aws-sdk-iam 1.59.0 → 1.63.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a8757f5ea0e5edfc637b6f6415195af7957d0412c7bf6331d409633c19761361
4
- data.tar.gz: 97e399180c8219c50e48bf87a743cb71f7c2a5f0bc5e760eea17c22a9610ceef
3
+ metadata.gz: 9fa3433396c62a683d3f1027e960f1b063f5451fae8eeee3df5079098251ae3e
4
+ data.tar.gz: ef7ad364a3f2cacd4d18627ddbc3e55d238a9ed2d58a7c1720a0d679582867ab
5
5
  SHA512:
6
- metadata.gz: cc67d677673cddcd917f7fd1927503c968e2a6a6f14942311e1a64219bcd2ab49a85ce40b552bd86fcf1a80d280d643515a9c1025b7e9d40584cc44b5e828059
7
- data.tar.gz: 7953eaa6b205facf5cdc8f9f1ff070f23cc3e8164ce79bce548503ac6ba142cf0010036c656b405cecef522df3b245e5017f2ac2a065ce139992e3c9006fd3fb
6
+ metadata.gz: 4abb7e8a0978c1c4282d503e9159c95a56e8f11cf5cd20d7938f5c438e7a69dd5f02f3ed883a3687cbeeb775e1f631e061e7fce3c748a17dd1bcab36e0e77855
7
+ data.tar.gz: e7644e8888056627f6f1dc4c30767c768a95144861eb8b509e96ba12ec0d1e464a9e5bbedbb4bd236ce96d7745c8b1a10305396d6ac6fab61206a4bf613eaaed
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.63.0 (2021-11-04)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.62.0 (2021-10-18)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
14
+ 1.61.0 (2021-09-22)
15
+ ------------------
16
+
17
+ * Feature - Added changes to OIDC API about not using port numbers in the URL.
18
+
19
+ 1.60.0 (2021-09-01)
20
+ ------------------
21
+
22
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
23
+
4
24
  1.59.0 (2021-07-30)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.59.0
1
+ 1.63.0
@@ -288,9 +288,10 @@ module Aws::IAM
288
288
  # uses the default value of `false`. The result is that passwords do not
289
289
  # require at least one lowercase character.
290
290
  # @option options [Boolean] :allow_users_to_change_password
291
- # Allows all IAM users in your account to use the Management Console to
292
- # change their own passwords. For more information, see [Letting IAM
293
- # users change their own passwords][1] in the *IAM User Guide*.
291
+ # Allows all IAM users in your account to use the Amazon Web Services
292
+ # Management Console to change their own passwords. For more
293
+ # information, see [Letting IAM users change their own passwords][1] in
294
+ # the *IAM User Guide*.
294
295
  #
295
296
  # If you do not specify a value for this parameter, then the operation
296
297
  # uses the default value of `false`. The result is that IAM users in the
@@ -275,6 +275,15 @@ module Aws::IAM
275
275
  # ** Please note ** When response stubbing is enabled, no HTTP
276
276
  # requests are made, and retries are disabled.
277
277
  #
278
+ # @option options [Boolean] :use_dualstack_endpoint
279
+ # When set to `true`, dualstack enabled endpoints (with `.aws` TLD)
280
+ # will be used if available.
281
+ #
282
+ # @option options [Boolean] :use_fips_endpoint
283
+ # When set to `true`, fips compatible endpoints will be used if available.
284
+ # When a `fips` region is used, the region is normalized and this config
285
+ # is set to `true`.
286
+ #
278
287
  # @option options [Boolean] :validate_params (true)
279
288
  # When `true`, request parameters are validated before
280
289
  # sending the request.
@@ -714,9 +723,9 @@ module Aws::IAM
714
723
 
715
724
  # Changes the password of the IAM user who is calling this operation.
716
725
  # This operation can be performed using the CLI, the Amazon Web Services
717
- # API, or the **My Security Credentials** page in the Management
718
- # Console. The account root user password is not affected by this
719
- # operation.
726
+ # API, or the **My Security Credentials** page in the Amazon Web
727
+ # Services Management Console. The Amazon Web Services account root user
728
+ # password is not affected by this operation.
720
729
  #
721
730
  # Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
722
731
  # the **Users** page in the IAM console to change the password for any
@@ -731,8 +740,8 @@ module Aws::IAM
731
740
  # The IAM user's current password.
732
741
  #
733
742
  # @option params [required, String] :new_password
734
- # The new password. The new password must conform to the account's
735
- # password policy, if one exists.
743
+ # The new password. The new password must conform to the Amazon Web
744
+ # Services account's password policy, if one exists.
736
745
  #
737
746
  # The [regex pattern][1] that is used to validate this parameter is a
738
747
  # string of characters. That string can include almost any printable
@@ -740,8 +749,9 @@ module Aws::IAM
740
749
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
741
750
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
742
751
  # of these characters are valid in a password. However, many tools, such
743
- # as the Management Console, might restrict the ability to type certain
744
- # characters because they have special meaning within that tool.
752
+ # as the Amazon Web Services Management Console, might restrict the
753
+ # ability to type certain characters because they have special meaning
754
+ # within that tool.
745
755
  #
746
756
  #
747
757
  #
@@ -781,18 +791,19 @@ module Aws::IAM
781
791
  #
782
792
  # If you do not specify a user name, IAM determines the user name
783
793
  # implicitly based on the Amazon Web Services access key ID signing the
784
- # request. This operation works for access keys under the account.
785
- # Consequently, you can use this operation to manage account root user
786
- # credentials. This is true even if the account has no associated users.
794
+ # request. This operation works for access keys under the Amazon Web
795
+ # Services account. Consequently, you can use this operation to manage
796
+ # Amazon Web Services account root user credentials. This is true even
797
+ # if the Amazon Web Services account has no associated users.
787
798
  #
788
799
  # For information about quotas on the number of keys you can create, see
789
800
  # [IAM and STS quotas][1] in the *IAM User Guide*.
790
801
  #
791
- # To ensure the security of your account, the secret access key is
792
- # accessible only during key and user creation. You must save the key
793
- # (for example, in a text file) if you want to be able to access it
794
- # again. If a secret key is lost, you can delete the access keys for the
795
- # associated user and then create new keys.
802
+ # To ensure the security of your Amazon Web Services account, the secret
803
+ # access key is accessible only during key and user creation. You must
804
+ # save the key (for example, in a text file) if you want to be able to
805
+ # access it again. If a secret key is lost, you can delete the access
806
+ # keys for the associated user and then create new keys.
796
807
  #
797
808
  #
798
809
  #
@@ -857,9 +868,9 @@ module Aws::IAM
857
868
  req.send_request(options)
858
869
  end
859
870
 
860
- # Creates an alias for your account. For information about using an
861
- # account alias, see [Using an alias for your account ID][1] in the *IAM
862
- # User Guide*.
871
+ # Creates an alias for your Amazon Web Services account. For information
872
+ # about using an Amazon Web Services account alias, see [Using an alias
873
+ # for your Amazon Web Services account ID][1] in the *IAM User Guide*.
863
874
  #
864
875
  #
865
876
  #
@@ -1125,13 +1136,14 @@ module Aws::IAM
1125
1136
  end
1126
1137
 
