aws-sdk-iam 1.59.0 → 1.63.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +20 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/account_password_policy.rb +4 -3
- data/lib/aws-sdk-iam/client.rb +212 -172
- data/lib/aws-sdk-iam/login_profile.rb +5 -4
- data/lib/aws-sdk-iam/resource.rb +15 -9
- data/lib/aws-sdk-iam/types.rb +74 -65
- data/lib/aws-sdk-iam/user.rb +3 -2
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +5 -5
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 9fa3433396c62a683d3f1027e960f1b063f5451fae8eeee3df5079098251ae3e
|
4
|
+
data.tar.gz: ef7ad364a3f2cacd4d18627ddbc3e55d238a9ed2d58a7c1720a0d679582867ab
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4abb7e8a0978c1c4282d503e9159c95a56e8f11cf5cd20d7938f5c438e7a69dd5f02f3ed883a3687cbeeb775e1f631e061e7fce3c748a17dd1bcab36e0e77855
|
7
|
+
data.tar.gz: e7644e8888056627f6f1dc4c30767c768a95144861eb8b509e96ba12ec0d1e464a9e5bbedbb4bd236ce96d7745c8b1a10305396d6ac6fab61206a4bf613eaaed
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,26 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.63.0 (2021-11-04)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.62.0 (2021-10-18)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
14
|
+
1.61.0 (2021-09-22)
|
15
|
+
------------------
|
16
|
+
|
17
|
+
* Feature - Added changes to OIDC API about not using port numbers in the URL.
|
18
|
+
|
19
|
+
1.60.0 (2021-09-01)
|
20
|
+
------------------
|
21
|
+
|
22
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
23
|
+
|
4
24
|
1.59.0 (2021-07-30)
|
5
25
|
------------------
|
6
26
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.63.0
|
@@ -288,9 +288,10 @@ module Aws::IAM
|
|
288
288
|
# uses the default value of `false`. The result is that passwords do not
|
289
289
|
# require at least one lowercase character.
|
290
290
|
# @option options [Boolean] :allow_users_to_change_password
|
291
|
-
# Allows all IAM users in your account to use the
|
292
|
-
# change their own passwords. For more
|
293
|
-
# users change their own passwords][1] in
|
291
|
+
# Allows all IAM users in your account to use the Amazon Web Services
|
292
|
+
# Management Console to change their own passwords. For more
|
293
|
+
# information, see [Letting IAM users change their own passwords][1] in
|
294
|
+
# the *IAM User Guide*.
|
294
295
|
#
|
295
296
|
# If you do not specify a value for this parameter, then the operation
|
296
297
|
# uses the default value of `false`. The result is that IAM users in the
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -275,6 +275,15 @@ module Aws::IAM
|
|
275
275
|
# ** Please note ** When response stubbing is enabled, no HTTP
|
276
276
|
# requests are made, and retries are disabled.
|
277
277
|
#
|
278
|
+
# @option options [Boolean] :use_dualstack_endpoint
|
279
|
+
# When set to `true`, dualstack enabled endpoints (with `.aws` TLD)
|
280
|
+
# will be used if available.
|
281
|
+
#
|
282
|
+
# @option options [Boolean] :use_fips_endpoint
|
283
|
+
# When set to `true`, fips compatible endpoints will be used if available.
|
284
|
+
# When a `fips` region is used, the region is normalized and this config
|
285
|
+
# is set to `true`.
|
286
|
+
#
|
278
287
|
# @option options [Boolean] :validate_params (true)
|
279
288
|
# When `true`, request parameters are validated before
|
280
289
|
# sending the request.
|
@@ -714,9 +723,9 @@ module Aws::IAM
|
|
714
723
|
|
715
724
|
# Changes the password of the IAM user who is calling this operation.
|
716
725
|
# This operation can be performed using the CLI, the Amazon Web Services
|
717
|
-
# API, or the **My Security Credentials** page in the
|
718
|
-
# Console. The account root user
|
719
|
-
# operation.
|
726
|
+
# API, or the **My Security Credentials** page in the Amazon Web
|
727
|
+
# Services Management Console. The Amazon Web Services account root user
|
728
|
+
# password is not affected by this operation.
|
720
729
|
#
|
721
730
|
# Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
|
722
731
|
# the **Users** page in the IAM console to change the password for any
|
@@ -731,8 +740,8 @@ module Aws::IAM
|
|
731
740
|
# The IAM user's current password.
|
732
741
|
#
|
733
742
|
# @option params [required, String] :new_password
|
734
|
-
# The new password. The new password must conform to the
|
735
|
-
# password policy, if one exists.
|
743
|
+
# The new password. The new password must conform to the Amazon Web
|
744
|
+
# Services account's password policy, if one exists.
|
736
745
|
#
|
737
746
|
# The [regex pattern][1] that is used to validate this parameter is a
|
738
747
|
# string of characters. That string can include almost any printable
|
@@ -740,8 +749,9 @@ module Aws::IAM
|
|
740
749
|
# character range (`\u00FF`). You can also include the tab (`\u0009`),
|
741
750
|
# line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
|
742
751
|
# of these characters are valid in a password. However, many tools, such
|
743
|
-
# as the Management Console, might restrict the
|
744
|
-
# characters because they have special meaning
|
752
|
+
# as the Amazon Web Services Management Console, might restrict the
|
753
|
+
# ability to type certain characters because they have special meaning
|
754
|
+
# within that tool.
|
745
755
|
#
|
746
756
|
#
|
747
757
|
#
|
@@ -781,18 +791,19 @@ module Aws::IAM
|
|
781
791
|
#
|
782
792
|
# If you do not specify a user name, IAM determines the user name
|
783
793
|
# implicitly based on the Amazon Web Services access key ID signing the
|
784
|
-
# request. This operation works for access keys under the
|
785
|
-
# Consequently, you can use this operation to manage
|
786
|
-
# credentials. This is true even
|
794
|
+
# request. This operation works for access keys under the Amazon Web
|
795
|
+
# Services account. Consequently, you can use this operation to manage
|
796
|
+
# Amazon Web Services account root user credentials. This is true even
|
797
|
+
# if the Amazon Web Services account has no associated users.
|
787
798
|
#
|
788
799
|
# For information about quotas on the number of keys you can create, see
|
789
800
|
# [IAM and STS quotas][1] in the *IAM User Guide*.
|
790
801
|
#
|
791
|
-
# To ensure the security of your account, the secret
|
792
|
-
# accessible only during key and user creation. You must
|
793
|
-
# (for example, in a text file) if you want to be able to
|
794
|
-
# again. If a secret key is lost, you can delete the access
|
795
|
-
# associated user and then create new keys.
|
802
|
+
# To ensure the security of your Amazon Web Services account, the secret
|
803
|
+
# access key is accessible only during key and user creation. You must
|
804
|
+
# save the key (for example, in a text file) if you want to be able to
|
805
|
+
# access it again. If a secret key is lost, you can delete the access
|
806
|
+
# keys for the associated user and then create new keys.
|
796
807
|
#
|
797
808
|
#
|
798
809
|
#
|
@@ -857,9 +868,9 @@ module Aws::IAM
|
|
857
868
|
req.send_request(options)
