ # ACM to provision, manage, and deploy your server certificates. For
8437
+ # more information about IAM server certificates, [Working with server
8438
+ # certificates][2] in the *IAM User Guide*.
8404
8439
  #
8405
8440
  # </note>
8406
8441
  #
@@ -8412,10 +8447,10 @@ module Aws::IAM
8412
8447
  # @option params [required, String] :server_certificate_name
8413
8448
  # The name of the IAM server certificate whose tags you want to see.
8414
8449
  #
8415
- # This parameter accepts (through its [regex pattern][1]) a string of
8416
- # characters that consist of upper and lowercase alphanumeric characters
8450
+ # This parameter allows (through its [regex pattern][1]) a string of
8451
+ # characters consisting of upper and lowercase alphanumeric characters
8417
8452
  # with no spaces. You can also include any of the following characters:
8418
- # =,.@-
8453
+ # \_+=,.@-
8419
8454
  #
8420
8455
  #
8421
8456
  #
@@ -8428,16 +8463,15 @@ module Aws::IAM
8428
8463
  # to indicate where the next call should start.
8429
8464
  #
8430
8465
  # @option params [Integer] :max_items
8431
- # (Optional) Use this only when paginating results to indicate the
8432
- # maximum number of items that you want in the response. If additional
8433
- # items exist beyond the maximum that you specify, the `IsTruncated`
8434
- # response element is `true`.
8466
+ # Use this only when paginating results to indicate the maximum number
8467
+ # of items you want in the response. If additional items exist beyond
8468
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8435
8469
  #
8436
- # If you do not include this parameter, it defaults to 100. Note that
8437
- # IAM might return fewer results, even when more results are available.
8438
- # In that case, the `IsTruncated` response element returns `true`, and
8439
- # `Marker` contains a value to include in the subsequent call that tells
8440
- # the service where to continue from.
8470
+ # If you do not include this parameter, the number of items defaults to
8471
+ # 100. Note that IAM might return fewer results, even when there are
8472
+ # more results available. In that case, the `IsTruncated` response
8473
+ # element returns `true`, and `Marker` contains a value to include in
8474
+ # the subsequent call that tells the service where to continue from.
8441
8475
  #
8442
8476
  # @return [Types::ListServerCertificateTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8443
8477
  #
@@ -8478,8 +8512,8 @@ module Aws::IAM
8478
8512
  #
8479
8513
  # For more information about working with server certificates, see
8480
8514
  # [Working with server certificates][1] in the *IAM User Guide*. This
8481
- # topic also includes a list of AWS services that can use the server
8482
- # certificates that you manage with IAM.
8515
+ # topic also includes a list of Amazon Web Services services that can
8516
+ # use the server certificates that you manage with IAM.
8483
8517
  #
8484
8518
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8485
8519
  # attributes for the resource. For example, this operation does not
@@ -8570,8 +8604,8 @@ module Aws::IAM
8570
8604
  # empty list. The service-specific credentials returned by this
8571
8605
  # operation are used only for authenticating the IAM user to a specific
8572
8606
  # service. For more information about using service-specific credentials
8573
- # to authenticate to an AWS service, see [Set up service-specific
8574
- # credentials][1] in the AWS CodeCommit User Guide.
8607
+ # to authenticate to an Amazon Web Services service, see [Set up
8608
+ # service-specific credentials][1] in the CodeCommit User Guide.
8575
8609
  #
8576
8610
  #
8577
8611
  #
@@ -8592,9 +8626,9 @@ module Aws::IAM
8592
8626
  # [1]: http://wikipedia.org/wiki/regex
8593
8627
  #
8594
8628
  # @option params [String] :service_name
8595
- # Filters the returned results to only those for the specified AWS
8596
- # service. If not specified, then AWS returns service-specific
8597
- # credentials for all services.
8629
+ # Filters the returned results to only those for the specified Amazon
8630
+ # Web Services service. If not specified, then Amazon Web Services
8631
+ # returns service-specific credentials for all services.
8598
8632
  #
8599
8633
  # @return [Types::ListServiceSpecificCredentialsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8600
8634
  #
@@ -8635,11 +8669,11 @@ module Aws::IAM
8635
8669
  # and `Marker` parameters.
8636
8670
  #
8637
8671
  # If the `UserName` field is not specified, the user name is determined
8638
- # implicitly based on the AWS access key ID used to sign the request for
8639
- # this operation. This operation works for access keys under the AWS
8640
- # account. Consequently, you can use this operation to manage AWS
8641
- # account root user credentials even if the AWS account has no
8642
- # associated users.
8672
+ # implicitly based on the Amazon Web Services access key ID used to sign
8673
+ # the request for this operation. This operation works for access keys
8674
+ # under the account. Consequently, you can use this operation to manage
8675
+ # account root user credentials even if the account has no associated
8676
+ # users.
8643
8677
  #
8644
8678
  # @option params [String] :user_name
8645
8679
  # The name of the IAM user whose signing certificates you want to
@@ -8817,10 +8851,10 @@ module Aws::IAM
8817
8851
  # @option params [required, String] :user_name
8818
8852
  # The name of the IAM user whose tags you want to see.
8819
8853
  #
8820
- # This parameter accepts (through its [regex pattern][1]) a string of
8821
- # characters that consist of upper and lowercase alphanumeric characters
8854
+ # This parameter allows (through its [regex pattern][1]) a string of
8855
+ # characters consisting of upper and lowercase alphanumeric characters
8822
8856
  # with no spaces. You can also include any of the following characters:
8823
- # =,.@-
8857
+ # \_+=,.@-
8824
8858
  #
8825
8859
  #
8826
8860
  #
@@ -8833,16 +8867,15 @@ module Aws::IAM
8833
8867
  # to indicate where the next call should start.
8834
8868
  #
8835
8869
  # @option params [Integer] :max_items
8836
- # (Optional) Use this only when paginating results to indicate the
8837
- # maximum number of items that you want in the response. If additional
8838
- # items exist beyond the maximum that you specify, the `IsTruncated`
8839
- # response element is `true`.
8870
+ # Use this only when paginating results to indicate the maximum number
8871
+ # of items you want in the response. If additional items exist beyond
8872
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8840
8873
  #
8841
- # If you do not include this parameter, it defaults to 100. Note that
8842
- # IAM might return fewer results, even when more results are available.
8843
- # In that case, the `IsTruncated` response element returns `true`, and
8844
- # `Marker` contains a value to include in the subsequent call that tells
8845
- # the service where to continue from.
8874
+ # If you do not include this parameter, the number of items defaults to
8875
+ # 100. Note that IAM might return fewer results, even when there are
8876
+ # more results available. In that case, the `IsTruncated` response
8877
+ # element returns `true`, and `Marker` contains a value to include in
8878
+ # the subsequent call that tells the service where to continue from.
8846
8879
  #
8847
8880
  # @return [Types::ListUserTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8848
8881
  #
@@ -8902,8 +8935,8 @@ module Aws::IAM
8902
8935
  end
8903
8936
 
8904
8937
  # Lists the IAM users that have the specified path prefix. If no path
8905
- # prefix is specified, the operation returns all users in the AWS
8906
- # account. If there are none, the operation returns an empty list.
8938
+ # prefix is specified, the operation returns all users in the account.
8939
+ # If there are none, the operation returns an empty list.
8907
8940
  #
8908
8941
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8909
8942
  # attributes for the resource. For example, this operation does not
@@ -9021,7 +9054,7 @@ module Aws::IAM
9021
9054
  req.send_request(options)
9022
9055
  end
9023
9056
 
9024
- # Lists the virtual MFA devices defined in the AWS account by assignment
9057
+ # Lists the virtual MFA devices defined in the account by assignment
9025
9058
  # status. If you do not specify an assignment status, the operation
9026
9059
  # returns a list of all virtual MFA devices. Assignment status can be
9027
9060
  # `Assigned`, `Unassigned`, or `Any`.
@@ -9180,10 +9213,10 @@ module Aws::IAM
9180
9213
  # @option params [required, String] :policy_document
9181
9214
  # The policy document.
9182
9215
  #
9183
- # You must provide policies in JSON format in IAM. However, for AWS
9216
+ # You must provide policies in JSON format in IAM. However, for
9184
9217
  # CloudFormation templates formatted in YAML, you can provide the policy
9185
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9186
- # policy to JSON format before submitting it to IAM.