1127
1138
  # Creates a password for the specified IAM user. A password allows an
1128
- # IAM user to access Amazon Web Services services through the Management
1129
- # Console.
1139
+ # IAM user to access Amazon Web Services services through the Amazon Web
1140
+ # Services Management Console.
1130
1141
  #
1131
1142
  # You can use the CLI, the Amazon Web Services API, or the **Users**
1132
1143
  # page in the IAM console to create a password for any IAM user. Use
1133
1144
  # ChangePassword to update your own existing password in the **My
1134
- # Security Credentials** page in the Management Console.
1145
+ # Security Credentials** page in the Amazon Web Services Management
1146
+ # Console.
1135
1147
  #
1136
1148
  # For more information about managing passwords, see [Managing
1137
1149
  # passwords][1] in the *IAM User Guide*.
@@ -1162,8 +1174,9 @@ module Aws::IAM
1162
1174
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
1163
1175
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
1164
1176
  # of these characters are valid in a password. However, many tools, such
1165
- # as the Management Console, might restrict the ability to type certain
1166
- # characters because they have special meaning within that tool.
1177
+ # as the Amazon Web Services Management Console, might restrict the
1178
+ # ability to type certain characters because they have special meaning
1179
+ # within that tool.
1167
1180
  #
1168
1181
  #
1169
1182
  #
@@ -1247,8 +1260,8 @@ module Aws::IAM
1247
1260
  # * A list of thumbprints of one or more server certificates that the
1248
1261
  # IdP uses
1249
1262
  #
1250
- # You get all of this information from the OIDC IdP that you want to use
1251
- # to access Amazon Web Services.
1263
+ # You get all of this information from the OIDC IdP you want to use to
1264
+ # access Amazon Web Services.
1252
1265
  #
1253
1266
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1254
1267
  # providers (IdPs) through our library of trusted certificate
@@ -1277,16 +1290,18 @@ module Aws::IAM
1277
1290
  # Connect ID tokens. Per the OIDC standard, path components are allowed
1278
1291
  # but query parameters are not. Typically the URL consists of only a
1279
1292
  # hostname, like `https://server.example.org` or `https://example.com`.
1293
+ # The URL should not contain a port number.
1280
1294
  #
1281
1295
  # You cannot register the same provider multiple times in a single
1282
- # account. If you try to submit a URL that has already been used for an
1283
- # OpenID Connect provider in the account, you will get an error.
1296
+ # Amazon Web Services account. If you try to submit a URL that has
1297
+ # already been used for an OpenID Connect provider in the Amazon Web
1298
+ # Services account, you will get an error.
1284
1299
  #
1285
1300
  # @option params [Array<String>] :client_id_list
1286
- # A list of client IDs (also known as audiences). When a mobile or web
1287
- # app registers with an OpenID Connect provider, they establish a value
1288
- # that identifies the application. (This is the value that's sent as
1289
- # the `client_id` parameter on OAuth requests.)
1301
+ # Provides a list of client IDs, also known as audiences. When a mobile
1302
+ # or web app registers with an OpenID Connect provider, they establish a
1303
+ # value that identifies the application. This is the value that's sent
1304
+ # as the `client_id` parameter on OAuth requests.
1290
1305
  #
1291
1306
  # You can register multiple client IDs with the same provider. For
1292
1307
  # example, you might have multiple applications that use the same OIDC
@@ -1313,11 +1328,11 @@ module Aws::IAM
1313
1328
  # `server.example.com` and the provider stores its keys at
1314
1329
  # https://keys.server.example.com/openid-connect. In that case, the
1315
1330
  # thumbprint string would be the hex-encoded SHA-1 hash value of the
1316
- # certificate used by https://keys.server.example.com.
1331
+ # certificate used by `https://keys.server.example.com.`
1317
1332
  #
1318
- # For more information about obtaining the OIDC provider's thumbprint,
1319
- # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
1320
- # the *IAM User Guide*.
1333
+ # For more information about obtaining the OIDC provider thumbprint, see
1334
+ # [Obtaining the thumbprint for an OpenID Connect provider][1] in the
1335
+ # *IAM User Guide*.
1321
1336
  #
1322
1337
  #
1323
1338
  #
@@ -1395,7 +1410,7 @@ module Aws::IAM
1395
1410
  req.send_request(options)
1396
1411
  end
1397
1412
 
1398
- # Creates a new managed policy for your account.
1413
+ # Creates a new managed policy for your Amazon Web Services account.
1399
1414
  #
1400
1415
  # This operation creates a policy version with a version identifier of
1401
1416
  # `v1` and sets v1 as the policy's default version. For more
@@ -1437,6 +1452,10 @@ module Aws::IAM
1437
1452
  # character (`\u007F`), including most punctuation characters, digits,
1438
1453
  # and upper and lowercased letters.
1439
1454
  #
1455
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
1456
+ #
1457
+ # </note>
1458
+ #
1440
1459
  #
1441
1460
  #
1442
1461
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -1650,10 +1669,10 @@ module Aws::IAM
1650
1669
  req.send_request(options)
1651
1670
  end
1652
1671
 
1653
- # Creates a new role for your account. For more information about roles,
1654
- # see [IAM roles][1]. For information about quotas for role names and
1655
- # the number of roles you can create, see [IAM and STS quotas][2] in the
1656
- # *IAM User Guide*.
1672
+ # Creates a new role for your Amazon Web Services account. For more
1673
+ # information about roles, see [IAM roles][1]. For information about
1674
+ # quotas for role names and the number of roles you can create, see [IAM
1675
+ # and STS quotas][2] in the *IAM User Guide*.
1657
1676
  #
1658
1677
  #
1659
1678
  #
@@ -1836,8 +1855,8 @@ module Aws::IAM
1836
1855
  # used as a principal in an IAM role's trust policy. Such a policy can
1837
1856
  # enable federated users who sign in using the SAML IdP to assume the
1838
1857
  # role. You can create an IAM role that supports Web-based single
1839
- # sign-on (SSO) to the Management Console or one that supports API
1840
- # access to Amazon Web Services.
1858
+ # sign-on (SSO) to the Amazon Web Services Management Console or one
1859
+ # that supports API access to Amazon Web Services.
1841
1860
  #
1842
1861
  # When you create the SAML provider resource, you upload a SAML metadata
1843
1862
  # document that you get from your IdP. That document includes the
@@ -1851,8 +1870,8 @@ module Aws::IAM
1851
1870
  # </note>
1852
1871
  #
1853
1872
  # For more information, see [Enabling SAML 2.0 federated users to access
1854
- # the Management Console][2] and [About SAML 2.0-based federation][3] in
1855
- # the *IAM User Guide*.
1873
+ # the Amazon Web Services Management Console][2] and [About SAML
1874
+ # 2.0-based federation][3] in the *IAM User Guide*.
1856
1875
  #
1857
1876
  #
1858
1877
  #
@@ -2096,7 +2115,7 @@ module Aws::IAM
2096
2115
  req.send_request(options)
2097
2116
  end
2098
2117
 
2099
- # Creates a new IAM user for your account.
2118
+ # Creates a new IAM user for your Amazon Web Services account.
2100
2119
  #
2101
2120
  # For information about quotas for the number of IAM users you can
2102
2121
  # create, see [IAM and STS quotas][1] in the *IAM User Guide*.
@@ -2211,10 +2230,11 @@ module Aws::IAM
2211
2230
  req.send_request(options)
2212
2231
  end
2213
2232
 