|
858
869
|
end
|
859
870
|
|
860
|
-
# Creates an alias for your account. For information
|
861
|
-
# account alias, see [Using an alias
|
862
|
-
# User Guide*.
|
871
|
+
# Creates an alias for your Amazon Web Services account. For information
|
872
|
+
# about using an Amazon Web Services account alias, see [Using an alias
|
873
|
+
# for your Amazon Web Services account ID][1] in the *IAM User Guide*.
|
863
874
|
#
|
864
875
|
#
|
865
876
|
#
|
@@ -1125,13 +1136,14 @@ module Aws::IAM
|
|
1125
1136
|
end
|
1126
1137
|
|
1127
1138
|
# Creates a password for the specified IAM user. A password allows an
|
1128
|
-
# IAM user to access Amazon Web Services services through the
|
1129
|
-
# Console.
|
1139
|
+
# IAM user to access Amazon Web Services services through the Amazon Web
|
1140
|
+
# Services Management Console.
|
1130
1141
|
#
|
1131
1142
|
# You can use the CLI, the Amazon Web Services API, or the **Users**
|
1132
1143
|
# page in the IAM console to create a password for any IAM user. Use
|
1133
1144
|
# ChangePassword to update your own existing password in the **My
|
1134
|
-
# Security Credentials** page in the Management
|
1145
|
+
# Security Credentials** page in the Amazon Web Services Management
|
1146
|
+
# Console.
|
1135
1147
|
#
|
1136
1148
|
# For more information about managing passwords, see [Managing
|
1137
1149
|
# passwords][1] in the *IAM User Guide*.
|
@@ -1162,8 +1174,9 @@ module Aws::IAM
|
|
1162
1174
|
# character range (`\u00FF`). You can also include the tab (`\u0009`),
|
1163
1175
|
# line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
|
1164
1176
|
# of these characters are valid in a password. However, many tools, such
|
1165
|
-
# as the Management Console, might restrict the
|
1166
|
-
# characters because they have special meaning
|
1177
|
+
# as the Amazon Web Services Management Console, might restrict the
|
1178
|
+
# ability to type certain characters because they have special meaning
|
1179
|
+
# within that tool.
|
1167
1180
|
#
|
1168
1181
|
#
|
1169
1182
|
#
|
@@ -1247,8 +1260,8 @@ module Aws::IAM
|
|
1247
1260
|
# * A list of thumbprints of one or more server certificates that the
|
1248
1261
|
# IdP uses
|
1249
1262
|
#
|
1250
|
-
# You get all of this information from the OIDC IdP
|
1251
|
-
#
|
1263
|
+
# You get all of this information from the OIDC IdP you want to use to
|
1264
|
+
# access Amazon Web Services.
|
1252
1265
|
#
|
1253
1266
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
1254
1267
|
# providers (IdPs) through our library of trusted certificate
|
@@ -1277,16 +1290,18 @@ module Aws::IAM
|
|
1277
1290
|
# Connect ID tokens. Per the OIDC standard, path components are allowed
|
1278
1291
|
# but query parameters are not. Typically the URL consists of only a
|
1279
1292
|
# hostname, like `https://server.example.org` or `https://example.com`.
|
1293
|
+
# The URL should not contain a port number.
|
1280
1294
|
#
|
1281
1295
|
# You cannot register the same provider multiple times in a single
|
1282
|
-
# account. If you try to submit a URL that has
|
1283
|
-
# OpenID Connect provider in the
|
1296
|
+
# Amazon Web Services account. If you try to submit a URL that has
|
1297
|
+
# already been used for an OpenID Connect provider in the Amazon Web
|
1298
|
+
# Services account, you will get an error.
|
1284
1299
|
#
|
1285
1300
|
# @option params [Array<String>] :client_id_list
|
1286
|
-
#
|
1287
|
-
# app registers with an OpenID Connect provider, they establish a
|
1288
|
-
# that identifies the application.
|
1289
|
-
# the `client_id` parameter on OAuth requests.
|
1301
|
+
# Provides a list of client IDs, also known as audiences. When a mobile
|
1302
|
+
# or web app registers with an OpenID Connect provider, they establish a
|
1303
|
+
# value that identifies the application. This is the value that's sent
|
1304
|
+
# as the `client_id` parameter on OAuth requests.
|
1290
1305
|
#
|
1291
1306
|
# You can register multiple client IDs with the same provider. For
|
1292
1307
|
# example, you might have multiple applications that use the same OIDC
|
@@ -1313,11 +1328,11 @@ module Aws::IAM
|
|
1313
1328
|
# `server.example.com` and the provider stores its keys at
|
1314
1329
|
# https://keys.server.example.com/openid-connect. In that case, the
|
1315
1330
|
# thumbprint string would be the hex-encoded SHA-1 hash value of the
|
1316
|
-
# certificate used by https://keys.server.example.com
|
1331
|
+
# certificate used by `https://keys.server.example.com.`
|
1317
1332
|
#
|
1318
|
-
# For more information about obtaining the OIDC provider
|
1319
|
-
#
|
1320
|
-
#
|
1333
|
+
# For more information about obtaining the OIDC provider thumbprint, see
|
1334
|
+
# [Obtaining the thumbprint for an OpenID Connect provider][1] in the
|
1335
|
+
# *IAM User Guide*.
|
1321
1336
|
#
|
1322
1337
|
#
|
1323
1338
|
#
|
@@ -1395,7 +1410,7 @@ module Aws::IAM
|
|
1395
1410
|
req.send_request(options)
|
1396
1411
|
end
|
1397
1412
|
|
1398
|
-
# Creates a new managed policy for your account.
|
1413
|
+
# Creates a new managed policy for your Amazon Web Services account.
|
1399
1414
|
#
|
1400
1415
|
# This operation creates a policy version with a version identifier of
|
1401
1416
|
# `v1` and sets v1 as the policy's default version. For more
|
@@ -1437,6 +1452,10 @@ module Aws::IAM
|
|
1437
1452
|
# character (`\u007F`), including most punctuation characters, digits,
|
1438
1453
|
# and upper and lowercased letters.
|
1439
1454
|
#
|
1455
|
+
# <note markdown="1"> You cannot use an asterisk (*) in the path name.
|
1456
|
+
#
|
1457
|
+
# </note>
|
1458
|
+
#
|
1440
1459
|
#
|
1441
1460
|
#
|
1442
1461
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
@@ -1650,10 +1669,10 @@ module Aws::IAM
|
|
1650
1669
|
req.send_request(options)
|
1651
1670
|
end
|
1652
1671
|
|
1653
|
-
# Creates a new role for your account. For more
|
1654
|
-
# see [IAM roles][1]. For information about
|
1655
|
-
# the number of roles you can create, see [IAM
|
1656
|
-
# *IAM User Guide*.
|
1672
|
+
# Creates a new role for your Amazon Web Services account. For more
|
1673
|
+
# information about roles, see [IAM roles][1]. For information about
|
1674
|
+
# quotas for role names and the number of roles you can create, see [IAM
|
1675
|
+
# and STS quotas][2] in the *IAM User Guide*.
|
1657
1676
|
#
|
1658
1677
|
#
|
1659
1678
|
#
|
@@ -1836,8 +1855,8 @@ module Aws::IAM
|
|
1836
1855
|
# used as a principal in an IAM role's trust policy. Such a policy can
|
1837
1856
|
# enable federated users who sign in using the SAML IdP to assume the
|
1838
1857
|
# role. You can create an IAM role that supports Web-based single
|
1839
|
-
# sign-on (SSO) to the Management Console or one
|
1840
|
-
# access to Amazon Web Services.
|
1858
|
+
# sign-on (SSO) to the Amazon Web Services Management Console or one
|
1859
|
+
# that supports API access to Amazon Web Services.
|
1841
1860
|
#
|
1842
1861
|
# When you create the SAML provider resource, you upload a SAML metadata
|
1843
1862
|
# document that you get from your IdP. That document includes the
|
@@ -1851,8 +1870,8 @@ module Aws::IAM
|
|
1851
1870
|
# </note>
|
1852
1871
|
#
|
1853
1872
|
# For more information, see [Enabling SAML 2.0 federated users to access
|
1854
|
-
# the Management Console][2] and [About SAML
|
1855
|
-
# the *IAM User Guide*.
|
1873
|
+
# the Amazon Web Services Management Console][2] and [About SAML
|
1874
|
+
# 2.0-based federation][3] in the *IAM User Guide*.
|
1856
1875
|
#
|
1857
1876
|
#
|
1858
1877
|
#
|
@@ -2096,7 +2115,7 @@ module Aws::IAM
|
|
2096
2115
|
req.send_request(options)
|
2097
2116
|
end
|
2098
2117
|
|
2099
|
-
# Creates a new IAM user for your account.
|
2118
|
+
# Creates a new IAM user for your Amazon Web Services account.
|
2100
2119
|
#
|
2101
2120
|
# For information about quotas for the number of IAM users you can
|
2102
2121
|
# create, see [IAM and STS quotas][1] in the *IAM User Guide*.
|
@@ -2211,10 +2230,11 @@ module Aws::IAM
|
|
2211
2230
|
req.send_request(options)