9218
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9219
+ # to JSON format before submitting it to = IAM.
9187
9220
  #
9188
9221
  # The [regex pattern][1] used to validate this parameter is a string of
9189
9222
  # characters consisting of the following:
@@ -9232,11 +9265,11 @@ module Aws::IAM
9232
9265
  end
9233
9266
 
9234
9267
  # Adds or updates the policy that is specified as the IAM role's
9235
- # permissions boundary. You can use an AWS managed policy or a customer
9236
- # managed policy to set the boundary for a role. Use the boundary to
9237
- # control the maximum permissions that the role can have. Setting a
9238
- # permissions boundary is an advanced feature that can affect the
9239
- # permissions for the role.
9268
+ # permissions boundary. You can use an Amazon Web Services managed
9269
+ # policy or a customer managed policy to set the boundary for a role.
9270
+ # Use the boundary to control the maximum permissions that the role can
9271
+ # have. Setting a permissions boundary is an advanced feature that can
9272
+ # affect the permissions for the role.
9240
9273
  #
9241
9274
  # You cannot set the boundary for a service-linked role.
9242
9275
  #
@@ -9335,10 +9368,10 @@ module Aws::IAM
9335
9368
  # @option params [required, String] :policy_document
9336
9369
  # The policy document.
9337
9370
  #
9338
- # You must provide policies in JSON format in IAM. However, for AWS
9371
+ # You must provide policies in JSON format in IAM. However, for
9339
9372
  # CloudFormation templates formatted in YAML, you can provide the policy
9340
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9341
- # policy to JSON format before submitting it to IAM.
9373
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9374
+ # to JSON format before submitting it to IAM.
9342
9375
  #
9343
9376
  # The [regex pattern][1] used to validate this parameter is a string of
9344
9377
  # characters consisting of the following:
@@ -9387,11 +9420,11 @@ module Aws::IAM
9387
9420
  end
9388
9421
 
9389
9422
  # Adds or updates the policy that is specified as the IAM user's
9390
- # permissions boundary. You can use an AWS managed policy or a customer
9391
- # managed policy to set the boundary for a user. Use the boundary to
9392
- # control the maximum permissions that the user can have. Setting a
9393
- # permissions boundary is an advanced feature that can affect the
9394
- # permissions for the user.
9423
+ # permissions boundary. You can use an Amazon Web Services managed
9424
+ # policy or a customer managed policy to set the boundary for a user.
9425
+ # Use the boundary to control the maximum permissions that the user can
9426
+ # have. Setting a permissions boundary is an advanced feature that can
9427
+ # affect the permissions for the user.
9395
9428
  #
9396
9429
  # Policies that are used as permissions boundaries do not provide
9397
9430
  # permissions. You must also attach a permissions policy to the user. To
@@ -9480,10 +9513,10 @@ module Aws::IAM
9480
9513
  # @option params [required, String] :policy_document
9481
9514
  # The policy document.
9482
9515
  #
9483
- # You must provide policies in JSON format in IAM. However, for AWS
9516
+ # You must provide policies in JSON format in IAM. However, for
9484
9517
  # CloudFormation templates formatted in YAML, you can provide the policy
9485
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9486
- # policy to JSON format before submitting it to IAM.
9518
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9519
+ # to JSON format before submitting it to IAM.
9487
9520
  #
9488
9521
  # The [regex pattern][1] used to validate this parameter is a string of
9489
9522
  # characters consisting of the following:
@@ -9544,7 +9577,7 @@ module Aws::IAM
9544
9577
  # using the ListOpenIDConnectProviders operation.
9545
9578
  #
9546
9579
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9547
- # in the *AWS General Reference*.
9580
+ # in the *Amazon Web Services General Reference*.
9548
9581
  #
9549
9582
  #
9550
9583
  #
@@ -9697,9 +9730,10 @@ module Aws::IAM
9697
9730
  end
9698
9731
 
9699
9732
  # Resets the password for a service-specific credential. The new
9700
- # password is AWS generated and cryptographically strong. It cannot be
9701
- # configured by the user. Resetting the password immediately invalidates
9702
- # the previous password associated with this user.
9733
+ # password is Amazon Web Services generated and cryptographically
9734
+ # strong. It cannot be configured by the user. Resetting the password
9735
+ # immediately invalidates the previous password associated with this
9736
+ # user.
9703
9737
  #
9704
9738
  # @option params [String] :user_name
9705
9739
  # The name of the IAM user associated with the service-specific
@@ -9757,7 +9791,7 @@ module Aws::IAM
9757
9791
  end
9758
9792
 
9759
9793
  # Synchronizes the specified MFA device with its IAM resource object on
9760
- # the AWS servers.
9794
+ # the Amazon Web Services servers.
9761
9795
  #
9762
9796
  # For more information about creating and working with virtual MFA
9763
9797
  # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
@@ -9839,7 +9873,7 @@ module Aws::IAM
9839
9873
  # you want to set.
9840
9874
  #
9841
9875
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9842
- # in the *AWS General Reference*.
9876
+ # in the *Amazon Web Services General Reference*.
9843
9877
  #
9844
9878
  #
9845
9879
  #
@@ -9874,25 +9908,25 @@ module Aws::IAM
9874
9908
  end
9875
9909
 
9876
9910
  # Sets the specified version of the global endpoint token as the token
9877
- # version used for the AWS account.
9911
+ # version used for the account.
9878
9912
  #
9879
- # By default, AWS Security Token Service (STS) is available as a global
9913
+ # By default, Security Token Service (STS) is available as a global
9880
9914
  # service, and all STS requests go to a single endpoint at
9881
- # `https://sts.amazonaws.com`. AWS recommends using Regional STS
9882
- # endpoints to reduce latency, build in redundancy, and increase session
9883
- # token availability. For information about Regional endpoints for STS,
9884
- # see [AWS AWS Security Token Service endpoints and quotas][1] in the
9885
- # *AWS General Reference*.
9915
+ # `https://sts.amazonaws.com`. Amazon Web Services recommends using
9916
+ # Regional STS endpoints to reduce latency, build in redundancy, and
9917
+ # increase session token availability. For information about Regional
9918
+ # endpoints for STS, see [Security Token Service endpoints and
9919
+ # quotas][1] in the *Amazon Web Services General Reference*.
9886
9920
  #
9887
9921
  # If you make an STS call to the global endpoint, the resulting session
9888
9922
  # tokens might be valid in some Regions but not others. It depends on
9889
9923
  # the version that is set in this operation. Version 1 tokens are valid
9890
- # only in AWS Regions that are available by default. These tokens do not
9924
+ # only in Regions that are available by default. These tokens do not
9891
9925
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9892
9926
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9893
9927
  # are longer and might affect systems where you temporarily store
9894
9928
  # tokens. For information, see [Activating and deactivating STS in an
9895
- # AWS region][2] in the *IAM User Guide*.
9929
+ # Region][2] in the *IAM User Guide*.
9896
9930
  #
9897
9931
  # To view the current session token version, see the
9898
9932
  # `GlobalEndpointTokenVersion` entry in the response of the
@@ -9905,14 +9939,14 @@ module Aws::IAM
9905
9939
  #
9906
9940
  # @option params [required, String] :global_endpoint_token_version
9907
9941
  # The version of the global endpoint token. Version 1 tokens are valid
9908
- # only in AWS Regions that are available by default. These tokens do not
9942
+ # only in Regions that are available by default. These tokens do not
9909
9943
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9910
9944
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9911
9945
  # are longer and might affect systems where you temporarily store
9912
9946
  # tokens.
9913
9947
  #
9914
- # For information, see [Activating and deactivating STS in an AWS
9915
- # region][1] in the *IAM User Guide*.
9948
+ # For information, see [Activating and deactivating STS in an Region][1]
9949
+ # in the *IAM User Guide*.