2214
- # Creates a new virtual MFA device for the account. After creating the
2215
- # virtual MFA, use EnableMFADevice to attach the MFA device to an IAM
2216
- # user. For more information about creating and working with virtual MFA
2217
- # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
2233
+ # Creates a new virtual MFA device for the Amazon Web Services account.
2234
+ # After creating the virtual MFA, use EnableMFADevice to attach the MFA
2235
+ # device to an IAM user. For more information about creating and working
2236
+ # with virtual MFA devices, see [Using a virtual MFA device][1] in the
2237
+ # *IAM User Guide*.
2218
2238
  #
2219
2239
  # For information about the maximum number of MFA devices you can
2220
2240
  # create, see [IAM and STS quotas][2] in the *IAM User Guide*.
@@ -2384,9 +2404,10 @@ module Aws::IAM
2384
2404
  #
2385
2405
  # If you do not specify a user name, IAM determines the user name
2386
2406
  # implicitly based on the Amazon Web Services access key ID signing the
2387
- # request. This operation works for access keys under the account.
2388
- # Consequently, you can use this operation to manage account root user
2389
- # credentials even if the account has no associated users.
2407
+ # request. This operation works for access keys under the Amazon Web
2408
+ # Services account. Consequently, you can use this operation to manage
2409
+ # Amazon Web Services account root user credentials even if the Amazon
2410
+ # Web Services account has no associated users.
2390
2411
  #
2391
2412
  # @option params [String] :user_name
2392
2413
  # The name of the user whose access key pair you want to delete.
@@ -2440,9 +2461,10 @@ module Aws::IAM
2440
2461
  req.send_request(options)
2441
2462
  end
2442
2463
 
2443
- # Deletes the specified account alias. For information about using an
2444
- # Amazon Web Services account alias, see [Using an alias for your
2445
- # account ID][1] in the *IAM User Guide*.
2464
+ # Deletes the specified Amazon Web Services account alias. For
2465
+ # information about using an Amazon Web Services account alias, see
2466
+ # [Using an alias for your Amazon Web Services account ID][1] in the
2467
+ # *IAM User Guide*.
2446
2468
  #
2447
2469
  #
2448
2470
  #
@@ -2486,7 +2508,8 @@ module Aws::IAM
2486
2508
  req.send_request(options)
2487
2509
  end
2488
2510
 
2489
- # Deletes the password policy for the account. There are no parameters.
2511
+ # Deletes the password policy for the Amazon Web Services account. There
2512
+ # are no parameters.
2490
2513
  #
2491
2514
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2492
2515
  #
@@ -2659,12 +2682,13 @@ module Aws::IAM
2659
2682
 
2660
2683
  # Deletes the password for the specified IAM user, which terminates the
2661
2684
  # user's ability to access Amazon Web Services services through the
2662
- # Management Console.
2685
+ # Amazon Web Services Management Console.
2663
2686
  #
2664
2687
  # You can use the CLI, the Amazon Web Services API, or the **Users**
2665
2688
  # page in the IAM console to delete a password for any IAM user. You can
2666
2689
  # use ChangePassword to update, but not delete, your own password in the
2667
- # **My Security Credentials** page in the Management Console.
2690
+ # **My Security Credentials** page in the Amazon Web Services Management
2691
+ # Console.
2668
2692
  #
2669
2693
  # Deleting a user's password does not prevent a user from accessing
2670
2694
  # Amazon Web Services through the command line interface or the API. To
@@ -3243,9 +3267,10 @@ module Aws::IAM
3243
3267
  #
3244
3268
  # If you do not specify a user name, IAM determines the user name
3245
3269
  # implicitly based on the Amazon Web Services access key ID signing the
3246
- # request. This operation works for access keys under the account.
3247
- # Consequently, you can use this operation to manage account root user
3248
- # credentials even if the account has no associated IAM users.
3270
+ # request. This operation works for access keys under the Amazon Web
3271
+ # Services account. Consequently, you can use this operation to manage
3272
+ # Amazon Web Services account root user credentials even if the Amazon
3273
+ # Web Services account has no associated IAM users.
3249
3274
  #
3250
3275
  # @option params [String] :user_name
3251
3276
  # The name of the user the signing certificate belongs to.
@@ -3298,11 +3323,11 @@ module Aws::IAM
3298
3323
  req.send_request(options)
3299
3324
  end
3300
3325
 
3301
- # Deletes the specified IAM user. Unlike the Management Console, when
3302
- # you delete a user programmatically, you must delete the items attached
3303
- # to the user manually, or the deletion fails. For more information, see
3304
- # [Deleting an IAM user][1]. Before attempting to delete a user, remove
3305
- # the following items:
3326
+ # Deletes the specified IAM user. Unlike the Amazon Web Services
3327
+ # Management Console, when you delete a user programmatically, you must
3328
+ # delete the items attached to the user manually, or the deletion fails.
3329
+ # For more information, see [Deleting an IAM user][1]. Before attempting
3330
+ # to delete a user, remove the following items:
3306
3331
  #
3307
3332
  # * Password (DeleteLoginProfile)
3308
3333
  #
@@ -3738,9 +3763,9 @@ module Aws::IAM
3738
3763
  req.send_request(options)
3739
3764
  end
3740
3765
 
3741
- # Generates a credential report for the account. For more information
3742
- # about the credential report, see [Getting credential reports][1] in
3743
- # the *IAM User Guide*.
3766
+ # Generates a credential report for the Amazon Web Services account. For
3767
+ # more information about the credential report, see [Getting credential
3768
+ # reports][1] in the *IAM User Guide*.
3744
3769
  #
3745
3770
  #
3746
3771
  #
@@ -3796,14 +3821,14 @@ module Aws::IAM
3796
3821
  #
3797
3822
  # The data includes all attempts to access Amazon Web Services, not just
3798
3823
  # the successful ones. This includes all attempts that were made using
3799
- # the Management Console, the Amazon Web Services API through any of the
3800
- # SDKs, or any of the command line tools. An unexpected entry in the
3801
- # service last accessed data does not mean that an account has been
3802
- # compromised, because the request might have been denied. Refer to your
3803
- # CloudTrail logs as the authoritative source for information about all
3804
- # API calls and whether they were successful or denied access. For more
3805
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3806
- # User Guide*.
3824
+ # the Amazon Web Services Management Console, the Amazon Web Services
3825
+ # API through any of the SDKs, or any of the command line tools. An
3826
+ # unexpected entry in the service last accessed data does not mean that
3827
+ # an account has been compromised, because the request might have been
3828
+ # denied. Refer to your CloudTrail logs as the authoritative source for
3829
+ # information about all API calls and whether they were successful or
3830
+ # denied access. For more information, see [Logging IAM events with
3831
+ # CloudTrail][2] in the *IAM User Guide*.
3807
3832
  #
3808
3833
  # This operation returns a `JobId`. Use this parameter in the `
3809
3834
  # GetOrganizationsAccessReport ` operation to check the status of the
@@ -3959,14 +3984,15 @@ module Aws::IAM
3959
3984
  #
3960
3985
  # The service last accessed data includes all attempts to access an
3961
3986
  # Amazon Web Services API, not just the successful ones. This includes
3962
- # all attempts that were made using the Management Console, the Amazon
3963
- # Web Services API through any of the SDKs, or any of the command line
3964
- # tools. An unexpected entry in the service last accessed data does not
3965
- # mean that your account has been compromised, because the request might
3966
- # have been denied. Refer to your CloudTrail logs as the authoritative
3967
- # source for information about all API calls and whether they were
3968
- # successful or denied access. For more information, see [Logging IAM
3969
- # events with CloudTrail][2] in the *IAM User Guide*.
3987
+ # all attempts that were made using the Amazon Web Services Management
3988
+ # Console, the Amazon Web Services API through any of the SDKs, or any
3989
+ # of the command line tools. An unexpected entry in the service last
3990
+ # accessed data does not mean that your account has been compromised,
3991
+ # because the request might have been denied. Refer to your CloudTrail
3992
+ # logs as the authoritative source for information about all API calls
3993
+ # and whether they were successful or denied access. For more
3994
+ # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3995
+ # User Guide*.
3970
3996
  #
3971
3997
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
3972
3998
  # Use this parameter in the following operations to retrieve the
@@ -4284,10 +4310,11 @@ module Aws::IAM
4284
4310
  req.send_request(options)
4285
4311
  end
4286
4312
 
