aws-sdk-iam 1.54.0 → 1.58.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2270d440a509177a9e1999bf55af3136c5dcc0ec361c4a416e1bb933497e5f1d
4
- data.tar.gz: e09be8bc789484df173be8a29a316c99cf2922a8fae026344a7e1577dac7c5e8
3
+ metadata.gz: 5bd487f5369277f1b11761894e578727ea1450ed796809199fe6fbc9ef67d159
4
+ data.tar.gz: 881a6d6202ba4291ef62658a1e7af84bbc97d5f6bd2d72b29b58afa536448ac6
5
5
  SHA512:
6
- metadata.gz: 49953fa362c37a37b1057c568c1d347e7317a3b27793811516bd58209b346eff0781452e96e1e6ff67f5e799b0a2a0adaf52b86716d3efb252a3548b38875e6f
7
- data.tar.gz: a846acc0c69a305cd9e8b34ecb14f8e1dd6f44cbc1d75ae78f91df755754abc95287fdea719421799256e5037f13a8725dd1dd966bf436977caf6cc053c0ddd3
6
+ metadata.gz: 6054ee2734c1017ba7c66729299baad642a121350c44c9f109fd1fea0cf85626613900c10e62daf83f07626a54f9effb96f96dde96e654bd40f43b2e94d0b487
7
+ data.tar.gz: 334d3e03ffe18c7d9b60c565ba2a82b4d4c62c85095957390a659eccd2487bf9b32b66dd8517e17050661ccd82bfbf1b67a1a90aa66232cd3d1e5d6323e85f16
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.58.0 (2021-07-28)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.57.0 (2021-07-21)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
14
+ 1.56.0 (2021-07-07)
15
+ ------------------
16
+
17
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
18
+
19
+ 1.55.0 (2021-06-02)
20
+ ------------------
21
+
22
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
23
+
4
24
  1.54.0 (2021-05-20)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.54.0
1
+ 1.58.0
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.54.0'
73
+ GEM_VERSION = '1.58.0'
74
74
 
75
75
  end
@@ -288,8 +288,8 @@ module Aws::IAM
288
288
  # uses the default value of `false`. The result is that passwords do not
289
289
  # require at least one lowercase character.
290
290
  # @option options [Boolean] :allow_users_to_change_password
291
- # Allows all IAM users in your account to use the AWS Management Console
292
- # to change their own passwords. For more information, see [Letting IAM
291
+ # Allows all IAM users in your account to use the Management Console to
292
+ # change their own passwords. For more information, see [Letting IAM
293
293
  # users change their own passwords][1] in the *IAM User Guide*.
294
294
  #
295
295
  # If you do not specify a value for this parameter, then the operation
@@ -170,10 +170,10 @@ module Aws::IAM
170
170
  # @option options [required, String] :policy_document
171
171
  # The policy that grants an entity permission to assume the role.
172
172
  #
173
- # You must provide policies in JSON format in IAM. However, for AWS
173
+ # You must provide policies in JSON format in IAM. However, for
174
174
  # CloudFormation templates formatted in YAML, you can provide the policy
175
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
176
- # policy to JSON format before submitting it to IAM.
175
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
176
+ # to JSON format before submitting it to IAM.
177
177
  #
178
178
  # The [regex pattern][1] used to validate this parameter is a string of
179
179
  # characters consisting of the following:
@@ -376,10 +376,10 @@ module Aws::IAM
376
376
  # instance profile can contain only one role, and this quota cannot be
377
377
  # increased. You can remove the existing role and then add a different
378
378
  # role to an instance profile. You must then wait for the change to
379
- # appear across all of AWS because of [eventual consistency][1]. To
380
- # force the change, you must [disassociate the instance profile][2] and
381
- # then [associate the instance profile][3], or you can stop your
382
- # instance and then restart it.
379
+ # appear across all of Amazon Web Services because of [eventual
380
+ # consistency][1]. To force the change, you must [disassociate the
381
+ # instance profile][2] and then [associate the instance profile][3], or
382
+ # you can stop your instance and then restart it.
383
383
  #
384
384
  # <note markdown="1"> The caller of this operation must be granted the `PassRole` permission
385
385
  # on the IAM role by a permissions policy.
@@ -537,7 +537,7 @@ module Aws::IAM
537
537
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
538
538
  #
539
539
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
540
- # in the *AWS General Reference*.
540
+ # in the *Amazon Web Services General Reference*.
541
541
  #
542
542
  #
543
543
  #
@@ -611,7 +611,7 @@ module Aws::IAM
611
611
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
612
612
  #
613
613
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
614
- # in the *AWS General Reference*.
614
+ # in the *Amazon Web Services General Reference*.
615
615
  #
616
616
  #
617
617
  #
@@ -678,7 +678,7 @@ module Aws::IAM
678
678
  # The Amazon Resource Name (ARN) of the IAM policy you want to attach.
679
679
  #
680
680
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
681
- # in the *AWS General Reference*.
681
+ # in the *Amazon Web Services General Reference*.
682
682
  #
683
683
  #
684
684
  #
@@ -713,14 +713,15 @@ module Aws::IAM
713
713
  end
714
714
 
715
715
  # Changes the password of the IAM user who is calling this operation.
716
- # This operation can be performed using the AWS CLI, the AWS API, or the
717
- # **My Security Credentials** page in the AWS Management Console. The
718
- # AWS account root user password is not affected by this operation.
716
+ # This operation can be performed using the CLI, the Amazon Web Services
717
+ # API, or the **My Security Credentials** page in the Management
718
+ # Console. The account root user password is not affected by this
719
+ # operation.
719
720
  #
720
- # Use UpdateLoginProfile to use the AWS CLI, the AWS API, or the
721
- # **Users** page in the IAM console to change the password for any IAM
722
- # user. For more information about modifying passwords, see [Managing
723
- # passwords][1] in the *IAM User Guide*.
721
+ # Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
722
+ # the **Users** page in the IAM console to change the password for any
723
+ # IAM user. For more information about modifying passwords, see
724
+ # [Managing passwords][1] in the *IAM User Guide*.
724
725
  #
725
726
  #
726
727
  #
@@ -730,7 +731,7 @@ module Aws::IAM
730
731
  # The IAM user's current password.
731
732
  #
732
733
  # @option params [required, String] :new_password
733
- # The new password. The new password must conform to the AWS account's
734
+ # The new password. The new password must conform to the account's
734
735
  # password policy, if one exists.
735
736
  #
736
737
  # The [regex pattern][1] that is used to validate this parameter is a
@@ -739,8 +740,8 @@ module Aws::IAM
739
740
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
740
741
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
741
742
  # of these characters are valid in a password. However, many tools, such
742
- # as the AWS Management Console, might restrict the ability to type
743
- # certain characters because they have special meaning within that tool.
743
+ # as the Management Console, might restrict the ability to type certain
744
+ # characters because they have special meaning within that tool.
744
745
  #
745
746
  #
746
747
  #
@@ -774,21 +775,20 @@ module Aws::IAM
774
775
  req.send_request(options)
775
776
  end
776
777
 
777
- # Creates a new AWS secret access key and corresponding AWS access key
778
- # ID for the specified user. The default status for new keys is
779
- # `Active`.
778
+ # Creates a new Amazon Web Services secret access key and corresponding
779
+ # Amazon Web Services access key ID for the specified user. The default
780
+ # status for new keys is `Active`.
780
781
  #
781
782
  # If you do not specify a user name, IAM determines the user name
782
- # implicitly based on the AWS access key ID signing the request. This
783
- # operation works for access keys under the AWS account. Consequently,
784
- # you can use this operation to manage AWS account root user
785
- # credentials. This is true even if the AWS account has no associated
786
- # users.
783
+ # implicitly based on the Amazon Web Services access key ID signing the
784
+ # request. This operation works for access keys under the account.
785
+ # Consequently, you can use this operation to manage account root user
786
+ # credentials. This is true even if the account has no associated users.
787
787
  #
788
788
  # For information about quotas on the number of keys you can create, see
789
789
  # [IAM and STS quotas][1] in the *IAM User Guide*.
790
790
  #
791
- # To ensure the security of your AWS account, the secret access key is
791
+ # To ensure the security of your account, the secret access key is
792
792
  # accessible only during key and user creation. You must save the key
793
793
  # (for example, in a text file) if you want to be able to access it
794
794
  # again. If a secret key is lost, you can delete the access keys for the
@@ -857,9 +857,9 @@ module Aws::IAM
857
857
  req.send_request(options)
858
858
  end
859
859
 
860
- # Creates an alias for your AWS account. For information about using an
861
- # AWS account alias, see [Using an alias for your AWS account ID][1] in
862
- # the *IAM User Guide*.
860
+ # Creates an alias for your account. For information about using an
861
+ # account alias, see [Using an alias for your account ID][1] in the *IAM
862
+ # User Guide*.
863
863
  #
864
864
  #
865
865
  #
@@ -1125,12 +1125,13 @@ module Aws::IAM
1125
1125
  end
1126
1126
 
1127
1127
  # Creates a password for the specified IAM user. A password allows an
1128
- # IAM user to access AWS services through the AWS Management Console.
1128
+ # IAM user to access Amazon Web Services services through the Management
1129
+ # Console.
1129
1130
  #
1130
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
1131
- # console to create a password for any IAM user. Use ChangePassword to
1132
- # update your own existing password in the **My Security Credentials**
1133
- # page in the AWS Management Console.
1131
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
1132
+ # page in the IAM console to create a password for any IAM user. Use
1133
+ # ChangePassword to update your own existing password in the **My
1134
+ # Security Credentials** page in the Management Console.
1134
1135
  #
1135
1136
  # For more information about managing passwords, see [Managing
1136
1137
  # passwords][1] in the *IAM User Guide*.
@@ -1161,8 +1162,8 @@ module Aws::IAM
1161
1162
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
1162
1163
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
1163
1164
  # of these characters are valid in a password. However, many tools, such
1164
- # as the AWS Management Console, might restrict the ability to type
1165
- # certain characters because they have special meaning within that tool.
1165
+ # as the Management Console, might restrict the ability to type certain
1166
+ # characters because they have special meaning within that tool.
1166
1167
  #
1167
1168
  #
1168
1169
  #
@@ -1225,29 +1226,39 @@ module Aws::IAM
1225
1226
  #
1226
1227
  # The OIDC provider that you create with this operation can be used as a
1227
1228
  # principal in a role's trust policy. Such a policy establishes a trust
1228
- # relationship between AWS and the OIDC provider.
1229
+ # relationship between Amazon Web Services and the OIDC provider.
1229
1230
  #
1230
1231
  # If you are using an OIDC identity provider from Google, Facebook, or
1231
1232
  # Amazon Cognito, you don't need to create a separate IAM identity
1232
- # provider. These OIDC identity providers are already built-in to AWS
1233
- # and are available for your use. Instead, you can move directly to
1234
- # creating new roles using your identity provider. To learn more, see
1235
- # [Creating a role for web identity or OpenID connect federation][2] in
1236
- # the *IAM User Guide*.
1233
+ # provider. These OIDC identity providers are already built-in to Amazon
1234
+ # Web Services and are available for your use. Instead, you can move
1235
+ # directly to creating new roles using your identity provider. To learn
1236
+ # more, see [Creating a role for web identity or OpenID connect
1237
+ # federation][2] in the *IAM User Guide*.
1237
1238
  #
1238
1239
  # When you create the IAM OIDC provider, you specify the following:
1239
1240
  #
1240
1241
  # * The URL of the OIDC identity provider (IdP) to trust
1241
1242
  #
1242
1243
  # * A list of client IDs (also known as audiences) that identify the
1243
- # application or applications that are allowed to authenticate using
1244
- # the OIDC provider
1244
+ # application or applications allowed to authenticate using the OIDC
1245
+ # provider
1245
1246
  #
1246
1247
  # * A list of thumbprints of one or more server certificates that the
1247
1248
  # IdP uses
1248
1249
  #
1249
1250
  # You get all of this information from the OIDC IdP that you want to use
1250
- # to access AWS.
1251
+ # to access Amazon Web Services.
1252
+ #
1253
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1254
+ # providers (IdPs) through our library of trusted certificate
1255
+ # authorities (CAs) instead of using a certificate thumbprint to verify
1256
+ # your IdP server certificate. These OIDC IdPs include Google, and those
1257
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
1258
+ # endpoint. In these cases, your legacy thumbprint remains in your
1259
+ # configuration, but is no longer used for validation.
1260
+ #
1261
+ # </note>
1251
1262
  #
1252
1263
  # <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that
1253
1264
  # this operation creates. Therefore, it is best to limit access to the
@@ -1267,9 +1278,9 @@ module Aws::IAM
1267
1278
  # but query parameters are not. Typically the URL consists of only a
1268
1279
  # hostname, like `https://server.example.org` or `https://example.com`.
1269
1280
  #
1270
- # You cannot register the same provider multiple times in a single AWS
1281
+ # You cannot register the same provider multiple times in a single
1271
1282
  # account. If you try to submit a URL that has already been used for an
1272
- # OpenID Connect provider in the AWS account, you will get an error.
1283
+ # OpenID Connect provider in the account, you will get an error.
1273
1284
  #
1274
1285
  # @option params [Array<String>] :client_id_list
1275
1286
  # A list of client IDs (also known as audiences). When a mobile or web
@@ -1384,7 +1395,7 @@ module Aws::IAM
1384
1395
  req.send_request(options)
1385
1396
  end
1386
1397
 
1387
- # Creates a new managed policy for your AWS account.
1398
+ # Creates a new managed policy for your account.
1388
1399
  #
1389
1400
  # This operation creates a policy version with a version identifier of
1390
1401
  # `v1` and sets v1 as the policy's default version. For more
@@ -1435,12 +1446,20 @@ module Aws::IAM
1435
1446
  # The JSON policy document that you want to use as the content for the
1436
1447
  # new policy.
1437
1448
  #
1438
- # You must provide policies in JSON format in IAM. However, for AWS
1449
+ # You must provide policies in JSON format in IAM. However, for
1439
1450
  # CloudFormation templates formatted in YAML, you can provide the policy
1440
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1441
- # policy to JSON format before submitting it to IAM.
1451
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1452
+ # to JSON format before submitting it to IAM.
1442
1453
  #
1443
- # The [regex pattern][1] used to validate this parameter is a string of
1454
+ # The maximum length of the policy document that you can pass in this
1455
+ # operation, including whitespace, is listed below. To view the maximum
1456
+ # character counts of a managed policy with no whitespaces, see [IAM and
1457
+ # STS character quotas][1].
1458
+ #
1459
+ # To learn more about JSON policy grammar, see [Grammar of the IAM JSON
1460
+ # policy language][2] in the *IAM User Guide*.
1461
+ #
1462
+ # The [regex pattern][3] used to validate this parameter is a string of
1444
1463
  # characters consisting of the following:
1445
1464
  #
1446
1465
  # * Any printable ASCII character ranging from the space character
@@ -1454,7 +1473,9 @@ module Aws::IAM
1454
1473
  #
1455
1474
  #
1456
1475
  #
1457
- # [1]: http://wikipedia.org/wiki/regex
1476
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1477
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_grammar.html
1478
+ # [3]: http://wikipedia.org/wiki/regex
1458
1479
  #
1459
1480
  # @option params [String] :description
1460
1481
  # A friendly description of the policy.
@@ -1549,7 +1570,7 @@ module Aws::IAM
1549
1570
  # add a new version.
1550
1571
  #
1551
1572
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
1552
- # in the *AWS General Reference*.
1573
+ # in the *Amazon Web Services General Reference*.
1553
1574
  #
1554
1575
  #
1555
1576
  #
@@ -1559,12 +1580,17 @@ module Aws::IAM
1559
1580
  # The JSON policy document that you want to use as the content for this
1560
1581
  # new version of the policy.
1561
1582
  #
1562
- # You must provide policies in JSON format in IAM. However, for AWS
1583
+ # You must provide policies in JSON format in IAM. However, for
1563
1584
  # CloudFormation templates formatted in YAML, you can provide the policy
1564
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
1565
- # policy to JSON format before submitting it to IAM.
1585
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
1586
+ # to JSON format before submitting it to IAM.
1566
1587
  #
1567
- # The [regex pattern][1] used to validate this parameter is a string of
1588
+ # The maximum length of the policy document that you can pass in this
1589
+ # operation, including whitespace, is listed below. To view the maximum
1590
+ # character counts of a managed policy with no whitespaces, see [IAM and
1591
+ # STS character quotas][1].
1592
+ #
1593
+ # The [regex pattern][2] used to validate this parameter is a string of
1568
1594
  # characters consisting of the following:
1569
1595
  #
1570
1596
  # * Any printable ASCII character ranging from the space character
@@ -1578,7 +1604,8 @@ module Aws::IAM
1578
1604
  #
1579
1605
  #
1580
1606
  #
1581
- # [1]: http://wikipedia.org/wiki/regex
1607
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
1608
+ # [2]: http://wikipedia.org/wiki/regex
1582
1609
  #
1583
1610
  # @option params [Boolean] :set_as_default
1584
1611
  # Specifies whether to set this version as the policy's default
@@ -1623,10 +1650,10 @@ module Aws::IAM
1623
1650
  req.send_request(options)
1624
1651
  end
1625
1652
 