9916
9950
  #
9917
9951
  #
9918
9952
  #
@@ -9945,9 +9979,9 @@ module Aws::IAM
9945
9979
  end
9946
9980
 
9947
9981
  # Simulate how a set of IAM policies and optionally a resource-based
9948
- # policy works with a list of API operations and AWS resources to
9949
- # determine the policies' effective permissions. The policies are
9950
- # provided as strings.
9982
+ # policy works with a list of API operations and Amazon Web Services
9983
+ # resources to determine the policies' effective permissions. The
9984
+ # policies are provided as strings.
9951
9985
  #
9952
9986
  # The simulation does not perform the API operations; it only checks the
9953
9987
  # authorization to determine if the simulated policies allow or deny the
@@ -9957,11 +9991,12 @@ module Aws::IAM
9957
9991
  # If you want to simulate existing policies that are attached to an IAM
9958
9992
  # user, group, or role, use SimulatePrincipalPolicy instead.
9959
9993
  #
9960
- # Context keys are variables that are maintained by AWS and its services
9961
- # and which provide details about the context of an API query request.
9962
- # You can use the `Condition` element of an IAM policy to evaluate
9963
- # context keys. To get the list of context keys that the policies
9964
- # require for correct simulation, use GetContextKeysForCustomPolicy.
9994
+ # Context keys are variables that are maintained by Amazon Web Services
9995
+ # and its services and which provide details about the context of an API
9996
+ # query request. You can use the `Condition` element of an IAM policy to
9997
+ # evaluate context keys. To get the list of context keys that the
9998
+ # policies require for correct simulation, use
9999
+ # GetContextKeysForCustomPolicy.
9965
10000
  #
9966
10001
  # If the output is long, you can use `MaxItems` and `Marker` parameters
9967
10002
  # to paginate the results.
@@ -9985,7 +10020,12 @@ module Aws::IAM
9985
10020
  # In other words, do not use policies designed to restrict what a user
9986
10021
  # can do while using the temporary credentials.
9987
10022
  #
9988
- # The [regex pattern][3] used to validate this parameter is a string of
10023
+ # The maximum length of the policy document that you can pass in this
10024
+ # operation, including whitespace, is listed below. To view the maximum
10025
+ # character counts of a managed policy with no whitespaces, see [IAM and
10026
+ # STS character quotas][3].
10027
+ #
10028
+ # The [regex pattern][4] used to validate this parameter is a string of
9989
10029
  # characters consisting of the following:
9990
10030
  #
9991
10031
  # * Any printable ASCII character ranging from the space character
@@ -10001,7 +10041,8 @@ module Aws::IAM
10001
10041
  #
10002
10042
  # [1]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetFederationToken.html
10003
10043
  # [2]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_AssumeRole.html
10004
- # [3]: http://wikipedia.org/wiki/regex
10044
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10045
+ # [4]: http://wikipedia.org/wiki/regex
10005
10046
  #
10006
10047
  # @option params [Array<String>] :permissions_boundary_policy_input_list
10007
10048
  # The IAM permissions boundary policy to simulate. The permissions
@@ -10012,7 +10053,12 @@ module Aws::IAM
10012
10053
  # The policy input is specified as a string that contains the complete,
10013
10054
  # valid JSON text of a permissions boundary policy.
10014
10055
  #
10015
- # The [regex pattern][2] used to validate this parameter is a string of
10056
+ # The maximum length of the policy document that you can pass in this
10057
+ # operation, including whitespace, is listed below. To view the maximum
10058
+ # character counts of a managed policy with no whitespaces, see [IAM and
10059
+ # STS character quotas][2].
10060
+ #
10061
+ # The [regex pattern][3] used to validate this parameter is a string of
10016
10062
  # characters consisting of the following:
10017
10063
  #
10018
10064
  # * Any printable ASCII character ranging from the space character
@@ -10027,7 +10073,8 @@ module Aws::IAM
10027
10073
  #
10028
10074
  #
10029
10075
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10030
- # [2]: http://wikipedia.org/wiki/regex
10076
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10077
+ # [3]: http://wikipedia.org/wiki/regex
10031
10078
  #
10032
10079
  # @option params [required, Array<String>] :action_names
10033
10080
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10036,13 +10083,13 @@ module Aws::IAM
10036
10083
  # operation does not support using wildcards (*) in an action name.
10037
10084
  #
10038
10085
  # @option params [Array<String>] :resource_arns
10039
- # A list of ARNs of AWS resources to include in the simulation. If this
10040
- # parameter is not provided, then the value defaults to `*` (all
10041
- # resources). Each API in the `ActionNames` parameter is evaluated for
10042
- # each resource in this list. The simulation determines the access
10043
- # result (allowed or denied) of each combination and reports it in the
10044
- # response. You can simulate resources that don't exist in your
10045
- # account.
10086
+ # A list of ARNs of Amazon Web Services resources to include in the
10087
+ # simulation. If this parameter is not provided, then the value defaults
10088
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10089
+ # evaluated for each resource in this list. The simulation determines
10090
+ # the access result (allowed or denied) of each combination and reports
10091
+ # it in the response. You can simulate resources that don't exist in
10092
+ # your account.
10046
10093
  #
10047
10094
  # The simulation does not automatically retrieve policies for the
10048
10095
  # specified resources. If you want to include a resource policy in the
@@ -10054,7 +10101,7 @@ module Aws::IAM
10054
10101
  # input error.
10055
10102
  #
10056
10103
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10057
- # in the *AWS General Reference*.
10104
+ # in the *Amazon Web Services General Reference*.
10058
10105
  #
10059
10106
  #
10060
10107
  #
@@ -10066,7 +10113,12 @@ module Aws::IAM
10066
10113
  # policy attached. You can include only one resource-based policy in a
10067
10114
  # simulation.
10068
10115
  #
10069
- # The [regex pattern][1] used to validate this parameter is a string of
10116
+ # The maximum length of the policy document that you can pass in this
10117
+ # operation, including whitespace, is listed below. To view the maximum
10118
+ # character counts of a managed policy with no whitespaces, see [IAM and
10119
+ # STS character quotas][1].
10120
+ #
10121
+ # The [regex pattern][2] used to validate this parameter is a string of
10070
10122
  # characters consisting of the following:
10071
10123
  #
10072
10124
  # * Any printable ASCII character ranging from the space character
@@ -10080,10 +10132,11 @@ module Aws::IAM
10080
10132
  #
10081
10133
  #
10082
10134
  #
10083
- # [1]: http://wikipedia.org/wiki/regex
10135
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10136
+ # [2]: http://wikipedia.org/wiki/regex
10084
10137
  #
10085
10138
  # @option params [String] :resource_owner
10086
- # An ARN representing the AWS account ID that specifies the owner of any
10139
+ # An ARN representing the account ID that specifies the owner of any
10087
10140
  # simulated resource that does not identify its owner in the resource
10088
10141
  # ARN. Examples of resource ARNs include an S3 bucket or object. If
10089
10142
  # `ResourceOwner` is specified, it is also used as the account owner of
@@ -10254,11 +10307,11 @@ module Aws::IAM
10254
10307
  end
10255
10308
 
10256
10309
  # Simulate how a set of IAM policies attached to an IAM entity works
10257
- # with a list of API operations and AWS resources to determine the
10258
- # policies' effective permissions. The entity can be an IAM user,
10259
- # group, or role. If you specify a user, then the simulation also
10260
- # includes all of the policies that are attached to groups that the user
10261
- # belongs to. You can simulate resources that don't exist in your
10310
+ # with a list of API operations and Amazon Web Services resources to
10311
+ # determine the policies' effective permissions. The entity can be an
10312
+ # IAM user, group, or role. If you specify a user, then the simulation
10313
+ # also includes all of the policies that are attached to groups that the
10314
+ # user belongs to. You can simulate resources that don't exist in your
10262
10315
  # account.
10263
10316
  #
10264
10317
  # You can optionally include a list of one or more additional policies
@@ -10278,11 +10331,12 @@ module Aws::IAM
10278
10331
  # permissions, then consider allowing them to use SimulateCustomPolicy
10279
10332
  # instead.
10280
10333
  #
10281
- # Context keys are variables maintained by AWS and its services that
10282
- # provide details about the context of an API query request. You can use
10283
- # the `Condition` element of an IAM policy to evaluate context keys. To
10284
- # get the list of context keys that the policies require for correct
10285
- # simulation, use GetContextKeysForPrincipalPolicy.