|
2212
2231
|
end
|
2213
2232
|
|
2214
|
-
# Creates a new virtual MFA device for the
|
2215
|
-
# virtual MFA, use EnableMFADevice to attach the MFA
|
2216
|
-
# user. For more information about creating and working
|
2217
|
-
# devices, see [Using a virtual MFA device][1] in the
|
2233
|
+
# Creates a new virtual MFA device for the Amazon Web Services account.
|
2234
|
+
# After creating the virtual MFA, use EnableMFADevice to attach the MFA
|
2235
|
+
# device to an IAM user. For more information about creating and working
|
2236
|
+
# with virtual MFA devices, see [Using a virtual MFA device][1] in the
|
2237
|
+
# *IAM User Guide*.
|
2218
2238
|
#
|
2219
2239
|
# For information about the maximum number of MFA devices you can
|
2220
2240
|
# create, see [IAM and STS quotas][2] in the *IAM User Guide*.
|
@@ -2384,9 +2404,10 @@ module Aws::IAM
|
|
2384
2404
|
#
|
2385
2405
|
# If you do not specify a user name, IAM determines the user name
|
2386
2406
|
# implicitly based on the Amazon Web Services access key ID signing the
|
2387
|
-
# request. This operation works for access keys under the
|
2388
|
-
# Consequently, you can use this operation to manage
|
2389
|
-
# credentials even if the
|
2407
|
+
# request. This operation works for access keys under the Amazon Web
|
2408
|
+
# Services account. Consequently, you can use this operation to manage
|
2409
|
+
# Amazon Web Services account root user credentials even if the Amazon
|
2410
|
+
# Web Services account has no associated users.
|
2390
2411
|
#
|
2391
2412
|
# @option params [String] :user_name
|
2392
2413
|
# The name of the user whose access key pair you want to delete.
|
@@ -2440,9 +2461,10 @@ module Aws::IAM
|
|
2440
2461
|
req.send_request(options)
|
2441
2462
|
end
|
2442
2463
|
|
2443
|
-
# Deletes the specified account alias. For
|
2444
|
-
# Amazon Web Services account alias, see
|
2445
|
-
# account ID][1] in the
|
2464
|
+
# Deletes the specified Amazon Web Services account alias. For
|
2465
|
+
# information about using an Amazon Web Services account alias, see
|
2466
|
+
# [Using an alias for your Amazon Web Services account ID][1] in the
|
2467
|
+
# *IAM User Guide*.
|
2446
2468
|
#
|
2447
2469
|
#
|
2448
2470
|
#
|
@@ -2486,7 +2508,8 @@ module Aws::IAM
|
|
2486
2508
|
req.send_request(options)
|
2487
2509
|
end
|
2488
2510
|
|
2489
|
-
# Deletes the password policy for the account. There
|
2511
|
+
# Deletes the password policy for the Amazon Web Services account. There
|
2512
|
+
# are no parameters.
|
2490
2513
|
#
|
2491
2514
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
2492
2515
|
#
|
@@ -2659,12 +2682,13 @@ module Aws::IAM
|
|
2659
2682
|
|
2660
2683
|
# Deletes the password for the specified IAM user, which terminates the
|
2661
2684
|
# user's ability to access Amazon Web Services services through the
|
2662
|
-
# Management Console.
|
2685
|
+
# Amazon Web Services Management Console.
|
2663
2686
|
#
|
2664
2687
|
# You can use the CLI, the Amazon Web Services API, or the **Users**
|
2665
2688
|
# page in the IAM console to delete a password for any IAM user. You can
|
2666
2689
|
# use ChangePassword to update, but not delete, your own password in the
|
2667
|
-
# **My Security Credentials** page in the Management
|
2690
|
+
# **My Security Credentials** page in the Amazon Web Services Management
|
2691
|
+
# Console.
|
2668
2692
|
#
|
2669
2693
|
# Deleting a user's password does not prevent a user from accessing
|
2670
2694
|
# Amazon Web Services through the command line interface or the API. To
|
@@ -3243,9 +3267,10 @@ module Aws::IAM
|
|
3243
3267
|
#
|
3244
3268
|
# If you do not specify a user name, IAM determines the user name
|
3245
3269
|
# implicitly based on the Amazon Web Services access key ID signing the
|
3246
|
-
# request. This operation works for access keys under the
|
3247
|
-
# Consequently, you can use this operation to manage
|
3248
|
-
#
|
3270
|
+
# request. This operation works for access keys under the Amazon Web
|
3271
|
+
# Services account. Consequently, you can use this operation to manage
|
3272
|
+
# Amazon Web Services account root user credentials even if the Amazon
|
3273
|
+
# Web Services account has no associated IAM users.
|
3249
3274
|
#
|
3250
3275
|
# @option params [String] :user_name
|
3251
3276
|
# The name of the user the signing certificate belongs to.
|
@@ -3298,11 +3323,11 @@ module Aws::IAM
|
|
3298
3323
|
req.send_request(options)
|
3299
3324
|
end
|
3300
3325
|
|
3301
|
-
# Deletes the specified IAM user. Unlike the
|
3302
|
-
# you delete a user programmatically, you must
|
3303
|
-
# to the user manually, or the deletion fails.
|
3304
|
-
# [Deleting an IAM user][1]. Before attempting
|
3305
|
-
# the following items:
|
3326
|
+
# Deletes the specified IAM user. Unlike the Amazon Web Services
|
3327
|
+
# Management Console, when you delete a user programmatically, you must
|
3328
|
+
# delete the items attached to the user manually, or the deletion fails.
|
3329
|
+
# For more information, see [Deleting an IAM user][1]. Before attempting
|
3330
|
+
# to delete a user, remove the following items:
|
3306
3331
|
#
|
3307
3332
|
# * Password (DeleteLoginProfile)
|
3308
3333
|
#
|
@@ -3738,9 +3763,9 @@ module Aws::IAM
|
|
3738
3763
|
req.send_request(options)