1626
- # Creates a new role for your AWS account. For more information about
1627
- # roles, see [IAM roles][1]. For information about quotas for role names
1628
- # and the number of roles you can create, see [IAM and STS quotas][2] in
1629
- # the *IAM User Guide*.
1653
+ # Creates a new role for your account. For more information about roles,
1654
+ # see [IAM roles][1]. For information about quotas for role names and
1655
+ # the number of roles you can create, see [IAM and STS quotas][2] in the
1656
+ # *IAM User Guide*.
1630
1657
  #
1631
1658
  #
1632
1659
  #
@@ -1664,10 +1691,9 @@ module Aws::IAM
1664
1691
  # permission to assume the role.
1665
1692
  #
1666
1693
  # In IAM, you must provide a JSON policy that has been converted to a
1667
- # string. However, for AWS CloudFormation templates formatted in YAML,
1668
- # you can provide the policy in JSON or YAML format. AWS CloudFormation
1669
- # always converts a YAML policy to JSON format before submitting it to
1670
- # IAM.
1694
+ # string. However, for CloudFormation templates formatted in YAML, you
1695
+ # can provide the policy in JSON or YAML format. CloudFormation always
1696
+ # converts a YAML policy to JSON format before submitting it to IAM.
1671
1697
  #
1672
1698
  # The [regex pattern][1] used to validate this parameter is a string of
1673
1699
  # characters consisting of the following:
@@ -1697,7 +1723,7 @@ module Aws::IAM
1697
1723
  # default maximum of one hour is applied. This setting can have a value
1698
1724
  # from 1 hour to 12 hours.
1699
1725
  #
1700
- # Anyone who assumes the role from the AWS CLI or API can use the
1726
+ # Anyone who assumes the role from the or API can use the
1701
1727
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
1702
1728
  # parameter to request a longer session. The `MaxSessionDuration`
1703
1729
  # setting determines the maximum duration that can be requested using
@@ -1810,8 +1836,8 @@ module Aws::IAM
1810
1836
  # used as a principal in an IAM role's trust policy. Such a policy can
1811
1837
  # enable federated users who sign in using the SAML IdP to assume the
1812
1838
  # role. You can create an IAM role that supports Web-based single
1813
- # sign-on (SSO) to the AWS Management Console or one that supports API
1814
- # access to AWS.
1839
+ # sign-on (SSO) to the Management Console or one that supports API
1840
+ # access to Amazon Web Services.
1815
1841
  #
1816
1842
  # When you create the SAML provider resource, you upload a SAML metadata
1817
1843
  # document that you get from your IdP. That document includes the
@@ -1825,8 +1851,8 @@ module Aws::IAM
1825
1851
  # </note>
1826
1852
  #
1827
1853
  # For more information, see [Enabling SAML 2.0 federated users to access
1828
- # the AWS Management Console][2] and [About SAML 2.0-based
1829
- # federation][3] in the *IAM User Guide*.
1854
+ # the Management Console][2] and [About SAML 2.0-based federation][3] in
1855
+ # the *IAM User Guide*.
1830
1856
  #
1831
1857
  #
1832
1858
  #
@@ -1911,33 +1937,35 @@ module Aws::IAM
1911
1937
  req.send_request(options)
1912
1938
  end
1913
1939
 
1914
- # Creates an IAM role that is linked to a specific AWS service. The
1915
- # service controls the attached policies and when the role can be
1916
- # deleted. This helps ensure that the service is not broken by an
1917
- # unexpectedly changed or deleted role, which could put your AWS
1918
- # resources into an unknown state. Allowing the service to control the
1919
- # role helps improve service stability and proper cleanup when a service
1920
- # and its role are no longer needed. For more information, see [Using
1921
- # service-linked roles][1] in the *IAM User Guide*.
1940
+ # Creates an IAM role that is linked to a specific Amazon Web Services
1941
+ # service. The service controls the attached policies and when the role
1942
+ # can be deleted. This helps ensure that the service is not broken by an
1943
+ # unexpectedly changed or deleted role, which could put your Amazon Web
1944
+ # Services resources into an unknown state. Allowing the service to
1945
+ # control the role helps improve service stability and proper cleanup
1946
+ # when a service and its role are no longer needed. For more
1947
+ # information, see [Using service-linked roles][1] in the *IAM User
1948
+ # Guide*.
1922
1949
  #
1923
1950
  # To attach a policy to this service-linked role, you must make the
1924
- # request using the AWS service that depends on this role.
1951
+ # request using the Amazon Web Services service that depends on this
1952
+ # role.
1925
1953
  #
1926
1954
  #
1927
1955
  #
1928
1956
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/using-service-linked-roles.html
1929
1957
  #
1930
1958
  # @option params [required, String] :aws_service_name
1931
- # The service principal for the AWS service to which this role is
1932
- # attached. You use a string similar to a URL but without the http:// in
1933
- # front. For example: `elasticbeanstalk.amazonaws.com`.
1959
+ # The service principal for the Amazon Web Services service to which
1960
+ # this role is attached. You use a string similar to a URL but without
1961
+ # the http:// in front. For example: `elasticbeanstalk.amazonaws.com`.
1934
1962
  #
1935
1963
  # Service principals are unique and case-sensitive. To find the exact
1936
- # service principal for your service-linked role, see [AWS services that
1937
- # work with IAM][1] in the *IAM User Guide*. Look for the services that
1938
- # have <b>Yes </b>in the **Service-Linked Role** column. Choose the
1939
- # **Yes** link to view the service-linked role documentation for that
1940
- # service.
1964
+ # service principal for your service-linked role, see [Amazon Web
1965
+ # Services services that work with IAM][1] in the *IAM User Guide*. Look
1966
+ # for the services that have <b>Yes </b>in the **Service-Linked Role**
1967
+ # column. Choose the **Yes** link to view the service-linked role
1968
+ # documentation for that service.
1941
1969
  #
1942
1970
  #
1943
1971
  #
@@ -2004,15 +2032,15 @@ module Aws::IAM
2004
2032
  # You can have a maximum of two sets of service-specific credentials for
2005
2033
  # each supported service per user.
2006
2034
  #
2007
- # You can create service-specific credentials for AWS CodeCommit and
2008
- # Amazon Keyspaces (for Apache Cassandra).
2035
+ # You can create service-specific credentials for CodeCommit and Amazon
2036
+ # Keyspaces (for Apache Cassandra).
2009
2037
  #
2010
2038
  # You can reset the password to a new service-generated value by calling
2011
2039
  # ResetServiceSpecificCredential.
2012
2040
  #
2013
2041
  # For more information about service-specific credentials, see [Using
2014
- # IAM with AWS CodeCommit: Git credentials, SSH keys, and AWS access
2015
- # keys][1] in the *IAM User Guide*.
2042
+ # IAM with CodeCommit: Git credentials, SSH keys, and Amazon Web
2043
+ # Services access keys][1] in the *IAM User Guide*.
2016
2044
  #
2017
2045
  #
2018
2046
  #
@@ -2034,9 +2062,9 @@ module Aws::IAM
2034
2062
  # [1]: http://wikipedia.org/wiki/regex
2035
2063
  #
2036
2064
  # @option params [required, String] :service_name
2037
- # The name of the AWS service that is to be associated with the
2038
- # credentials. The service you specify here is the only service that can
2039
- # be accessed using these credentials.
2065
+ # The name of the Amazon Web Services service that is to be associated
2066
+ # with the credentials. The service you specify here is the only service
2067
+ # that can be accessed using these credentials.
2040
2068
  #
2041
2069
  # @return [Types::CreateServiceSpecificCredentialResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2042
2070
  #
@@ -2068,7 +2096,7 @@ module Aws::IAM
2068
2096
  req.send_request(options)
2069
2097
  end
2070
2098
 
2071
- # Creates a new IAM user for your AWS account.
2099
+ # Creates a new IAM user for your account.
2072
2100
  #
2073
2101
  # For information about quotas for the number of IAM users you can
2074
2102
  # create, see [IAM and STS quotas][1] in the *IAM User Guide*.
@@ -2183,20 +2211,20 @@ module Aws::IAM
2183
2211
  req.send_request(options)
2184
2212
  end
2185
2213
 
2186
- # Creates a new virtual MFA device for the AWS account. After creating
2187
- # the virtual MFA, use EnableMFADevice to attach the MFA device to an
2188
- # IAM user. For more information about creating and working with virtual
2189
- # MFA devices, see [Using a virtual MFA device][1] in the *IAM User
2190
- # Guide*.
2214
+ # Creates a new virtual MFA device for the account. After creating the
2215
+ # virtual MFA, use EnableMFADevice to attach the MFA device to an IAM
2216
+ # user. For more information about creating and working with virtual MFA
2217
+ # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
2191
2218
  #
2192
2219
  # For information about the maximum number of MFA devices you can
2193
2220
  # create, see [IAM and STS quotas][2] in the *IAM User Guide*.
2194
2221
  #
2195
2222
  # The seed information contained in the QR code and the Base32 string
2196
2223
  # should be treated like any other secret access information. In other
2197
- # words, protect the seed information as you would your AWS access keys
2198
- # or your passwords. After you provision your virtual device, you should
2199
- # ensure that the information is destroyed following secure procedures.
2224
+ # words, protect the seed information as you would your Amazon Web
2225
+ # Services access keys or your passwords. After you provision your
2226
+ # virtual device, you should ensure that the information is destroyed
2227
+ # following secure procedures.
2200
2228
  #
2201
2229
  #
2202
2230
  #
@@ -2355,10 +2383,10 @@ module Aws::IAM
2355
2383
  # Deletes the access key pair associated with the specified IAM user.
2356
2384
  #
2357
2385
  # If you do not specify a user name, IAM determines the user name
2358
- # implicitly based on the AWS access key ID signing the request. This
2359
- # operation works for access keys under the AWS account. Consequently,
2360
- # you can use this operation to manage AWS account root user credentials
2361
- # even if the AWS account has no associated users.
2386
+ # implicitly based on the Amazon Web Services access key ID signing the
2387
+ # request. This operation works for access keys under the account.
2388
+ # Consequently, you can use this operation to manage account root user
2389
+ # credentials even if the account has no associated users.
2362
2390
  #
2363
2391
  # @option params [String] :user_name
2364
2392
  # The name of the user whose access key pair you want to delete.
@@ -2412,9 +2440,9 @@ module Aws::IAM
2412
2440
  req.send_request(options)
2413
2441
  end
2414
2442
 
2415
- # Deletes the specified AWS account alias. For information about using
2416
- # an AWS account alias, see [Using an alias for your AWS account ID][1]
2417
- # in the *IAM User Guide*.
2443
+ # Deletes the specified account alias. For information about using an
2444
+ # Amazon Web Services account alias, see [Using an alias for your
2445
+ # account ID][1] in the *IAM User Guide*.
2418
2446
  #
2419
2447
  #
2420
2448
  #
@@ -2458,8 +2486,7 @@ module Aws::IAM
2458
2486
  req.send_request(options)
2459
2487
  end
2460
2488
 
2461
- # Deletes the password policy for the AWS account. There are no
2462
- # parameters.
2489
+ # Deletes the password policy for the account. There are no parameters.
2463
2490
  #
2464
2491
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2465
2492
  #
@@ -2631,19 +2658,19 @@ module Aws::IAM
2631
2658
  end
2632
2659
 
2633
2660
  # Deletes the password for the specified IAM user, which terminates the
2634
- # user's ability to access AWS services through the AWS Management
2635
- # Console.
2661
+ # user's ability to access Amazon Web Services services through the
2662
+ # Management Console.
2636
2663
  #
2637
- # You can use the AWS CLI, the AWS API, or the **Users** page in the IAM
2638
- # console to delete a password for any IAM user. You can use
2639
- # ChangePassword to update, but not delete, your own password in the
2640
- # **My Security Credentials** page in the AWS Management Console.
2664
+ # You can use the CLI, the Amazon Web Services API, or the **Users**
2665
+ # page in the IAM console to delete a password for any IAM user. You can
2666
+ # use ChangePassword to update, but not delete, your own password in the
2667
+ # **My Security Credentials** page in the Management Console.
2641
2668
  #
2642
- # Deleting a user's password does not prevent a user from accessing AWS
2643
- # through the command line interface or the API. To prevent all user
2644
- # access, you must also either make any access keys inactive or delete
2645
- # them. For more information about making keys inactive or deleting
2646
- # them, see UpdateAccessKey and DeleteAccessKey.
2669
+ # Deleting a user's password does not prevent a user from accessing
2670
+ # Amazon Web Services through the command line interface or the API. To
2671
+ # prevent all user access, you must also either make any access keys
2672
+ # inactive or delete them. For more information about making keys
2673
+ # inactive or deleting them, see UpdateAccessKey and DeleteAccessKey.
2647
2674
  #
2648
2675
  # @option params [required, String] :user_name
2649
2676
  # The name of the user whose password you want to delete.
@@ -2748,7 +2775,7 @@ module Aws::IAM
2748
2775
  # The Amazon Resource Name (ARN) of the IAM policy you want to delete.
2749
2776
  #
2750
2777
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2751
- # in the *AWS General Reference*.
2778
+ # in the *Amazon Web Services General Reference*.
2752
2779
  #
2753
2780
  #
2754
2781
  #
@@ -2790,7 +2817,7 @@ module Aws::IAM
2790
2817
  # to delete a version.
2791
2818
  #
2792
2819
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
2793
- # in the *AWS General Reference*.
2820
+ # in the *Amazon Web Services General Reference*.
2794
2821
  #
2795
2822
  #
2796
2823
  #
@@ -3011,10 +3038,10 @@ module Aws::IAM
3011
3038
  # Deletes the specified SSH public key.
3012
3039
  #
3013
3040
  # The SSH public key deleted by this operation is used only for
3014
- # authenticating the associated IAM user to an AWS CodeCommit
3015
- # repository. For more information about using SSH keys to authenticate
3016
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
3017
- # connections][1] in the *AWS CodeCommit User Guide*.
3041
+ # authenticating the associated IAM user to an CodeCommit repository.
3042
+ # For more information about using SSH keys to authenticate to an
3043
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
3044
+ # in the *CodeCommit User Guide*.
3018
3045
  #
3019
3046
  #
3020
3047
  #
@@ -3065,8 +3092,8 @@ module Aws::IAM
3065
3092
  #
3066
3093
  # For more information about working with server certificates, see
3067
3094
  # [Working with server certificates][1] in the *IAM User Guide*. This
3068
- # topic also includes a list of AWS services that can use the server
3069
- # certificates that you manage with IAM.
3095
+ # topic also includes a list of Amazon Web Services services that can
3096
+ # use the server certificates that you manage with IAM.
3070
3097
  #
3071
3098
  # If you are using a server certificate with Elastic Load Balancing,
3072
3099
  # deleting the certificate could have implications for your application.
@@ -3128,10 +3155,12 @@ module Aws::IAM
3128
3155
  # first remove those resources from the linked service and then submit
3129
3156
  # the deletion request again. Resources are specific to the service that
3130
3157
  # is linked to the role. For more information about removing resources
3131
- # from a service, see the [AWS documentation][1] for your service.
3158
+ # from a service, see the [Amazon Web Services documentation][1] for
3159
+ # your service.
3132
3160
  #
3133
3161
  # For more information about service-linked roles, see [Roles terms and
3134
- # concepts: AWS service-linked role][2] in the *IAM User Guide*.
3162
+ # concepts: Amazon Web Services service-linked role][2] in the *IAM User
3163
+ # Guide*.
3135
3164
  #
3136
3165
  #
3137
3166
  #
@@ -3213,10 +3242,10 @@ module Aws::IAM
3213
3242
  # Deletes a signing certificate associated with the specified IAM user.
3214
3243
  #
3215
3244
  # If you do not specify a user name, IAM determines the user name
3216
- # implicitly based on the AWS access key ID signing the request. This
3217
- # operation works for access keys under the AWS account. Consequently,
3218
- # you can use this operation to manage AWS account root user credentials
3219
- # even if the AWS account has no associated IAM users.
3245
+ # implicitly based on the Amazon Web Services access key ID signing the
3246
+ # request. This operation works for access keys under the account.
3247
+ # Consequently, you can use this operation to manage account root user
3248
+ # credentials even if the account has no associated IAM users.
3220
3249
  #
3221
3250
  # @option params [String] :user_name
3222
3251
  # The name of the user the signing certificate belongs to.
@@ -3269,11 +3298,11 @@ module Aws::IAM
3269
3298
  req.send_request(options)
3270
3299
  end
3271
3300
 
3272
- # Deletes the specified IAM user. Unlike the AWS Management Console,
3273
- # when you delete a user programmatically, you must delete the items
3274
- # attached to the user manually, or the deletion fails. For more
3275
- # information, see [Deleting an IAM user][1]. Before attempting to
3276
- # delete a user, remove the following items:
3301
+ # Deletes the specified IAM user. Unlike the Management Console, when
3302
+ # you delete a user programmatically, you must delete the items attached
3303
+ # to the user manually, or the deletion fails. For more information, see
3304
+ # [Deleting an IAM user][1]. Before attempting to delete a user, remove
3305
+ # the following items:
3277
3306
  #
3278
3307
  # * Password (DeleteLoginProfile)
3279
3308
  #
@@ -3502,7 +3531,7 @@ module Aws::IAM
3502
3531
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3503
3532
  #
3504
3533
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3505
- # in the *AWS General Reference*.
3534
+ # in the *Amazon Web Services General Reference*.
3506
3535
  #
3507
3536
  #
3508
3537
  #
@@ -3553,7 +3582,7 @@ module Aws::IAM
3553
3582
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3554
3583
  #
3555
3584
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3556
- # in the *AWS General Reference*.
3585
+ # in the *Amazon Web Services General Reference*.
3557
3586
  #
3558
3587
  #
3559
3588
  #
@@ -3604,7 +3633,7 @@ module Aws::IAM
3604
3633
  # The Amazon Resource Name (ARN) of the IAM policy you want to detach.
3605
3634
  #
3606
3635
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
3607
- # in the *AWS General Reference*.
3636
+ # in the *Amazon Web Services General Reference*.
3608
3637
  #
3609
3638
  #
3610
3639
  #
@@ -3709,9 +3738,9 @@ module Aws::IAM
3709
3738
  req.send_request(options)
3710
3739
  end
3711
3740
 
3712
- # Generates a credential report for the AWS account. For more
3713
- # information about the credential report, see [Getting credential
3714
- # reports][1] in the *IAM User Guide*.
3741
+ # Generates a credential report for the account. For more information
3742
+ # about the credential report, see [Getting credential reports][1] in
3743
+ # the *IAM User Guide*.
3715
3744
  #
3716
3745
  #
3717
3746
  #
@@ -3736,18 +3765,17 @@ module Aws::IAM
3736
3765
  req.send_request(options)
3737
3766
  end
3738
3767
 
