aws-sdk-iam 1.60.0 → 1.61.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5121819d748185a8c479668754e9c822cc93330c5b523271d5c16f6d108acb53
4
- data.tar.gz: 1d04a921fd706bc555cc590b9648c48fad89290eed9a9ee204d0ccd1b85452e7
3
+ metadata.gz: 55d594a115585ecc0ca073fe8486b170405e1666aeffd5dbb9ada7fae3cd041e
4
+ data.tar.gz: 533858168ba1dfd6aa25a2b4f134bcfe4eb49508b9dcc9c90546e24f0de18e6b
5
5
  SHA512:
6
- metadata.gz: 6e535e006859d78fb0a4a4d9096fd36ff2e1a134a2fa97fde116c711b502314db10f00ec8a75246adf40315b8a05d62f212d55d25ef8aa9e9c34f92eabc69b5b
7
- data.tar.gz: 999e98dbc352afc9912aaf7204fa72d4a281e0b277c4c43a7f9a6a526527d951f453d58cb5c361328264d7d0c0aa5b96744b425fc8512d481dfcb18b068476a4
6
+ metadata.gz: 83fb07b97bbd0bbb010f26d72aa5c3eebe6163a398a6e069542f3ae254f096bee1752d7cbda87581317df3f2c5b6e65181731a21c7005b6bd31853922008ea3b
7
+ data.tar.gz: 1da30b4abe1a5f5bd36b170ebd2bda9a121ccefc28da18d2831fddb74d0579ce3fe2d9f1aeb8006a24677a98f936243e769d999c9a385675174fcfd711d37b03
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.61.0 (2021-09-22)
5
+ ------------------
6
+
7
+ * Feature - Added changes to OIDC API about not using port numbers in the URL.
8
+
4
9
  1.60.0 (2021-09-01)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.60.0
1
+ 1.61.0
@@ -288,9 +288,10 @@ module Aws::IAM
288
288
  # uses the default value of `false`. The result is that passwords do not
289
289
  # require at least one lowercase character.
290
290
  # @option options [Boolean] :allow_users_to_change_password
291
- # Allows all IAM users in your account to use the Management Console to
292
- # change their own passwords. For more information, see [Letting IAM
293
- # users change their own passwords][1] in the *IAM User Guide*.
291
+ # Allows all IAM users in your account to use the Amazon Web Services
292
+ # Management Console to change their own passwords. For more
293
+ # information, see [Letting IAM users change their own passwords][1] in
294
+ # the *IAM User Guide*.
294
295
  #
295
296
  # If you do not specify a value for this parameter, then the operation
296
297
  # uses the default value of `false`. The result is that IAM users in the
@@ -714,9 +714,9 @@ module Aws::IAM
714
714
 