|
3739
3764
|
end
|
3740
3765
|
|
3741
|
-
# Generates a credential report for the account. For
|
3742
|
-
# about the credential report, see [Getting credential
|
3743
|
-
# the *IAM User Guide*.
|
3766
|
+
# Generates a credential report for the Amazon Web Services account. For
|
3767
|
+
# more information about the credential report, see [Getting credential
|
3768
|
+
# reports][1] in the *IAM User Guide*.
|
3744
3769
|
#
|
3745
3770
|
#
|
3746
3771
|
#
|
@@ -3796,14 +3821,14 @@ module Aws::IAM
|
|
3796
3821
|
#
|
3797
3822
|
# The data includes all attempts to access Amazon Web Services, not just
|
3798
3823
|
# the successful ones. This includes all attempts that were made using
|
3799
|
-
# the Management Console, the Amazon Web Services
|
3800
|
-
# SDKs, or any of the command line tools. An
|
3801
|
-
# service last accessed data does not mean that
|
3802
|
-
# compromised, because the request might have been
|
3803
|
-
# CloudTrail logs as the authoritative source for
|
3804
|
-
# API calls and whether they were successful or
|
3805
|
-
# information, see [Logging IAM events with
|
3806
|
-
# User Guide*.
|
3824
|
+
# the Amazon Web Services Management Console, the Amazon Web Services
|
3825
|
+
# API through any of the SDKs, or any of the command line tools. An
|
3826
|
+
# unexpected entry in the service last accessed data does not mean that
|
3827
|
+
# an account has been compromised, because the request might have been
|
3828
|
+
# denied. Refer to your CloudTrail logs as the authoritative source for
|
3829
|
+
# information about all API calls and whether they were successful or
|
3830
|
+
# denied access. For more information, see [Logging IAM events with
|
3831
|
+
# CloudTrail][2] in the *IAM User Guide*.
|
3807
3832
|
#
|
3808
3833
|
# This operation returns a `JobId`. Use this parameter in the `
|
3809
3834
|
# GetOrganizationsAccessReport ` operation to check the status of the
|
@@ -3959,14 +3984,15 @@ module Aws::IAM
|
|
3959
3984
|
#
|
3960
3985
|
# The service last accessed data includes all attempts to access an
|
3961
3986
|
# Amazon Web Services API, not just the successful ones. This includes
|
3962
|
-
# all attempts that were made using the
|
3963
|
-
# Web Services API through any of the SDKs, or any
|
3964
|
-
# tools. An unexpected entry in the service last
|
3965
|
-
# mean that your account has been compromised,
|
3966
|
-
# have been denied. Refer to your CloudTrail
|
3967
|
-
# source for information about all API calls
|
3968
|
-
# successful or denied access. For more
|
3969
|
-
# events with CloudTrail][2] in the *IAM
|
3987
|
+
# all attempts that were made using the Amazon Web Services Management
|
3988
|
+
# Console, the Amazon Web Services API through any of the SDKs, or any
|
3989
|
+
# of the command line tools. An unexpected entry in the service last
|
3990
|
+
# accessed data does not mean that your account has been compromised,
|
3991
|
+
# because the request might have been denied. Refer to your CloudTrail
|
3992
|
+
# logs as the authoritative source for information about all API calls
|
3993
|
+
# and whether they were successful or denied access. For more
|
3994
|
+
# information, see [Logging IAM events with CloudTrail][2] in the *IAM
|
3995
|
+
# User Guide*.
|
3970
3996
|
#
|
3971
3997
|
# The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
|
3972
3998
|
# Use this parameter in the following operations to retrieve the
|
@@ -4284,10 +4310,11 @@ module Aws::IAM
|
|
4284
4310
|
req.send_request(options)
|
4285
4311
|
end
|
4286
4312
|
|
4287
|
-
# Retrieves the password policy for the
|
4288
|
-
# complexity requirements and mandatory rotation
|
4289
|
-
# user passwords in your account. For more
|
4290
|
-
# password policy, see [Managing an IAM
|
4313
|
+
# Retrieves the password policy for the Amazon Web Services account.
|
4314
|
+
# This tells you the complexity requirements and mandatory rotation
|
4315
|
+
# periods for the IAM user passwords in your account. For more
|
4316
|
+
# information about using a password policy, see [Managing an IAM
|
4317
|
+
# password policy][1].
|
4291
4318
|
#
|
4292
4319
|
#
|
4293
4320
|
#
|
@@ -4554,9 +4581,9 @@ module Aws::IAM
|
|
4554
4581
|
req.send_request(options)
|
4555
4582
|
end
|
4556
4583
|
|
4557
|
-
# Retrieves a credential report for the account. For
|
4558
|
-
# about the credential report, see [Getting credential
|
4559
|
-
# the *IAM User Guide*.
|
4584
|
+
# Retrieves a credential report for the Amazon Web Services account. For
|
4585
|
+
# more information about the credential report, see [Getting credential
|
4586
|
+
# reports][1] in the *IAM User Guide*.
|
4560
4587
|
#
|
4561
4588
|
#
|
4562
4589
|
#
|
@@ -4842,18 +4869,20 @@ module Aws::IAM
|
|
4842
4869
|
end
|
4843
4870
|
|
4844
4871
|
# Retrieves the user name for the specified IAM user. A login profile is
|
4845
|
-
# created when you create a password for the user to access the
|
4846
|
-
# Management Console. If the user does not exist or does
|
4847
|
-
# password, the operation returns a 404 (`NoSuchEntity`)
|
4872
|
+
# created when you create a password for the user to access the Amazon
|
4873
|
+
# Web Services Management Console. If the user does not exist or does
|
4874
|
+
# not have a password, the operation returns a 404 (`NoSuchEntity`)
|
4875
|
+
# error.
|
4848
4876
|
#
|
4849
4877
|
# If you create an IAM user with access to the console, the `CreateDate`
|
4850
4878
|
# reflects the date you created the initial password for the user.
|
4851
4879
|
#
|
4852
4880
|
# If you create an IAM user with programmatic access, and then later add
|
4853
|
-
# a password for the user to access the
|
4854
|
-
# `CreateDate` reflects the initial password creation date.
|
4855
|
-
# programmatic access does not have a login profile unless
|
4856
|
-
# password for the user to access the
|
4881
|
+
# a password for the user to access the Amazon Web Services Management
|
4882
|
+
# Console, the `CreateDate` reflects the initial password creation date.
|
4883
|
+
# A user with programmatic access does not have a login profile unless
|
4884
|
+
# you create a password for the user to access the Amazon Web Services
|
4885
|
+
# Management Console.
|
4857
4886
|
#
|
4858
4887
|
# @option params [required, String] :user_name
|
4859
4888
|
# The name of the user whose login profile you want to retrieve.
|
@@ -6131,12 +6160,13 @@ module Aws::IAM
|
|
6131
6160
|
#
|
6132
6161
|
# If the `UserName` field is not specified, the user name is determined
|
6133
6162
|
# implicitly based on the Amazon Web Services access key ID used to sign
|
6134
|
-
# the request. This operation works for access keys under the
|
6135
|
-
# Consequently, you can use this operation to manage
|
6136
|
-
# credentials even if the
|
6163
|
+
# the request. This operation works for access keys under the Amazon Web
|
6164
|
+
# Services account. Consequently, you can use this operation to manage
|
6165
|
+
# Amazon Web Services account root user credentials even if the Amazon
|
6166
|
+
# Web Services account has no associated users.
|
6137
6167
|
#
|
6138
|
-
# <note markdown="1"> To ensure the security of your account, the secret
|
6139
|
-
# accessible only during key and user creation.
|
6168
|
+
# <note markdown="1"> To ensure the security of your Amazon Web Services account, the secret
|
6169
|
+
# access key is accessible only during key and user creation.
|
6140
6170
|
#
|
6141
6171
|
# </note>
|
6142
6172
|
#
|
@@ -6231,9 +6261,10 @@ module Aws::IAM
|
|
6231
6261
|
req.send_request(options)
|
6232
6262
|
end
|
6233
6263
|
|
6234
|
-
# Lists the account alias associated with the
|
6235
|
-
# have only one). For information about using an
|
6236
|
-
#
|
6264
|
+
# Lists the account alias associated with the Amazon Web Services
|
6265
|
+
# account (Note: you can have only one). For information about using an
|
6266
|
+
# Amazon Web Services account alias, see [Using an alias for your Amazon
|
6267
|
+
# Web Services account ID][1] in the *IAM User Guide*.
|
6237
6268
|
#
|
6238
6269
|
#
|
6239
6270
|
#
|
@@ -7510,7 +7541,7 @@ module Aws::IAM
|
|
7510
7541
|
end
|
7511
7542
|
|
7512
7543
|
# Lists information about the IAM OpenID Connect (OIDC) provider
|
7513
|
-
# resource objects defined in the account.
|
7544
|
+
# resource objects defined in the Amazon Web Services account.
|
7514
7545
|
#
|
7515
7546
|
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
7516
7547
|
# attributes for the resource. For example, this operation does not
|
@@ -7538,9 +7569,9 @@ module Aws::IAM
|
|
7538
7569
|
req.send_request(options)
|
7539
7570
|
end
|
7540
7571
|
|
7541
|
-
# Lists all the managed policies that are available in your
|
7542
|
-
# including your own customer-defined managed policies
|
7543
|
-
# Web Services managed policies.
|
7572
|
+
# Lists all the managed policies that are available in your Amazon Web
|
7573
|
+
# Services account, including your own customer-defined managed policies
|
7574
|
+
# and all Amazon Web Services managed policies.
|
7544
7575
|
#
|
7545
7576
|
# You can filter the list of policies that is returned using the
|
7546
7577
|
# optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
|
@@ -7570,8 +7601,8 @@ module Aws::IAM
|
|
7570
7601
|
# The scope to use for filtering the results.
|
7571
7602
|
#
|
7572
7603
|
# To list only Amazon Web Services managed policies, set `Scope` to
|
7573
|
-
# `AWS`. To list only the customer managed policies in your
|
7574
|
-
# `Scope` to `Local`.
|
7604
|
+
# `AWS`. To list only the customer managed policies in your Amazon Web
|
7605
|
+
# Services account, set `Scope` to `Local`.
|
7575
7606
|
#
|
7576
7607
|
# This parameter is optional. If it is not included, or if it is set to
|
7577
7608
|
# `All`, all policies are returned.
|
@@ -8671,9 +8702,9 @@ module Aws::IAM
|
|
8671
8702
|
# If the `UserName` field is not specified, the user name is determined
|
8672
8703
|
# implicitly based on the Amazon Web Services access key ID used to sign
|
8673
8704
|
# the request for this operation. This operation works for access keys
|
8674
|
-
# under the account. Consequently, you can use this
|
8675
|
-
#
|
8676
|
-
# users.
|
8705
|
+
# under the Amazon Web Services account. Consequently, you can use this
|
8706
|
+
# operation to manage Amazon Web Services account root user credentials
|
8707
|
+
# even if the Amazon Web Services account has no associated users.
|
8677
8708
|
#
|
8678
8709
|
# @option params [String] :user_name
|
8679
8710
|
# The name of the IAM user whose signing certificates you want to
|
@@ -8935,8 +8966,9 @@ module Aws::IAM
|
|
8935
8966
|
end
|
8936
8967
|
|
8937
8968
|
# Lists the IAM users that have the specified path prefix. If no path
|
8938
|
-
# prefix is specified, the operation returns all users in the
|
8939
|
-
# If there are none, the operation returns an empty
|
8969
|
+
# prefix is specified, the operation returns all users in the Amazon Web
|
8970
|
+
# Services account. If there are none, the operation returns an empty
|
8971
|
+
# list.
|
8940
8972
|
#
|
8941
8973
|
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
8942
8974
|
# attributes for the resource. For example, this operation does not
|
@@ -9054,10 +9086,10 @@ module Aws::IAM
|
|
9054
9086
|
req.send_request(options)