4287
- # Retrieves the password policy for the account. This tells you the
4288
- # complexity requirements and mandatory rotation periods for the IAM
4289
- # user passwords in your account. For more information about using a
4290
- # password policy, see [Managing an IAM password policy][1].
4313
+ # Retrieves the password policy for the Amazon Web Services account.
4314
+ # This tells you the complexity requirements and mandatory rotation
4315
+ # periods for the IAM user passwords in your account. For more
4316
+ # information about using a password policy, see [Managing an IAM
4317
+ # password policy][1].
4291
4318
  #
4292
4319
  #
4293
4320
  #
@@ -4554,9 +4581,9 @@ module Aws::IAM
4554
4581
  req.send_request(options)
4555
4582
  end
4556
4583
 
4557
- # Retrieves a credential report for the account. For more information
4558
- # about the credential report, see [Getting credential reports][1] in
4559
- # the *IAM User Guide*.
4584
+ # Retrieves a credential report for the Amazon Web Services account. For
4585
+ # more information about the credential report, see [Getting credential
4586
+ # reports][1] in the *IAM User Guide*.
4560
4587
  #
4561
4588
  #
4562
4589
  #
@@ -4842,18 +4869,20 @@ module Aws::IAM
4842
4869
  end
4843
4870
 
4844
4871
  # Retrieves the user name for the specified IAM user. A login profile is
4845
- # created when you create a password for the user to access the
4846
- # Management Console. If the user does not exist or does not have a
4847
- # password, the operation returns a 404 (`NoSuchEntity`) error.
4872
+ # created when you create a password for the user to access the Amazon
4873
+ # Web Services Management Console. If the user does not exist or does
4874
+ # not have a password, the operation returns a 404 (`NoSuchEntity`)
4875
+ # error.
4848
4876
  #
4849
4877
  # If you create an IAM user with access to the console, the `CreateDate`
4850
4878
  # reflects the date you created the initial password for the user.
4851
4879
  #
4852
4880
  # If you create an IAM user with programmatic access, and then later add
4853
- # a password for the user to access the Management Console, the
4854
- # `CreateDate` reflects the initial password creation date. A user with
4855
- # programmatic access does not have a login profile unless you create a
4856
- # password for the user to access the Management Console.
4881
+ # a password for the user to access the Amazon Web Services Management
4882
+ # Console, the `CreateDate` reflects the initial password creation date.
4883
+ # A user with programmatic access does not have a login profile unless
4884
+ # you create a password for the user to access the Amazon Web Services
4885
+ # Management Console.
4857
4886
  #
4858
4887
  # @option params [required, String] :user_name
4859
4888
  # The name of the user whose login profile you want to retrieve.
@@ -6131,12 +6160,13 @@ module Aws::IAM
6131
6160
  #
6132
6161
  # If the `UserName` field is not specified, the user name is determined
6133
6162
  # implicitly based on the Amazon Web Services access key ID used to sign
6134
- # the request. This operation works for access keys under the account.
6135
- # Consequently, you can use this operation to manage account root user
6136
- # credentials even if the account has no associated users.
6163
+ # the request. This operation works for access keys under the Amazon Web
6164
+ # Services account. Consequently, you can use this operation to manage
6165
+ # Amazon Web Services account root user credentials even if the Amazon
6166
+ # Web Services account has no associated users.
6137
6167
  #
6138
- # <note markdown="1"> To ensure the security of your account, the secret access key is
6139
- # accessible only during key and user creation.
6168
+ # <note markdown="1"> To ensure the security of your Amazon Web Services account, the secret
6169
+ # access key is accessible only during key and user creation.
6140
6170
  #
6141
6171
  # </note>
6142
6172
  #
@@ -6231,9 +6261,10 @@ module Aws::IAM
6231
6261
  req.send_request(options)
6232
6262
  end
6233
6263
 
6234
- # Lists the account alias associated with the account (Note: you can
6235
- # have only one). For information about using an account alias, see
6236
- # [Using an alias for your account ID][1] in the *IAM User Guide*.
6264
+ # Lists the account alias associated with the Amazon Web Services
6265
+ # account (Note: you can have only one). For information about using an
6266
+ # Amazon Web Services account alias, see [Using an alias for your Amazon
6267
+ # Web Services account ID][1] in the *IAM User Guide*.
6237
6268
  #
6238
6269
  #
6239
6270
  #
@@ -7510,7 +7541,7 @@ module Aws::IAM
7510
7541
  end
7511
7542
 
7512
7543
  # Lists information about the IAM OpenID Connect (OIDC) provider
7513
- # resource objects defined in the account.
7544
+ # resource objects defined in the Amazon Web Services account.
7514
7545
  #
7515
7546
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7516
7547
  # attributes for the resource. For example, this operation does not
@@ -7538,9 +7569,9 @@ module Aws::IAM
7538
7569
  req.send_request(options)
7539
7570
  end
7540
7571
 
7541
- # Lists all the managed policies that are available in your account,
7542
- # including your own customer-defined managed policies and all Amazon
7543
- # Web Services managed policies.
7572
+ # Lists all the managed policies that are available in your Amazon Web
7573
+ # Services account, including your own customer-defined managed policies
7574
+ # and all Amazon Web Services managed policies.
7544
7575
  #
7545
7576
  # You can filter the list of policies that is returned using the
7546
7577
  # optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
@@ -7570,8 +7601,8 @@ module Aws::IAM
7570
7601
  # The scope to use for filtering the results.
7571
7602
  #
7572
7603
  # To list only Amazon Web Services managed policies, set `Scope` to
7573
- # `AWS`. To list only the customer managed policies in your account, set
7574
- # `Scope` to `Local`.
7604
+ # `AWS`. To list only the customer managed policies in your Amazon Web
7605
+ # Services account, set `Scope` to `Local`.
7575
7606
  #
7576
7607
  # This parameter is optional. If it is not included, or if it is set to
7577
7608
  # `All`, all policies are returned.
@@ -8671,9 +8702,9 @@ module Aws::IAM
8671
8702
  # If the `UserName` field is not specified, the user name is determined
8672
8703
  # implicitly based on the Amazon Web Services access key ID used to sign
8673
8704
  # the request for this operation. This operation works for access keys
8674
- # under the account. Consequently, you can use this operation to manage
8675
- # account root user credentials even if the account has no associated
8676
- # users.
8705
+ # under the Amazon Web Services account. Consequently, you can use this
8706
+ # operation to manage Amazon Web Services account root user credentials
8707
+ # even if the Amazon Web Services account has no associated users.
8677
8708
  #
8678
8709
  # @option params [String] :user_name
8679
8710
  # The name of the IAM user whose signing certificates you want to
@@ -8935,8 +8966,9 @@ module Aws::IAM
8935
8966
  end
8936
8967
 
8937
8968
  # Lists the IAM users that have the specified path prefix. If no path
8938
- # prefix is specified, the operation returns all users in the account.
8939
- # If there are none, the operation returns an empty list.
8969
+ # prefix is specified, the operation returns all users in the Amazon Web
8970
+ # Services account. If there are none, the operation returns an empty
8971
+ # list.
8940
8972
  #
8941
8973
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8942
8974
  # attributes for the resource. For example, this operation does not
@@ -9054,10 +9086,10 @@ module Aws::IAM
9054
9086
  req.send_request(options)
9055
9087
  end
9056
9088
 