10334
+ # Context keys are variables maintained by Amazon Web Services and its
10335
+ # services that provide details about the context of an API query
10336
+ # request. You can use the `Condition` element of an IAM policy to
10337
+ # evaluate context keys. To get the list of context keys that the
10338
+ # policies require for correct simulation, use
10339
+ # GetContextKeysForPrincipalPolicy.
10286
10340
  #
10287
10341
  # If the output is long, you can use the `MaxItems` and `Marker`
10288
10342
  # parameters to paginate the results.
@@ -10303,12 +10357,18 @@ module Aws::IAM
10303
10357
  # also includes all policies that are attached to any groups the user
10304
10358
  # belongs to.
10305
10359
  #
10306
- # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10307
- # in the *AWS General Reference*.
10360
+ # The maximum length of the policy document that you can pass in this
10361
+ # operation, including whitespace, is listed below. To view the maximum
10362
+ # character counts of a managed policy with no whitespaces, see [IAM and
10363
+ # STS character quotas][1].
10308
10364
  #
10365
+ # For more information about ARNs, see [Amazon Resource Names (ARNs)][2]
10366
+ # in the *Amazon Web Services General Reference*.
10309
10367
  #
10310
10368
  #
10311
- # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10369
+ #
10370
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10371
+ # [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10312
10372
  #
10313
10373
  # @option params [Array<String>] :policy_input_list
10314
10374
  # An optional list of additional policy documents to include in the
@@ -10344,7 +10404,12 @@ module Aws::IAM
10344
10404
  # Guide*. The policy input is specified as a string containing the
10345
10405
  # complete, valid JSON text of a permissions boundary policy.
10346
10406
  #
10347
- # The [regex pattern][2] used to validate this parameter is a string of
10407
+ # The maximum length of the policy document that you can pass in this
10408
+ # operation, including whitespace, is listed below. To view the maximum
10409
+ # character counts of a managed policy with no whitespaces, see [IAM and
10410
+ # STS character quotas][2].
10411
+ #
10412
+ # The [regex pattern][3] used to validate this parameter is a string of
10348
10413
  # characters consisting of the following:
10349
10414
  #
10350
10415
  # * Any printable ASCII character ranging from the space character
@@ -10359,7 +10424,8 @@ module Aws::IAM
10359
10424
  #
10360
10425
  #
10361
10426
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10362
- # [2]: http://wikipedia.org/wiki/regex
10427
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10428
+ # [3]: http://wikipedia.org/wiki/regex
10363
10429
  #
10364
10430
  # @option params [required, Array<String>] :action_names
10365
10431
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10367,13 +10433,13 @@ module Aws::IAM
10367
10433
  # the service identifier, such as `iam:CreateUser`.
10368
10434
  #
10369
10435
  # @option params [Array<String>] :resource_arns
10370
- # A list of ARNs of AWS resources to include in the simulation. If this
10371
- # parameter is not provided, then the value defaults to `*` (all
10372
- # resources). Each API in the `ActionNames` parameter is evaluated for
10373
- # each resource in this list. The simulation determines the access
10374
- # result (allowed or denied) of each combination and reports it in the
10375
- # response. You can simulate resources that don't exist in your
10376
- # account.
10436
+ # A list of ARNs of Amazon Web Services resources to include in the
10437
+ # simulation. If this parameter is not provided, then the value defaults
10438
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10439
+ # evaluated for each resource in this list. The simulation determines
10440
+ # the access result (allowed or denied) of each combination and reports
10441
+ # it in the response. You can simulate resources that don't exist in
10442
+ # your account.
10377
10443
  #
10378
10444
  # The simulation does not automatically retrieve policies for the
10379
10445
  # specified resources. If you want to include a resource policy in the
@@ -10381,7 +10447,7 @@ module Aws::IAM
10381
10447
  # `ResourcePolicy` parameter.
10382
10448
  #
10383
10449
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10384
- # in the *AWS General Reference*.
10450
+ # in the *Amazon Web Services General Reference*.
10385
10451
  #
10386
10452
  #
10387
10453
  #
@@ -10393,7 +10459,12 @@ module Aws::IAM
10393
10459
  # policy attached. You can include only one resource-based policy in a
10394
10460
  # simulation.
10395
10461
  #
10396
- # The [regex pattern][1] used to validate this parameter is a string of
10462
+ # The maximum length of the policy document that you can pass in this
10463
+ # operation, including whitespace, is listed below. To view the maximum
10464
+ # character counts of a managed policy with no whitespaces, see [IAM and
10465
+ # STS character quotas][1].
10466
+ #
10467
+ # The [regex pattern][2] used to validate this parameter is a string of
10397
10468
  # characters consisting of the following:
10398
10469
  #
10399
10470
  # * Any printable ASCII character ranging from the space character
@@ -10407,19 +10478,20 @@ module Aws::IAM
10407
10478
  #
10408
10479
  #
10409
10480
  #
10410
- # [1]: http://wikipedia.org/wiki/regex
10481
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10482
+ # [2]: http://wikipedia.org/wiki/regex
10411
10483
  #
10412
10484
  # @option params [String] :resource_owner
10413
- # An AWS account ID that specifies the owner of any simulated resource
10414
- # that does not identify its owner in the resource ARN. Examples of
10415
- # resource ARNs include an S3 bucket or object. If `ResourceOwner` is
10416
- # specified, it is also used as the account owner of any
10417
- # `ResourcePolicy` included in the simulation. If the `ResourceOwner`
10418
- # parameter is not specified, then the owner of the resources and the
10419
- # resource policy defaults to the account of the identity provided in
10420
- # `CallerArn`. This parameter is required only if you specify a
10421
- # resource-based policy and account that owns the resource is different
10422
- # from the account that owns the simulated calling user `CallerArn`.
10485
+ # An account ID that specifies the owner of any simulated resource that
10486
+ # does not identify its owner in the resource ARN. Examples of resource
10487
+ # ARNs include an S3 bucket or object. If `ResourceOwner` is specified,
10488
+ # it is also used as the account owner of any `ResourcePolicy` included
10489
+ # in the simulation. If the `ResourceOwner` parameter is not specified,
10490
+ # then the owner of the resources and the resource policy defaults to
10491
+ # the account of the identity provided in `CallerArn`. This parameter is
10492
+ # required only if you specify a resource-based policy and account that
10493
+ # owns the resource is different from the account that owns the
10494
+ # simulated calling user `CallerArn`.
10423
10495
  #
10424
10496
  # @option params [String] :caller_arn
10425
10497
  # The ARN of the IAM user that you want to specify as the simulated
@@ -10440,7 +10512,7 @@ module Aws::IAM
10440
10512
  # use in evaluating the policy.
10441
10513
  #
10442
10514
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10443
- # in the *AWS General Reference*.
10515
+ # in the *Amazon Web Services General Reference*.
10444
10516
  #
10445
10517
  #
10446
10518
  #
@@ -10615,9 +10687,10 @@ module Aws::IAM
10615
10687
  # resource is not created. For more information about tagging, see
10616
10688
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10617
10689
  #
10618
- # * AWS always interprets the tag `Value` as a single string. If you
10619
- # need to store an array, you can store comma-separated values in the
10620
- # string. However, you must interpret the value in your code.
10690
+ # * Amazon Web Services always interprets the tag `Value` as a single
10691
+ # string. If you need to store an array, you can store comma-separated
10692
+ # values in the string. However, you must interpret the value in your
10693
+ # code.