715
715
  # Changes the password of the IAM user who is calling this operation.
716
716
  # This operation can be performed using the CLI, the Amazon Web Services
717
- # API, or the **My Security Credentials** page in the Management
718
- # Console. The account root user password is not affected by this
719
- # operation.
717
+ # API, or the **My Security Credentials** page in the Amazon Web
718
+ # Services Management Console. The Amazon Web Services account root user
719
+ # password is not affected by this operation.
720
720
  #
721
721
  # Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
722
722
  # the **Users** page in the IAM console to change the password for any
@@ -731,8 +731,8 @@ module Aws::IAM
731
731
  # The IAM user's current password.
732
732
  #
733
733
  # @option params [required, String] :new_password
734
- # The new password. The new password must conform to the account's
735
- # password policy, if one exists.
734
+ # The new password. The new password must conform to the Amazon Web
735
+ # Services account's password policy, if one exists.
736
736
  #
737
737
  # The [regex pattern][1] that is used to validate this parameter is a
738
738
  # string of characters. That string can include almost any printable
@@ -740,8 +740,9 @@ module Aws::IAM
740
740
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
741
741
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
742
742
  # of these characters are valid in a password. However, many tools, such
743
- # as the Management Console, might restrict the ability to type certain
744
- # characters because they have special meaning within that tool.
743
+ # as the Amazon Web Services Management Console, might restrict the
744
+ # ability to type certain characters because they have special meaning
745
+ # within that tool.
745
746
  #
746
747
  #
747
748
  #
@@ -781,18 +782,19 @@ module Aws::IAM
781
782
  #
782
783
  # If you do not specify a user name, IAM determines the user name
783
784
  # implicitly based on the Amazon Web Services access key ID signing the
784
- # request. This operation works for access keys under the account.
785
- # Consequently, you can use this operation to manage account root user
786
- # credentials. This is true even if the account has no associated users.
785
+ # request. This operation works for access keys under the Amazon Web
786
+ # Services account. Consequently, you can use this operation to manage
787
+ # Amazon Web Services account root user credentials. This is true even
788
+ # if the Amazon Web Services account has no associated users.
787
789
  #
788
790
  # For information about quotas on the number of keys you can create, see
789
791
  # [IAM and STS quotas][1] in the *IAM User Guide*.
790
792
  #
791
- # To ensure the security of your account, the secret access key is
792
- # accessible only during key and user creation. You must save the key
793
- # (for example, in a text file) if you want to be able to access it
794
- # again. If a secret key is lost, you can delete the access keys for the
795
- # associated user and then create new keys.
793
+ # To ensure the security of your Amazon Web Services account, the secret
794
+ # access key is accessible only during key and user creation. You must
795
+ # save the key (for example, in a text file) if you want to be able to
796
+ # access it again. If a secret key is lost, you can delete the access
797
+ # keys for the associated user and then create new keys.
796
798
  #
797
799
  #
798
800
  #
@@ -857,9 +859,9 @@ module Aws::IAM
857
859
  req.send_request(options)
858
860
  end
859
861
 
860
- # Creates an alias for your account. For information about using an
861
- # account alias, see [Using an alias for your account ID][1] in the *IAM
862
- # User Guide*.
862
+ # Creates an alias for your Amazon Web Services account. For information
863
+ # about using an Amazon Web Services account alias, see [Using an alias
864
+ # for your Amazon Web Services account ID][1] in the *IAM User Guide*.
863
865
  #
864
866
  #
865
867
  #
@@ -1125,13 +1127,14 @@ module Aws::IAM
1125
1127
  end
1126
1128
 