|
9055
9087
|
end
|
9056
9088
|
|
9057
|
-
# Lists the virtual MFA devices defined in the
|
9058
|
-
# status. If you do not specify an assignment
|
9059
|
-
# returns a list of all virtual MFA devices.
|
9060
|
-
# `Assigned`, `Unassigned`, or `Any`.
|
9089
|
+
# Lists the virtual MFA devices defined in the Amazon Web Services
|
9090
|
+
# account by assignment status. If you do not specify an assignment
|
9091
|
+
# status, the operation returns a list of all virtual MFA devices.
|
9092
|
+
# Assignment status can be `Assigned`, `Unassigned`, or `Any`.
|
9061
9093
|
#
|
9062
9094
|
# <note markdown="1"> IAM resource-listing operations return a subset of the available
|
9063
9095
|
# attributes for the resource. For example, this operation does not
|
@@ -9908,7 +9940,7 @@ module Aws::IAM
|
|
9908
9940
|
end
|
9909
9941
|
|
9910
9942
|
# Sets the specified version of the global endpoint token as the token
|
9911
|
-
# version used for the account.
|
9943
|
+
# version used for the Amazon Web Services account.
|
9912
9944
|
#
|
9913
9945
|
# By default, Security Token Service (STS) is available as a global
|
9914
9946
|
# service, and all STS requests go to a single endpoint at
|
@@ -9921,12 +9953,13 @@ module Aws::IAM
|
|
9921
9953
|
# If you make an STS call to the global endpoint, the resulting session
|
9922
9954
|
# tokens might be valid in some Regions but not others. It depends on
|
9923
9955
|
# the version that is set in this operation. Version 1 tokens are valid
|
9924
|
-
# only in Regions that are available by default.
|
9925
|
-
# work in manually enabled Regions, such as Asia
|
9926
|
-
# Version 2 tokens are valid in all Regions.
|
9927
|
-
# are longer and might affect systems where
|
9928
|
-
# tokens. For information, see [Activating and
|
9929
|
-
# Region][2] in the *IAM User
|
9956
|
+
# only in Amazon Web Services Regions that are available by default.
|
9957
|
+
# These tokens do not work in manually enabled Regions, such as Asia
|
9958
|
+
# Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
|
9959
|
+
# However, version 2 tokens are longer and might affect systems where
|
9960
|
+
# you temporarily store tokens. For information, see [Activating and
|
9961
|
+
# deactivating STS in an Amazon Web Services Region][2] in the *IAM User
|
9962
|
+
# Guide*.
|
9930
9963
|
#
|
9931
9964
|
# To view the current session token version, see the
|
9932
9965
|
# `GlobalEndpointTokenVersion` entry in the response of the
|
@@ -9939,14 +9972,14 @@ module Aws::IAM
|
|
9939
9972
|
#
|
9940
9973
|
# @option params [required, String] :global_endpoint_token_version
|
9941
9974
|
# The version of the global endpoint token. Version 1 tokens are valid
|
9942
|
-
# only in Regions that are available by default.
|
9943
|
-
# work in manually enabled Regions, such as Asia
|
9944
|
-
# Version 2 tokens are valid in all Regions.
|
9945
|
-
# are longer and might affect systems where
|
9946
|
-
# tokens.
|
9975
|
+
# only in Amazon Web Services Regions that are available by default.
|
9976
|
+
# These tokens do not work in manually enabled Regions, such as Asia
|
9977
|
+
# Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
|
9978
|
+
# However, version 2 tokens are longer and might affect systems where
|
9979
|
+
# you temporarily store tokens.
|
9947
9980
|
#
|
9948
|
-
# For information, see [Activating and deactivating STS in an
|
9949
|
-
# in the *IAM User Guide*.
|
9981
|
+
# For information, see [Activating and deactivating STS in an Amazon Web
|
9982
|
+
# Services Region][1] in the *IAM User Guide*.
|
9950
9983
|
#
|
9951
9984
|
#
|
9952
9985
|
#
|
@@ -10136,12 +10169,12 @@ module Aws::IAM
|
|
10136
10169
|
# [2]: http://wikipedia.org/wiki/regex
|
10137
10170
|
#
|
10138
10171
|
# @option params [String] :resource_owner
|
10139
|
-
# An ARN representing the account ID that specifies
|
10140
|
-
# simulated resource that does not identify its owner
|
10141
|
-
# ARN. Examples of resource ARNs include an S3 bucket or
|
10142
|
-
# `ResourceOwner` is specified, it is also used as the
|
10143
|
-
# any `ResourcePolicy` included in the simulation. If
|
10144
|
-
# `ResourceOwner` parameter is not specified, then the owner of the
|
10172
|
+
# An ARN representing the Amazon Web Services account ID that specifies
|
10173
|
+
# the owner of any simulated resource that does not identify its owner
|
10174
|
+
# in the resource ARN. Examples of resource ARNs include an S3 bucket or
|
10175
|
+
# object. If `ResourceOwner` is specified, it is also used as the
|
10176
|
+
# account owner of any `ResourcePolicy` included in the simulation. If
|
10177
|
+
# the `ResourceOwner` parameter is not specified, then the owner of the
|
10145
10178
|
# resources and the resource policy defaults to the account of the
|
10146
10179
|
# identity provided in `CallerArn`. This parameter is required only if
|
10147
10180
|
# you specify a resource-based policy and account that owns the resource
|
@@ -10482,16 +10515,17 @@ module Aws::IAM
|
|
10482
10515
|
# [2]: http://wikipedia.org/wiki/regex
|
10483
10516
|
#
|
10484
10517
|
# @option params [String] :resource_owner
|
10485
|
-
# An account ID that specifies the owner of any
|
10486
|
-
# does not identify its owner in the resource
|
10487
|
-
# ARNs include an S3 bucket or object. If
|
10488
|
-
# it is also used as the account owner of
|
10489
|
-
# in the simulation. If the
|
10490
|
-
#
|
10491
|
-
#
|
10492
|
-
#
|
10493
|
-
#
|
10494
|
-
# simulated calling user
|
10518
|
+
# An Amazon Web Services account ID that specifies the owner of any
|
10519
|
+
# simulated resource that does not identify its owner in the resource
|
10520
|
+
# ARN. Examples of resource ARNs include an S3 bucket or object. If
|
10521
|
+
# `ResourceOwner` is specified, it is also used as the account owner of
|
10522
|
+
# any `ResourcePolicy` included in the simulation. If the
|
10523
|
+
# `ResourceOwner` parameter is not specified, then the owner of the
|
10524
|
+
# resources and the resource policy defaults to the account of the
|
10525
|
+
# identity provided in `CallerArn`. This parameter is required only if
|
10526
|
+
# you specify a resource-based policy and account that owns the resource
|
10527
|
+
# is different from the account that owns the simulated calling user
|
10528
|
+
# `CallerArn`.
|
10495
10529
|
#
|
10496
10530
|
# @option params [String] :caller_arn
|
10497
10531
|
# The ARN of the IAM user that you want to specify as the simulated
|
@@ -11723,9 +11757,10 @@ module Aws::IAM
|
|
11723
11757
|
#
|
11724
11758
|
# If the `UserName` is not specified, the user name is determined
|
11725
11759
|
# implicitly based on the Amazon Web Services access key ID used to sign
|
11726
|
-
# the request. This operation works for access keys under the
|
11727
|
-
# Consequently, you can use this operation to manage
|
11728
|
-
# credentials even if the
|
11760
|
+
# the request. This operation works for access keys under the Amazon Web
|
11761
|
+
# Services account. Consequently, you can use this operation to manage
|
11762
|
+
# Amazon Web Services account root user credentials even if the Amazon
|
11763
|
+
# Web Services account has no associated users.
|
11729
11764
|
#
|
11730
11765
|
# For information about rotating keys, see [Managing keys and
|
11731
11766
|
# certificates][1] in the *IAM User Guide*.
|
@@ -11793,7 +11828,8 @@ module Aws::IAM
|
|
11793
11828
|
req.send_request(options)