3739
- # Generates a report for service last accessed data for AWS
3740
- # Organizations. You can generate a report for any entities
3741
- # (organization root, organizational unit, or account) or policies in
3742
- # your organization.
3768
+ # Generates a report for service last accessed data for Organizations.
3769
+ # You can generate a report for any entities (organization root,
3770
+ # organizational unit, or account) or policies in your organization.
3743
3771
  #
3744
- # To call this operation, you must be signed in using your AWS
3745
- # Organizations management account credentials. You can use your
3746
- # long-term IAM user or root user credentials, or temporary credentials
3747
- # from assuming an IAM role. SCPs must be enabled for your organization
3748
- # root. You must have the required IAM and AWS Organizations
3749
- # permissions. For more information, see [Refining permissions using
3750
- # service last accessed data][1] in the *IAM User Guide*.
3772
+ # To call this operation, you must be signed in using your Organizations
3773
+ # management account credentials. You can use your long-term IAM user or
3774
+ # root user credentials, or temporary credentials from assuming an IAM
3775
+ # role. SCPs must be enabled for your organization root. You must have
3776
+ # the required IAM and Organizations permissions. For more information,
3777
+ # see [Refining permissions using service last accessed data][1] in the
3778
+ # *IAM User Guide*.
3751
3779
  #
3752
3780
  # You can generate a service last accessed data report for entities by
3753
3781
  # specifying only the entity's path. This data includes a list of
@@ -3755,8 +3783,8 @@ module Aws::IAM
3755
3783
  # apply to the entity.
3756
3784
  #
3757
3785
  # You can generate a service last accessed data report for a policy by
3758
- # specifying an entity's path and an optional AWS Organizations policy
3759
- # ID. This data includes a list of services that are allowed by the
3786
+ # specifying an entity's path and an optional Organizations policy ID.
3787
+ # This data includes a list of services that are allowed by the
3760
3788
  # specified SCP.
3761
3789
  #
3762
3790
  # For each service in both report types, the data includes the most
@@ -3766,15 +3794,16 @@ module Aws::IAM
3766
3794
  # troubleshooting, and supported Regions see [Reducing permissions using
3767
3795
  # service last accessed data][1] in the *IAM User Guide*.
3768
3796
  #
3769
- # The data includes all attempts to access AWS, not just the successful
3770
- # ones. This includes all attempts that were made using the AWS
3771
- # Management Console, the AWS API through any of the SDKs, or any of the
3772
- # command line tools. An unexpected entry in the service last accessed
3773
- # data does not mean that an account has been compromised, because the
3774
- # request might have been denied. Refer to your CloudTrail logs as the
3775
- # authoritative source for information about all API calls and whether
3776
- # they were successful or denied access. For more information,
3777
- # see [Logging IAM events with CloudTrail][2] in the *IAM User Guide*.
3797
+ # The data includes all attempts to access Amazon Web Services, not just
3798
+ # the successful ones. This includes all attempts that were made using
3799
+ # the Management Console, the Amazon Web Services API through any of the
3800
+ # SDKs, or any of the command line tools. An unexpected entry in the
3801
+ # service last accessed data does not mean that an account has been
3802
+ # compromised, because the request might have been denied. Refer to your
3803
+ # CloudTrail logs as the authoritative source for information about all
3804
+ # API calls and whether they were successful or denied access. For more
3805
+ # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3806
+ # User Guide*.
3778
3807
  #
3779
3808
  # This operation returns a `JobId`. Use this parameter in the `
3780
3809
  # GetOrganizationsAccessReport ` operation to check the status of the
@@ -3784,9 +3813,9 @@ module Aws::IAM
3784
3813
  # you can retrieve the report.
3785
3814
  #
3786
3815
  # To generate a service last accessed data report for entities, specify
3787
- # an entity path without specifying the optional AWS Organizations
3788
- # policy ID. The type of entity that you specify determines the data
3789
- # returned in the report.
3816
+ # an entity path without specifying the optional Organizations policy
3817
+ # ID. The type of entity that you specify determines the data returned
3818
+ # in the report.
3790
3819
  #
3791
3820
  # * **Root** – When you specify the organizations root as the entity,
3792
3821
  # the resulting report lists all of the services allowed by SCPs that
@@ -3802,9 +3831,9 @@ module Aws::IAM
3802
3831
  # not limited by SCPs.
3803
3832
  #
3804
3833
  # * **management account** – When you specify the management account,
3805
- # the resulting report lists all AWS services, because the management
3806
- # account is not limited by SCPs. For each service, the report
3807
- # includes data for only the management account.
3834
+ # the resulting report lists all Amazon Web Services services, because
3835
+ # the management account is not limited by SCPs. For each service, the
3836
+ # report includes data for only the management account.
3808
3837
  #
3809
3838
  # * **Account** – When you specify another account as the entity, the
3810
3839
  # resulting report lists all of the services allowed by SCPs that are
@@ -3812,9 +3841,8 @@ module Aws::IAM
3812
3841
  # report includes data for only the specified account.
3813
3842
  #
3814
3843
  # To generate a service last accessed data report for policies, specify
3815
- # an entity path and the optional AWS Organizations policy ID. The type
3816
- # of entity that you specify determines the data returned for each
3817
- # service.
3844
+ # an entity path and the optional Organizations policy ID. The type of
3845
+ # entity that you specify determines the data returned for each service.
3818
3846
  #
3819
3847
  # * **Root** – When you specify the root entity and a policy ID, the
3820
3848
  # resulting report lists all of the services that are allowed by the
@@ -3836,10 +3864,10 @@ module Aws::IAM
3836
3864
  # the report will return a list of services with no data.
3837
3865
  #
3838
3866
  # * **management account** – When you specify the management account,
3839
- # the resulting report lists all AWS services, because the management
3840
- # account is not limited by SCPs. If you specify a policy ID in the
3841
- # CLI or API, the policy is ignored. For each service, the report
3842
- # includes data for only the management account.
3867
+ # the resulting report lists all Amazon Web Services services, because
3868
+ # the management account is not limited by SCPs. If you specify a
3869
+ # policy ID in the CLI or API, the policy is ignored. For each
3870
+ # service, the report includes data for only the management account.
3843
3871
  #
3844
3872
  # * **Account** – When you specify another account entity and a policy
3845
3873
  # ID, the resulting report lists all of the services that are allowed
@@ -3868,21 +3896,21 @@ module Aws::IAM
3868
3896
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics
3869
3897
  #
3870
3898
  # @option params [required, String] :entity_path
3871
- # The path of the AWS Organizations entity (root, OU, or account). You
3872
- # can build an entity path using the known structure of your
3873
- # organization. For example, assume that your account ID is
3874
- # `123456789012` and its parent OU ID is `ou-rge0-awsabcde`. The
3875
- # organization root ID is `r-f6g7h8i9j0example` and your organization ID
3876
- # is `o-a1b2c3d4e5`. Your entity path is
3899
+ # The path of the Organizations entity (root, OU, or account). You can
3900
+ # build an entity path using the known structure of your organization.
3901
+ # For example, assume that your account ID is `123456789012` and its
3902
+ # parent OU ID is `ou-rge0-awsabcde`. The organization root ID is
3903
+ # `r-f6g7h8i9j0example` and your organization ID is `o-a1b2c3d4e5`. Your
3904
+ # entity path is
3877
3905
  # `o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-rge0-awsabcde/123456789012`.
3878
3906
  #
3879
3907
  # @option params [String] :organizations_policy_id
3880
- # The identifier of the AWS Organizations service control policy (SCP).
3881
- # This parameter is optional.
3908
+ # The identifier of the Organizations service control policy (SCP). This
3909
+ # parameter is optional.
3882
3910
  #
3883
3911
  # This ID is used to generate information about when an account
3884
- # principal that is limited by the SCP attempted to access an AWS
3885
- # service.
3912
+ # principal that is limited by the SCP attempted to access an Amazon Web
3913
+ # Services service.
3886
3914
  #
3887
3915
  # @return [Types::GenerateOrganizationsAccessReportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3888
3916
  #
@@ -3924,31 +3952,31 @@ module Aws::IAM
3924
3952
 
3925
3953
  # Generates a report that includes details about when an IAM resource
3926
3954
  # (user, group, role, or policy) was last used in an attempt to access
3927
- # AWS services. Recent activity usually appears within four hours. IAM
3928
- # reports activity for the last 365 days, or less if your Region began
3929
- # supporting this feature within the last year. For more information,
3930
- # see [Regions where data is tracked][1].
3931
- #
3932
- # The service last accessed data includes all attempts to access an AWS
3933
- # API, not just the successful ones. This includes all attempts that
3934
- # were made using the AWS Management Console, the AWS API through any of
3935
- # the SDKs, or any of the command line tools. An unexpected entry in the
3936
- # service last accessed data does not mean that your account has been
3937
- # compromised, because the request might have been denied. Refer to your
3938
- # CloudTrail logs as the authoritative source for information about all
3939
- # API calls and whether they were successful or denied access. For more
3940
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3941
- # User Guide*.
3955
+ # Amazon Web Services services. Recent activity usually appears within
3956
+ # four hours. IAM reports activity for the last 365 days, or less if
3957
+ # your Region began supporting this feature within the last year. For
3958
+ # more information, see [Regions where data is tracked][1].
3959
+ #
3960
+ # The service last accessed data includes all attempts to access an
3961
+ # Amazon Web Services API, not just the successful ones. This includes
3962
+ # all attempts that were made using the Management Console, the Amazon
3963
+ # Web Services API through any of the SDKs, or any of the command line
3964
+ # tools. An unexpected entry in the service last accessed data does not
3965
+ # mean that your account has been compromised, because the request might
3966
+ # have been denied. Refer to your CloudTrail logs as the authoritative
3967
+ # source for information about all API calls and whether they were
3968
+ # successful or denied access. For more information, see [Logging IAM
3969
+ # events with CloudTrail][2] in the *IAM User Guide*.
3942
3970
  #
3943
3971
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
3944
3972
  # Use this parameter in the following operations to retrieve the
3945
3973
  # following details from your report:
3946
3974
  #
3947
3975
  # * GetServiceLastAccessedDetails – Use this operation for users,
3948
- # groups, roles, or policies to list every AWS service that the
3949
- # resource could access using permissions policies. For each service,
3950
- # the response includes information about the most recent access
3951
- # attempt.
3976
+ # groups, roles, or policies to list every Amazon Web Services service
3977
+ # that the resource could access using permissions policies. For each
3978
+ # service, the response includes information about the most recent
3979
+ # access attempt.
3952
3980
  #
3953
3981
  # The `JobId` returned by `GenerateServiceLastAccessedDetail` must be
3954
3982
  # used by the same role within a session, or by the same user when
@@ -3956,8 +3984,8 @@ module Aws::IAM
3956
3984
  #
3957
3985
  # * GetServiceLastAccessedDetailsWithEntities – Use this operation for
3958
3986
  # groups and policies to list information about the associated
3959
- # entities (users or roles) that attempted to access a specific AWS
3960
- # service.
3987
+ # entities (users or roles) that attempted to access a specific Amazon
3988
+ # Web Services service.
3961
3989
  #
3962
3990
  # To check the status of the `GenerateServiceLastAccessedDetails`
3963
3991
  # request, use the `JobId` parameter in the same operations and test the
@@ -3970,10 +3998,10 @@ module Aws::IAM
3970
3998
  # <note markdown="1"> Service last accessed data does not use other policy types when
3971
3999
  # determining whether a resource could access a service. These other
3972
4000
  # policy types include resource-based policies, access control lists,
3973
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
3974
- # assume role policies. It only applies permissions policy logic. For
3975
- # more about the evaluation of policy types, see [Evaluating
3976
- # policies][3] in the *IAM User Guide*.
4001
+ # Organizations policies, IAM permissions boundaries, and STS assume
4002
+ # role policies. It only applies permissions policy logic. For more
4003
+ # about the evaluation of policy types, see [Evaluating policies][3] in
4004
+ # the *IAM User Guide*.
3977
4005
  #
3978
4006
  # </note>
3979
4007
  #
@@ -3991,7 +4019,7 @@ module Aws::IAM
3991
4019
  # @option params [required, String] :arn
3992
4020
  # The ARN of the IAM resource (user, group, role, or managed policy)
3993
4021
  # used to generate information about when the resource was last used in
3994
- # an attempt to access an AWS service.
4022
+ # an attempt to access an Amazon Web Services service.
3995
4023
  #
3996
4024
  # @option params [String] :granularity
3997
4025
  # The level of detail that you want to generate. You can specify whether
@@ -4041,8 +4069,8 @@ module Aws::IAM
4041
4069
 
4042
4070
  # Retrieves information about when the specified access key was last
4043
4071
  # used. The information includes the date and time of last use, along
4044
- # with the AWS service and Region that were specified in the last
4045
- # request made with that key.
4072
+ # with the Amazon Web Services service and Region that were specified in
4073
+ # the last request made with that key.
4046
4074
  #
4047
4075
  # @option params [required, String] :access_key_id
4048
4076
  # The identifier of an access key.
@@ -4083,9 +4111,10 @@ module Aws::IAM
4083
4111
  end
4084
4112
 
4085
4113
  # Retrieves information about all IAM users, groups, roles, and policies
4086
- # in your AWS account, including their relationships to one another. Use
4087
- # this operation to obtain a snapshot of the configuration of IAM
4088
- # permissions (users, groups, roles, and policies) in your account.
4114
+ # in your Amazon Web Services account, including their relationships to
4115
+ # one another. Use this operation to obtain a snapshot of the
4116
+ # configuration of IAM permissions (users, groups, roles, and policies)
4117
+ # in your account.
4089
4118
  #
4090
4119
  # <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
4091
4120
  # [RFC 3986][1]. You can use a URL decoding method to convert the policy
@@ -4255,7 +4284,7 @@ module Aws::IAM
4255
4284
  req.send_request(options)
4256
4285
  end
4257
4286
 
4258
- # Retrieves the password policy for the AWS account. This tells you the
4287
+ # Retrieves the password policy for the account. This tells you the
4259
4288
  # complexity requirements and mandatory rotation periods for the IAM
4260
4289
  # user passwords in your account. For more information about using a
4261
4290
  # password policy, see [Managing an IAM password policy][1].
@@ -4314,8 +4343,8 @@ module Aws::IAM
4314
4343
  req.send_request(options)
4315
4344
  end
4316
4345
 
4317
- # Retrieves information about IAM entity usage and IAM quotas in the AWS
4318
- # account.
4346
+ # Retrieves information about IAM entity usage and IAM quotas in the
4347
+ # Amazon Web Services account.
4319
4348
  #
4320
4349
  # For information about IAM quotas, see [IAM and STS quotas][1] in the
4321
4350
  # *IAM User Guide*.
@@ -4387,14 +4416,14 @@ module Aws::IAM
4387
4416
  # To get the context keys from policies associated with an IAM user,
4388
4417
  # group, or role, use GetContextKeysForPrincipalPolicy.
4389
4418
  #
4390
- # Context keys are variables maintained by AWS and its services that
4391
- # provide details about the context of an API query request. Context
4392
- # keys can be evaluated by testing against a value specified in an IAM
4393
- # policy. Use `GetContextKeysForCustomPolicy` to understand what key
4394
- # names and values you must supply when you call SimulateCustomPolicy.
4395
- # Note that all parameters are shown in unencoded form here for clarity
4396
- # but must be URL encoded to be included as a part of a real HTML
4397
- # request.
4419
+ # Context keys are variables maintained by Amazon Web Services and its
4420
+ # services that provide details about the context of an API query
4421
+ # request. Context keys can be evaluated by testing against a value
4422
+ # specified in an IAM policy. Use `GetContextKeysForCustomPolicy` to
4423
+ # understand what key names and values you must supply when you call
4424
+ # SimulateCustomPolicy. Note that all parameters are shown in unencoded
4425
+ # form here for clarity but must be URL encoded to be included as a part
4426
+ # of a real HTML request.
4398
4427
  #
4399
4428
  # @option params [required, Array<String>] :policy_input_list
4400
4429
  # A list of policies for which you want the list of context keys
@@ -4456,11 +4485,12 @@ module Aws::IAM
4456
4485
  # permissions, then consider allowing them to use
4457
4486
  # GetContextKeysForCustomPolicy instead.
4458
4487
  #
4459
- # Context keys are variables maintained by AWS and its services that
4460
- # provide details about the context of an API query request. Context
4461
- # keys can be evaluated by testing against a value in an IAM policy. Use
4462
- # GetContextKeysForPrincipalPolicy to understand what key names and
4463
- # values you must supply when you call SimulatePrincipalPolicy.
4488
+ # Context keys are variables maintained by Amazon Web Services and its
4489
+ # services that provide details about the context of an API query
4490
+ # request. Context keys can be evaluated by testing against a value in
4491
+ # an IAM policy. Use GetContextKeysForPrincipalPolicy to understand what
4492
+ # key names and values you must supply when you call
4493
+ # SimulatePrincipalPolicy.
4464
4494
  #
4465
4495
  # @option params [required, String] :policy_source_arn
4466
4496
  # The ARN of a user, group, or role whose policies contain the context
@@ -4473,7 +4503,7 @@ module Aws::IAM
4473
4503
  # URL encoded to be included as a part of a real HTML request.
4474
4504
  #
4475
4505
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4476
- # in the *AWS General Reference*.
4506
+ # in the *Amazon Web Services General Reference*.
4477
4507
  #
4478
4508
  #
4479
4509
  #
@@ -4524,9 +4554,9 @@ module Aws::IAM
4524
4554
  req.send_request(options)
4525
4555
  end
4526
4556
 
4527
- # Retrieves a credential report for the AWS account. For more
4528
- # information about the credential report, see [Getting credential
4529
- # reports][1] in the *IAM User Guide*.
4557
+ # Retrieves a credential report for the account. For more information
4558
+ # about the credential report, see [Getting credential reports][1] in
4559
+ # the *IAM User Guide*.
4530
4560
  #
4531
4561
  #
4532
4562
  #
@@ -4811,9 +4841,19 @@ module Aws::IAM
4811
4841
  req.send_request(options)
4812
4842
  end
4813
4843
 
4814
- # Retrieves the user name and password creation date for the specified
4815
- # IAM user. If the user has not been assigned a password, the operation
4816
- # returns a 404 (`NoSuchEntity`) error.
4844
+ # Retrieves the user name for the specified IAM user. A login profile is
4845
+ # created when you create a password for the user to access the
4846
+ # Management Console. If the user does not exist or does not have a
4847
+ # password, the operation returns a 404 (`NoSuchEntity`) error.
4848
+ #
4849
+ # If you create an IAM user with access to the console, the `CreateDate`
4850
+ # reflects the date you created the initial password for the user.
4851
+ #
4852
+ # If you create an IAM user with programmatic access, and then later add
4853
+ # a password for the user to access the Management Console, the
4854
+ # `CreateDate` reflects the initial password creation date. A user with
4855
+ # programmatic access does not have a login profile unless you create a
4856
+ # password for the user to access the Management Console.
4817
4857
  #
4818
4858
  # @option params [required, String] :user_name
4819
4859
  # The name of the user whose login profile you want to retrieve.
@@ -4878,7 +4918,7 @@ module Aws::IAM
4878
4918
  # resource ARNs by using the ListOpenIDConnectProviders operation.
4879
4919
  #
4880
4920
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
4881
- # in the *AWS General Reference*.
4921
+ # in the *Amazon Web Services General Reference*.
4882
4922
  #
4883
4923
  #
4884
4924
  #
@@ -4919,10 +4959,10 @@ module Aws::IAM
4919
4959
  req.send_request(options)
4920
4960
  end
4921
4961
 