10621
10694
  #
10622
10695
  # </note>
10623
10696
  #
@@ -10629,10 +10702,10 @@ module Aws::IAM
10629
10702
  # @option params [required, String] :instance_profile_name
10630
10703
  # The name of the IAM instance profile to which you want to add tags.
10631
10704
  #
10632
- # This parameter accepts (through its [regex pattern][1]) a string of
10633
- # characters that consist of upper and lowercase alphanumeric characters
10705
+ # This parameter allows (through its [regex pattern][1]) a string of
10706
+ # characters consisting of upper and lowercase alphanumeric characters
10634
10707
  # with no spaces. You can also include any of the following characters:
10635
- # =,.@-
10708
+ # \_+=,.@-
10636
10709
  #
10637
10710
  #
10638
10711
  #
@@ -10689,9 +10762,10 @@ module Aws::IAM
10689
10762
  # resource is not created. For more information about tagging, see
10690
10763
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10691
10764
  #
10692
- # * AWS always interprets the tag `Value` as a single string. If you
10693
- # need to store an array, you can store comma-separated values in the
10694
- # string. However, you must interpret the value in your code.
10765
+ # * Amazon Web Services always interprets the tag `Value` as a single
10766
+ # string. If you need to store an array, you can store comma-separated
10767
+ # values in the string. However, you must interpret the value in your
10768
+ # code.
10695
10769
  #
10696
10770
  # </note>
10697
10771
  #
@@ -10705,10 +10779,10 @@ module Aws::IAM
10705
10779
  # to add tags. For virtual MFA devices, the serial number is the same as
10706
10780
  # the ARN.
10707
10781
  #
10708
- # This parameter accepts (through its [regex pattern][1]) a string of
10709
- # characters that consist of upper and lowercase alphanumeric characters
10782
+ # This parameter allows (through its [regex pattern][1]) a string of
10783
+ # characters consisting of upper and lowercase alphanumeric characters
10710
10784
  # with no spaces. You can also include any of the following characters:
10711
- # =,.@-
10785
+ # \_+=,.@-
10712
10786
  #
10713
10787
  #
10714
10788
  #
@@ -10766,9 +10840,10 @@ module Aws::IAM
10766
10840
  # resource is not created. For more information about tagging, see
10767
10841
  # [Tagging IAM resources][3] in the *IAM User Guide*.
10768
10842
  #
10769
- # * AWS always interprets the tag `Value` as a single string. If you
10770
- # need to store an array, you can store comma-separated values in the
10771
- # string. However, you must interpret the value in your code.
10843
+ # * Amazon Web Services always interprets the tag `Value` as a single
10844
+ # string. If you need to store an array, you can store comma-separated
10845
+ # values in the string. However, you must interpret the value in your
10846
+ # code.
10772
10847
  #
10773
10848
  # </note>
10774
10849
  #
@@ -10782,10 +10857,10 @@ module Aws::IAM
10782
10857
  # The ARN of the OIDC identity provider in IAM to which you want to add
10783
10858
  # tags.
10784
10859
  #
10785
- # This parameter accepts (through its [regex pattern][1]) a string of
10786
- # characters that consist of upper and lowercase alphanumeric characters
10860
+ # This parameter allows (through its [regex pattern][1]) a string of
10861
+ # characters consisting of upper and lowercase alphanumeric characters
10787
10862
  # with no spaces. You can also include any of the following characters:
10788
- # =,.@-
10863
+ # \_+=,.@-
10789
10864
  #
10790
10865
  #
10791
10866
  #
@@ -10843,9 +10918,10 @@ module Aws::IAM
10843
10918
  # resource is not created. For more information about tagging, see
10844
10919
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10845
10920
  #
10846
- # * AWS always interprets the tag `Value` as a single string. If you
10847
- # need to store an array, you can store comma-separated values in the
10848
- # string. However, you must interpret the value in your code.
10921
+ # * Amazon Web Services always interprets the tag `Value` as a single
10922
+ # string. If you need to store an array, you can store comma-separated
10923
+ # values in the string. However, you must interpret the value in your
10924
+ # code.
10849
10925
  #
10850
10926
  # </note>
10851
10927
  #
@@ -10858,10 +10934,10 @@ module Aws::IAM
10858
10934
  # The ARN of the IAM customer managed policy to which you want to add
10859
10935
  # tags.
10860
10936
  #
10861
- # This parameter accepts (through its [regex pattern][1]) a string of
10862
- # characters that consist of upper and lowercase alphanumeric characters
10937
+ # This parameter allows (through its [regex pattern][1]) a string of
10938
+ # characters consisting of upper and lowercase alphanumeric characters
10863
10939
  # with no spaces. You can also include any of the following characters:
10864
- # =,.@-
10940
+ # \_+=,.@-
10865
10941
  #
10866
10942
  #
10867
10943
  #
@@ -10915,16 +10991,17 @@ module Aws::IAM
10915
10991
  # see [Control access using IAM tags][1] in the *IAM User Guide*.
10916
10992
  #
10917
10993
  # * **Cost allocation** - Use tags to help track which individuals and
10918
- # teams are using which AWS resources.
10994
+ # teams are using which Amazon Web Services resources.
10919
10995
  #
10920
10996
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
10921
10997
  # maximum number of tags, then the entire request fails and the
10922
10998
  # resource is not created. For more information about tagging, see
10923
10999
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10924
11000
  #
10925
- # * AWS always interprets the tag `Value` as a single string. If you
10926
- # need to store an array, you can store comma-separated values in the
10927
- # string. However, you must interpret the value in your code.
11001
+ # * Amazon Web Services always interprets the tag `Value` as a single
11002
+ # string. If you need to store an array, you can store comma-separated
11003
+ # values in the string. However, you must interpret the value in your
11004
+ # code.
10928
11005
  #
10929
11006
  # </note>
10930
11007
  #
@@ -11019,9 +11096,10 @@ module Aws::IAM
11019
11096
  # resource is not created. For more information about tagging, see
11020
11097
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11021
11098
  #
11022
- # * AWS always interprets the tag `Value` as a single string. If you
11023
- # need to store an array, you can store comma-separated values in the
11024
- # string. However, you must interpret the value in your code.
11099
+ # * Amazon Web Services always interprets the tag `Value` as a single
11100
+ # string. If you need to store an array, you can store comma-separated
11101
+ # values in the string. However, you must interpret the value in your
11102
+ # code.
11025
11103
  #
11026
11104
  # </note>
11027
11105
  #
@@ -11035,10 +11113,10 @@ module Aws::IAM
11035
11113
  # The ARN of the SAML identity provider in IAM to which you want to add
11036
11114
  # tags.
11037
11115
  #
11038
- # This parameter accepts (through its [regex pattern][1]) a string of
11039
- # characters that consist of upper and lowercase alphanumeric characters
11116
+ # This parameter allows (through its [regex pattern][1]) a string of
11117
+ # characters consisting of upper and lowercase alphanumeric characters
11040
11118
  # with no spaces. You can also include any of the following characters:
11041
- # =,.@-
11119
+ # \_+=,.@-
11042
11120
  #
11043
11121
  #
11044
11122
  #
@@ -11075,11 +11153,11 @@ module Aws::IAM
11075
11153
  # same key name already exists, then that tag is overwritten with the
11076
11154
  # new value.
11077
11155
  #
11078
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11079
- # (ACM), we recommend that you don't use IAM server certificates.
11080
- # Instead, use ACM to provision, manage, and deploy your server
11081
- # certificates. For more information about IAM server certificates,
11082
- # [Working with server certificates][1] in the *IAM User Guide*.
11156
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11157
+ # we recommend that you don't use IAM server certificates. Instead, use
11158
+ # ACM to provision, manage, and deploy your server certificates. For
11159
+ # more information about IAM server certificates, [Working with server
11160
+ # certificates][1] in the *IAM User Guide*.
11083
11161
  #
11084
11162
  # </note>
11085
11163
  #
@@ -11099,16 +11177,17 @@ module Aws::IAM
11099
11177
  # [Control access using IAM tags][2] in the *IAM User Guide*.
11100
11178
  #
11101
11179
  # * **Cost allocation** - Use tags to help track which individuals and
11102
- # teams are using which AWS resources.
11180
+ # teams are using which Amazon Web Services resources.
11103
11181
  #
11104
11182
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11105
11183
  # maximum number of tags, then the entire request fails and the
11106
11184
  # resource is not created. For more information about tagging, see
11107
11185
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11108
11186
  #
11109
- # * AWS always interprets the tag `Value` as a single string. If you
11110
- # need to store an array, you can store comma-separated values in the
11111
- # string. However, you must interpret the value in your code.