|
11794
11829
|
end
|
11795
11830
|
|
11796
|
-
# Updates the password policy settings for the
|
11831
|
+
# Updates the password policy settings for the Amazon Web Services
|
11832
|
+
# account.
|
11797
11833
|
#
|
11798
11834
|
# <note markdown="1"> * This operation does not support partial updates. No parameters are
|
11799
11835
|
# required, but if you do not specify a parameter, that parameter's
|
@@ -11855,9 +11891,10 @@ module Aws::IAM
|
|
11855
11891
|
# require at least one lowercase character.
|
11856
11892
|
#
|
11857
11893
|
# @option params [Boolean] :allow_users_to_change_password
|
11858
|
-
# Allows all IAM users in your account to use the
|
11859
|
-
# change their own passwords. For more
|
11860
|
-
# users change their own passwords][1] in
|
11894
|
+
# Allows all IAM users in your account to use the Amazon Web Services
|
11895
|
+
# Management Console to change their own passwords. For more
|
11896
|
+
# information, see [Letting IAM users change their own passwords][1] in
|
11897
|
+
# the *IAM User Guide*.
|
11861
11898
|
#
|
11862
11899
|
# If you do not specify a value for this parameter, then the operation
|
11863
11900
|
# uses the default value of `false`. The result is that IAM users in the
|
@@ -12092,7 +12129,7 @@ module Aws::IAM
|
|
12092
12129
|
# the Amazon Web Services API, or the **Users** page in the IAM console
|
12093
12130
|
# to change the password for any IAM user. Use ChangePassword to change
|
12094
12131
|
# your own password in the **My Security Credentials** page in the
|
12095
|
-
# Management Console.
|
12132
|
+
# Amazon Web Services Management Console.
|
12096
12133
|
#
|
12097
12134
|
# For more information about modifying passwords, see [Managing
|
12098
12135
|
# passwords][1] in the *IAM User Guide*.
|
@@ -12129,8 +12166,8 @@ module Aws::IAM
|
|
12129
12166
|
# carriage return (`\u000D`)
|
12130
12167
|
#
|
12131
12168
|
# However, the format can be further restricted by the account
|
12132
|
-
# administrator by setting a password policy on the
|
12133
|
-
# information, see UpdateAccountPasswordPolicy.
|
12169
|
+
# administrator by setting a password policy on the Amazon Web Services
|
12170
|
+
# account. For more information, see UpdateAccountPasswordPolicy.
|
12134
12171
|
#
|
12135
12172
|
#
|
12136
12173
|
#
|
@@ -12597,9 +12634,10 @@ module Aws::IAM
|
|
12597
12634
|
#
|
12598
12635
|
# If the `UserName` field is not specified, the user name is determined
|
12599
12636
|
# implicitly based on the Amazon Web Services access key ID used to sign
|
12600
|
-
# the request. This operation works for access keys under the
|
12601
|
-
# Consequently, you can use this operation to manage
|
12602
|
-
# credentials even if the
|
12637
|
+
# the request. This operation works for access keys under the Amazon Web
|
12638
|
+
# Services account. Consequently, you can use this operation to manage
|
12639
|
+
# Amazon Web Services account root user credentials even if the Amazon
|
12640
|
+
# Web Services account has no associated users.
|
12603
12641
|
#
|
12604
12642
|
# @option params [String] :user_name
|
12605
12643
|
# The name of the IAM user the signing certificate belongs to.
|
@@ -12820,9 +12858,10 @@ module Aws::IAM
|
|
12820
12858
|
req.send_request(options)
|
12821
12859
|
end
|
12822
12860
|
|
12823
|
-
# Uploads a server certificate entity for the
|
12824
|
-
# certificate entity includes a public key
|
12825
|
-
# and an optional certificate chain, which
|
12861
|
+
# Uploads a server certificate entity for the Amazon Web Services
|
12862
|
+
# account. The server certificate entity includes a public key
|
12863
|
+
# certificate, a private key, and an optional certificate chain, which
|
12864
|
+
# should all be PEM-encoded.
|
12826
12865
|
#
|
12827
12866
|
# We recommend that you use [Certificate Manager][1] to provision,
|
12828
12867
|
# manage, and deploy your server certificates. With ACM you can request
|
@@ -13047,9 +13086,10 @@ module Aws::IAM
|
|
13047
13086
|
#
|
13048
13087
|
# If the `UserName` is not specified, the IAM user name is determined
|
13049
13088
|
# implicitly based on the Amazon Web Services access key ID used to sign
|
13050
|
-
# the request. This operation works for access keys under the
|
13051
|
-
# Consequently, you can use this operation to manage
|
13052
|
-
# credentials even if the
|
13089
|
+
# the request. This operation works for access keys under the Amazon Web
|
13090
|
+
# Services account. Consequently, you can use this operation to manage
|
13091
|
+
# Amazon Web Services account root user credentials even if the Amazon
|
13092
|
+
# Web Services account has no associated users.
|
13053
13093
|
#
|
13054
13094
|
# <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
|
13055
13095
|
# POST rather than GET when calling `UploadSigningCertificate`. For
|
@@ -13160,7 +13200,7 @@ module Aws::IAM
|
|
13160
13200
|
params: params,
|
13161
13201
|
config: config)
|
13162
13202
|
context[:gem_name] = 'aws-sdk-iam'
|
13163
|
-
context[:gem_version] = '1.
|
13203
|
+
context[:gem_version] = '1.63.0'
|
13164
13204
|
Seahorse::Client::Request.new(handlers, context)