9057
- # Lists the virtual MFA devices defined in the account by assignment
9058
- # status. If you do not specify an assignment status, the operation
9059
- # returns a list of all virtual MFA devices. Assignment status can be
9060
- # `Assigned`, `Unassigned`, or `Any`.
9089
+ # Lists the virtual MFA devices defined in the Amazon Web Services
9090
+ # account by assignment status. If you do not specify an assignment
9091
+ # status, the operation returns a list of all virtual MFA devices.
9092
+ # Assignment status can be `Assigned`, `Unassigned`, or `Any`.
9061
9093
  #
9062
9094
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
9063
9095
  # attributes for the resource. For example, this operation does not
@@ -9908,7 +9940,7 @@ module Aws::IAM
9908
9940
  end
9909
9941
 
9910
9942
  # Sets the specified version of the global endpoint token as the token
9911
- # version used for the account.
9943
+ # version used for the Amazon Web Services account.
9912
9944
  #
9913
9945
  # By default, Security Token Service (STS) is available as a global
9914
9946
  # service, and all STS requests go to a single endpoint at
@@ -9921,12 +9953,13 @@ module Aws::IAM
9921
9953
  # If you make an STS call to the global endpoint, the resulting session
9922
9954
  # tokens might be valid in some Regions but not others. It depends on
9923
9955
  # the version that is set in this operation. Version 1 tokens are valid
9924
- # only in Regions that are available by default. These tokens do not
9925
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9926
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
9927
- # are longer and might affect systems where you temporarily store
9928
- # tokens. For information, see [Activating and deactivating STS in an
9929
- # Region][2] in the *IAM User Guide*.
9956
+ # only in Amazon Web Services Regions that are available by default.
9957
+ # These tokens do not work in manually enabled Regions, such as Asia
9958
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
9959
+ # However, version 2 tokens are longer and might affect systems where
9960
+ # you temporarily store tokens. For information, see [Activating and
9961
+ # deactivating STS in an Amazon Web Services Region][2] in the *IAM User
9962
+ # Guide*.
9930
9963
  #
9931
9964
  # To view the current session token version, see the
9932
9965
  # `GlobalEndpointTokenVersion` entry in the response of the
@@ -9939,14 +9972,14 @@ module Aws::IAM
9939
9972
  #
9940
9973
  # @option params [required, String] :global_endpoint_token_version
9941
9974
  # The version of the global endpoint token. Version 1 tokens are valid
9942
- # only in Regions that are available by default. These tokens do not
9943
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9944
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
9945
- # are longer and might affect systems where you temporarily store
9946
- # tokens.
9975
+ # only in Amazon Web Services Regions that are available by default.
9976
+ # These tokens do not work in manually enabled Regions, such as Asia
9977
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
9978
+ # However, version 2 tokens are longer and might affect systems where
9979
+ # you temporarily store tokens.
9947
9980
  #
9948
- # For information, see [Activating and deactivating STS in an Region][1]
9949
- # in the *IAM User Guide*.
9981
+ # For information, see [Activating and deactivating STS in an Amazon Web
9982
+ # Services Region][1] in the *IAM User Guide*.
9950
9983
  #
9951
9984
  #
9952
9985
  #
@@ -10136,12 +10169,12 @@ module Aws::IAM
10136
10169
  # [2]: http://wikipedia.org/wiki/regex
10137
10170
  #
10138
10171
  # @option params [String] :resource_owner
10139
- # An ARN representing the account ID that specifies the owner of any
10140
- # simulated resource that does not identify its owner in the resource
10141
- # ARN. Examples of resource ARNs include an S3 bucket or object. If
10142
- # `ResourceOwner` is specified, it is also used as the account owner of
10143
- # any `ResourcePolicy` included in the simulation. If the
10144
- # `ResourceOwner` parameter is not specified, then the owner of the
10172
+ # An ARN representing the Amazon Web Services account ID that specifies
10173
+ # the owner of any simulated resource that does not identify its owner
10174
+ # in the resource ARN. Examples of resource ARNs include an S3 bucket or
10175
+ # object. If `ResourceOwner` is specified, it is also used as the
10176
+ # account owner of any `ResourcePolicy` included in the simulation. If
10177
+ # the `ResourceOwner` parameter is not specified, then the owner of the
10145
10178
  # resources and the resource policy defaults to the account of the
10146
10179
  # identity provided in `CallerArn`. This parameter is required only if
10147
10180
  # you specify a resource-based policy and account that owns the resource
@@ -10482,16 +10515,17 @@ module Aws::IAM
10482
10515
  # [2]: http://wikipedia.org/wiki/regex
10483
10516
  #
10484
10517
  # @option params [String] :resource_owner
10485
- # An account ID that specifies the owner of any simulated resource that
10486
- # does not identify its owner in the resource ARN. Examples of resource
10487
- # ARNs include an S3 bucket or object. If `ResourceOwner` is specified,
10488
- # it is also used as the account owner of any `ResourcePolicy` included
10489
- # in the simulation. If the `ResourceOwner` parameter is not specified,
10490
- # then the owner of the resources and the resource policy defaults to
10491
- # the account of the identity provided in `CallerArn`. This parameter is
10492
- # required only if you specify a resource-based policy and account that
10493
- # owns the resource is different from the account that owns the
10494
- # simulated calling user `CallerArn`.
10518
+ # An Amazon Web Services account ID that specifies the owner of any
10519
+ # simulated resource that does not identify its owner in the resource
10520
+ # ARN. Examples of resource ARNs include an S3 bucket or object. If
10521
+ # `ResourceOwner` is specified, it is also used as the account owner of
10522
+ # any `ResourcePolicy` included in the simulation. If the
10523
+ # `ResourceOwner` parameter is not specified, then the owner of the
10524
+ # resources and the resource policy defaults to the account of the
10525
+ # identity provided in `CallerArn`. This parameter is required only if
10526
+ # you specify a resource-based policy and account that owns the resource
10527
+ # is different from the account that owns the simulated calling user
10528
+ # `CallerArn`.
10495
10529
  #
10496
10530
  # @option params [String] :caller_arn
10497
10531
  # The ARN of the IAM user that you want to specify as the simulated
@@ -11723,9 +11757,10 @@ module Aws::IAM
11723
11757
  #
11724
11758
  # If the `UserName` is not specified, the user name is determined
11725
11759
  # implicitly based on the Amazon Web Services access key ID used to sign
11726
- # the request. This operation works for access keys under the account.
11727
- # Consequently, you can use this operation to manage account root user
11728
- # credentials even if the account has no associated users.
11760
+ # the request. This operation works for access keys under the Amazon Web
11761
+ # Services account. Consequently, you can use this operation to manage
11762
+ # Amazon Web Services account root user credentials even if the Amazon
11763
+ # Web Services account has no associated users.
11729
11764
  #
11730
11765
  # For information about rotating keys, see [Managing keys and
11731
11766
  # certificates][1] in the *IAM User Guide*.
@@ -11793,7 +11828,8 @@ module Aws::IAM
11793
11828
  req.send_request(options)
11794
11829
  end
11795
11830
 