1127
1129
  # Creates a password for the specified IAM user. A password allows an
1128
- # IAM user to access Amazon Web Services services through the Management
1129
- # Console.
1130
+ # IAM user to access Amazon Web Services services through the Amazon Web
1131
+ # Services Management Console.
1130
1132
  #
1131
1133
  # You can use the CLI, the Amazon Web Services API, or the **Users**
1132
1134
  # page in the IAM console to create a password for any IAM user. Use
1133
1135
  # ChangePassword to update your own existing password in the **My
1134
- # Security Credentials** page in the Management Console.
1136
+ # Security Credentials** page in the Amazon Web Services Management
1137
+ # Console.
1135
1138
  #
1136
1139
  # For more information about managing passwords, see [Managing
1137
1140
  # passwords][1] in the *IAM User Guide*.
@@ -1162,8 +1165,9 @@ module Aws::IAM
1162
1165
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
1163
1166
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
1164
1167
  # of these characters are valid in a password. However, many tools, such
1165
- # as the Management Console, might restrict the ability to type certain
1166
- # characters because they have special meaning within that tool.
1168
+ # as the Amazon Web Services Management Console, might restrict the
1169
+ # ability to type certain characters because they have special meaning
1170
+ # within that tool.
1167
1171
  #
1168
1172
  #
1169
1173
  #
@@ -1247,8 +1251,8 @@ module Aws::IAM
1247
1251
  # * A list of thumbprints of one or more server certificates that the
1248
1252
  # IdP uses
1249
1253
  #
1250
- # You get all of this information from the OIDC IdP that you want to use
1251
- # to access Amazon Web Services.
1254
+ # You get all of this information from the OIDC IdP you want to use to
1255
+ # access Amazon Web Services.
1252
1256
  #
1253
1257
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1254
1258
  # providers (IdPs) through our library of trusted certificate
@@ -1277,16 +1281,18 @@ module Aws::IAM
1277
1281
  # Connect ID tokens. Per the OIDC standard, path components are allowed
1278
1282
  # but query parameters are not. Typically the URL consists of only a
1279
1283
  # hostname, like `https://server.example.org` or `https://example.com`.
1284
+ # The URL should not contain a port number.
1280
1285
  #
1281
1286
  # You cannot register the same provider multiple times in a single
1282
- # account. If you try to submit a URL that has already been used for an
1283
- # OpenID Connect provider in the account, you will get an error.
1287
+ # Amazon Web Services account. If you try to submit a URL that has
1288
+ # already been used for an OpenID Connect provider in the Amazon Web
1289
+ # Services account, you will get an error.
1284
1290
  #
1285
1291
  # @option params [Array<String>] :client_id_list
1286
- # A list of client IDs (also known as audiences). When a mobile or web
1287
- # app registers with an OpenID Connect provider, they establish a value
1288
- # that identifies the application. (This is the value that's sent as
1289
- # the `client_id` parameter on OAuth requests.)
1292
+ # Provides a list of client IDs, also known as audiences. When a mobile
1293
+ # or web app registers with an OpenID Connect provider, they establish a
1294
+ # value that identifies the application. This is the value that's sent
1295
+ # as the `client_id` parameter on OAuth requests.
1290
1296
  #
1291
1297
  # You can register multiple client IDs with the same provider. For
1292
1298
  # example, you might have multiple applications that use the same OIDC
@@ -1313,11 +1319,11 @@ module Aws::IAM
1313
1319
  # `server.example.com` and the provider stores its keys at
1314
1320
  # https://keys.server.example.com/openid-connect. In that case, the
1315
1321
  # thumbprint string would be the hex-encoded SHA-1 hash value of the
1316
- # certificate used by https://keys.server.example.com.
1322
+ # certificate used by `https://keys.server.example.com.`
1317
1323
  #
1318
- # For more information about obtaining the OIDC provider's thumbprint,
1319
- # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
1320
- # the *IAM User Guide*.
1324
+ # For more information about obtaining the OIDC provider thumbprint, see
1325
+ # [Obtaining the thumbprint for an OpenID Connect provider][1] in the
1326
+ # *IAM User Guide*.
1321
1327
  #
1322
1328
  #
1323
1329
  #
@@ -1395,7 +1401,7 @@ module Aws::IAM
1395
1401
  req.send_request(options)
1396
1402
  end
1397
1403
 
1398
- # Creates a new managed policy for your account.
1404
+ # Creates a new managed policy for your Amazon Web Services account.
1399
1405
  #
1400
1406
  # This operation creates a policy version with a version identifier of
1401
1407
  # `v1` and sets v1 as the policy's default version. For more
@@ -1437,6 +1443,10 @@ module Aws::IAM
1437
1443
  # character (`\u007F`), including most punctuation characters, digits,
1438
1444
  # and upper and lowercased letters.
1439
1445
  #
1446
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
1447
+ #
1448
+ # </note>
1449
+ #
1440
1450
  #
1441
1451
  #
1442
1452
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -1650,10 +1660,10 @@ module Aws::IAM
1650
1660
  req.send_request(options)
1651
1661
  end
1652
1662
 
1653
- # Creates a new role for your account. For more information about roles,
1654
- # see [IAM roles][1]. For information about quotas for role names and
1655
- # the number of roles you can create, see [IAM and STS quotas][2] in the
1656
- # *IAM User Guide*.
1663
+ # Creates a new role for your Amazon Web Services account. For more
1664
+ # information about roles, see [IAM roles][1]. For information about
1665
+ # quotas for role names and the number of roles you can create, see [IAM
1666
+ # and STS quotas][2] in the *IAM User Guide*.
1657
1667
  #
1658
1668
  #
1659
1669
  #
@@ -1836,8 +1846,8 @@ module Aws::IAM
1836
1846
  # used as a principal in an IAM role's trust policy. Such a policy can
1837
1847
  # enable federated users who sign in using the SAML IdP to assume the
1838
1848
  # role. You can create an IAM role that supports Web-based single
1839
- # sign-on (SSO) to the Management Console or one that supports API
1840
- # access to Amazon Web Services.
1849
+ # sign-on (SSO) to the Amazon Web Services Management Console or one
1850
+ # that supports API access to Amazon Web Services.
1841
1851
  #
1842
1852
  # When you create the SAML provider resource, you upload a SAML metadata
1843
1853
  # document that you get from your IdP. That document includes the
@@ -1851,8 +1861,8 @@ module Aws::IAM
1851
1861
  # </note>
1852
1862
  #
1853
1863
  # For more information, see [Enabling SAML 2.0 federated users to access
1854
- # the Management Console][2] and [About SAML 2.0-based federation][3] in
1855
- # the *IAM User Guide*.
1864
+ # the Amazon Web Services Management Console][2] and [About SAML
1865
+ # 2.0-based federation][3] in the *IAM User Guide*.
1856
1866
  #
1857
1867
  #
1858
1868
  #
@@ -2096,7 +2106,7 @@ module Aws::IAM
2096
2106
  req.send_request(options)
2097
2107
  end
2098
2108
 