|
13165
13205
|
end
|
13166
13206
|
|
@@ -197,8 +197,9 @@ module Aws::IAM
|
|
197
197
|
# character range (`\u00FF`). You can also include the tab (`\u0009`),
|
198
198
|
# line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
|
199
199
|
# of these characters are valid in a password. However, many tools, such
|
200
|
-
# as the Management Console, might restrict the
|
201
|
-
# characters because they have special meaning
|
200
|
+
# as the Amazon Web Services Management Console, might restrict the
|
201
|
+
# ability to type certain characters because they have special meaning
|
202
|
+
# within that tool.
|
202
203
|
#
|
203
204
|
#
|
204
205
|
#
|
@@ -251,8 +252,8 @@ module Aws::IAM
|
|
251
252
|
# carriage return (`\u000D`)
|
252
253
|
#
|
253
254
|
# However, the format can be further restricted by the account
|
254
|
-
# administrator by setting a password policy on the
|
255
|
-
# information, see UpdateAccountPasswordPolicy.
|
255
|
+
# administrator by setting a password policy on the Amazon Web Services
|
256
|
+
# account. For more information, see UpdateAccountPasswordPolicy.
|
256
257
|
#
|
257
258
|
#
|
258
259
|
#
|
data/lib/aws-sdk-iam/resource.rb
CHANGED
@@ -45,8 +45,8 @@ module Aws::IAM
|
|
45
45
|
# @option options [required, String] :old_password
|
46
46
|
# The IAM user's current password.
|
47
47
|
# @option options [required, String] :new_password
|
48
|
-
# The new password. The new password must conform to the
|
49
|
-
# password policy, if one exists.
|
48
|
+
# The new password. The new password must conform to the Amazon Web
|
49
|
+
# Services account's password policy, if one exists.
|
50
50
|
#
|
51
51
|
# The [regex pattern][1] that is used to validate this parameter is a
|
52
52
|
# string of characters. That string can include almost any printable
|
@@ -54,8 +54,9 @@ module Aws::IAM
|
|
54
54
|
# character range (`\u00FF`). You can also include the tab (`\u0009`),
|
55
55
|
# line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
|
56
56
|
# of these characters are valid in a password. However, many tools, such
|
57
|
-
# as the Management Console, might restrict the
|
58
|
-
# characters because they have special meaning
|
57
|
+
# as the Amazon Web Services Management Console, might restrict the
|
58
|
+
# ability to type certain characters because they have special meaning
|
59
|
+
# within that tool.
|
59
60
|
#
|
60
61
|
#
|
61
62
|
#
|
@@ -139,9 +140,10 @@ module Aws::IAM
|
|
139
140
|
# uses the default value of `false`. The result is that passwords do not
|
140
141
|
# require at least one lowercase character.
|
141
142
|
# @option options [Boolean] :allow_users_to_change_password
|
142
|
-
# Allows all IAM users in your account to use the
|
143
|
-
# change their own passwords. For more
|
144
|
-
# users change their own passwords][1] in
|
143
|
+
# Allows all IAM users in your account to use the Amazon Web Services
|
144
|
+
# Management Console to change their own passwords. For more
|
145
|
+
# information, see [Letting IAM users change their own passwords][1] in
|
146
|
+
# the *IAM User Guide*.
|
145
147
|
#
|
146
148
|
# If you do not specify a value for this parameter, then the operation
|
147
149
|
# uses the default value of `false`. The result is that IAM users in the
|
@@ -325,6 +327,10 @@ module Aws::IAM
|
|
325
327
|
# character (`\u007F`), including most punctuation characters, digits,
|
326
328
|
# and upper and lowercased letters.
|
327
329
|
#
|
330
|
+
# <note markdown="1"> You cannot use an asterisk (*) in the path name.
|
331
|
+
#
|
332
|
+
# </note>
|
333
|
+
#
|
328
334
|
#
|
329
335
|
#
|
330
336
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
@@ -1015,8 +1021,8 @@ module Aws::IAM
|
|
1015
1021
|
# The scope to use for filtering the results.
|
1016
1022
|
#
|
1017
1023
|
# To list only Amazon Web Services managed policies, set `Scope` to
|
1018
|
-
# `AWS`. To list only the customer managed policies in your
|
1019
|
-
# `Scope` to `Local`.
|
1024
|
+
# `AWS`. To list only the customer managed policies in your Amazon Web
|
1025
|
+
# Services account, set `Scope` to `Local`.
|
1020
1026
|
#
|
1021
1027
|
# This parameter is optional. If it is not included, or if it is set to
|
1022
1028
|
# `All`, all policies are returned.
|
data/lib/aws-sdk-iam/types.rb
CHANGED
@@ -186,8 +186,9 @@ module Aws::IAM
|
|
186
186
|
# @return [String]
|
187
187
|
#
|
188
188
|
# @!attribute [rw] region
|
189
|
-
# The Region where this access key was most
|
190
|
-
# for this field is "N/A" in the following
|
189
|
+
# The Amazon Web Services Region where this access key was most
|
190
|
+
# recently used. The value for this field is "N/A" in the following
|
191
|
+
# situations:
|
191
192
|
#
|
192
193
|
# * The user does not have an access key.
|
193
194
|
#
|
@@ -196,8 +197,8 @@ module Aws::IAM
|
|
196
197
|
#
|
197
198
|
# * There is no sign-in data associated with the user.
|
198
199
|
#
|
199
|
-
# For more information about Regions, see [Regions
|
200
|
-
# in the Amazon Web Services General Reference.
|
200
|
+
# For more information about Amazon Web Services Regions, see [Regions
|
201
|
+
# and endpoints][1] in the Amazon Web Services General Reference.
|
201
202
|
#
|
202
203
|
#
|
203
204
|
#
|
@@ -574,8 +575,8 @@ module Aws::IAM
|
|
574
575
|
# @return [String]
|
575
576
|
#
|
576
577
|
# @!attribute [rw] new_password
|
577
|
-
# The new password. The new password must conform to the
|
578
|
-
# password policy, if one exists.
|
578
|
+
# The new password. The new password must conform to the Amazon Web
|
579
|
+
# Services account's password policy, if one exists.
|
579
580
|
#
|
580
581
|
# The [regex pattern][1] that is used to validate this parameter is a
|
581
582
|
# string of characters. That string can include almost any printable
|
@@ -583,9 +584,9 @@ module Aws::IAM
|
|
583
584
|
# ASCII character range (`\u00FF`). You can also include the tab
|
584
585
|
# (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
|
585
586
|
# characters. Any of these characters are valid in a password.
|
586
|
-
# However, many tools, such as the
|
587
|
-
# the ability to type certain characters
|
588
|
-
# meaning within that tool.
|
587
|
+
# However, many tools, such as the Amazon Web Services Management
|
588
|
+
# Console, might restrict the ability to type certain characters
|
589
|
+
# because they have special meaning within that tool.
|
589
590
|
#
|
590
591
|
#
|
591
592
|
#
|
@@ -911,9 +912,9 @@ module Aws::IAM
|
|
911
912
|
# ASCII character range (`\u00FF`). You can also include the tab
|
912
913
|
# (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
|
913
914
|
# characters. Any of these characters are valid in a password.
|
914
|
-
# However, many tools, such as the
|
915
|
-
# the ability to type certain characters
|
916
|
-
# meaning within that tool.
|
915
|
+
# However, many tools, such as the Amazon Web Services Management
|
916
|
+
# Console, might restrict the ability to type certain characters
|
917
|
+
# because they have special meaning within that tool.
|
917
918
|
#
|
918
919
|
#
|
919
920
|
#
|
@@ -970,18 +971,19 @@ module Aws::IAM
|
|
970
971
|
# Connect ID tokens. Per the OIDC standard, path components are
|
971
972
|
# allowed but query parameters are not. Typically the URL consists of
|
972
973
|
# only a hostname, like `https://server.example.org` or
|
973
|
-
# `https://example.com`.
|
974
|
+
# `https://example.com`. The URL should not contain a port number.
|
974
975
|
#
|
975
976
|
# You cannot register the same provider multiple times in a single
|
976
|
-
# account. If you try to submit a URL that has
|
977
|
-
# an OpenID Connect provider in the
|
977
|
+
# Amazon Web Services account. If you try to submit a URL that has
|
978
|
+
# already been used for an OpenID Connect provider in the Amazon Web
|
979
|
+
# Services account, you will get an error.
|
978
980
|
# @return [String]
|
979
981
|
#
|
980
982
|
# @!attribute [rw] client_id_list
|
981
|
-
#
|
982
|
-
# app registers with an OpenID Connect provider, they
|
983
|
-
# value that identifies the application.
|
984
|
-
# sent as the `client_id` parameter on OAuth requests.
|
983
|
+
# Provides a list of client IDs, also known as audiences. When a
|
984
|
+
# mobile or web app registers with an OpenID Connect provider, they
|
985
|
+
# establish a value that identifies the application. This is the value
|
986
|
+
# that's sent as the `client_id` parameter on OAuth requests.
|
985
987
|
#
|
986
988
|
# You can register multiple client IDs with the same provider. For
|
987
989
|
# example, you might have multiple applications that use the same OIDC
|
@@ -1010,11 +1012,11 @@ module Aws::IAM
|
|
1010
1012
|
# `server.example.com` and the provider stores its keys at
|
1011
1013
|
# https://keys.server.example.com/openid-connect. In that case, the
|
1012
1014
|
# thumbprint string would be the hex-encoded SHA-1 hash value of the
|
1013
|
-
# certificate used by https://keys.server.example.com
|
1015
|
+
# certificate used by `https://keys.server.example.com.`
|
1014
1016
|
#
|
1015
|
-
# For more information about obtaining the OIDC provider
|
1016
|
-
#
|
1017
|
-
#
|
1017
|
+
# For more information about obtaining the OIDC provider thumbprint,
|
1018
|
+
# see [Obtaining the thumbprint for an OpenID Connect provider][1] in
|
1019
|
+
# the *IAM User Guide*.
|
1018
1020
|
#
|
1019
1021
|
#
|
1020
1022
|
#
|
@@ -1119,6 +1121,10 @@ module Aws::IAM
|
|
1119
1121
|
# DEL character (`\u007F`), including most punctuation characters,
|
1120
1122
|
# digits, and upper and lowercased letters.
|
1121
1123
|
#
|
1124
|
+
# <note markdown="1"> You cannot use an asterisk (*) in the path name.
|
1125
|
+
#
|
1126
|
+
# </note>
|
1127
|
+
#
|
1122
1128
|
#
|
1123
1129
|
#
|
1124
1130
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
@@ -3911,7 +3917,7 @@ module Aws::IAM
|
|
3911
3917
|
#
|
3912
3918
|
# @!attribute [rw] create_date
|
3913
3919
|
# The date and time when the IAM OIDC provider resource object was
|
3914
|
-
# created in the account.
|
3920
|
+
# created in the Amazon Web Services account.
|
3915
3921
|
# @return [Time]
|
3916
3922
|
#
|
3917
3923
|
# @!attribute [rw] tags
|
@@ -6594,8 +6600,8 @@ module Aws::IAM
|
|
6594
6600
|
# request.
|
6595
6601
|
#
|
6596
6602
|
# @!attribute [rw] open_id_connect_provider_list
|
6597
|
-
# The list of IAM OIDC provider resource objects defined in the
|
6598
|
-
# account.
|
6603
|
+
# The list of IAM OIDC provider resource objects defined in the Amazon
|
6604
|
+
# Web Services account.
|
6599
6605
|
# @return [Array<Types::OpenIDConnectProviderListEntry>]
|
6600
6606
|
#
|
6601
6607
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOpenIDConnectProvidersResponse AWS API Documentation