11187
+ # * Amazon Web Services always interprets the tag `Value` as a single
11188
+ # string. If you need to store an array, you can store comma-separated
11189
+ # values in the string. However, you must interpret the value in your
11190
+ # code.
11112
11191
  #
11113
11192
  # </note>
11114
11193
  #
@@ -11121,10 +11200,10 @@ module Aws::IAM
11121
11200
  # @option params [required, String] :server_certificate_name
11122
11201
  # The name of the IAM server certificate to which you want to add tags.
11123
11202
  #
11124
- # This parameter accepts (through its [regex pattern][1]) a string of
11125
- # characters that consist of upper and lowercase alphanumeric characters
11203
+ # This parameter allows (through its [regex pattern][1]) a string of
11204
+ # characters consisting of upper and lowercase alphanumeric characters
11126
11205
  # with no spaces. You can also include any of the following characters:
11127
- # =,.@-
11206
+ # \_+=,.@-
11128
11207
  #
11129
11208
  #
11130
11209
  #
@@ -11178,16 +11257,17 @@ module Aws::IAM
11178
11257
  # User Guide*.
11179
11258
  #
11180
11259
  # * **Cost allocation** - Use tags to help track which individuals and
11181
- # teams are using which AWS resources.
11260
+ # teams are using which Amazon Web Services resources.
11182
11261
  #
11183
11262
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11184
11263
  # maximum number of tags, then the entire request fails and the
11185
11264
  # resource is not created. For more information about tagging, see
11186
11265
  # [Tagging IAM resources][2] in the *IAM User Guide*.
11187
11266
  #
11188
- # * AWS always interprets the tag `Value` as a single string. If you
11189
- # need to store an array, you can store comma-separated values in the
11190
- # string. However, you must interpret the value in your code.
11267
+ # * Amazon Web Services always interprets the tag `Value` as a single
11268
+ # string. If you need to store an array, you can store comma-separated
11269
+ # values in the string. However, you must interpret the value in your
11270
+ # code.
11191
11271
  #
11192
11272
  # </note>
11193
11273
  #
@@ -11202,10 +11282,10 @@ module Aws::IAM
11202
11282
  # @option params [required, String] :user_name
11203
11283
  # The name of the IAM user to which you want to add tags.
11204
11284
  #
11205
- # This parameter accepts (through its [regex pattern][1]) a string of
11206
- # characters that consist of upper and lowercase alphanumeric characters
11285
+ # This parameter allows (through its [regex pattern][1]) a string of
11286
+ # characters consisting of upper and lowercase alphanumeric characters
11207
11287
  # with no spaces. You can also include any of the following characters:
11208
- # =,.@-
11288
+ # \_+=,.@-
11209
11289
  #
11210
11290
  #
11211
11291
  #
@@ -11269,10 +11349,10 @@ module Aws::IAM
11269
11349
  # The name of the IAM instance profile from which you want to remove
11270
11350
  # tags.
11271
11351
  #
11272
- # This parameter accepts (through its [regex pattern][1]) a string of
11273
- # characters that consist of upper and lowercase alphanumeric characters
11352
+ # This parameter allows (through its [regex pattern][1]) a string of
11353
+ # characters consisting of upper and lowercase alphanumeric characters
11274
11354
  # with no spaces. You can also include any of the following characters:
11275
- # =,.@-
11355
+ # \_+=,.@-
11276
11356
  #
11277
11357
  #
11278
11358
  #
@@ -11313,10 +11393,10 @@ module Aws::IAM
11313
11393
  # want to remove tags. For virtual MFA devices, the serial number is the
11314
11394
  # same as the ARN.
11315
11395
  #
11316
- # This parameter accepts (through its [regex pattern][1]) a string of
11317
- # characters that consist of upper and lowercase alphanumeric characters
11396
+ # This parameter allows (through its [regex pattern][1]) a string of
11397
+ # characters consisting of upper and lowercase alphanumeric characters
11318
11398
  # with no spaces. You can also include any of the following characters:
11319
- # =,.@-
11399
+ # \_+=,.@-
11320
11400
  #
11321
11401
  #
11322
11402
  #
@@ -11359,10 +11439,10 @@ module Aws::IAM
11359
11439
  # The ARN of the OIDC provider in IAM from which you want to remove
11360
11440
  # tags.
11361
11441
  #
11362
- # This parameter accepts (through its [regex pattern][1]) a string of
11363
- # characters that consist of upper and lowercase alphanumeric characters
11442
+ # This parameter allows (through its [regex pattern][1]) a string of
11443
+ # characters consisting of upper and lowercase alphanumeric characters
11364
11444
  # with no spaces. You can also include any of the following characters:
11365
- # =,.@-
11445
+ # \_+=,.@-
11366
11446
  #
11367
11447
  #
11368
11448
  #
@@ -11402,10 +11482,10 @@ module Aws::IAM
11402
11482
  # The ARN of the IAM customer managed policy from which you want to
11403
11483
  # remove tags.
11404
11484
  #
11405
- # This parameter accepts (through its [regex pattern][1]) a string of
11406
- # characters that consist of upper and lowercase alphanumeric characters
11485
+ # This parameter allows (through its [regex pattern][1]) a string of
11486
+ # characters consisting of upper and lowercase alphanumeric characters
11407
11487
  # with no spaces. You can also include any of the following characters:
11408
- # =,.@-
11488
+ # \_+=,.@-
11409
11489
  #
11410
11490
  #
11411
11491
  #
@@ -11501,10 +11581,10 @@ module Aws::IAM
11501
11581
  # The ARN of the SAML identity provider in IAM from which you want to
11502
11582
  # remove tags.
11503
11583
  #
11504
- # This parameter accepts (through its [regex pattern][1]) a string of
11505
- # characters that consist of upper and lowercase alphanumeric characters
11584
+ # This parameter allows (through its [regex pattern][1]) a string of
11585
+ # characters consisting of upper and lowercase alphanumeric characters
11506
11586
  # with no spaces. You can also include any of the following characters:
11507
- # =,.@-
11587
+ # \_+=,.@-
11508
11588
  #
11509
11589
  #
11510
11590
  #
@@ -11536,11 +11616,11 @@ module Aws::IAM
11536
11616
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
11537
11617
  # User Guide*.
11538
11618
  #
11539
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11540
- # (ACM), we recommend that you don't use IAM server certificates.
11541
- # Instead, use ACM to provision, manage, and deploy your server
11542
- # certificates. For more information about IAM server certificates,
11543
- # [Working with server certificates][2] in the *IAM User Guide*.
11619
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11620
+ # we recommend that you don't use IAM server certificates. Instead, use
11621
+ # ACM to provision, manage, and deploy your server certificates. For
11622
+ # more information about IAM server certificates, [Working with server
11623
+ # certificates][2] in the *IAM User Guide*.
11544
11624
  #
11545
11625
  # </note>
11546
11626
  #
@@ -11553,10 +11633,10 @@ module Aws::IAM
11553
11633
  # The name of the IAM server certificate from which you want to remove
11554
11634
  # tags.
11555
11635
  #
11556
- # This parameter accepts (through its [regex pattern][1]) a string of
11557
- # characters that consist of upper and lowercase alphanumeric characters
11636
+ # This parameter allows (through its [regex pattern][1]) a string of
11637
+ # characters consisting of upper and lowercase alphanumeric characters
11558
11638
  # with no spaces. You can also include any of the following characters:
11559
- # =,.@-
11639
+ # \_+=,.@-
11560
11640
  #
11561
11641
  #
11562
11642
  #
@@ -11594,10 +11674,10 @@ module Aws::IAM
11594
11674
  # @option params [required, String] :user_name
11595
11675
  # The name of the IAM user from which you want to remove tags.
11596
11676
  #
11597
- # This parameter accepts (through its [regex pattern][1]) a string of
11598
- # characters that consist of upper and lowercase alphanumeric characters
11677
+ # This parameter allows (through its [regex pattern][1]) a string of
11678
+ # characters consisting of upper and lowercase alphanumeric characters
11599
11679
  # with no spaces. You can also include any of the following characters:
11600
- # =,.@-
11680
+ # \_+=,.@-
11601
11681
  #
11602
11682
  #
11603
11683
  #
@@ -11642,10 +11722,10 @@ module Aws::IAM
11642
11722
  # user's key as part of a key rotation workflow.
11643
11723
  #
11644
11724
  # If the `UserName` is not specified, the user name is determined
11645
- # implicitly based on the AWS access key ID used to sign the request.