2099
- # Creates a new IAM user for your account.
2109
+ # Creates a new IAM user for your Amazon Web Services account.
2100
2110
  #
2101
2111
  # For information about quotas for the number of IAM users you can
2102
2112
  # create, see [IAM and STS quotas][1] in the *IAM User Guide*.
@@ -2211,10 +2221,11 @@ module Aws::IAM
2211
2221
  req.send_request(options)
2212
2222
  end
2213
2223
 
2214
- # Creates a new virtual MFA device for the account. After creating the
2215
- # virtual MFA, use EnableMFADevice to attach the MFA device to an IAM
2216
- # user. For more information about creating and working with virtual MFA
2217
- # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
2224
+ # Creates a new virtual MFA device for the Amazon Web Services account.
2225
+ # After creating the virtual MFA, use EnableMFADevice to attach the MFA
2226
+ # device to an IAM user. For more information about creating and working
2227
+ # with virtual MFA devices, see [Using a virtual MFA device][1] in the
2228
+ # *IAM User Guide*.
2218
2229
  #
2219
2230
  # For information about the maximum number of MFA devices you can
2220
2231
  # create, see [IAM and STS quotas][2] in the *IAM User Guide*.
@@ -2384,9 +2395,10 @@ module Aws::IAM
2384
2395
  #
2385
2396
  # If you do not specify a user name, IAM determines the user name
2386
2397
  # implicitly based on the Amazon Web Services access key ID signing the
2387
- # request. This operation works for access keys under the account.
2388
- # Consequently, you can use this operation to manage account root user
2389
- # credentials even if the account has no associated users.
2398
+ # request. This operation works for access keys under the Amazon Web
2399
+ # Services account. Consequently, you can use this operation to manage
2400
+ # Amazon Web Services account root user credentials even if the Amazon
2401
+ # Web Services account has no associated users.
2390
2402
  #
2391
2403
  # @option params [String] :user_name
2392
2404
  # The name of the user whose access key pair you want to delete.
@@ -2440,9 +2452,10 @@ module Aws::IAM
2440
2452
  req.send_request(options)
2441
2453
  end
2442
2454
 
2443
- # Deletes the specified account alias. For information about using an
2444
- # Amazon Web Services account alias, see [Using an alias for your
2445
- # account ID][1] in the *IAM User Guide*.
2455
+ # Deletes the specified Amazon Web Services account alias. For
2456
+ # information about using an Amazon Web Services account alias, see
2457
+ # [Using an alias for your Amazon Web Services account ID][1] in the
2458
+ # *IAM User Guide*.
2446
2459
  #
2447
2460
  #
2448
2461
  #
@@ -2486,7 +2499,8 @@ module Aws::IAM
2486
2499
  req.send_request(options)
2487
2500
  end
2488
2501
 
2489
- # Deletes the password policy for the account. There are no parameters.
2502
+ # Deletes the password policy for the Amazon Web Services account. There
2503
+ # are no parameters.
2490
2504
  #
2491
2505
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2492
2506
  #
@@ -2659,12 +2673,13 @@ module Aws::IAM
2659
2673
 