4922
- # Retrieves the service last accessed data report for AWS Organizations
4923
- # that was previously generated using the `
4924
- # GenerateOrganizationsAccessReport ` operation. This operation
4925
- # retrieves the status of your report job and the report contents.
4962
+ # Retrieves the service last accessed data report for Organizations that
4963
+ # was previously generated using the ` GenerateOrganizationsAccessReport
4964
+ # ` operation. This operation retrieves the status of your report job
4965
+ # and the report contents.
4926
4966
  #
4927
4967
  # Depending on the parameters that you passed when you generated the
4928
4968
  # report, the data returned could include different information. For
@@ -5089,7 +5129,7 @@ module Aws::IAM
5089
5129
  # information about.
5090
5130
  #
5091
5131
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5092
- # in the *AWS General Reference*.
5132
+ # in the *Amazon Web Services General Reference*.
5093
5133
  #
5094
5134
  #
5095
5135
  #
@@ -5171,7 +5211,7 @@ module Aws::IAM
5171
5211
  # information about.
5172
5212
  #
5173
5213
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5174
- # in the *AWS General Reference*.
5214
+ # in the *Amazon Web Services General Reference*.
5175
5215
  #
5176
5216
  #
5177
5217
  #
@@ -5410,7 +5450,7 @@ module Aws::IAM
5410
5450
  # IAM to get information about.
5411
5451
  #
5412
5452
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
5413
- # in the *AWS General Reference*.
5453
+ # in the *Amazon Web Services General Reference*.
5414
5454
  #
5415
5455
  #
5416
5456
  #
@@ -5451,10 +5491,10 @@ module Aws::IAM
5451
5491
  # key.
5452
5492
  #
5453
5493
  # The SSH public key retrieved by this operation is used only for
5454
- # authenticating the associated IAM user to an AWS CodeCommit
5455
- # repository. For more information about using SSH keys to authenticate
5456
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
5457
- # connections][1] in the *AWS CodeCommit User Guide*.
5494
+ # authenticating the associated IAM user to an CodeCommit repository.
5495
+ # For more information about using SSH keys to authenticate to an
5496
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
5497
+ # in the *CodeCommit User Guide*.
5458
5498
  #
5459
5499
  #
5460
5500
  #
@@ -5523,8 +5563,8 @@ module Aws::IAM
5523
5563
  #
5524
5564
  # For more information about working with server certificates, see
5525
5565
  # [Working with server certificates][1] in the *IAM User Guide*. This
5526
- # topic includes a list of AWS services that can use the server
5527
- # certificates that you manage with IAM.
5566
+ # topic includes a list of Amazon Web Services services that can use the
5567
+ # server certificates that you manage with IAM.
5528
5568
  #
5529
5569
  #
5530
5570
  #
@@ -5580,17 +5620,17 @@ module Aws::IAM
5580
5620
  # `GenerateServiceLastAccessedDetails` operation. You can use the
5581
5621
  # `JobId` parameter in `GetServiceLastAccessedDetails` to retrieve the
5582
5622
  # status of your report job. When the report is complete, you can
5583
- # retrieve the generated report. The report includes a list of AWS
5584
- # services that the resource (user, group, role, or managed policy) can
5585
- # access.
5623
+ # retrieve the generated report. The report includes a list of Amazon
5624
+ # Web Services services that the resource (user, group, role, or managed
5625
+ # policy) can access.
5586
5626
  #
5587
5627
  # <note markdown="1"> Service last accessed data does not use other policy types when
5588
5628
  # determining whether a resource could access a service. These other
5589
5629
  # policy types include resource-based policies, access control lists,
5590
- # AWS Organizations policies, IAM permissions boundaries, and AWS STS
5591
- # assume role policies. It only applies permissions policy logic. For
5592
- # more about the evaluation of policy types, see [Evaluating
5593
- # policies][1] in the *IAM User Guide*.
5630
+ # Organizations policies, IAM permissions boundaries, and STS assume
5631
+ # role policies. It only applies permissions policy logic. For more
5632
+ # about the evaluation of policy types, see [Evaluating policies][1] in
5633
+ # the *IAM User Guide*.
5594
5634
  #
5595
5635
  # </note>
5596
5636
  #
@@ -5769,16 +5809,17 @@ module Aws::IAM
5769
5809
  # `GenerateServiceLastAccessedDetails` operation.
5770
5810
  #
5771
5811
  # @option params [required, String] :service_namespace
5772
- # The service namespace for an AWS service. Provide the service
5773
- # namespace to learn when the IAM entity last attempted to access the
5774
- # specified service.
5812
+ # The service namespace for an Amazon Web Services service. Provide the
5813
+ # service namespace to learn when the IAM entity last attempted to
5814
+ # access the specified service.
5775
5815
  #
5776
5816
  # To learn the service namespace for a service, see [Actions, resources,
5777
- # and condition keys for AWS services][1] in the *IAM User Guide*.
5778
- # Choose the name of the service to view details for that service. In
5779
- # the first paragraph, find the service prefix. For example, `(service
5780
- # prefix: a4b)`. For more information about service namespaces, see [AWS
5781
- # service namespaces][2] in the *AWS General Reference*.
5817
+ # and condition keys for Amazon Web Services services][1] in the *IAM
5818
+ # User Guide*. Choose the name of the service to view details for that
5819
+ # service. In the first paragraph, find the service prefix. For example,
5820
+ # `(service prefix: a4b)`. For more information about service
5821
+ # namespaces, see [Amazon Web Services service namespaces][2] in
5822
+ # the *Amazon Web Services General Reference*.
5782
5823
  #
5783
5824
  #
5784
5825
  #
@@ -5931,8 +5972,8 @@ module Aws::IAM
5931
5972
  # user's creation date, path, unique ID, and ARN.
5932
5973
  #
5933
5974
  # If you do not specify a user name, IAM determines the user name
5934
- # implicitly based on the AWS access key ID used to sign the request to
5935
- # this operation.
5975
+ # implicitly based on the Amazon Web Services access key ID used to sign
5976
+ # the request to this operation.
5936
5977
  #
5937
5978
  # @option params [String] :user_name
5938
5979
  # The name of the user to get information about.
@@ -6089,12 +6130,12 @@ module Aws::IAM
6089
6130
  # paginate the results using the `MaxItems` and `Marker` parameters.
6090
6131
  #
6091
6132
  # If the `UserName` field is not specified, the user name is determined
6092
- # implicitly based on the AWS access key ID used to sign the request.
6093
- # This operation works for access keys under the AWS account.
6094
- # Consequently, you can use this operation to manage AWS account root
6095
- # user credentials even if the AWS account has no associated users.
6133
+ # implicitly based on the Amazon Web Services access key ID used to sign
6134
+ # the request. This operation works for access keys under the account.
6135
+ # Consequently, you can use this operation to manage account root user
6136
+ # credentials even if the account has no associated users.
6096
6137
  #
6097
- # <note markdown="1"> To ensure the security of your AWS account, the secret access key is
6138
+ # <note markdown="1"> To ensure the security of your account, the secret access key is
6098
6139
  # accessible only during key and user creation.
6099
6140
  #
6100
6141
  # </note>
@@ -6190,9 +6231,9 @@ module Aws::IAM
6190
6231
  req.send_request(options)
6191
6232
  end
6192
6233
 
6193
- # Lists the account alias associated with the AWS account (Note: you can
6194
- # have only one). For information about using an AWS account alias, see
6195
- # [Using an alias for your AWS account ID][1] in the *IAM User Guide*.
6234
+ # Lists the account alias associated with the account (Note: you can
6235
+ # have only one). For information about using an account alias, see
6236
+ # [Using an alias for your account ID][1] in the *IAM User Guide*.
6196
6237
  #
6197
6238
  #
6198
6239
  #
@@ -6571,7 +6612,7 @@ module Aws::IAM
6571
6612
  # the versions.
6572
6613
  #
6573
6614
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
6574
- # in the *AWS General Reference*.
6615
+ # in the *Amazon Web Services General Reference*.
6575
6616
  #
6576
6617
  #
6577
6618
  #
@@ -6989,10 +7030,10 @@ module Aws::IAM
6989
7030
  # @option params [required, String] :instance_profile_name
6990
7031
  # The name of the IAM instance profile whose tags you want to see.
6991
7032
  #
6992
- # This parameter accepts (through its [regex pattern][1]) a string of
6993
- # characters that consist of upper and lowercase alphanumeric characters
7033
+ # This parameter allows (through its [regex pattern][1]) a string of
7034
+ # characters consisting of upper and lowercase alphanumeric characters
6994
7035
  # with no spaces. You can also include any of the following characters:
6995
- # =,.@-
7036
+ # \_+=,.@-
6996
7037
  #
6997
7038
  #
6998
7039
  #
@@ -7005,16 +7046,15 @@ module Aws::IAM
7005
7046
  # to indicate where the next call should start.
7006
7047
  #
7007
7048
  # @option params [Integer] :max_items
7008
- # (Optional) Use this only when paginating results to indicate the
7009
- # maximum number of items that you want in the response. If additional
7010
- # items exist beyond the maximum that you specify, the `IsTruncated`
7011
- # response element is `true`.
7049
+ # Use this only when paginating results to indicate the maximum number
7050
+ # of items you want in the response. If additional items exist beyond
7051
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7012
7052
  #
7013
- # If you do not include this parameter, it defaults to 100. Note that
7014
- # IAM might return fewer results, even when more results are available.
7015
- # In that case, the `IsTruncated` response element returns `true`, and
7016
- # `Marker` contains a value to include in the subsequent call that tells
7017
- # the service where to continue from.
7053
+ # If you do not include this parameter, the number of items defaults to
7054
+ # 100. Note that IAM might return fewer results, even when there are
7055
+ # more results available. In that case, the `IsTruncated` response
7056
+ # element returns `true`, and `Marker` contains a value to include in
7057
+ # the subsequent call that tells the service where to continue from.
7018
7058
  #
7019
7059
  # @return [Types::ListInstanceProfileTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7020
7060
  #
@@ -7266,10 +7306,10 @@ module Aws::IAM
7266
7306
  # want to see. For virtual MFA devices, the serial number is the same as
7267
7307
  # the ARN.
7268
7308
  #
7269
- # This parameter accepts (through its [regex pattern][1]) a string of
7270
- # characters that consist of upper and lowercase alphanumeric characters
7309
+ # This parameter allows (through its [regex pattern][1]) a string of
7310
+ # characters consisting of upper and lowercase alphanumeric characters
7271
7311
  # with no spaces. You can also include any of the following characters:
7272
- # =,.@-
7312
+ # \_+=,.@-
7273
7313
  #
7274
7314
  #
7275
7315
  #
@@ -7282,16 +7322,15 @@ module Aws::IAM
7282
7322
  # to indicate where the next call should start.
7283
7323
  #
7284
7324
  # @option params [Integer] :max_items
7285
- # (Optional) Use this only when paginating results to indicate the
7286
- # maximum number of items that you want in the response. If additional
7287
- # items exist beyond the maximum that you specify, the `IsTruncated`
7288
- # response element is `true`.
7325
+ # Use this only when paginating results to indicate the maximum number
7326
+ # of items you want in the response. If additional items exist beyond
7327
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7289
7328
  #
7290
- # If you do not include this parameter, it defaults to 100. Note that
7291
- # IAM might return fewer results, even when more results are available.
7292
- # In that case, the `IsTruncated` response element returns `true`, and
7293
- # `Marker` contains a value to include in the subsequent call that tells
7294
- # the service where to continue from.
7329
+ # If you do not include this parameter, the number of items defaults to
7330
+ # 100. Note that IAM might return fewer results, even when there are
7331
+ # more results available. In that case, the `IsTruncated` response
7332
+ # element returns `true`, and `Marker` contains a value to include in
7333
+ # the subsequent call that tells the service where to continue from.
7295
7334
  #
7296
7335
  # @return [Types::ListMFADeviceTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7297
7336
  #
@@ -7327,8 +7366,8 @@ module Aws::IAM
7327
7366
  # Lists the MFA devices for an IAM user. If the request includes a IAM
7328
7367
  # user name, then this operation lists all the MFA devices associated
7329
7368
  # with the specified user. If you do not specify a user name, IAM
7330
- # determines the user name implicitly based on the AWS access key ID
7331
- # signing the request for this operation.
7369
+ # determines the user name implicitly based on the Amazon Web Services
7370
+ # access key ID signing the request for this operation.
7332
7371
  #
7333
7372
  # You can paginate the results using the `MaxItems` and `Marker`
7334
7373
  # parameters.
@@ -7413,10 +7452,10 @@ module Aws::IAM
7413
7452
  # The ARN of the OpenID Connect (OIDC) identity provider whose tags you
7414
7453
  # want to see.
7415
7454
  #
7416
- # This parameter accepts (through its [regex pattern][1]) a string of
7417
- # characters that consist of upper and lowercase alphanumeric characters
7455
+ # This parameter allows (through its [regex pattern][1]) a string of
7456
+ # characters consisting of upper and lowercase alphanumeric characters
7418
7457
  # with no spaces. You can also include any of the following characters:
7419
- # =,.@-
7458
+ # \_+=,.@-
7420
7459
  #
7421
7460
  #
7422
7461
  #
@@ -7429,16 +7468,15 @@ module Aws::IAM
7429
7468
  # to indicate where the next call should start.
7430
7469
  #
7431
7470
  # @option params [Integer] :max_items
7432
- # (Optional) Use this only when paginating results to indicate the
7433
- # maximum number of items that you want in the response. If additional
7434
- # items exist beyond the maximum that you specify, the `IsTruncated`
7435
- # response element is `true`.
7471
+ # Use this only when paginating results to indicate the maximum number
7472
+ # of items you want in the response. If additional items exist beyond
7473
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7436
7474
  #
7437
- # If you do not include this parameter, it defaults to 100. Note that
7438
- # IAM might return fewer results, even when more results are available.
7439
- # In that case, the `IsTruncated` response element returns `true`, and
7440
- # `Marker` contains a value to include in the subsequent call that tells
7441
- # the service where to continue from.
7475
+ # If you do not include this parameter, the number of items defaults to
7476
+ # 100. Note that IAM might return fewer results, even when there are
7477
+ # more results available. In that case, the `IsTruncated` response
7478
+ # element returns `true`, and `Marker` contains a value to include in
7479
+ # the subsequent call that tells the service where to continue from.
7442
7480
  #
7443
7481
  # @return [Types::ListOpenIDConnectProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7444
7482
  #
@@ -7472,7 +7510,7 @@ module Aws::IAM
7472
7510
  end
7473
7511
 
7474
7512
  # Lists information about the IAM OpenID Connect (OIDC) provider
7475
- # resource objects defined in the AWS account.
7513
+ # resource objects defined in the account.
7476
7514
  #
7477
7515
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7478
7516
  # attributes for the resource. For example, this operation does not
@@ -7500,15 +7538,15 @@ module Aws::IAM
7500
7538
  req.send_request(options)
7501
7539
  end
7502
7540
 