11646
- # This operation works for access keys under the AWS account.
11647
- # Consequently, you can use this operation to manage AWS account root
11648
- # user credentials even if the AWS account has no associated users.
11725
+ # implicitly based on the Amazon Web Services access key ID used to sign
11726
+ # the request. This operation works for access keys under the account.
11727
+ # Consequently, you can use this operation to manage account root user
11728
+ # credentials even if the account has no associated users.
11649
11729
  #
11650
11730
  # For information about rotating keys, see [Managing keys and
11651
11731
  # certificates][1] in the *IAM User Guide*.
@@ -11679,8 +11759,8 @@ module Aws::IAM
11679
11759
  #
11680
11760
  # @option params [required, String] :status
11681
11761
  # The status you want to assign to the secret access key. `Active` means
11682
- # that the key can be used for programmatic calls to AWS, while
11683
- # `Inactive` means that the key cannot be used.
11762
+ # that the key can be used for programmatic calls to Amazon Web
11763
+ # Services, while `Inactive` means that the key cannot be used.
11684
11764
  #
11685
11765
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
11686
11766
  #
@@ -11713,7 +11793,7 @@ module Aws::IAM
11713
11793
  req.send_request(options)
11714
11794
  end
11715
11795
 
11716
- # Updates the password policy settings for the AWS account.
11796
+ # Updates the password policy settings for the account.
11717
11797
  #
11718
11798
  # <note markdown="1"> * This operation does not support partial updates. No parameters are
11719
11799
  # required, but if you do not specify a parameter, that parameter's
@@ -11775,8 +11855,8 @@ module Aws::IAM
11775
11855
  # require at least one lowercase character.
11776
11856
  #
11777
11857
  # @option params [Boolean] :allow_users_to_change_password
11778
- # Allows all IAM users in your account to use the AWS Management Console
11779
- # to change their own passwords. For more information, see [Letting IAM
11858
+ # Allows all IAM users in your account to use the Management Console to
11859
+ # change their own passwords. For more information, see [Letting IAM
11780
11860
  # users change their own passwords][1] in the *IAM User Guide*.
11781
11861
  #
11782
11862
  # If you do not specify a value for this parameter, then the operation
@@ -11873,10 +11953,10 @@ module Aws::IAM
11873
11953
  # @option params [required, String] :policy_document
11874
11954
  # The policy that grants an entity permission to assume the role.
11875
11955
  #
11876
- # You must provide policies in JSON format in IAM. However, for AWS
11956
+ # You must provide policies in JSON format in IAM. However, for
11877
11957
  # CloudFormation templates formatted in YAML, you can provide the policy
11878
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
11879
- # policy to JSON format before submitting it to IAM.
11958
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
11959
+ # to JSON format before submitting it to IAM.
11880
11960
  #
11881
11961
  # The [regex pattern][1] used to validate this parameter is a string of
11882
11962
  # characters consisting of the following:
@@ -12008,11 +12088,11 @@ module Aws::IAM
12008
12088
  req.send_request(options)
12009
12089
  end
12010
12090
 
12011
- # Changes the password for the specified IAM user. You can use the AWS
12012
- # CLI, the AWS API, or the **Users** page in the IAM console to change
12013
- # the password for any IAM user. Use ChangePassword to change your own
12014
- # password in the **My Security Credentials** page in the AWS Management
12015
- # Console.
12091
+ # Changes the password for the specified IAM user. You can use the CLI,
12092
+ # the Amazon Web Services API, or the **Users** page in the IAM console
12093
+ # to change the password for any IAM user. Use ChangePassword to change
12094
+ # your own password in the **My Security Credentials** page in the
12095
+ # Management Console.
12016
12096
  #
12017
12097
  # For more information about modifying passwords, see [Managing
12018
12098
  # passwords][1] in the *IAM User Guide*.
@@ -12049,8 +12129,8 @@ module Aws::IAM
12049
12129
  # carriage return (`\u000D`)
12050
12130
  #
12051
12131
  # However, the format can be further restricted by the account
12052
- # administrator by setting a password policy on the AWS account. For
12053
- # more information, see UpdateAccountPasswordPolicy.
12132
+ # administrator by setting a password policy on the account. For more
12133
+ # information, see UpdateAccountPasswordPolicy.
12054
12134
  #
12055
12135
  #
12056
12136
  #
@@ -12097,15 +12177,25 @@ module Aws::IAM
12097
12177
  # existing list of thumbprints. (The lists are not merged.)
12098
12178
  #
12099
12179
  # Typically, you need to update a thumbprint only when the identity
12100
- # provider's certificate changes, which occurs rarely. However, if the
12180
+ # provider certificate changes, which occurs rarely. However, if the
12101
12181
  # provider's certificate *does* change, any attempt to assume an IAM
12102
12182
  # role that specifies the OIDC provider as a principal fails until the
12103
12183
  # certificate thumbprint is updated.
12104
12184
  #
12105
- # <note markdown="1"> Trust for the OIDC provider is derived from the provider's
12106
- # certificate and is validated by the thumbprint. Therefore, it is best
12107
- # to limit access to the `UpdateOpenIDConnectProviderThumbprint`
12108
- # operation to highly privileged users.
12185
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12186
+ # providers (IdPs) through our library of trusted certificate
12187
+ # authorities (CAs) instead of using a certificate thumbprint to verify
12188
+ # your IdP server certificate. These OIDC IdPs include Google, and those
12189
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
12190
+ # endpoint. In these cases, your legacy thumbprint remains in your
12191
+ # configuration, but is no longer used for validation.
12192
+ #
12193
+ # </note>
12194
+ #
12195
+ # <note markdown="1"> Trust for the OIDC provider is derived from the provider certificate
12196
+ # and is validated by the thumbprint. Therefore, it is best to limit
12197
+ # access to the `UpdateOpenIDConnectProviderThumbprint` operation to
12198
+ # highly privileged users.
12109
12199
  #
12110
12200
  # </note>
12111
12201
  #
@@ -12116,7 +12206,7 @@ module Aws::IAM
12116
12206
  # operation.
12117
12207
  #
12118
12208
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12119
- # in the *AWS General Reference*.
12209
+ # in the *Amazon Web Services General Reference*.
12120
12210
  #
12121
12211
  #
12122
12212
  #
@@ -12159,7 +12249,7 @@ module Aws::IAM
12159
12249
  # default maximum of one hour is applied. This setting can have a value
12160
12250
  # from 1 hour to 12 hours.
12161
12251
  #
12162
- # Anyone who assumes the role from the AWS CLI or API can use the
12252
+ # Anyone who assumes the role from the CLI or API can use the
12163
12253
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
12164
12254
  # parameter to request a longer session. The `MaxSessionDuration`
12165
12255
  # setting determines the maximum duration that can be requested using
@@ -12266,7 +12356,7 @@ module Aws::IAM
12266
12356
  # The Amazon Resource Name (ARN) of the SAML provider to update.
12267
12357
  #
12268
12358
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12269
- # in the *AWS General Reference*.
12359
+ # in the *Amazon Web Services General Reference*.
12270
12360
  #
12271
12361
  #
12272
12362
  #
@@ -12302,10 +12392,10 @@ module Aws::IAM
12302
12392
  # public key as part of a key rotation work flow.
12303
12393
  #
12304
12394
  # The SSH public key affected by this operation is used only for
12305
- # authenticating the associated IAM user to an AWS CodeCommit
12306
- # repository. For more information about using SSH keys to authenticate
12307
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12308
- # connections][1] in the *AWS CodeCommit User Guide*.
12395
+ # authenticating the associated IAM user to an CodeCommit repository.
12396
+ # For more information about using SSH keys to authenticate to an
12397
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12398
+ # in the *CodeCommit User Guide*.