2660
2674
  # Deletes the password for the specified IAM user, which terminates the
2661
2675
  # user's ability to access Amazon Web Services services through the
2662
- # Management Console.
2676
+ # Amazon Web Services Management Console.
2663
2677
  #
2664
2678
  # You can use the CLI, the Amazon Web Services API, or the **Users**
2665
2679
  # page in the IAM console to delete a password for any IAM user. You can
2666
2680
  # use ChangePassword to update, but not delete, your own password in the
2667
- # **My Security Credentials** page in the Management Console.
2681
+ # **My Security Credentials** page in the Amazon Web Services Management
2682
+ # Console.
2668
2683
  #
2669
2684
  # Deleting a user's password does not prevent a user from accessing
2670
2685
  # Amazon Web Services through the command line interface or the API. To
@@ -3243,9 +3258,10 @@ module Aws::IAM
3243
3258
  #
3244
3259
  # If you do not specify a user name, IAM determines the user name
3245
3260
  # implicitly based on the Amazon Web Services access key ID signing the
3246
- # request. This operation works for access keys under the account.
3247
- # Consequently, you can use this operation to manage account root user
3248
- # credentials even if the account has no associated IAM users.
3261
+ # request. This operation works for access keys under the Amazon Web
3262
+ # Services account. Consequently, you can use this operation to manage
3263
+ # Amazon Web Services account root user credentials even if the Amazon
3264
+ # Web Services account has no associated IAM users.
3249
3265
  #
3250
3266
  # @option params [String] :user_name
3251
3267
  # The name of the user the signing certificate belongs to.
@@ -3298,11 +3314,11 @@ module Aws::IAM
3298
3314
  req.send_request(options)
3299
3315
  end
3300
3316
 
3301
- # Deletes the specified IAM user. Unlike the Management Console, when
3302
- # you delete a user programmatically, you must delete the items attached
3303
- # to the user manually, or the deletion fails. For more information, see
3304
- # [Deleting an IAM user][1]. Before attempting to delete a user, remove
3305
- # the following items:
3317
+ # Deletes the specified IAM user. Unlike the Amazon Web Services
3318
+ # Management Console, when you delete a user programmatically, you must
3319
+ # delete the items attached to the user manually, or the deletion fails.
3320
+ # For more information, see [Deleting an IAM user][1]. Before attempting
3321
+ # to delete a user, remove the following items:
3306
3322
  #
3307
3323
  # * Password (DeleteLoginProfile)
3308
3324
  #
@@ -3738,9 +3754,9 @@ module Aws::IAM
3738
3754
  req.send_request(options)
3739
3755
  end
3740
3756
 
3741
- # Generates a credential report for the account. For more information
3742
- # about the credential report, see [Getting credential reports][1] in
3743
- # the *IAM User Guide*.
3757
+ # Generates a credential report for the Amazon Web Services account. For
3758
+ # more information about the credential report, see [Getting credential
3759
+ # reports][1] in the *IAM User Guide*.
3744
3760
  #
3745
3761
  #
3746
3762
  #
@@ -3796,14 +3812,14 @@ module Aws::IAM
3796
3812
  #
3797
3813
  # The data includes all attempts to access Amazon Web Services, not just
3798
3814
  # the successful ones. This includes all attempts that were made using
3799
- # the Management Console, the Amazon Web Services API through any of the
3800
- # SDKs, or any of the command line tools. An unexpected entry in the
3801
- # service last accessed data does not mean that an account has been
3802
- # compromised, because the request might have been denied. Refer to your
3803
- # CloudTrail logs as the authoritative source for information about all
3804
- # API calls and whether they were successful or denied access. For more
3805
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3806
- # User Guide*.
3815
+ # the Amazon Web Services Management Console, the Amazon Web Services
3816
+ # API through any of the SDKs, or any of the command line tools. An
3817
+ # unexpected entry in the service last accessed data does not mean that
3818
+ # an account has been compromised, because the request might have been
3819
+ # denied. Refer to your CloudTrail logs as the authoritative source for
3820
+ # information about all API calls and whether they were successful or
3821
+ # denied access. For more information, see [Logging IAM events with
3822
+ # CloudTrail][2] in the *IAM User Guide*.
3807
3823
  #
3808
3824
  # This operation returns a `JobId`. Use this parameter in the `
3809
3825
  # GetOrganizationsAccessReport ` operation to check the status of the
@@ -3959,14 +3975,15 @@ module Aws::IAM
3959
3975
  #
3960
3976
  # The service last accessed data includes all attempts to access an
3961
3977
  # Amazon Web Services API, not just the successful ones. This includes
3962
- # all attempts that were made using the Management Console, the Amazon
3963
- # Web Services API through any of the SDKs, or any of the command line
3964
- # tools. An unexpected entry in the service last accessed data does not
3965
- # mean that your account has been compromised, because the request might
3966
- # have been denied. Refer to your CloudTrail logs as the authoritative
3967
- # source for information about all API calls and whether they were
3968
- # successful or denied access. For more information, see [Logging IAM
3969
- # events with CloudTrail][2] in the *IAM User Guide*.
3978
+ # all attempts that were made using the Amazon Web Services Management
3979
+ # Console, the Amazon Web Services API through any of the SDKs, or any
3980
+ # of the command line tools. An unexpected entry in the service last
3981
+ # accessed data does not mean that your account has been compromised,
3982
+ # because the request might have been denied. Refer to your CloudTrail
3983
+ # logs as the authoritative source for information about all API calls
3984
+ # and whether they were successful or denied access. For more
3985
+ # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3986
+ # User Guide*.
3970
3987
  #
3971
3988
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
3972
3989
  # Use this parameter in the following operations to retrieve the
@@ -4284,10 +4301,11 @@ module Aws::IAM
4284
4301
  req.send_request(options)
4285
4302
  end
4286
4303
 