7503
- # Lists all the managed policies that are available in your AWS account,
7504
- # including your own customer-defined managed policies and all AWS
7505
- # managed policies.
7541
+ # Lists all the managed policies that are available in your account,
7542
+ # including your own customer-defined managed policies and all Amazon
7543
+ # Web Services managed policies.
7506
7544
  #
7507
7545
  # You can filter the list of policies that is returned using the
7508
7546
  # optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
7509
- # example, to list only the customer managed policies in your AWS
7510
- # account, set `Scope` to `Local`. To list only AWS managed policies,
7511
- # set `Scope` to `AWS`.
7547
+ # example, to list only the customer managed policies in your Amazon Web
7548
+ # Services account, set `Scope` to `Local`. To list only Amazon Web
7549
+ # Services managed policies, set `Scope` to `AWS`.
7512
7550
  #
7513
7551
  # You can paginate the results using the `MaxItems` and `Marker`
7514
7552
  # parameters.
@@ -7531,9 +7569,9 @@ module Aws::IAM
7531
7569
  # @option params [String] :scope
7532
7570
  # The scope to use for filtering the results.
7533
7571
  #
7534
- # To list only AWS managed policies, set `Scope` to `AWS`. To list only
7535
- # the customer managed policies in your AWS account, set `Scope` to
7536
- # `Local`.
7572
+ # To list only Amazon Web Services managed policies, set `Scope` to
7573
+ # `AWS`. To list only the customer managed policies in your account, set
7574
+ # `Scope` to `Local`.
7537
7575
  #
7538
7576
  # This parameter is optional. If it is not included, or if it is set to
7539
7577
  # `All`, all policies are returned.
@@ -7641,11 +7679,10 @@ module Aws::IAM
7641
7679
  #
7642
7680
  # <note markdown="1"> This operation does not use other policy types when determining
7643
7681
  # whether a resource could access a service. These other policy types
7644
- # include resource-based policies, access control lists, AWS
7645
- # Organizations policies, IAM permissions boundaries, and AWS STS assume
7646
- # role policies. It only applies permissions policy logic. For more
7647
- # about the evaluation of policy types, see [Evaluating policies][1] in
7648
- # the *IAM User Guide*.
7682
+ # include resource-based policies, access control lists, Organizations
7683
+ # policies, IAM permissions boundaries, and STS assume role policies. It
7684
+ # only applies permissions policy logic. For more about the evaluation
7685
+ # of policy types, see [Evaluating policies][1] in the *IAM User Guide*.
7649
7686
  #
7650
7687
  # </note>
7651
7688
  #
@@ -7691,15 +7728,16 @@ module Aws::IAM
7691
7728
  # want to list.
7692
7729
  #
7693
7730
  # @option params [required, Array<String>] :service_namespaces
7694
- # The service namespace for the AWS services whose policies you want to
7695
- # list.
7731
+ # The service namespace for the Amazon Web Services services whose
7732
+ # policies you want to list.
7696
7733
  #
7697
7734
  # To learn the service namespace for a service, see [Actions, resources,
7698
- # and condition keys for AWS services][1] in the *IAM User Guide*.
7699
- # Choose the name of the service to view details for that service. In
7700
- # the first paragraph, find the service prefix. For example, `(service
7701
- # prefix: a4b)`. For more information about service namespaces, see [AWS
7702
- # service namespaces][2] in the *AWS General Reference*.
7735
+ # and condition keys for Amazon Web Services services][1] in the *IAM
7736
+ # User Guide*. Choose the name of the service to view details for that
7737
+ # service. In the first paragraph, find the service prefix. For example,
7738
+ # `(service prefix: a4b)`. For more information about service
7739
+ # namespaces, see [Amazon Web Services service namespaces][2] in
7740
+ # the *Amazon Web Services General Reference*.
7703
7741
  #
7704
7742
  #
7705
7743
  #
@@ -7800,10 +7838,10 @@ module Aws::IAM
7800
7838
  # @option params [required, String] :policy_arn
7801
7839
  # The ARN of the IAM customer managed policy whose tags you want to see.
7802
7840
  #
7803
- # This parameter accepts (through its [regex pattern][1]) a string of
7804
- # characters that consist of upper and lowercase alphanumeric characters
7841
+ # This parameter allows (through its [regex pattern][1]) a string of
7842
+ # characters consisting of upper and lowercase alphanumeric characters
7805
7843
  # with no spaces. You can also include any of the following characters:
7806
- # =,.@-
7844
+ # \_+=,.@-
7807
7845
  #
7808
7846
  #
7809
7847
  #
@@ -7816,16 +7854,15 @@ module Aws::IAM
7816
7854
  # to indicate where the next call should start.
7817
7855
  #
7818
7856
  # @option params [Integer] :max_items
7819
- # (Optional) Use this only when paginating results to indicate the
7820
- # maximum number of items that you want in the response. If additional
7821
- # items exist beyond the maximum that you specify, the `IsTruncated`
7822
- # response element is `true`.
7857
+ # Use this only when paginating results to indicate the maximum number
7858
+ # of items you want in the response. If additional items exist beyond
7859
+ # the maximum you specify, the `IsTruncated` response element is `true`.
7823
7860
  #
7824
- # If you do not include this parameter, it defaults to 100. Note that
7825
- # IAM might return fewer results, even when more results are available.
7826
- # In that case, the `IsTruncated` response element returns `true`, and
7827
- # `Marker` contains a value to include in the subsequent call that tells
7828
- # the service where to continue from.
7861
+ # If you do not include this parameter, the number of items defaults to
7862
+ # 100. Note that IAM might return fewer results, even when there are
7863
+ # more results available. In that case, the `IsTruncated` response
7864
+ # element returns `true`, and `Marker` contains a value to include in
7865
+ # the subsequent call that tells the service where to continue from.
7829
7866
  #
7830
7867
  # @return [Types::ListPolicyTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
7831
7868
  #
@@ -7874,7 +7911,7 @@ module Aws::IAM
7874
7911
  # the versions.
7875
7912
  #
7876
7913
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
7877
- # in the *AWS General Reference*.
7914
+ # in the *Amazon Web Services General Reference*.
7878
7915
  #
7879
7916
  #
7880
7917
  #
@@ -8036,16 +8073,15 @@ module Aws::IAM
8036
8073
  # to indicate where the next call should start.
8037
8074
  #
8038
8075
  # @option params [Integer] :max_items
8039
- # (Optional) Use this only when paginating results to indicate the
8040
- # maximum number of items that you want in the response. If additional
8041
- # items exist beyond the maximum that you specify, the `IsTruncated`
8042
- # response element is `true`.
8076
+ # Use this only when paginating results to indicate the maximum number
8077
+ # of items you want in the response. If additional items exist beyond
8078
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8043
8079
  #
8044
- # If you do not include this parameter, it defaults to 100. Note that
8045
- # IAM might return fewer results, even when more results are available.
8046
- # In that case, the `IsTruncated` response element returns `true`, and
8047
- # `Marker` contains a value to include in the subsequent call that tells
8048
- # the service where to continue from.
8080
+ # If you do not include this parameter, the number of items defaults to
8081
+ # 100. Note that IAM might return fewer results, even when there are
8082
+ # more results available. In that case, the `IsTruncated` response
8083
+ # element returns `true`, and `Marker` contains a value to include in
8084
+ # the subsequent call that tells the service where to continue from.
8049
8085
  #
8050
8086
  # @return [Types::ListRoleTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8051
8087
  #
@@ -8217,10 +8253,10 @@ module Aws::IAM
8217
8253
  # The ARN of the Security Assertion Markup Language (SAML) identity
8218
8254
  # provider whose tags you want to see.
8219
8255
  #
8220
- # This parameter accepts (through its [regex pattern][1]) a string of
8221
- # characters that consist of upper and lowercase alphanumeric characters
8256
+ # This parameter allows (through its [regex pattern][1]) a string of
8257
+ # characters consisting of upper and lowercase alphanumeric characters
8222
8258
  # with no spaces. You can also include any of the following characters:
8223
- # =,.@-
8259
+ # \_+=,.@-
8224
8260
  #
8225
8261
  #
8226
8262
  #
@@ -8233,16 +8269,15 @@ module Aws::IAM
8233
8269
  # to indicate where the next call should start.
8234
8270
  #
8235
8271
  # @option params [Integer] :max_items
8236
- # (Optional) Use this only when paginating results to indicate the
8237
- # maximum number of items that you want in the response. If additional
8238
- # items exist beyond the maximum that you specify, the `IsTruncated`
8239
- # response element is `true`.
8272
+ # Use this only when paginating results to indicate the maximum number
8273
+ # of items you want in the response. If additional items exist beyond
8274
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8240
8275
  #
8241
- # If you do not include this parameter, it defaults to 100. Note that
8242
- # IAM might return fewer results, even when more results are available.
8243
- # In that case, the `IsTruncated` response element returns `true`, and
8244
- # `Marker` contains a value to include in the subsequent call that tells
8245
- # the service where to continue from.
8276
+ # If you do not include this parameter, the number of items defaults to
8277
+ # 100. Note that IAM might return fewer results, even when there are
8278
+ # more results available. In that case, the `IsTruncated` response
8279
+ # element returns `true`, and `Marker` contains a value to include in
8280
+ # the subsequent call that tells the service where to continue from.
8246
8281
  #
8247
8282
  # @return [Types::ListSAMLProviderTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8248
8283
  #
@@ -8313,10 +8348,10 @@ module Aws::IAM
8313
8348
  # list.
8314
8349
  #
8315
8350
  # The SSH public keys returned by this operation are used only for
8316
- # authenticating the IAM user to an AWS CodeCommit repository. For more
8317
- # information about using SSH keys to authenticate to an AWS CodeCommit
8318
- # repository, see [Set up AWS CodeCommit for SSH connections][1] in the
8319
- # *AWS CodeCommit User Guide*.
8351
+ # authenticating the IAM user to an CodeCommit repository. For more
8352
+ # information about using SSH keys to authenticate to an CodeCommit
8353
+ # repository, see [Set up CodeCommit for SSH connections][1] in the
8354
+ # *CodeCommit User Guide*.
8320
8355
  #
8321
8356
  # Although each user is limited to a small number of keys, you can still
8322
8357
  # paginate the results using the `MaxItems` and `Marker` parameters.
@@ -8328,7 +8363,7 @@ module Aws::IAM
8328
8363
  # @option params [String] :user_name
8329
8364
  # The name of the IAM user to list SSH public keys for. If none is
8330
8365
  # specified, the `UserName` field is determined implicitly based on the
8331
- # AWS access key used to sign the request.
8366
+ # Amazon Web Services access key used to sign the request.
8332
8367
  #
8333
8368
  # This parameter allows (through its [regex pattern][1]) a string of
8334
8369
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8396,11 +8431,11 @@ module Aws::IAM
8396
8431
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
8397
8432
  # User Guide*.
8398
8433
  #
8399
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
8400
- # (ACM), we recommend that you don't use IAM server certificates.
8401
- # Instead, use ACM to provision, manage, and deploy your server
8402
- # certificates. For more information about IAM server certificates,
8403
- # [Working with server certificates][2] in the *IAM User Guide*.
8434
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
8435
+ # we recommend that you don't use IAM server certificates. Instead, use
8436
+ # ACM to provision, manage, and deploy your server certificates. For
8437
+ # more information about IAM server certificates, [Working with server
8438
+ # certificates][2] in the *IAM User Guide*.
8404
8439
  #
8405
8440
  # </note>
8406
8441
  #
@@ -8412,10 +8447,10 @@ module Aws::IAM
8412
8447
  # @option params [required, String] :server_certificate_name
8413
8448
  # The name of the IAM server certificate whose tags you want to see.
8414
8449
  #
8415
- # This parameter accepts (through its [regex pattern][1]) a string of
8416
- # characters that consist of upper and lowercase alphanumeric characters
8450
+ # This parameter allows (through its [regex pattern][1]) a string of
8451
+ # characters consisting of upper and lowercase alphanumeric characters
8417
8452
  # with no spaces. You can also include any of the following characters:
8418
- # =,.@-
8453
+ # \_+=,.@-
8419
8454
  #
8420
8455
  #
8421
8456
  #
@@ -8428,16 +8463,15 @@ module Aws::IAM
8428
8463
  # to indicate where the next call should start.
8429
8464
  #
8430
8465
  # @option params [Integer] :max_items
8431
- # (Optional) Use this only when paginating results to indicate the
8432
- # maximum number of items that you want in the response. If additional
8433
- # items exist beyond the maximum that you specify, the `IsTruncated`
8434
- # response element is `true`.
8466
+ # Use this only when paginating results to indicate the maximum number
8467
+ # of items you want in the response. If additional items exist beyond
8468
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8435
8469
  #
8436
- # If you do not include this parameter, it defaults to 100. Note that
8437
- # IAM might return fewer results, even when more results are available.
8438
- # In that case, the `IsTruncated` response element returns `true`, and
8439
- # `Marker` contains a value to include in the subsequent call that tells
8440
- # the service where to continue from.
8470
+ # If you do not include this parameter, the number of items defaults to
8471
+ # 100. Note that IAM might return fewer results, even when there are
8472
+ # more results available. In that case, the `IsTruncated` response
8473
+ # element returns `true`, and `Marker` contains a value to include in
8474
+ # the subsequent call that tells the service where to continue from.
8441
8475
  #
8442
8476
  # @return [Types::ListServerCertificateTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8443
8477
  #
@@ -8478,8 +8512,8 @@ module Aws::IAM
8478
8512
  #
8479
8513
  # For more information about working with server certificates, see
8480
8514
  # [Working with server certificates][1] in the *IAM User Guide*. This
8481
- # topic also includes a list of AWS services that can use the server
8482
- # certificates that you manage with IAM.
8515
+ # topic also includes a list of Amazon Web Services services that can
8516
+ # use the server certificates that you manage with IAM.
8483
8517
  #
8484
8518
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8485
8519
  # attributes for the resource. For example, this operation does not
@@ -8570,8 +8604,8 @@ module Aws::IAM
8570
8604
  # empty list. The service-specific credentials returned by this
8571
8605
  # operation are used only for authenticating the IAM user to a specific
8572
8606
  # service. For more information about using service-specific credentials
8573
- # to authenticate to an AWS service, see [Set up service-specific
8574
- # credentials][1] in the AWS CodeCommit User Guide.
8607
+ # to authenticate to an Amazon Web Services service, see [Set up
8608
+ # service-specific credentials][1] in the CodeCommit User Guide.
8575
8609
  #
8576
8610
  #
8577
8611
  #
@@ -8592,9 +8626,9 @@ module Aws::IAM
8592
8626
  # [1]: http://wikipedia.org/wiki/regex
8593
8627
  #
8594
8628
  # @option params [String] :service_name
8595
- # Filters the returned results to only those for the specified AWS
8596
- # service. If not specified, then AWS returns service-specific
8597
- # credentials for all services.
8629
+ # Filters the returned results to only those for the specified Amazon
8630
+ # Web Services service. If not specified, then Amazon Web Services
8631
+ # returns service-specific credentials for all services.
8598
8632
  #
8599
8633
  # @return [Types::ListServiceSpecificCredentialsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8600
8634
  #
@@ -8635,11 +8669,11 @@ module Aws::IAM
8635
8669
  # and `Marker` parameters.
8636
8670
  #
8637
8671
  # If the `UserName` field is not specified, the user name is determined
8638
- # implicitly based on the AWS access key ID used to sign the request for
8639
- # this operation. This operation works for access keys under the AWS
8640
- # account. Consequently, you can use this operation to manage AWS
8641
- # account root user credentials even if the AWS account has no
8642
- # associated users.
8672
+ # implicitly based on the Amazon Web Services access key ID used to sign
8673
+ # the request for this operation. This operation works for access keys
8674
+ # under the account. Consequently, you can use this operation to manage
8675
+ # account root user credentials even if the account has no associated
8676
+ # users.
8643
8677
  #
8644
8678
  # @option params [String] :user_name
8645
8679
  # The name of the IAM user whose signing certificates you want to
@@ -8817,10 +8851,10 @@ module Aws::IAM
8817
8851
  # @option params [required, String] :user_name
8818
8852
  # The name of the IAM user whose tags you want to see.
8819
8853
  #
8820
- # This parameter accepts (through its [regex pattern][1]) a string of
8821
- # characters that consist of upper and lowercase alphanumeric characters
8854
+ # This parameter allows (through its [regex pattern][1]) a string of
8855
+ # characters consisting of upper and lowercase alphanumeric characters
8822
8856
  # with no spaces. You can also include any of the following characters:
8823
- # =,.@-
8857
+ # \_+=,.@-
8824
8858
  #
8825
8859
  #
8826
8860
  #
@@ -8833,16 +8867,15 @@ module Aws::IAM
8833
8867
  # to indicate where the next call should start.
8834
8868
  #
8835
8869
  # @option params [Integer] :max_items
8836
- # (Optional) Use this only when paginating results to indicate the
8837
- # maximum number of items that you want in the response. If additional
8838
- # items exist beyond the maximum that you specify, the `IsTruncated`
8839
- # response element is `true`.
8870
+ # Use this only when paginating results to indicate the maximum number
8871
+ # of items you want in the response. If additional items exist beyond
8872
+ # the maximum you specify, the `IsTruncated` response element is `true`.
8840
8873
  #
8841
- # If you do not include this parameter, it defaults to 100. Note that
8842
- # IAM might return fewer results, even when more results are available.
8843
- # In that case, the `IsTruncated` response element returns `true`, and
8844
- # `Marker` contains a value to include in the subsequent call that tells
8845
- # the service where to continue from.
8874
+ # If you do not include this parameter, the number of items defaults to
8875
+ # 100. Note that IAM might return fewer results, even when there are
8876
+ # more results available. In that case, the `IsTruncated` response
8877
+ # element returns `true`, and `Marker` contains a value to include in
8878
+ # the subsequent call that tells the service where to continue from.
8846
8879
  #
8847
8880
  # @return [Types::ListUserTagsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8848
8881
  #
@@ -8902,8 +8935,8 @@ module Aws::IAM
8902
8935
  end
8903
8936
 
8904
8937
  # Lists the IAM users that have the specified path prefix. If no path
8905
- # prefix is specified, the operation returns all users in the AWS
8906
- # account. If there are none, the operation returns an empty list.
8938
+ # prefix is specified, the operation returns all users in the account.
8939
+ # If there are none, the operation returns an empty list.
8907
8940
  #
8908
8941
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8909
8942
  # attributes for the resource. For example, this operation does not
@@ -9021,7 +9054,7 @@ module Aws::IAM
9021
9054
  req.send_request(options)
9022
9055
  end
9023
9056
 
9024
- # Lists the virtual MFA devices defined in the AWS account by assignment
9057
+ # Lists the virtual MFA devices defined in the account by assignment
9025
9058
  # status. If you do not specify an assignment status, the operation
9026
9059
  # returns a list of all virtual MFA devices. Assignment status can be
9027
9060
  # `Assigned`, `Unassigned`, or `Any`.
@@ -9180,10 +9213,10 @@ module Aws::IAM
9180
9213
  # @option params [required, String] :policy_document
9181
9214
  # The policy document.
9182
9215
  #
9183
- # You must provide policies in JSON format in IAM. However, for AWS
9216
+ # You must provide policies in JSON format in IAM. However, for
9184
9217
  # CloudFormation templates formatted in YAML, you can provide the policy
9185
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9186
- # policy to JSON format before submitting it to IAM.
9218
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9219
+ # to JSON format before submitting it to = IAM.
9187
9220
  #
9188
9221
  # The [regex pattern][1] used to validate this parameter is a string of
9189
9222
  # characters consisting of the following:
@@ -9232,11 +9265,11 @@ module Aws::IAM
9232
9265
  end
9233
9266
 
9234
9267
  # Adds or updates the policy that is specified as the IAM role's
9235
- # permissions boundary. You can use an AWS managed policy or a customer
9236
- # managed policy to set the boundary for a role. Use the boundary to
9237
- # control the maximum permissions that the role can have. Setting a
9238
- # permissions boundary is an advanced feature that can affect the
9239
- # permissions for the role.
9268
+ # permissions boundary. You can use an Amazon Web Services managed
9269
+ # policy or a customer managed policy to set the boundary for a role.
9270
+ # Use the boundary to control the maximum permissions that the role can
9271
+ # have. Setting a permissions boundary is an advanced feature that can
9272
+ # affect the permissions for the role.
9240
9273
  #
9241
9274
  # You cannot set the boundary for a service-linked role.
9242
9275
  #
@@ -9335,10 +9368,10 @@ module Aws::IAM
9335
9368
  # @option params [required, String] :policy_document
9336
9369
  # The policy document.
9337
9370
  #
9338
- # You must provide policies in JSON format in IAM. However, for AWS
9371
+ # You must provide policies in JSON format in IAM. However, for
9339
9372
  # CloudFormation templates formatted in YAML, you can provide the policy
9340
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9341
- # policy to JSON format before submitting it to IAM.
9373
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9374
+ # to JSON format before submitting it to IAM.
9342
9375
  #
9343
9376
  # The [regex pattern][1] used to validate this parameter is a string of
9344
9377
  # characters consisting of the following:
@@ -9387,11 +9420,11 @@ module Aws::IAM
9387
9420
  end
9388
9421
 