|
@@ -6739,8 +6745,8 @@ module Aws::IAM
|
|
6739
6745
|
# The scope to use for filtering the results.
|
6740
6746
|
#
|
6741
6747
|
# To list only Amazon Web Services managed policies, set `Scope` to
|
6742
|
-
# `AWS`. To list only the customer managed policies in your
|
6743
|
-
# set `Scope` to `Local`.
|
6748
|
+
# `AWS`. To list only the customer managed policies in your Amazon Web
|
6749
|
+
# Services account, set `Scope` to `Local`.
|
6744
6750
|
#
|
6745
6751
|
# This parameter is optional. If it is not included, or if it is set
|
6746
6752
|
# to `All`, all policies are returned.
|
@@ -8132,8 +8138,8 @@ module Aws::IAM
|
|
8132
8138
|
# and GetLoginProfile operations.
|
8133
8139
|
#
|
8134
8140
|
# @!attribute [rw] user_name
|
8135
|
-
# The name of the user, which can be used for signing in to the
|
8136
|
-
# Management Console.
|
8141
|
+
# The name of the user, which can be used for signing in to the Amazon
|
8142
|
+
# Web Services Management Console.
|
8137
8143
|
# @return [String]
|
8138
8144
|
#
|
8139
8145
|
# @!attribute [rw] create_date
|
@@ -9813,7 +9819,8 @@ module Aws::IAM
|
|
9813
9819
|
# @return [Time]
|
9814
9820
|
#
|
9815
9821
|
# @!attribute [rw] region
|
9816
|
-
# The name of the Region in which the role was
|
9822
|
+
# The name of the Amazon Web Services Region in which the role was
|
9823
|
+
# last used.
|
9817
9824
|
# @return [String]
|
9818
9825
|
#
|
9819
9826
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/RoleLastUsed AWS API Documentation
|
@@ -10347,14 +10354,14 @@ module Aws::IAM
|
|
10347
10354
|
#
|
10348
10355
|
# @!attribute [rw] global_endpoint_token_version
|
10349
10356
|
# The version of the global endpoint token. Version 1 tokens are valid
|
10350
|
-
# only in Regions that are available by default.
|
10351
|
-
# work in manually enabled Regions, such as Asia
|
10352
|
-
# Version 2 tokens are valid in all Regions.
|
10353
|
-
# are longer and might affect systems where
|
10354
|
-
# tokens.
|
10357
|
+
# only in Amazon Web Services Regions that are available by default.
|
10358
|
+
# These tokens do not work in manually enabled Regions, such as Asia
|
10359
|
+
# Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
|
10360
|
+
# However, version 2 tokens are longer and might affect systems where
|
10361
|
+
# you temporarily store tokens.
|
10355
10362
|
#
|
10356
|
-
# For information, see [Activating and deactivating STS in an
|
10357
|
-
# Region][1] in the *IAM User Guide*.
|
10363
|
+
# For information, see [Activating and deactivating STS in an Amazon
|
10364
|
+
# Web Services Region][1] in the *IAM User Guide*.
|
10358
10365
|
#
|
10359
10366
|
#
|
10360
10367
|
#
|
@@ -10563,17 +10570,17 @@ module Aws::IAM
|
|
10563
10570
|
# @return [String]
|
10564
10571
|
#
|
10565
10572
|
# @!attribute [rw] resource_owner
|
10566
|
-
# An ARN representing the account ID that
|
10567
|
-
# simulated resource that does not identify
|
10568
|
-
# ARN. Examples of resource ARNs include an
|
10569
|
-
# `ResourceOwner` is specified, it is also
|
10570
|
-
# of any `ResourcePolicy` included in the
|
10571
|
-
# `ResourceOwner` parameter is not specified, then
|
10572
|
-
# resources and the resource policy defaults to the
|
10573
|
-
# identity provided in `CallerArn`. This parameter is
|
10574
|
-
# you specify a resource-based policy and account
|
10575
|
-
# resource is different from the account that owns the
|
10576
|
-
# calling user `CallerArn`.
|
10573
|
+
# An ARN representing the Amazon Web Services account ID that
|
10574
|
+
# specifies the owner of any simulated resource that does not identify
|
10575
|
+
# its owner in the resource ARN. Examples of resource ARNs include an
|
10576
|
+
# S3 bucket or object. If `ResourceOwner` is specified, it is also
|
10577
|
+
# used as the account owner of any `ResourcePolicy` included in the
|
10578
|
+
# simulation. If the `ResourceOwner` parameter is not specified, then
|
10579
|
+
# the owner of the resources and the resource policy defaults to the
|
10580
|
+
# account of the identity provided in `CallerArn`. This parameter is
|
10581
|
+
# required only if you specify a resource-based policy and account
|
10582
|
+
# that owns the resource is different from the account that owns the
|
10583
|
+
# simulated calling user `CallerArn`.
|
10577
10584
|
#
|
10578
10585
|
# The ARN for an account uses the following syntax:
|
10579
10586
|
# `arn:aws:iam::AWS-account-ID:root`. For example, to represent the
|
@@ -10880,17 +10887,17 @@ module Aws::IAM
|
|
10880
10887
|
# @return [String]
|
10881
10888
|
#
|
10882
10889
|
# @!attribute [rw] resource_owner
|
10883
|
-
# An account ID that specifies the owner of any
|
10884
|
-
# that does not identify its owner in the resource
|
10885
|
-
# resource ARNs include an S3 bucket or object. If
|
10886
|
-
# specified, it is also used as the account owner
|
10887
|
-
# `ResourcePolicy` included in the simulation. If the
|
10888
|
-
# parameter is not specified, then the owner of the
|
10889
|
-
# resource policy defaults to the account of the
|
10890
|
-
# `CallerArn`. This parameter is required only if
|
10891
|
-
# resource-based policy and account that owns the
|
10892
|
-
# different from the account that owns the simulated
|
10893
|
-
# `CallerArn`.
|
10890
|
+
# An Amazon Web Services account ID that specifies the owner of any
|
10891
|
+
# simulated resource that does not identify its owner in the resource
|
10892
|
+
# ARN. Examples of resource ARNs include an S3 bucket or object. If
|
10893
|
+
# `ResourceOwner` is specified, it is also used as the account owner
|
10894
|
+
# of any `ResourcePolicy` included in the simulation. If the
|
10895
|
+
# `ResourceOwner` parameter is not specified, then the owner of the
|
10896
|
+
# resources and the resource policy defaults to the account of the
|
10897
|
+
# identity provided in `CallerArn`. This parameter is required only if
|
10898
|
+
# you specify a resource-based policy and account that owns the
|
10899
|
+
# resource is different from the account that owns the simulated
|
10900
|
+
# calling user `CallerArn`.
|
10894
10901
|
# @return [String]
|
10895
10902
|
#
|
10896
10903
|
# @!attribute [rw] caller_arn
|
@@ -11913,9 +11920,10 @@ module Aws::IAM
|
|
11913
11920
|
# @return [Boolean]
|
11914
11921
|
#
|
11915
11922
|
# @!attribute [rw] allow_users_to_change_password
|
11916
|
-
# Allows all IAM users in your account to use the
|
11917
|
-
# to change their own passwords. For more
|
11918
|
-
# IAM users change their own passwords][1]
|
11923
|
+
# Allows all IAM users in your account to use the Amazon Web Services
|
11924
|
+
# Management Console to change their own passwords. For more
|
11925
|
+
# information, see [Letting IAM users change their own passwords][1]
|
11926
|
+
# in the *IAM User Guide*.
|
11919
11927
|
#
|
11920
11928
|
# If you do not specify a value for this parameter, then the operation
|
11921
11929
|
# uses the default value of `false`. The result is that IAM users in
|
@@ -12123,8 +12131,9 @@ module Aws::IAM
|
|
12123
12131
|
# carriage return (`\u000D`)
|
12124
12132
|
#
|
12125
12133
|
# However, the format can be further restricted by the account
|
12126
|
-
# administrator by setting a password policy on the
|
12127
|
-
# information, see
|
12134
|
+
# administrator by setting a password policy on the Amazon Web
|
12135
|
+
# Services account. For more information, see
|
12136
|
+
# UpdateAccountPasswordPolicy.
|
12128
12137
|
#
|
12129
12138
|
#
|
12130
12139
|
#
|
data/lib/aws-sdk-iam/user.rb
CHANGED
@@ -439,8 +439,9 @@ module Aws::IAM
|
|
439
439
|
# character range (`\u00FF`). You can also include the tab (`\u0009`),
|
440
440
|
# line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
|
441
441
|
# of these characters are valid in a password. However, many tools, such
|
442
|
-
# as the Management Console, might restrict the
|
443
|
-
# characters because they have special meaning
|
442
|
+
# as the Amazon Web Services Management Console, might restrict the
|
443
|
+
# ability to type certain characters because they have special meaning
|
444
|
+
# within that tool.
|
444
445
|
#
|
445
446
|
#
|
446
447
|
#
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-iam
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.63.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-11-04 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.122.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,7 +29,7 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.122.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|
@@ -99,7 +99,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
99
99
|
requirements:
|
100
100
|
- - ">="
|
101
101
|
- !ruby/object:Gem::Version
|
102
|
-
version: '
|
102
|
+
version: '2.3'
|
103
103
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
104
104
|
requirements:
|
105
105
|
- - ">="
|