4287
- # Retrieves the password policy for the account. This tells you the
4288
- # complexity requirements and mandatory rotation periods for the IAM
4289
- # user passwords in your account. For more information about using a
4290
- # password policy, see [Managing an IAM password policy][1].
4304
+ # Retrieves the password policy for the Amazon Web Services account.
4305
+ # This tells you the complexity requirements and mandatory rotation
4306
+ # periods for the IAM user passwords in your account. For more
4307
+ # information about using a password policy, see [Managing an IAM
4308
+ # password policy][1].
4291
4309
  #
4292
4310
  #
4293
4311
  #
@@ -4554,9 +4572,9 @@ module Aws::IAM
4554
4572
  req.send_request(options)
4555
4573
  end
4556
4574
 
4557
- # Retrieves a credential report for the account. For more information
4558
- # about the credential report, see [Getting credential reports][1] in
4559
- # the *IAM User Guide*.
4575
+ # Retrieves a credential report for the Amazon Web Services account. For
4576
+ # more information about the credential report, see [Getting credential
4577
+ # reports][1] in the *IAM User Guide*.
4560
4578
  #
4561
4579
  #
4562
4580
  #
@@ -4842,18 +4860,20 @@ module Aws::IAM
4842
4860
  end
4843
4861
 
4844
4862
  # Retrieves the user name for the specified IAM user. A login profile is
4845
- # created when you create a password for the user to access the
4846
- # Management Console. If the user does not exist or does not have a
4847
- # password, the operation returns a 404 (`NoSuchEntity`) error.
4863
+ # created when you create a password for the user to access the Amazon
4864
+ # Web Services Management Console. If the user does not exist or does
4865
+ # not have a password, the operation returns a 404 (`NoSuchEntity`)
4866
+ # error.
4848
4867
  #
4849
4868
  # If you create an IAM user with access to the console, the `CreateDate`
4850
4869
  # reflects the date you created the initial password for the user.
4851
4870
  #
4852
4871
  # If you create an IAM user with programmatic access, and then later add
4853
- # a password for the user to access the Management Console, the
4854
- # `CreateDate` reflects the initial password creation date. A user with
4855
- # programmatic access does not have a login profile unless you create a
4856
- # password for the user to access the Management Console.
4872
+ # a password for the user to access the Amazon Web Services Management
4873
+ # Console, the `CreateDate` reflects the initial password creation date.
4874
+ # A user with programmatic access does not have a login profile unless
4875
+ # you create a password for the user to access the Amazon Web Services
4876
+ # Management Console.
4857
4877
  #
4858
4878
  # @option params [required, String] :user_name
4859
4879
  # The name of the user whose login profile you want to retrieve.
@@ -6131,12 +6151,13 @@ module Aws::IAM
6131
6151
  #
6132
6152
  # If the `UserName` field is not specified, the user name is determined
6133
6153
  # implicitly based on the Amazon Web Services access key ID used to sign
6134
- # the request. This operation works for access keys under the account.
6135
- # Consequently, you can use this operation to manage account root user
6136
- # credentials even if the account has no associated users.
6154
+ # the request. This operation works for access keys under the Amazon Web
6155
+ # Services account. Consequently, you can use this operation to manage
6156
+ # Amazon Web Services account root user credentials even if the Amazon
6157
+ # Web Services account has no associated users.
6137
6158
  #
6138
- # <note markdown="1"> To ensure the security of your account, the secret access key is
6139
- # accessible only during key and user creation.
6159
+ # <note markdown="1"> To ensure the security of your Amazon Web Services account, the secret
6160
+ # access key is accessible only during key and user creation.
6140
6161
  #
6141
6162
  # </note>
6142
6163
  #
@@ -6231,9 +6252,10 @@ module Aws::IAM
6231
6252
  req.send_request(options)
6232
6253
  end
6233
6254
 