9389
9422
  # Adds or updates the policy that is specified as the IAM user's
9390
- # permissions boundary. You can use an AWS managed policy or a customer
9391
- # managed policy to set the boundary for a user. Use the boundary to
9392
- # control the maximum permissions that the user can have. Setting a
9393
- # permissions boundary is an advanced feature that can affect the
9394
- # permissions for the user.
9423
+ # permissions boundary. You can use an Amazon Web Services managed
9424
+ # policy or a customer managed policy to set the boundary for a user.
9425
+ # Use the boundary to control the maximum permissions that the user can
9426
+ # have. Setting a permissions boundary is an advanced feature that can
9427
+ # affect the permissions for the user.
9395
9428
  #
9396
9429
  # Policies that are used as permissions boundaries do not provide
9397
9430
  # permissions. You must also attach a permissions policy to the user. To
@@ -9480,10 +9513,10 @@ module Aws::IAM
9480
9513
  # @option params [required, String] :policy_document
9481
9514
  # The policy document.
9482
9515
  #
9483
- # You must provide policies in JSON format in IAM. However, for AWS
9516
+ # You must provide policies in JSON format in IAM. However, for
9484
9517
  # CloudFormation templates formatted in YAML, you can provide the policy
9485
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
9486
- # policy to JSON format before submitting it to IAM.
9518
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
9519
+ # to JSON format before submitting it to IAM.
9487
9520
  #
9488
9521
  # The [regex pattern][1] used to validate this parameter is a string of
9489
9522
  # characters consisting of the following:
@@ -9544,7 +9577,7 @@ module Aws::IAM
9544
9577
  # using the ListOpenIDConnectProviders operation.
9545
9578
  #
9546
9579
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9547
- # in the *AWS General Reference*.
9580
+ # in the *Amazon Web Services General Reference*.
9548
9581
  #
9549
9582
  #
9550
9583
  #
@@ -9697,9 +9730,10 @@ module Aws::IAM
9697
9730
  end
9698
9731
 
9699
9732
  # Resets the password for a service-specific credential. The new
9700
- # password is AWS generated and cryptographically strong. It cannot be
9701
- # configured by the user. Resetting the password immediately invalidates
9702
- # the previous password associated with this user.
9733
+ # password is Amazon Web Services generated and cryptographically
9734
+ # strong. It cannot be configured by the user. Resetting the password
9735
+ # immediately invalidates the previous password associated with this
9736
+ # user.
9703
9737
  #
9704
9738
  # @option params [String] :user_name
9705
9739
  # The name of the IAM user associated with the service-specific
@@ -9757,7 +9791,7 @@ module Aws::IAM
9757
9791
  end
9758
9792
 
9759
9793
  # Synchronizes the specified MFA device with its IAM resource object on
9760
- # the AWS servers.
9794
+ # the Amazon Web Services servers.
9761
9795
  #
9762
9796
  # For more information about creating and working with virtual MFA
9763
9797
  # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
@@ -9839,7 +9873,7 @@ module Aws::IAM
9839
9873
  # you want to set.
9840
9874
  #
9841
9875
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
9842
- # in the *AWS General Reference*.
9876
+ # in the *Amazon Web Services General Reference*.
9843
9877
  #
9844
9878
  #
9845
9879
  #
@@ -9874,25 +9908,25 @@ module Aws::IAM
9874
9908
  end
9875
9909
 
9876
9910
  # Sets the specified version of the global endpoint token as the token
9877
- # version used for the AWS account.
9911
+ # version used for the account.
9878
9912
  #
9879
- # By default, AWS Security Token Service (STS) is available as a global
9913
+ # By default, Security Token Service (STS) is available as a global
9880
9914
  # service, and all STS requests go to a single endpoint at
9881
- # `https://sts.amazonaws.com`. AWS recommends using Regional STS
9882
- # endpoints to reduce latency, build in redundancy, and increase session
9883
- # token availability. For information about Regional endpoints for STS,
9884
- # see [AWS AWS Security Token Service endpoints and quotas][1] in the
9885
- # *AWS General Reference*.
9915
+ # `https://sts.amazonaws.com`. Amazon Web Services recommends using
9916
+ # Regional STS endpoints to reduce latency, build in redundancy, and
9917
+ # increase session token availability. For information about Regional
9918
+ # endpoints for STS, see [Security Token Service endpoints and
9919
+ # quotas][1] in the *Amazon Web Services General Reference*.
9886
9920
  #
9887
9921
  # If you make an STS call to the global endpoint, the resulting session
9888
9922
  # tokens might be valid in some Regions but not others. It depends on
9889
9923
  # the version that is set in this operation. Version 1 tokens are valid
9890
- # only in AWS Regions that are available by default. These tokens do not
9924
+ # only in Regions that are available by default. These tokens do not
9891
9925
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9892
9926
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9893
9927
  # are longer and might affect systems where you temporarily store
9894
9928
  # tokens. For information, see [Activating and deactivating STS in an
9895
- # AWS region][2] in the *IAM User Guide*.
9929
+ # Region][2] in the *IAM User Guide*.
9896
9930
  #
9897
9931
  # To view the current session token version, see the
9898
9932
  # `GlobalEndpointTokenVersion` entry in the response of the
@@ -9905,14 +9939,14 @@ module Aws::IAM
9905
9939
  #
9906
9940
  # @option params [required, String] :global_endpoint_token_version
9907
9941
  # The version of the global endpoint token. Version 1 tokens are valid
9908
- # only in AWS Regions that are available by default. These tokens do not
9942
+ # only in Regions that are available by default. These tokens do not
9909
9943
  # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9910
9944
  # Version 2 tokens are valid in all Regions. However, version 2 tokens
9911
9945
  # are longer and might affect systems where you temporarily store
9912
9946
  # tokens.
9913
9947
  #
9914
- # For information, see [Activating and deactivating STS in an AWS
9915
- # region][1] in the *IAM User Guide*.
9948
+ # For information, see [Activating and deactivating STS in an Region][1]
9949
+ # in the *IAM User Guide*.
9916
9950
  #
9917
9951
  #
9918
9952
  #
@@ -9945,9 +9979,9 @@ module Aws::IAM
9945
9979
  end
9946
9980
 
9947
9981
  # Simulate how a set of IAM policies and optionally a resource-based
9948
- # policy works with a list of API operations and AWS resources to
9949
- # determine the policies' effective permissions. The policies are
9950
- # provided as strings.
9982
+ # policy works with a list of API operations and Amazon Web Services
9983
+ # resources to determine the policies' effective permissions. The
9984
+ # policies are provided as strings.
9951
9985
  #
9952
9986
  # The simulation does not perform the API operations; it only checks the
9953
9987
  # authorization to determine if the simulated policies allow or deny the
@@ -9957,11 +9991,12 @@ module Aws::IAM
9957
9991
  # If you want to simulate existing policies that are attached to an IAM
9958
9992
  # user, group, or role, use SimulatePrincipalPolicy instead.
9959
9993
  #
9960
- # Context keys are variables that are maintained by AWS and its services
9961
- # and which provide details about the context of an API query request.
9962
- # You can use the `Condition` element of an IAM policy to evaluate
9963
- # context keys. To get the list of context keys that the policies
9964
- # require for correct simulation, use GetContextKeysForCustomPolicy.
9994
+ # Context keys are variables that are maintained by Amazon Web Services
9995
+ # and its services and which provide details about the context of an API
9996
+ # query request. You can use the `Condition` element of an IAM policy to
9997
+ # evaluate context keys. To get the list of context keys that the
9998
+ # policies require for correct simulation, use
9999
+ # GetContextKeysForCustomPolicy.
9965
10000
  #
9966
10001
  # If the output is long, you can use `MaxItems` and `Marker` parameters
9967
10002
  # to paginate the results.
@@ -9985,7 +10020,12 @@ module Aws::IAM
9985
10020
  # In other words, do not use policies designed to restrict what a user
9986
10021
  # can do while using the temporary credentials.
9987
10022
  #
9988
- # The [regex pattern][3] used to validate this parameter is a string of
10023
+ # The maximum length of the policy document that you can pass in this
10024
+ # operation, including whitespace, is listed below. To view the maximum
10025
+ # character counts of a managed policy with no whitespaces, see [IAM and
10026
+ # STS character quotas][3].
10027
+ #
10028
+ # The [regex pattern][4] used to validate this parameter is a string of
9989
10029
  # characters consisting of the following:
9990
10030
  #
9991
10031
  # * Any printable ASCII character ranging from the space character
@@ -10001,7 +10041,8 @@ module Aws::IAM
10001
10041
  #
10002
10042
  # [1]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetFederationToken.html
10003
10043
  # [2]: https://docs.aws.amazon.com/IAM/latest/APIReference/API_AssumeRole.html
10004
- # [3]: http://wikipedia.org/wiki/regex
10044
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10045
+ # [4]: http://wikipedia.org/wiki/regex
10005
10046
  #
10006
10047
  # @option params [Array<String>] :permissions_boundary_policy_input_list
10007
10048
  # The IAM permissions boundary policy to simulate. The permissions
@@ -10012,7 +10053,12 @@ module Aws::IAM
10012
10053
  # The policy input is specified as a string that contains the complete,
10013
10054
  # valid JSON text of a permissions boundary policy.
10014
10055
  #
10015
- # The [regex pattern][2] used to validate this parameter is a string of
10056
+ # The maximum length of the policy document that you can pass in this
10057
+ # operation, including whitespace, is listed below. To view the maximum
10058
+ # character counts of a managed policy with no whitespaces, see [IAM and
10059
+ # STS character quotas][2].
10060
+ #
10061
+ # The [regex pattern][3] used to validate this parameter is a string of
10016
10062
  # characters consisting of the following:
10017
10063
  #
10018
10064
  # * Any printable ASCII character ranging from the space character
@@ -10027,7 +10073,8 @@ module Aws::IAM
10027
10073
  #
10028
10074
  #
10029
10075
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10030
- # [2]: http://wikipedia.org/wiki/regex
10076
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10077
+ # [3]: http://wikipedia.org/wiki/regex
10031
10078
  #
10032
10079
  # @option params [required, Array<String>] :action_names
10033
10080
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10036,13 +10083,13 @@ module Aws::IAM
10036
10083
  # operation does not support using wildcards (*) in an action name.
10037
10084
  #
10038
10085
  # @option params [Array<String>] :resource_arns
10039
- # A list of ARNs of AWS resources to include in the simulation. If this
10040
- # parameter is not provided, then the value defaults to `*` (all
10041
- # resources). Each API in the `ActionNames` parameter is evaluated for
10042
- # each resource in this list. The simulation determines the access
10043
- # result (allowed or denied) of each combination and reports it in the
10044
- # response. You can simulate resources that don't exist in your
10045
- # account.
10086
+ # A list of ARNs of Amazon Web Services resources to include in the
10087
+ # simulation. If this parameter is not provided, then the value defaults
10088
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10089
+ # evaluated for each resource in this list. The simulation determines
10090
+ # the access result (allowed or denied) of each combination and reports
10091
+ # it in the response. You can simulate resources that don't exist in
10092
+ # your account.
10046
10093
  #
10047
10094
  # The simulation does not automatically retrieve policies for the
10048
10095
  # specified resources. If you want to include a resource policy in the
@@ -10054,7 +10101,7 @@ module Aws::IAM
10054
10101
  # input error.
10055
10102
  #
10056
10103
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10057
- # in the *AWS General Reference*.
10104
+ # in the *Amazon Web Services General Reference*.
10058
10105
  #
10059
10106
  #
10060
10107
  #
@@ -10066,7 +10113,12 @@ module Aws::IAM
10066
10113
  # policy attached. You can include only one resource-based policy in a
10067
10114
  # simulation.
10068
10115
  #
10069
- # The [regex pattern][1] used to validate this parameter is a string of
10116
+ # The maximum length of the policy document that you can pass in this
10117
+ # operation, including whitespace, is listed below. To view the maximum
10118
+ # character counts of a managed policy with no whitespaces, see [IAM and
10119
+ # STS character quotas][1].
10120
+ #
10121
+ # The [regex pattern][2] used to validate this parameter is a string of
10070
10122
  # characters consisting of the following:
10071
10123
  #
10072
10124
  # * Any printable ASCII character ranging from the space character
@@ -10080,10 +10132,11 @@ module Aws::IAM
10080
10132
  #
10081
10133
  #
10082
10134
  #
10083
- # [1]: http://wikipedia.org/wiki/regex
10135
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10136
+ # [2]: http://wikipedia.org/wiki/regex
10084
10137
  #
10085
10138
  # @option params [String] :resource_owner
10086
- # An ARN representing the AWS account ID that specifies the owner of any
10139
+ # An ARN representing the account ID that specifies the owner of any
10087
10140
  # simulated resource that does not identify its owner in the resource
10088
10141
  # ARN. Examples of resource ARNs include an S3 bucket or object. If
10089
10142
  # `ResourceOwner` is specified, it is also used as the account owner of
@@ -10254,11 +10307,11 @@ module Aws::IAM
10254
10307
  end
10255
10308
 