11796
- # Updates the password policy settings for the account.
11831
+ # Updates the password policy settings for the Amazon Web Services
11832
+ # account.
11797
11833
  #
11798
11834
  # <note markdown="1"> * This operation does not support partial updates. No parameters are
11799
11835
  # required, but if you do not specify a parameter, that parameter's
@@ -11855,9 +11891,10 @@ module Aws::IAM
11855
11891
  # require at least one lowercase character.
11856
11892
  #
11857
11893
  # @option params [Boolean] :allow_users_to_change_password
11858
- # Allows all IAM users in your account to use the Management Console to
11859
- # change their own passwords. For more information, see [Letting IAM
11860
- # users change their own passwords][1] in the *IAM User Guide*.
11894
+ # Allows all IAM users in your account to use the Amazon Web Services
11895
+ # Management Console to change their own passwords. For more
11896
+ # information, see [Letting IAM users change their own passwords][1] in
11897
+ # the *IAM User Guide*.
11861
11898
  #
11862
11899
  # If you do not specify a value for this parameter, then the operation
11863
11900
  # uses the default value of `false`. The result is that IAM users in the
@@ -12092,7 +12129,7 @@ module Aws::IAM
12092
12129
  # the Amazon Web Services API, or the **Users** page in the IAM console
12093
12130
  # to change the password for any IAM user. Use ChangePassword to change
12094
12131
  # your own password in the **My Security Credentials** page in the
12095
- # Management Console.
12132
+ # Amazon Web Services Management Console.
12096
12133
  #
12097
12134
  # For more information about modifying passwords, see [Managing
12098
12135
  # passwords][1] in the *IAM User Guide*.
@@ -12129,8 +12166,8 @@ module Aws::IAM
12129
12166
  # carriage return (`\u000D`)
12130
12167
  #
12131
12168
  # However, the format can be further restricted by the account
12132
- # administrator by setting a password policy on the account. For more
12133
- # information, see UpdateAccountPasswordPolicy.
12169
+ # administrator by setting a password policy on the Amazon Web Services
12170
+ # account. For more information, see UpdateAccountPasswordPolicy.
12134
12171
  #
12135
12172
  #
12136
12173
  #
@@ -12597,9 +12634,10 @@ module Aws::IAM
12597
12634
  #
12598
12635
  # If the `UserName` field is not specified, the user name is determined
12599
12636
  # implicitly based on the Amazon Web Services access key ID used to sign
12600
- # the request. This operation works for access keys under the account.
12601
- # Consequently, you can use this operation to manage account root user
12602
- # credentials even if the account has no associated users.
12637
+ # the request. This operation works for access keys under the Amazon Web
12638
+ # Services account. Consequently, you can use this operation to manage
12639
+ # Amazon Web Services account root user credentials even if the Amazon
12640
+ # Web Services account has no associated users.
12603
12641
  #
12604
12642
  # @option params [String] :user_name
12605
12643
  # The name of the IAM user the signing certificate belongs to.
@@ -12820,9 +12858,10 @@ module Aws::IAM
12820
12858
  req.send_request(options)
12821
12859
  end
12822
12860
 
12823
- # Uploads a server certificate entity for the account. The server
12824
- # certificate entity includes a public key certificate, a private key,
12825
- # and an optional certificate chain, which should all be PEM-encoded.
12861
+ # Uploads a server certificate entity for the Amazon Web Services
12862
+ # account. The server certificate entity includes a public key
12863
+ # certificate, a private key, and an optional certificate chain, which
12864
+ # should all be PEM-encoded.
12826
12865
  #
12827
12866
  # We recommend that you use [Certificate Manager][1] to provision,
12828
12867
  # manage, and deploy your server certificates. With ACM you can request
@@ -13047,9 +13086,10 @@ module Aws::IAM
13047
13086
  #
13048
13087
  # If the `UserName` is not specified, the IAM user name is determined
13049
13088
  # implicitly based on the Amazon Web Services access key ID used to sign
13050
- # the request. This operation works for access keys under the account.
13051
- # Consequently, you can use this operation to manage account root user
13052
- # credentials even if the account has no associated users.
13089
+ # the request. This operation works for access keys under the Amazon Web
13090
+ # Services account. Consequently, you can use this operation to manage
13091
+ # Amazon Web Services account root user credentials even if the Amazon
13092
+ # Web Services account has no associated users.
13053
13093
  #
13054
13094
  # <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
13055
13095
  # POST rather than GET when calling `UploadSigningCertificate`. For
@@ -13160,7 +13200,7 @@ module Aws::IAM
13160
13200
  params: params,
13161
13201
  config: config)
13162
13202
  context[:gem_name] = 'aws-sdk-iam'
13163
- context[:gem_version] = '1.59.0'
13203
+ context[:gem_version] = '1.63.0'
13164
13204
  Seahorse::Client::Request.new(handlers, context)
13165
13205
  end
13166
13206
 