12309
12399
  #
12310
12400
  #
12311
12401
  #
@@ -12336,7 +12426,7 @@ module Aws::IAM
12336
12426
  #
12337
12427
  # @option params [required, String] :status
12338
12428
  # The status to assign to the SSH public key. `Active` means that the
12339
- # key can be used for authentication with an AWS CodeCommit repository.
12429
+ # key can be used for authentication with an CodeCommit repository.
12340
12430
  # `Inactive` means that the key cannot be used.
12341
12431
  #
12342
12432
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
@@ -12363,8 +12453,8 @@ module Aws::IAM
12363
12453
  #
12364
12454
  # For more information about working with server certificates, see
12365
12455
  # [Working with server certificates][1] in the *IAM User Guide*. This
12366
- # topic also includes a list of AWS services that can use the server
12367
- # certificates that you manage with IAM.
12456
+ # topic also includes a list of Amazon Web Services services that can
12457
+ # use the server certificates that you manage with IAM.
12368
12458
  #
12369
12459
  # You should understand the implications of changing a server
12370
12460
  # certificate's path or name. For more information, see [Renaming a
@@ -12506,10 +12596,10 @@ module Aws::IAM
12506
12596
  # rotation work flow.
12507
12597
  #
12508
12598
  # If the `UserName` field is not specified, the user name is determined
12509
- # implicitly based on the AWS access key ID used to sign the request.
12510
- # This operation works for access keys under the AWS account.
12511
- # Consequently, you can use this operation to manage AWS account root
12512
- # user credentials even if the AWS account has no associated users.
12599
+ # implicitly based on the Amazon Web Services access key ID used to sign
12600
+ # the request. This operation works for access keys under the account.
12601
+ # Consequently, you can use this operation to manage account root user
12602
+ # credentials even if the account has no associated users.
12513
12603
  #
12514
12604
  # @option params [String] :user_name
12515
12605
  # The name of the IAM user the signing certificate belongs to.
@@ -12536,8 +12626,8 @@ module Aws::IAM
12536
12626
  #
12537
12627
  # @option params [required, String] :status
12538
12628
  # The status you want to assign to the certificate. `Active` means that
12539
- # the certificate can be used for programmatic calls to AWS `Inactive`
12540
- # means that the certificate cannot be used.
12629
+ # the certificate can be used for programmatic calls to Amazon Web
12630
+ # Services `Inactive` means that the certificate cannot be used.
12541
12631
  #
12542
12632
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
12543
12633
  #
@@ -12658,10 +12748,10 @@ module Aws::IAM
12658
12748
  # user.
12659
12749
  #
12660
12750
  # The SSH public key uploaded by this operation can be used only for
12661
- # authenticating the associated IAM user to an AWS CodeCommit
12662
- # repository. For more information about using SSH keys to authenticate
12663
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12664
- # connections][1] in the *AWS CodeCommit User Guide*.
12751
+ # authenticating the associated IAM user to an CodeCommit repository.
12752
+ # For more information about using SSH keys to authenticate to an
12753
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12754
+ # in the *CodeCommit User Guide*.
12665
12755
  #
12666
12756
  #
12667
12757
  #
@@ -12730,21 +12820,21 @@ module Aws::IAM
12730
12820
  req.send_request(options)
12731
12821
  end
12732
12822
 
12733
- # Uploads a server certificate entity for the AWS account. The server
12823
+ # Uploads a server certificate entity for the account. The server
12734
12824
  # certificate entity includes a public key certificate, a private key,
12735
12825
  # and an optional certificate chain, which should all be PEM-encoded.
12736
12826
  #
12737
- # We recommend that you use [AWS Certificate Manager][1] to provision,
12827
+ # We recommend that you use [Certificate Manager][1] to provision,
12738
12828
  # manage, and deploy your server certificates. With ACM you can request
12739
- # a certificate, deploy it to AWS resources, and let ACM handle
12740
- # certificate renewals for you. Certificates provided by ACM are free.
12741
- # For more information about using ACM, see the [AWS Certificate Manager
12742
- # User Guide][2].
12829
+ # a certificate, deploy it to Amazon Web Services resources, and let ACM
12830
+ # handle certificate renewals for you. Certificates provided by ACM are
12831
+ # free. For more information about using ACM, see the [Certificate
12832
+ # Manager User Guide][2].
12743
12833
  #
12744
12834
  # For more information about working with server certificates, see
12745
12835
  # [Working with server certificates][3] in the *IAM User Guide*. This
12746
- # topic includes a list of AWS services that can use the server
12747
- # certificates that you manage with IAM.
12836
+ # topic includes a list of Amazon Web Services services that can use the
12837
+ # server certificates that you manage with IAM.
12748
12838
  #
12749
12839
  # For information about the number of server certificates you can
12750
12840
  # upload, see [IAM and STS quotas][4] in the *IAM User Guide*.
@@ -12752,10 +12842,11 @@ module Aws::IAM
12752
12842
  # <note markdown="1"> Because the body of the public key certificate, private key, and the
12753
12843
  # certificate chain can be large, you should use POST rather than GET
12754
12844
  # when calling `UploadServerCertificate`. For information about setting
12755
- # up signatures and authorization through the API, see [Signing AWS API
12756
- # requests][5] in the *AWS General Reference*. For general information
12757
- # about using the Query API with IAM, see [Calling the API by making
12758
- # HTTP query requests][6] in the *IAM User Guide*.
12845
+ # up signatures and authorization through the API, see [Signing Amazon
12846
+ # Web Services API requests][5] in the *Amazon Web Services General
12847
+ # Reference*. For general information about using the Query API with
12848
+ # IAM, see [Calling the API by making HTTP query requests][6] in the
12849
+ # *IAM User Guide*.
12759
12850
  #
12760
12851
  # </note>
12761
12852
  #
@@ -12946,25 +13037,27 @@ module Aws::IAM
12946
13037
  end
12947
13038
 
12948
13039
  # Uploads an X.509 signing certificate and associates it with the
12949
- # specified IAM user. Some AWS services require you to use certificates
12950
- # to validate requests that are signed with a corresponding private key.
12951
- # When you upload the certificate, its default status is `Active`.
13040
+ # specified IAM user. Some Amazon Web Services services require you to
13041
+ # use certificates to validate requests that are signed with a
13042
+ # corresponding private key. When you upload the certificate, its
13043
+ # default status is `Active`.
12952
13044
  #
12953
13045
  # For information about when you would use an X.509 signing certificate,
12954
13046
  # see [Managing server certificates in IAM][1] in the *IAM User Guide*.
12955
13047
  #
12956
13048
  # If the `UserName` is not specified, the IAM user name is determined
12957
- # implicitly based on the AWS access key ID used to sign the request.
12958
- # This operation works for access keys under the AWS account.
12959
- # Consequently, you can use this operation to manage AWS account root
12960
- # user credentials even if the AWS account has no associated users.
13049
+ # implicitly based on the Amazon Web Services access key ID used to sign
13050
+ # the request. This operation works for access keys under the account.
13051
+ # Consequently, you can use this operation to manage account root user
13052
+ # credentials even if the account has no associated users.
12961
13053
  #
12962
13054
  # <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
12963
13055
  # POST rather than GET when calling `UploadSigningCertificate`. For
12964
13056
  # information about setting up signatures and authorization through the
12965
- # API, see [Signing AWS API requests][2] in the *AWS General Reference*.
12966
- # For general information about using the Query API with IAM, see
12967
- # [Making query requests][3] in the *IAM User Guide*.
13057
+ # API, see [Signing Amazon Web Services API requests][2] in the *Amazon
13058
+ # Web Services General Reference*. For general information about using
13059
+ # the Query API with IAM, see [Making query requests][3] in the *IAM
13060
+ # User Guide*.
12968
13061
  #
12969
13062
  # </note>
12970
13063
  #
@@ -13067,7 +13160,7 @@ module Aws::IAM
13067
13160
  params: params,
13068
13161
  config: config)
13069
13162
  context[:gem_name] = 'aws-sdk-iam'
13070
- context[:gem_version] = '1.54.0'
13163
+ context[:gem_version] = '1.58.0'
13071
13164
  Seahorse::Client::Request.new(handlers, context)
13072
13165
  end
13073
13166