10256
10309
  # Simulate how a set of IAM policies attached to an IAM entity works
10257
- # with a list of API operations and AWS resources to determine the
10258
- # policies' effective permissions. The entity can be an IAM user,
10259
- # group, or role. If you specify a user, then the simulation also
10260
- # includes all of the policies that are attached to groups that the user
10261
- # belongs to. You can simulate resources that don't exist in your
10310
+ # with a list of API operations and Amazon Web Services resources to
10311
+ # determine the policies' effective permissions. The entity can be an
10312
+ # IAM user, group, or role. If you specify a user, then the simulation
10313
+ # also includes all of the policies that are attached to groups that the
10314
+ # user belongs to. You can simulate resources that don't exist in your
10262
10315
  # account.
10263
10316
  #
10264
10317
  # You can optionally include a list of one or more additional policies
@@ -10278,11 +10331,12 @@ module Aws::IAM
10278
10331
  # permissions, then consider allowing them to use SimulateCustomPolicy
10279
10332
  # instead.
10280
10333
  #
10281
- # Context keys are variables maintained by AWS and its services that
10282
- # provide details about the context of an API query request. You can use
10283
- # the `Condition` element of an IAM policy to evaluate context keys. To
10284
- # get the list of context keys that the policies require for correct
10285
- # simulation, use GetContextKeysForPrincipalPolicy.
10334
+ # Context keys are variables maintained by Amazon Web Services and its
10335
+ # services that provide details about the context of an API query
10336
+ # request. You can use the `Condition` element of an IAM policy to
10337
+ # evaluate context keys. To get the list of context keys that the
10338
+ # policies require for correct simulation, use
10339
+ # GetContextKeysForPrincipalPolicy.
10286
10340
  #
10287
10341
  # If the output is long, you can use the `MaxItems` and `Marker`
10288
10342
  # parameters to paginate the results.
@@ -10303,12 +10357,18 @@ module Aws::IAM
10303
10357
  # also includes all policies that are attached to any groups the user
10304
10358
  # belongs to.
10305
10359
  #
10306
- # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10307
- # in the *AWS General Reference*.
10360
+ # The maximum length of the policy document that you can pass in this
10361
+ # operation, including whitespace, is listed below. To view the maximum
10362
+ # character counts of a managed policy with no whitespaces, see [IAM and
10363
+ # STS character quotas][1].
10308
10364
  #
10365
+ # For more information about ARNs, see [Amazon Resource Names (ARNs)][2]
10366
+ # in the *Amazon Web Services General Reference*.
10309
10367
  #
10310
10368
  #
10311
- # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10369
+ #
10370
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10371
+ # [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
10312
10372
  #
10313
10373
  # @option params [Array<String>] :policy_input_list
10314
10374
  # An optional list of additional policy documents to include in the
@@ -10344,7 +10404,12 @@ module Aws::IAM
10344
10404
  # Guide*. The policy input is specified as a string containing the
10345
10405
  # complete, valid JSON text of a permissions boundary policy.
10346
10406
  #
10347
- # The [regex pattern][2] used to validate this parameter is a string of
10407
+ # The maximum length of the policy document that you can pass in this
10408
+ # operation, including whitespace, is listed below. To view the maximum
10409
+ # character counts of a managed policy with no whitespaces, see [IAM and
10410
+ # STS character quotas][2].
10411
+ #
10412
+ # The [regex pattern][3] used to validate this parameter is a string of
10348
10413
  # characters consisting of the following:
10349
10414
  #
10350
10415
  # * Any printable ASCII character ranging from the space character
@@ -10359,7 +10424,8 @@ module Aws::IAM
10359
10424
  #
10360
10425
  #
10361
10426
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
10362
- # [2]: http://wikipedia.org/wiki/regex
10427
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10428
+ # [3]: http://wikipedia.org/wiki/regex
10363
10429
  #
10364
10430
  # @option params [required, Array<String>] :action_names
10365
10431
  # A list of names of API operations to evaluate in the simulation. Each
@@ -10367,13 +10433,13 @@ module Aws::IAM
10367
10433
  # the service identifier, such as `iam:CreateUser`.
10368
10434
  #
10369
10435
  # @option params [Array<String>] :resource_arns
10370
- # A list of ARNs of AWS resources to include in the simulation. If this
10371
- # parameter is not provided, then the value defaults to `*` (all
10372
- # resources). Each API in the `ActionNames` parameter is evaluated for
10373
- # each resource in this list. The simulation determines the access
10374
- # result (allowed or denied) of each combination and reports it in the
10375
- # response. You can simulate resources that don't exist in your
10376
- # account.
10436
+ # A list of ARNs of Amazon Web Services resources to include in the
10437
+ # simulation. If this parameter is not provided, then the value defaults
10438
+ # to `*` (all resources). Each API in the `ActionNames` parameter is
10439
+ # evaluated for each resource in this list. The simulation determines
10440
+ # the access result (allowed or denied) of each combination and reports
10441
+ # it in the response. You can simulate resources that don't exist in
10442
+ # your account.
10377
10443
  #
10378
10444
  # The simulation does not automatically retrieve policies for the
10379
10445
  # specified resources. If you want to include a resource policy in the
@@ -10381,7 +10447,7 @@ module Aws::IAM
10381
10447
  # `ResourcePolicy` parameter.
10382
10448
  #
10383
10449
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10384
- # in the *AWS General Reference*.
10450
+ # in the *Amazon Web Services General Reference*.
10385
10451
  #
10386
10452
  #
10387
10453
  #
@@ -10393,7 +10459,12 @@ module Aws::IAM
10393
10459
  # policy attached. You can include only one resource-based policy in a
10394
10460
  # simulation.
10395
10461
  #
10396
- # The [regex pattern][1] used to validate this parameter is a string of
10462
+ # The maximum length of the policy document that you can pass in this
10463
+ # operation, including whitespace, is listed below. To view the maximum
10464
+ # character counts of a managed policy with no whitespaces, see [IAM and
10465
+ # STS character quotas][1].
10466
+ #
10467
+ # The [regex pattern][2] used to validate this parameter is a string of
10397
10468
  # characters consisting of the following:
10398
10469
  #
10399
10470
  # * Any printable ASCII character ranging from the space character
@@ -10407,19 +10478,20 @@ module Aws::IAM
10407
10478
  #
10408
10479
  #
10409
10480
  #
10410
- # [1]: http://wikipedia.org/wiki/regex
10481
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
10482
+ # [2]: http://wikipedia.org/wiki/regex
10411
10483
  #
10412
10484
  # @option params [String] :resource_owner
10413
- # An AWS account ID that specifies the owner of any simulated resource
10414
- # that does not identify its owner in the resource ARN. Examples of
10415
- # resource ARNs include an S3 bucket or object. If `ResourceOwner` is
10416
- # specified, it is also used as the account owner of any
10417
- # `ResourcePolicy` included in the simulation. If the `ResourceOwner`
10418
- # parameter is not specified, then the owner of the resources and the
10419
- # resource policy defaults to the account of the identity provided in
10420
- # `CallerArn`. This parameter is required only if you specify a
10421
- # resource-based policy and account that owns the resource is different
10422
- # from the account that owns the simulated calling user `CallerArn`.
10485
+ # An account ID that specifies the owner of any simulated resource that
10486
+ # does not identify its owner in the resource ARN. Examples of resource
10487
+ # ARNs include an S3 bucket or object. If `ResourceOwner` is specified,
10488
+ # it is also used as the account owner of any `ResourcePolicy` included
10489
+ # in the simulation. If the `ResourceOwner` parameter is not specified,
10490
+ # then the owner of the resources and the resource policy defaults to
10491
+ # the account of the identity provided in `CallerArn`. This parameter is
10492
+ # required only if you specify a resource-based policy and account that
10493
+ # owns the resource is different from the account that owns the
10494
+ # simulated calling user `CallerArn`.
10423
10495
  #
10424
10496
  # @option params [String] :caller_arn
10425
10497
  # The ARN of the IAM user that you want to specify as the simulated
@@ -10440,7 +10512,7 @@ module Aws::IAM
10440
10512
  # use in evaluating the policy.
10441
10513
  #
10442
10514
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10443
- # in the *AWS General Reference*.
10515
+ # in the *Amazon Web Services General Reference*.
10444
10516
  #
10445
10517
  #
10446
10518
  #
@@ -10615,9 +10687,10 @@ module Aws::IAM
10615
10687
  # resource is not created. For more information about tagging, see
10616
10688
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10617
10689
  #
10618
- # * AWS always interprets the tag `Value` as a single string. If you
10619
- # need to store an array, you can store comma-separated values in the
10620
- # string. However, you must interpret the value in your code.
10690
+ # * Amazon Web Services always interprets the tag `Value` as a single
10691
+ # string. If you need to store an array, you can store comma-separated
10692
+ # values in the string. However, you must interpret the value in your
10693
+ # code.
10621
10694
  #
10622
10695
  # </note>
10623
10696
  #
@@ -10629,10 +10702,10 @@ module Aws::IAM
10629
10702
  # @option params [required, String] :instance_profile_name
10630
10703
  # The name of the IAM instance profile to which you want to add tags.
10631
10704
  #
10632
- # This parameter accepts (through its [regex pattern][1]) a string of
10633
- # characters that consist of upper and lowercase alphanumeric characters
10705
+ # This parameter allows (through its [regex pattern][1]) a string of
10706
+ # characters consisting of upper and lowercase alphanumeric characters
10634
10707
  # with no spaces. You can also include any of the following characters:
10635
- # =,.@-
10708
+ # \_+=,.@-
10636
10709
  #
10637
10710
  #
10638
10711
  #
@@ -10689,9 +10762,10 @@ module Aws::IAM
10689
10762
  # resource is not created. For more information about tagging, see
10690
10763
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10691
10764
  #
10692
- # * AWS always interprets the tag `Value` as a single string. If you
10693
- # need to store an array, you can store comma-separated values in the
10694
- # string. However, you must interpret the value in your code.
10765
+ # * Amazon Web Services always interprets the tag `Value` as a single
10766
+ # string. If you need to store an array, you can store comma-separated
10767
+ # values in the string. However, you must interpret the value in your
10768
+ # code.
10695
10769
  #
10696
10770
  # </note>
10697
10771
  #
@@ -10705,10 +10779,10 @@ module Aws::IAM
10705
10779
  # to add tags. For virtual MFA devices, the serial number is the same as
10706
10780
  # the ARN.
10707
10781
  #
10708
- # This parameter accepts (through its [regex pattern][1]) a string of
10709
- # characters that consist of upper and lowercase alphanumeric characters
10782
+ # This parameter allows (through its [regex pattern][1]) a string of
10783
+ # characters consisting of upper and lowercase alphanumeric characters
10710
10784
  # with no spaces. You can also include any of the following characters:
10711
- # =,.@-
10785
+ # \_+=,.@-
10712
10786
  #
10713
10787
  #
10714
10788
  #
@@ -10766,9 +10840,10 @@ module Aws::IAM
10766
10840
  # resource is not created. For more information about tagging, see
10767
10841
  # [Tagging IAM resources][3] in the *IAM User Guide*.
10768
10842
  #
10769
- # * AWS always interprets the tag `Value` as a single string. If you
10770
- # need to store an array, you can store comma-separated values in the
10771
- # string. However, you must interpret the value in your code.
10843
+ # * Amazon Web Services always interprets the tag `Value` as a single
10844
+ # string. If you need to store an array, you can store comma-separated
10845
+ # values in the string. However, you must interpret the value in your
10846
+ # code.
10772
10847
  #
10773
10848
  # </note>
10774
10849
  #
@@ -10782,10 +10857,10 @@ module Aws::IAM
10782
10857
  # The ARN of the OIDC identity provider in IAM to which you want to add
10783
10858
  # tags.
10784
10859
  #
10785
- # This parameter accepts (through its [regex pattern][1]) a string of
10786
- # characters that consist of upper and lowercase alphanumeric characters
10860
+ # This parameter allows (through its [regex pattern][1]) a string of
10861
+ # characters consisting of upper and lowercase alphanumeric characters
10787
10862
  # with no spaces. You can also include any of the following characters:
10788
- # =,.@-
10863
+ # \_+=,.@-
10789
10864
  #
10790
10865
  #
10791
10866
  #
@@ -10843,9 +10918,10 @@ module Aws::IAM
10843
10918
  # resource is not created. For more information about tagging, see
10844
10919
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10845
10920
  #
10846
- # * AWS always interprets the tag `Value` as a single string. If you
10847
- # need to store an array, you can store comma-separated values in the
10848
- # string. However, you must interpret the value in your code.
10921
+ # * Amazon Web Services always interprets the tag `Value` as a single
10922
+ # string. If you need to store an array, you can store comma-separated
10923
+ # values in the string. However, you must interpret the value in your
10924
+ # code.
10849
10925
  #
10850
10926
  # </note>
10851
10927
  #
@@ -10858,10 +10934,10 @@ module Aws::IAM
10858
10934
  # The ARN of the IAM customer managed policy to which you want to add
10859
10935
  # tags.
10860
10936
  #
10861
- # This parameter accepts (through its [regex pattern][1]) a string of
10862
- # characters that consist of upper and lowercase alphanumeric characters
10937
+ # This parameter allows (through its [regex pattern][1]) a string of
10938
+ # characters consisting of upper and lowercase alphanumeric characters
10863
10939
  # with no spaces. You can also include any of the following characters:
10864
- # =,.@-
10940
+ # \_+=,.@-
10865
10941
  #
10866
10942
  #
10867
10943
  #
@@ -10915,16 +10991,17 @@ module Aws::IAM
10915
10991
  # see [Control access using IAM tags][1] in the *IAM User Guide*.
10916
10992
  #
10917
10993
  # * **Cost allocation** - Use tags to help track which individuals and
10918
- # teams are using which AWS resources.
10994
+ # teams are using which Amazon Web Services resources.
10919
10995
  #
10920
10996
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
10921
10997
  # maximum number of tags, then the entire request fails and the
10922
10998
  # resource is not created. For more information about tagging, see
10923
10999
  # [Tagging IAM resources][2] in the *IAM User Guide*.
10924
11000
  #
10925
- # * AWS always interprets the tag `Value` as a single string. If you
10926
- # need to store an array, you can store comma-separated values in the
10927
- # string. However, you must interpret the value in your code.
11001
+ # * Amazon Web Services always interprets the tag `Value` as a single
11002
+ # string. If you need to store an array, you can store comma-separated
11003
+ # values in the string. However, you must interpret the value in your
11004
+ # code.
10928
11005
  #
10929
11006
  # </note>
10930
11007
  #
@@ -11019,9 +11096,10 @@ module Aws::IAM
11019
11096
  # resource is not created. For more information about tagging, see
11020
11097
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11021
11098
  #
11022
- # * AWS always interprets the tag `Value` as a single string. If you
11023
- # need to store an array, you can store comma-separated values in the
11024
- # string. However, you must interpret the value in your code.
11099
+ # * Amazon Web Services always interprets the tag `Value` as a single
11100
+ # string. If you need to store an array, you can store comma-separated
11101
+ # values in the string. However, you must interpret the value in your
11102
+ # code.
11025
11103
  #
11026
11104
  # </note>
11027
11105
  #
@@ -11035,10 +11113,10 @@ module Aws::IAM
11035
11113
  # The ARN of the SAML identity provider in IAM to which you want to add
11036
11114
  # tags.
11037
11115
  #
11038
- # This parameter accepts (through its [regex pattern][1]) a string of
11039
- # characters that consist of upper and lowercase alphanumeric characters
11116
+ # This parameter allows (through its [regex pattern][1]) a string of
11117
+ # characters consisting of upper and lowercase alphanumeric characters
11040
11118
  # with no spaces. You can also include any of the following characters:
11041
- # =,.@-
11119
+ # \_+=,.@-
11042
11120
  #
11043
11121
  #
11044
11122
  #
@@ -11075,11 +11153,11 @@ module Aws::IAM
11075
11153
  # same key name already exists, then that tag is overwritten with the
11076
11154
  # new value.
11077
11155
  #
11078
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11079
- # (ACM), we recommend that you don't use IAM server certificates.
11080
- # Instead, use ACM to provision, manage, and deploy your server
11081
- # certificates. For more information about IAM server certificates,
11082
- # [Working with server certificates][1] in the *IAM User Guide*.
11156
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11157
+ # we recommend that you don't use IAM server certificates. Instead, use
11158
+ # ACM to provision, manage, and deploy your server certificates. For
11159
+ # more information about IAM server certificates, [Working with server
11160
+ # certificates][1] in the *IAM User Guide*.
11083
11161
  #
11084
11162
  # </note>
11085
11163
  #
@@ -11099,16 +11177,17 @@ module Aws::IAM
11099
11177
  # [Control access using IAM tags][2] in the *IAM User Guide*.
11100
11178
  #
11101
11179
  # * **Cost allocation** - Use tags to help track which individuals and
11102
- # teams are using which AWS resources.
11180
+ # teams are using which Amazon Web Services resources.
11103
11181
  #
11104
11182
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11105
11183
  # maximum number of tags, then the entire request fails and the
11106
11184
  # resource is not created. For more information about tagging, see
11107
11185
  # [Tagging IAM resources][3] in the *IAM User Guide*.
11108
11186
  #
11109
- # * AWS always interprets the tag `Value` as a single string. If you
11110
- # need to store an array, you can store comma-separated values in the
11111
- # string. However, you must interpret the value in your code.
11187
+ # * Amazon Web Services always interprets the tag `Value` as a single
11188
+ # string. If you need to store an array, you can store comma-separated
11189
+ # values in the string. However, you must interpret the value in your
11190
+ # code.
11112
11191
  #
11113
11192
  # </note>
11114
11193
  #
@@ -11121,10 +11200,10 @@ module Aws::IAM
11121
11200
  # @option params [required, String] :server_certificate_name
11122
11201
  # The name of the IAM server certificate to which you want to add tags.
11123
11202
  #
11124
- # This parameter accepts (through its [regex pattern][1]) a string of
11125
- # characters that consist of upper and lowercase alphanumeric characters
11203
+ # This parameter allows (through its [regex pattern][1]) a string of
11204
+ # characters consisting of upper and lowercase alphanumeric characters
11126
11205
  # with no spaces. You can also include any of the following characters:
11127
- # =,.@-
11206
+ # \_+=,.@-
11128
11207
  #
11129
11208
  #
11130
11209
  #
@@ -11178,16 +11257,17 @@ module Aws::IAM
11178
11257
  # User Guide*.
11179
11258
  #
11180
11259
  # * **Cost allocation** - Use tags to help track which individuals and
11181
- # teams are using which AWS resources.
11260
+ # teams are using which Amazon Web Services resources.
11182
11261
  #
11183
11262
  # <note markdown="1"> * If any one of the tags is invalid or if you exceed the allowed
11184
11263
  # maximum number of tags, then the entire request fails and the
11185
11264
  # resource is not created. For more information about tagging, see
11186
11265
  # [Tagging IAM resources][2] in the *IAM User Guide*.
11187
11266
  #
11188
- # * AWS always interprets the tag `Value` as a single string. If you
11189
- # need to store an array, you can store comma-separated values in the
11190
- # string. However, you must interpret the value in your code.
11267
+ # * Amazon Web Services always interprets the tag `Value` as a single
11268
+ # string. If you need to store an array, you can store comma-separated
11269
+ # values in the string. However, you must interpret the value in your
11270
+ # code.
11191
11271
  #
11192
11272
  # </note>
11193
11273
  #
@@ -11202,10 +11282,10 @@ module Aws::IAM
11202
11282
  # @option params [required, String] :user_name
11203
11283
  # The name of the IAM user to which you want to add tags.
11204
11284
  #
11205
- # This parameter accepts (through its [regex pattern][1]) a string of
11206
- # characters that consist of upper and lowercase alphanumeric characters
11285
+ # This parameter allows (through its [regex pattern][1]) a string of
11286
+ # characters consisting of upper and lowercase alphanumeric characters
11207
11287
  # with no spaces. You can also include any of the following characters:
11208
- # =,.@-
11288
+ # \_+=,.@-
11209
11289
  #
11210
11290
  #
11211
11291
  #
@@ -11269,10 +11349,10 @@ module Aws::IAM
11269
11349
  # The name of the IAM instance profile from which you want to remove
11270
11350
  # tags.
11271
11351
  #
11272
- # This parameter accepts (through its [regex pattern][1]) a string of
11273
- # characters that consist of upper and lowercase alphanumeric characters
11352
+ # This parameter allows (through its [regex pattern][1]) a string of
11353
+ # characters consisting of upper and lowercase alphanumeric characters
11274
11354
  # with no spaces. You can also include any of the following characters:
11275
- # =,.@-
11355
+ # \_+=,.@-
11276
11356
  #
11277
11357
  #
11278
11358
  #
@@ -11313,10 +11393,10 @@ module Aws::IAM
11313
11393
  # want to remove tags. For virtual MFA devices, the serial number is the
11314
11394
  # same as the ARN.
11315
11395
  #
11316
- # This parameter accepts (through its [regex pattern][1]) a string of
11317
- # characters that consist of upper and lowercase alphanumeric characters
11396
+ # This parameter allows (through its [regex pattern][1]) a string of
11397
+ # characters consisting of upper and lowercase alphanumeric characters
11318
11398
  # with no spaces. You can also include any of the following characters:
11319
- # =,.@-
11399
+ # \_+=,.@-
11320
11400
  #
11321
11401
  #
11322
11402
  #
@@ -11359,10 +11439,10 @@ module Aws::IAM
11359
11439
  # The ARN of the OIDC provider in IAM from which you want to remove
11360
11440
  # tags.
11361
11441
  #
11362
- # This parameter accepts (through its [regex pattern][1]) a string of
11363
- # characters that consist of upper and lowercase alphanumeric characters
11442
+ # This parameter allows (through its [regex pattern][1]) a string of
11443
+ # characters consisting of upper and lowercase alphanumeric characters
11364
11444
  # with no spaces. You can also include any of the following characters:
11365
- # =,.@-
11445
+ # \_+=,.@-
11366
11446
  #
11367
11447
  #
11368
11448
  #
@@ -11402,10 +11482,10 @@ module Aws::IAM
11402
11482
  # The ARN of the IAM customer managed policy from which you want to
11403
11483
  # remove tags.
11404
11484
  #
11405
- # This parameter accepts (through its [regex pattern][1]) a string of
11406
- # characters that consist of upper and lowercase alphanumeric characters
11485
+ # This parameter allows (through its [regex pattern][1]) a string of
11486
+ # characters consisting of upper and lowercase alphanumeric characters
11407
11487
  # with no spaces. You can also include any of the following characters:
11408
- # =,.@-
11488
+ # \_+=,.@-
11409
11489
  #
11410
11490
  #
11411
11491
  #
@@ -11501,10 +11581,10 @@ module Aws::IAM
11501
11581
  # The ARN of the SAML identity provider in IAM from which you want to
11502
11582
  # remove tags.
11503
11583
  #
11504
- # This parameter accepts (through its [regex pattern][1]) a string of
11505
- # characters that consist of upper and lowercase alphanumeric characters
11584
+ # This parameter allows (through its [regex pattern][1]) a string of
11585
+ # characters consisting of upper and lowercase alphanumeric characters
11506
11586
  # with no spaces. You can also include any of the following characters:
11507
- # =,.@-
11587
+ # \_+=,.@-
11508
11588
  #
11509
11589
  #
11510
11590
  #
@@ -11536,11 +11616,11 @@ module Aws::IAM
11536
11616
  # information about tagging, see [Tagging IAM resources][1] in the *IAM
11537
11617
  # User Guide*.
11538
11618
  #
11539
- # <note markdown="1"> For certificates in a Region supported by AWS Certificate Manager
11540
- # (ACM), we recommend that you don't use IAM server certificates.
11541
- # Instead, use ACM to provision, manage, and deploy your server
11542
- # certificates. For more information about IAM server certificates,
11543
- # [Working with server certificates][2] in the *IAM User Guide*.
11619
+ # <note markdown="1"> For certificates in a Region supported by Certificate Manager (ACM),
11620
+ # we recommend that you don't use IAM server certificates. Instead, use
11621
+ # ACM to provision, manage, and deploy your server certificates. For
11622
+ # more information about IAM server certificates, [Working with server
11623
+ # certificates][2] in the *IAM User Guide*.
11544
11624
  #
11545
11625
  # </note>
11546
11626
  #
@@ -11553,10 +11633,10 @@ module Aws::IAM
11553
11633
  # The name of the IAM server certificate from which you want to remove
11554
11634
  # tags.
11555
11635
  #
11556
- # This parameter accepts (through its [regex pattern][1]) a string of
11557
- # characters that consist of upper and lowercase alphanumeric characters
11636
+ # This parameter allows (through its [regex pattern][1]) a string of
11637
+ # characters consisting of upper and lowercase alphanumeric characters
11558
11638
  # with no spaces. You can also include any of the following characters:
11559
- # =,.@-
11639
+ # \_+=,.@-
11560
11640
  #
11561
11641
  #
11562
11642
  #
@@ -11594,10 +11674,10 @@ module Aws::IAM
11594
11674
  # @option params [required, String] :user_name
11595
11675
  # The name of the IAM user from which you want to remove tags.
11596
11676
  #
11597
- # This parameter accepts (through its [regex pattern][1]) a string of
11598
- # characters that consist of upper and lowercase alphanumeric characters
11677
+ # This parameter allows (through its [regex pattern][1]) a string of
11678
+ # characters consisting of upper and lowercase alphanumeric characters
11599
11679
  # with no spaces. You can also include any of the following characters:
11600
- # =,.@-
11680
+ # \_+=,.@-
11601
11681
  #
11602
11682
  #
11603
11683
  #
@@ -11642,10 +11722,10 @@ module Aws::IAM
11642
11722
  # user's key as part of a key rotation workflow.
11643
11723
  #
11644
11724
  # If the `UserName` is not specified, the user name is determined
11645
- # implicitly based on the AWS access key ID used to sign the request.
11646
- # This operation works for access keys under the AWS account.
11647
- # Consequently, you can use this operation to manage AWS account root
11648
- # user credentials even if the AWS account has no associated users.
11725
+ # implicitly based on the Amazon Web Services access key ID used to sign
11726
+ # the request. This operation works for access keys under the account.
11727
+ # Consequently, you can use this operation to manage account root user
11728
+ # credentials even if the account has no associated users.
11649
11729
  #
11650
11730
  # For information about rotating keys, see [Managing keys and
11651
11731
  # certificates][1] in the *IAM User Guide*.
@@ -11679,8 +11759,8 @@ module Aws::IAM
11679
11759
  #
11680
11760
  # @option params [required, String] :status
11681
11761
  # The status you want to assign to the secret access key. `Active` means
11682
- # that the key can be used for programmatic calls to AWS, while
11683
- # `Inactive` means that the key cannot be used.
11762
+ # that the key can be used for programmatic calls to Amazon Web
11763
+ # Services, while `Inactive` means that the key cannot be used.
11684
11764
  #
11685
11765
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
11686
11766
  #
@@ -11713,7 +11793,7 @@ module Aws::IAM
11713
11793
  req.send_request(options)
11714
11794
  end
11715
11795
 