@@ -197,8 +197,9 @@ module Aws::IAM
197
197
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
198
198
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
199
199
  # of these characters are valid in a password. However, many tools, such
200
- # as the Management Console, might restrict the ability to type certain
201
- # characters because they have special meaning within that tool.
200
+ # as the Amazon Web Services Management Console, might restrict the
201
+ # ability to type certain characters because they have special meaning
202
+ # within that tool.
202
203
  #
203
204
  #
204
205
  #
@@ -251,8 +252,8 @@ module Aws::IAM
251
252
  # carriage return (`\u000D`)
252
253
  #
253
254
  # However, the format can be further restricted by the account
254
- # administrator by setting a password policy on the account. For more
255
- # information, see UpdateAccountPasswordPolicy.
255
+ # administrator by setting a password policy on the Amazon Web Services
256
+ # account. For more information, see UpdateAccountPasswordPolicy.
256
257
  #
257
258
  #
258
259
  #
@@ -45,8 +45,8 @@ module Aws::IAM
45
45
  # @option options [required, String] :old_password
46
46
  # The IAM user's current password.
47
47
  # @option options [required, String] :new_password
48
- # The new password. The new password must conform to the account's
49
- # password policy, if one exists.
48
+ # The new password. The new password must conform to the Amazon Web
49
+ # Services account's password policy, if one exists.
50
50
  #
51
51
  # The [regex pattern][1] that is used to validate this parameter is a
52
52
  # string of characters. That string can include almost any printable
@@ -54,8 +54,9 @@ module Aws::IAM
54
54
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
55
55
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
56
56
  # of these characters are valid in a password. However, many tools, such
57
- # as the Management Console, might restrict the ability to type certain
58
- # characters because they have special meaning within that tool.
57
+ # as the Amazon Web Services Management Console, might restrict the
58
+ # ability to type certain characters because they have special meaning
59
+ # within that tool.
59
60
  #
60
61
  #
61
62
  #
@@ -139,9 +140,10 @@ module Aws::IAM
139
140
  # uses the default value of `false`. The result is that passwords do not
140
141
  # require at least one lowercase character.
141
142
  # @option options [Boolean] :allow_users_to_change_password
142
- # Allows all IAM users in your account to use the Management Console to
143
- # change their own passwords. For more information, see [Letting IAM
144
- # users change their own passwords][1] in the *IAM User Guide*.
143
+ # Allows all IAM users in your account to use the Amazon Web Services
144
+ # Management Console to change their own passwords. For more
145
+ # information, see [Letting IAM users change their own passwords][1] in
146
+ # the *IAM User Guide*.
145
147
  #
146
148
  # If you do not specify a value for this parameter, then the operation
147
149
  # uses the default value of `false`. The result is that IAM users in the
@@ -325,6 +327,10 @@ module Aws::IAM
325
327
  # character (`\u007F`), including most punctuation characters, digits,
326
328
  # and upper and lowercased letters.
327
329
  #
330
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
331
+ #
332
+ # </note>
333
+ #
328
334
  #
329
335
  #
330
336
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -1015,8 +1021,8 @@ module Aws::IAM
1015
1021
  # The scope to use for filtering the results.
1016
1022
  #
1017
1023
  # To list only Amazon Web Services managed policies, set `Scope` to
1018
- # `AWS`. To list only the customer managed policies in your account, set
1019
- # `Scope` to `Local`.
1024
+ # `AWS`. To list only the customer managed policies in your Amazon Web
1025
+ # Services account, set `Scope` to `Local`.
1020
1026
  #
1021
1027
  # This parameter is optional. If it is not included, or if it is set to
1022
1028
  # `All`, all policies are returned.
@@ -186,8 +186,9 @@ module Aws::IAM
186
186
  # @return [String]
187
187
  #
188
188
  # @!attribute [rw] region
189
- # The Region where this access key was most recently used. The value
190
- # for this field is "N/A" in the following situations:
189
+ # The Amazon Web Services Region where this access key was most
190
+ # recently used. The value for this field is "N/A" in the following
191
+ # situations:
191
192
  #
192
193
  # * The user does not have an access key.
193
194
  #
@@ -196,8 +197,8 @@ module Aws::IAM
196
197
  #
197
198
  # * There is no sign-in data associated with the user.
198
199
  #
199
- # For more information about Regions, see [Regions and endpoints][1]
200
- # in the Amazon Web Services General Reference.
200
+ # For more information about Amazon Web Services Regions, see [Regions
201
+ # and endpoints][1] in the Amazon Web Services General Reference.
201
202
  #
202
203
  #
203
204
  #
@@ -574,8 +575,8 @@ module Aws::IAM
574
575
  # @return [String]
575
576
  #
576
577
  # @!attribute [rw] new_password
577
- # The new password. The new password must conform to the account's
578
- # password policy, if one exists.
578
+ # The new password. The new password must conform to the Amazon Web
579
+ # Services account's password policy, if one exists.
579
580
  #
580
581
  # The [regex pattern][1] that is used to validate this parameter is a
581
582
  # string of characters. That string can include almost any printable
@@ -583,9 +584,9 @@ module Aws::IAM
583
584
  # ASCII character range (`\u00FF`). You can also include the tab
584
585
  # (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
585
586
  # characters. Any of these characters are valid in a password.
586
- # However, many tools, such as the Management Console, might restrict
587
- # the ability to type certain characters because they have special
588
- # meaning within that tool.
587
+ # However, many tools, such as the Amazon Web Services Management
588
+ # Console, might restrict the ability to type certain characters
589
+ # because they have special meaning within that tool.
589
590
  #
590
591
  #
591
592
  #
@@ -911,9 +912,9 @@ module Aws::IAM
911
912
  # ASCII character range (`\u00FF`). You can also include the tab
912
913
  # (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
913
914
  # characters. Any of these characters are valid in a password.
914
- # However, many tools, such as the Management Console, might restrict
915
- # the ability to type certain characters because they have special
916
- # meaning within that tool.
915
+ # However, many tools, such as the Amazon Web Services Management
916
+ # Console, might restrict the ability to type certain characters
917
+ # because they have special meaning within that tool.
917
918
  #
918
919
  #
919
920
  #
@@ -970,18 +971,19 @@ module Aws::IAM
970
971
  # Connect ID tokens. Per the OIDC standard, path components are
971
972
  # allowed but query parameters are not. Typically the URL consists of
972
973
  # only a hostname, like `https://server.example.org` or
973
- # `https://example.com`.
974
+ # `https://example.com`. The URL should not contain a port number.
974
975
  #
975
976
  # You cannot register the same provider multiple times in a single
976
- # account. If you try to submit a URL that has already been used for
977
- # an OpenID Connect provider in the account, you will get an error.
977
+ # Amazon Web Services account. If you try to submit a URL that has
978
+ # already been used for an OpenID Connect provider in the Amazon Web
979
+ # Services account, you will get an error.
978
980
  # @return [String]
979
981
  #
980
982
  # @!attribute [rw] client_id_list
981
- # A list of client IDs (also known as audiences). When a mobile or web
982
- # app registers with an OpenID Connect provider, they establish a
983
- # value that identifies the application. (This is the value that's
984
- # sent as the `client_id` parameter on OAuth requests.)
983
+ # Provides a list of client IDs, also known as audiences. When a
984
+ # mobile or web app registers with an OpenID Connect provider, they
985
+ # establish a value that identifies the application. This is the value
986
+ # that's sent as the `client_id` parameter on OAuth requests.
985
987
  #
986
988
  # You can register multiple client IDs with the same provider. For
987
989
  # example, you might have multiple applications that use the same OIDC
@@ -1010,11 +1012,11 @@ module Aws::IAM
1010
1012
  # `server.example.com` and the provider stores its keys at
1011
1013
  # https://keys.server.example.com/openid-connect. In that case, the
1012
1014
  # thumbprint string would be the hex-encoded SHA-1 hash value of the
1013
- # certificate used by https://keys.server.example.com.
1015
+ # certificate used by `https://keys.server.example.com.`
1014
1016
  #
1015
- # For more information about obtaining the OIDC provider's
1016
- # thumbprint, see [Obtaining the thumbprint for an OpenID Connect
1017
- # provider][1] in the *IAM User Guide*.
1017
+ # For more information about obtaining the OIDC provider thumbprint,
1018
+ # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
1019
+ # the *IAM User Guide*.
1018
1020
  #
1019
1021
  #
1020
1022
  #
@@ -1119,6 +1121,10 @@ module Aws::IAM
1119
1121
  # DEL character (`\u007F`), including most punctuation characters,
1120
1122
  # digits, and upper and lowercased letters.
1121
1123
  #
1124
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
1125
+ #
1126
+ # </note>
1127
+ #
1122
1128
  #
1123
1129
  #
1124
1130
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -3911,7 +3917,7 @@ module Aws::IAM
3911
3917
  #
3912
3918
  # @!attribute [rw] create_date
3913