11716
- # Updates the password policy settings for the AWS account.
11796
+ # Updates the password policy settings for the account.
11717
11797
  #
11718
11798
  # <note markdown="1"> * This operation does not support partial updates. No parameters are
11719
11799
  # required, but if you do not specify a parameter, that parameter's
@@ -11775,8 +11855,8 @@ module Aws::IAM
11775
11855
  # require at least one lowercase character.
11776
11856
  #
11777
11857
  # @option params [Boolean] :allow_users_to_change_password
11778
- # Allows all IAM users in your account to use the AWS Management Console
11779
- # to change their own passwords. For more information, see [Letting IAM
11858
+ # Allows all IAM users in your account to use the Management Console to
11859
+ # change their own passwords. For more information, see [Letting IAM
11780
11860
  # users change their own passwords][1] in the *IAM User Guide*.
11781
11861
  #
11782
11862
  # If you do not specify a value for this parameter, then the operation
@@ -11873,10 +11953,10 @@ module Aws::IAM
11873
11953
  # @option params [required, String] :policy_document
11874
11954
  # The policy that grants an entity permission to assume the role.
11875
11955
  #
11876
- # You must provide policies in JSON format in IAM. However, for AWS
11956
+ # You must provide policies in JSON format in IAM. However, for
11877
11957
  # CloudFormation templates formatted in YAML, you can provide the policy
11878
- # in JSON or YAML format. AWS CloudFormation always converts a YAML
11879
- # policy to JSON format before submitting it to IAM.
11958
+ # in JSON or YAML format. CloudFormation always converts a YAML policy
11959
+ # to JSON format before submitting it to IAM.
11880
11960
  #
11881
11961
  # The [regex pattern][1] used to validate this parameter is a string of
11882
11962
  # characters consisting of the following:
@@ -12008,11 +12088,11 @@ module Aws::IAM
12008
12088
  req.send_request(options)
12009
12089
  end
12010
12090
 
12011
- # Changes the password for the specified IAM user. You can use the AWS
12012
- # CLI, the AWS API, or the **Users** page in the IAM console to change
12013
- # the password for any IAM user. Use ChangePassword to change your own
12014
- # password in the **My Security Credentials** page in the AWS Management
12015
- # Console.
12091
+ # Changes the password for the specified IAM user. You can use the CLI,
12092
+ # the Amazon Web Services API, or the **Users** page in the IAM console
12093
+ # to change the password for any IAM user. Use ChangePassword to change
12094
+ # your own password in the **My Security Credentials** page in the
12095
+ # Management Console.
12016
12096
  #
12017
12097
  # For more information about modifying passwords, see [Managing
12018
12098
  # passwords][1] in the *IAM User Guide*.
@@ -12049,8 +12129,8 @@ module Aws::IAM
12049
12129
  # carriage return (`\u000D`)
12050
12130
  #
12051
12131
  # However, the format can be further restricted by the account
12052
- # administrator by setting a password policy on the AWS account. For
12053
- # more information, see UpdateAccountPasswordPolicy.
12132
+ # administrator by setting a password policy on the account. For more
12133
+ # information, see UpdateAccountPasswordPolicy.
12054
12134
  #
12055
12135
  #
12056
12136
  #
@@ -12097,15 +12177,25 @@ module Aws::IAM
12097
12177
  # existing list of thumbprints. (The lists are not merged.)
12098
12178
  #
12099
12179
  # Typically, you need to update a thumbprint only when the identity
12100
- # provider's certificate changes, which occurs rarely. However, if the
12180
+ # provider certificate changes, which occurs rarely. However, if the
12101
12181
  # provider's certificate *does* change, any attempt to assume an IAM
12102
12182
  # role that specifies the OIDC provider as a principal fails until the
12103
12183
  # certificate thumbprint is updated.
12104
12184
  #
12105
- # <note markdown="1"> Trust for the OIDC provider is derived from the provider's
12106
- # certificate and is validated by the thumbprint. Therefore, it is best
12107
- # to limit access to the `UpdateOpenIDConnectProviderThumbprint`
12108
- # operation to highly privileged users.
12185
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12186
+ # providers (IdPs) through our library of trusted certificate
12187
+ # authorities (CAs) instead of using a certificate thumbprint to verify
12188
+ # your IdP server certificate. These OIDC IdPs include Google, and those
12189
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
12190
+ # endpoint. In these cases, your legacy thumbprint remains in your
12191
+ # configuration, but is no longer used for validation.
12192
+ #
12193
+ # </note>
12194
+ #
12195
+ # <note markdown="1"> Trust for the OIDC provider is derived from the provider certificate
12196
+ # and is validated by the thumbprint. Therefore, it is best to limit
12197
+ # access to the `UpdateOpenIDConnectProviderThumbprint` operation to
12198
+ # highly privileged users.
12109
12199
  #
12110
12200
  # </note>
12111
12201
  #
@@ -12116,7 +12206,7 @@ module Aws::IAM
12116
12206
  # operation.
12117
12207
  #
12118
12208
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12119
- # in the *AWS General Reference*.
12209
+ # in the *Amazon Web Services General Reference*.
12120
12210
  #
12121
12211
  #
12122
12212
  #
@@ -12159,7 +12249,7 @@ module Aws::IAM
12159
12249
  # default maximum of one hour is applied. This setting can have a value
12160
12250
  # from 1 hour to 12 hours.
12161
12251
  #
12162
- # Anyone who assumes the role from the AWS CLI or API can use the
12252
+ # Anyone who assumes the role from the CLI or API can use the
12163
12253
  # `DurationSeconds` API parameter or the `duration-seconds` CLI
12164
12254
  # parameter to request a longer session. The `MaxSessionDuration`
12165
12255
  # setting determines the maximum duration that can be requested using
@@ -12266,7 +12356,7 @@ module Aws::IAM
12266
12356
  # The Amazon Resource Name (ARN) of the SAML provider to update.
12267
12357
  #
12268
12358
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
12269
- # in the *AWS General Reference*.
12359
+ # in the *Amazon Web Services General Reference*.
12270
12360
  #
12271
12361
  #
12272
12362
  #
@@ -12302,10 +12392,10 @@ module Aws::IAM
12302
12392
  # public key as part of a key rotation work flow.
12303
12393
  #
12304
12394
  # The SSH public key affected by this operation is used only for
12305
- # authenticating the associated IAM user to an AWS CodeCommit
12306
- # repository. For more information about using SSH keys to authenticate
12307
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12308
- # connections][1] in the *AWS CodeCommit User Guide*.
12395
+ # authenticating the associated IAM user to an CodeCommit repository.
12396
+ # For more information about using SSH keys to authenticate to an
12397
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12398
+ # in the *CodeCommit User Guide*.
12309
12399
  #
12310
12400
  #
12311
12401
  #
@@ -12336,7 +12426,7 @@ module Aws::IAM
12336
12426
  #
12337
12427
  # @option params [required, String] :status
12338
12428
  # The status to assign to the SSH public key. `Active` means that the
12339
- # key can be used for authentication with an AWS CodeCommit repository.
12429
+ # key can be used for authentication with an CodeCommit repository.
12340
12430
  # `Inactive` means that the key cannot be used.
12341
12431
  #
12342
12432
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
@@ -12363,8 +12453,8 @@ module Aws::IAM
12363
12453
  #
12364
12454
  # For more information about working with server certificates, see
12365
12455
  # [Working with server certificates][1] in the *IAM User Guide*. This
12366
- # topic also includes a list of AWS services that can use the server
12367
- # certificates that you manage with IAM.
12456
+ # topic also includes a list of Amazon Web Services services that can
12457
+ # use the server certificates that you manage with IAM.
12368
12458
  #
12369
12459
  # You should understand the implications of changing a server
12370
12460
  # certificate's path or name. For more information, see [Renaming a
@@ -12506,10 +12596,10 @@ module Aws::IAM
12506
12596
  # rotation work flow.
12507
12597
  #
12508
12598
  # If the `UserName` field is not specified, the user name is determined
12509
- # implicitly based on the AWS access key ID used to sign the request.
12510
- # This operation works for access keys under the AWS account.
12511
- # Consequently, you can use this operation to manage AWS account root
12512
- # user credentials even if the AWS account has no associated users.
12599
+ # implicitly based on the Amazon Web Services access key ID used to sign
12600
+ # the request. This operation works for access keys under the account.
12601
+ # Consequently, you can use this operation to manage account root user
12602
+ # credentials even if the account has no associated users.
12513
12603
  #
12514
12604
  # @option params [String] :user_name
12515
12605
  # The name of the IAM user the signing certificate belongs to.
@@ -12536,8 +12626,8 @@ module Aws::IAM
12536
12626
  #
12537
12627
  # @option params [required, String] :status
12538
12628
  # The status you want to assign to the certificate. `Active` means that
12539
- # the certificate can be used for programmatic calls to AWS `Inactive`
12540
- # means that the certificate cannot be used.
12629
+ # the certificate can be used for programmatic calls to Amazon Web
12630
+ # Services `Inactive` means that the certificate cannot be used.
12541
12631
  #
12542
12632
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
12543
12633
  #
@@ -12658,10 +12748,10 @@ module Aws::IAM
12658
12748
  # user.
12659
12749
  #
12660
12750
  # The SSH public key uploaded by this operation can be used only for
12661
- # authenticating the associated IAM user to an AWS CodeCommit
12662
- # repository. For more information about using SSH keys to authenticate
12663
- # to an AWS CodeCommit repository, see [Set up AWS CodeCommit for SSH
12664
- # connections][1] in the *AWS CodeCommit User Guide*.
12751
+ # authenticating the associated IAM user to an CodeCommit repository.
12752
+ # For more information about using SSH keys to authenticate to an
12753
+ # CodeCommit repository, see [Set up CodeCommit for SSH connections][1]
12754
+ # in the *CodeCommit User Guide*.
12665
12755
  #
12666
12756
  #
12667
12757
  #
@@ -12730,21 +12820,21 @@ module Aws::IAM
12730
12820
  req.send_request(options)
12731
12821
  end
12732
12822
 
12733
- # Uploads a server certificate entity for the AWS account. The server
12823
+ # Uploads a server certificate entity for the account. The server
12734
12824
  # certificate entity includes a public key certificate, a private key,
12735
12825
  # and an optional certificate chain, which should all be PEM-encoded.
12736
12826
  #
12737
- # We recommend that you use [AWS Certificate Manager][1] to provision,
12827
+ # We recommend that you use [Certificate Manager][1] to provision,
12738
12828
  # manage, and deploy your server certificates. With ACM you can request
12739
- # a certificate, deploy it to AWS resources, and let ACM handle
12740
- # certificate renewals for you. Certificates provided by ACM are free.
12741
- # For more information about using ACM, see the [AWS Certificate Manager
12742
- # User Guide][2].
12829
+ # a certificate, deploy it to Amazon Web Services resources, and let ACM
12830
+ # handle certificate renewals for you. Certificates provided by ACM are
12831
+ # free. For more information about using ACM, see the [Certificate
12832
+ # Manager User Guide][2].
12743
12833
  #
12744
12834
  # For more information about working with server certificates, see
12745
12835
  # [Working with server certificates][3] in the *IAM User Guide*. This
12746
- # topic includes a list of AWS services that can use the server
12747
- # certificates that you manage with IAM.
12836
+ # topic includes a list of Amazon Web Services services that can use the
12837
+ # server certificates that you manage with IAM.
12748
12838
  #
12749
12839
  # For information about the number of server certificates you can
12750
12840
  # upload, see [IAM and STS quotas][4] in the *IAM User Guide*.
@@ -12752,10 +12842,11 @@ module Aws::IAM
12752
12842
  # <note markdown="1"> Because the body of the public key certificate, private key, and the
12753
12843
  # certificate chain can be large, you should use POST rather than GET
12754
12844
  # when calling `UploadServerCertificate`. For information about setting
12755
- # up signatures and authorization through the API, see [Signing AWS API
12756
- # requests][5] in the *AWS General Reference*. For general information
12757
- # about using the Query API with IAM, see [Calling the API by making
12758
- # HTTP query requests][6] in the *IAM User Guide*.
12845
+ # up signatures and authorization through the API, see [Signing Amazon
12846
+ # Web Services API requests][5] in the *Amazon Web Services General
12847
+ # Reference*. For general information about using the Query API with
12848
+ # IAM, see [Calling the API by making HTTP query requests][6] in the
12849
+ # *IAM User Guide*.
12759
12850
  #
12760
12851
  # </note>
12761
12852
  #
@@ -12946,25 +13037,27 @@ module Aws::IAM
12946
13037
  end
12947
13038
 
12948
13039
  # Uploads an X.509 signing certificate and associates it with the
12949
- # specified IAM user. Some AWS services require you to use certificates
12950
- # to validate requests that are signed with a corresponding private key.
12951
- # When you upload the certificate, its default status is `Active`.
13040
+ # specified IAM user. Some Amazon Web Services services require you to
13041
+ # use certificates to validate requests that are signed with a
13042
+ # corresponding private key. When you upload the certificate, its
13043
+ # default status is `Active`.
12952
13044
  #
12953
13045
  # For information about when you would use an X.509 signing certificate,
12954
13046
  # see [Managing server certificates in IAM][1] in the *IAM User Guide*.
12955
13047
  #
12956
13048
  # If the `UserName` is not specified, the IAM user name is determined
12957
- # implicitly based on the AWS access key ID used to sign the request.
12958
- # This operation works for access keys under the AWS account.
12959
- # Consequently, you can use this operation to manage AWS account root
12960
- # user credentials even if the AWS account has no associated users.
13049
+ # implicitly based on the Amazon Web Services access key ID used to sign
13050
+ # the request. This operation works for access keys under the account.
13051
+ # Consequently, you can use this operation to manage account root user
13052
+ # credentials even if the account has no associated users.
12961
13053
  #
12962
13054
  # <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
12963
13055
  # POST rather than GET when calling `UploadSigningCertificate`. For
12964
13056
  # information about setting up signatures and authorization through the
12965
- # API, see [Signing AWS API requests][2] in the *AWS General Reference*.
12966
- # For general information about using the Query API with IAM, see
12967
- # [Making query requests][3] in the *IAM User Guide*.
13057
+ # API, see [Signing Amazon Web Services API requests][2] in the *Amazon
13058
+ # Web Services General Reference*. For general information about using
13059
+ # the Query API with IAM, see [Making query requests][3] in the *IAM
13060
+ # User Guide*.
12968
13061
  #
12969
13062
  # </note>
12970
13063
  #
@@ -13067,7 +13160,7 @@ module Aws::IAM
13067
13160
  params: params,
13068
13161
  config: config)
13069
13162
  context[:gem_name] = 'aws-sdk-iam'
13070
- context[:gem_version] = '1.54.0'
13163
+ context[:gem_version] = '1.58.0'
13071
13164
  Seahorse::Client::Request.new(handlers, context)
13072
13165
  end
13073
13166