3919
  # The date and time when the IAM OIDC provider resource object was
3914
- # created in the account.
3920
+ # created in the Amazon Web Services account.
3915
3921
  # @return [Time]
3916
3922
  #
3917
3923
  # @!attribute [rw] tags
@@ -6594,8 +6600,8 @@ module Aws::IAM
6594
6600
  # request.
6595
6601
  #
6596
6602
  # @!attribute [rw] open_id_connect_provider_list
6597
- # The list of IAM OIDC provider resource objects defined in the
6598
- # account.
6603
+ # The list of IAM OIDC provider resource objects defined in the Amazon
6604
+ # Web Services account.
6599
6605
  # @return [Array<Types::OpenIDConnectProviderListEntry>]
6600
6606
  #
6601
6607
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOpenIDConnectProvidersResponse AWS API Documentation
@@ -6739,8 +6745,8 @@ module Aws::IAM
6739
6745
  # The scope to use for filtering the results.
6740
6746
  #
6741
6747
  # To list only Amazon Web Services managed policies, set `Scope` to
6742
- # `AWS`. To list only the customer managed policies in your account,
6743
- # set `Scope` to `Local`.
6748
+ # `AWS`. To list only the customer managed policies in your Amazon Web
6749
+ # Services account, set `Scope` to `Local`.
6744
6750
  #
6745
6751
  # This parameter is optional. If it is not included, or if it is set
6746
6752
  # to `All`, all policies are returned.
@@ -8132,8 +8138,8 @@ module Aws::IAM
8132
8138
  # and GetLoginProfile operations.
8133
8139
  #
8134
8140
  # @!attribute [rw] user_name
8135
- # The name of the user, which can be used for signing in to the
8136
- # Management Console.
8141
+ # The name of the user, which can be used for signing in to the Amazon
8142
+ # Web Services Management Console.
8137
8143
  # @return [String]
8138
8144
  #
8139
8145
  # @!attribute [rw] create_date
@@ -9813,7 +9819,8 @@ module Aws::IAM
9813
9819
  # @return [Time]
9814
9820
  #
9815
9821
  # @!attribute [rw] region
9816
- # The name of the Region in which the role was last used.
9822
+ # The name of the Amazon Web Services Region in which the role was
9823
+ # last used.
9817
9824
  # @return [String]
9818
9825
  #
9819
9826
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/RoleLastUsed AWS API Documentation
@@ -10347,14 +10354,14 @@ module Aws::IAM
10347
10354
  #
10348
10355
  # @!attribute [rw] global_endpoint_token_version
10349
10356
  # The version of the global endpoint token. Version 1 tokens are valid
10350
- # only in Regions that are available by default. These tokens do not
10351
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
10352
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
10353
- # are longer and might affect systems where you temporarily store
10354
- # tokens.
10357
+ # only in Amazon Web Services Regions that are available by default.
10358
+ # These tokens do not work in manually enabled Regions, such as Asia
10359
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
10360
+ # However, version 2 tokens are longer and might affect systems where
10361
+ # you temporarily store tokens.
10355
10362
  #
10356
- # For information, see [Activating and deactivating STS in an
10357
- # Region][1] in the *IAM User Guide*.
10363
+ # For information, see [Activating and deactivating STS in an Amazon
10364
+ # Web Services Region][1] in the *IAM User Guide*.
10358
10365
  #
10359
10366
  #
10360
10367
  #
@@ -10563,17 +10570,17 @@ module Aws::IAM
10563
10570
  # @return [String]
10564
10571
  #
10565
10572
  # @!attribute [rw] resource_owner
10566
- # An ARN representing the account ID that specifies the owner of any
10567
- # simulated resource that does not identify its owner in the resource
10568
- # ARN. Examples of resource ARNs include an S3 bucket or object. If
10569
- # `ResourceOwner` is specified, it is also used as the account owner
10570
- # of any `ResourcePolicy` included in the simulation. If the
10571
- # `ResourceOwner` parameter is not specified, then the owner of the
10572
- # resources and the resource policy defaults to the account of the
10573
- # identity provided in `CallerArn`. This parameter is required only if
10574
- # you specify a resource-based policy and account that owns the
10575
- # resource is different from the account that owns the simulated
10576
- # calling user `CallerArn`.
10573
+ # An ARN representing the Amazon Web Services account ID that
10574
+ # specifies the owner of any simulated resource that does not identify
10575
+ # its owner in the resource ARN. Examples of resource ARNs include an
10576
+ # S3 bucket or object. If `ResourceOwner` is specified, it is also
10577
+ # used as the account owner of any `ResourcePolicy` included in the
10578
+ # simulation. If the `ResourceOwner` parameter is not specified, then
10579
+ # the owner of the resources and the resource policy defaults to the
10580
+ # account of the identity provided in `CallerArn`. This parameter is
10581
+ # required only if you specify a resource-based policy and account
10582
+ # that owns the resource is different from the account that owns the
10583
+ # simulated calling user `CallerArn`.
10577
10584
  #
10578
10585
  # The ARN for an account uses the following syntax:
10579
10586
  # `arn:aws:iam::AWS-account-ID:root`. For example, to represent the
@@ -10880,17 +10887,17 @@ module Aws::IAM
10880
10887
  # @return [String]
10881
10888
  #
10882
10889
  # @!attribute [rw] resource_owner
10883
- # An account ID that specifies the owner of any simulated resource
10884
- # that does not identify its owner in the resource ARN. Examples of
10885
- # resource ARNs include an S3 bucket or object. If `ResourceOwner` is
10886
- # specified, it is also used as the account owner of any
10887
- # `ResourcePolicy` included in the simulation. If the `ResourceOwner`
10888
- # parameter is not specified, then the owner of the resources and the
10889
- # resource policy defaults to the account of the identity provided in
10890
- # `CallerArn`. This parameter is required only if you specify a
10891
- # resource-based policy and account that owns the resource is
10892
- # different from the account that owns the simulated calling user
10893
- # `CallerArn`.
10890
+ # An Amazon Web Services account ID that specifies the owner of any
10891
+ # simulated resource that does not identify its owner in the resource
10892
+ # ARN. Examples of resource ARNs include an S3 bucket or object. If
10893
+ # `ResourceOwner` is specified, it is also used as the account owner
10894
+ # of any `ResourcePolicy` included in the simulation. If the
10895
+ # `ResourceOwner` parameter is not specified, then the owner of the
10896
+ # resources and the resource policy defaults to the account of the
10897
+ # identity provided in `CallerArn`. This parameter is required only if
10898
+ # you specify a resource-based policy and account that owns the
10899
+ # resource is different from the account that owns the simulated
10900
+ # calling user `CallerArn`.
10894
10901
  # @return [String]
10895
10902
  #
10896
10903
  # @!attribute [rw] caller_arn
@@ -11913,9 +11920,10 @@ module Aws::IAM
11913
11920
  # @return [Boolean]
11914
11921
  #
11915
11922
  # @!attribute [rw] allow_users_to_change_password
11916
- # Allows all IAM users in your account to use the Management Console
11917
- # to change their own passwords. For more information, see [Letting
11918
- # IAM users change their own passwords][1] in the *IAM User Guide*.
11923
+ # Allows all IAM users in your account to use the Amazon Web Services
11924
+ # Management Console to change their own passwords. For more
11925
+ # information, see [Letting IAM users change their own passwords][1]
11926
+ # in the *IAM User Guide*.
11919
11927
  #
11920
11928
  # If you do not specify a value for this parameter, then the operation
11921
11929
  # uses the default value of `false`. The result is that IAM users in
@@ -12123,8 +12131,9 @@ module Aws::IAM
12123
12131
  # carriage return (`\u000D`)
12124
12132
  #
12125
12133
  # However, the format can be further restricted by the account
12126
- # administrator by setting a password policy on the account. For more
12127
- # information, see UpdateAccountPasswordPolicy.
12134
+ # administrator by setting a password policy on the Amazon Web
12135
+ # Services account. For more information, see
12136
+ # UpdateAccountPasswordPolicy.
12128
12137
  #
12129
12138
  #
12130
12139
  #
@@ -439,8 +439,9 @@ module Aws::IAM
439
439
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
440
440
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
441
441
  # of these characters are valid in a password. However, many tools, such
442
- # as the Management Console, might restrict the ability to type certain
443
- # characters because they have special meaning within that tool.
442
+ # as the Amazon Web Services Management Console, might restrict the
443
+ # ability to type certain characters because they have special meaning
444
+ # within that tool.
444
445
  #
445
446
  #
446
447
  #
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.59.0'
73
+ GEM_VERSION = '1.63.0'
74
74
 
75
75
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.59.0
4
+ version: 1.63.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-07-30 00:00:00.000000000 Z
11
+ date: 2021-11-04 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.119.0
22
+ version: 3.122.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.119.0
32
+ version: 3.122.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement
@@ -99,7 +99,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
99
99
  requirements:
100
100
  - - ">="
101
101
  - !ruby/object:Gem::Version
102
- version: '0'
102
+ version: '2.3'
103
103
  required_rubygems_version: !ruby/object:Gem::Requirement
104
104
  requirements:
105
105
  - - ">="