6234
- # Lists the account alias associated with the account (Note: you can
6235
- # have only one). For information about using an account alias, see
6236
- # [Using an alias for your account ID][1] in the *IAM User Guide*.
6255
+ # Lists the account alias associated with the Amazon Web Services
6256
+ # account (Note: you can have only one). For information about using an
6257
+ # Amazon Web Services account alias, see [Using an alias for your Amazon
6258
+ # Web Services account ID][1] in the *IAM User Guide*.
6237
6259
  #
6238
6260
  #
6239
6261
  #
@@ -7510,7 +7532,7 @@ module Aws::IAM
7510
7532
  end
7511
7533
 
7512
7534
  # Lists information about the IAM OpenID Connect (OIDC) provider
7513
- # resource objects defined in the account.
7535
+ # resource objects defined in the Amazon Web Services account.
7514
7536
  #
7515
7537
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7516
7538
  # attributes for the resource. For example, this operation does not
@@ -7538,9 +7560,9 @@ module Aws::IAM
7538
7560
  req.send_request(options)
7539
7561
  end
7540
7562
 
7541
- # Lists all the managed policies that are available in your account,
7542
- # including your own customer-defined managed policies and all Amazon
7543
- # Web Services managed policies.
7563
+ # Lists all the managed policies that are available in your Amazon Web
7564
+ # Services account, including your own customer-defined managed policies
7565
+ # and all Amazon Web Services managed policies.
7544
7566
  #
7545
7567
  # You can filter the list of policies that is returned using the
7546
7568
  # optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
@@ -7570,8 +7592,8 @@ module Aws::IAM
7570
7592
  # The scope to use for filtering the results.
7571
7593
  #
7572
7594
  # To list only Amazon Web Services managed policies, set `Scope` to
7573
- # `AWS`. To list only the customer managed policies in your account, set
7574
- # `Scope` to `Local`.
7595
+ # `AWS`. To list only the customer managed policies in your Amazon Web
7596
+ # Services account, set `Scope` to `Local`.
7575
7597
  #
7576
7598
  # This parameter is optional. If it is not included, or if it is set to
7577
7599
  # `All`, all policies are returned.
@@ -8671,9 +8693,9 @@ module Aws::IAM
8671
8693
  # If the `UserName` field is not specified, the user name is determined
8672
8694
  # implicitly based on the Amazon Web Services access key ID used to sign
8673
8695
  # the request for this operation. This operation works for access keys
8674
- # under the account. Consequently, you can use this operation to manage
8675
- # account root user credentials even if the account has no associated
8676
- # users.
8696
+ # under the Amazon Web Services account. Consequently, you can use this
8697
+ # operation to manage Amazon Web Services account root user credentials
8698
+ # even if the Amazon Web Services account has no associated users.
8677
8699
  #
8678
8700
  # @option params [String] :user_name
8679
8701
  # The name of the IAM user whose signing certificates you want to
@@ -8935,8 +8957,9 @@ module Aws::IAM
8935
8957
  end
8936
8958
 
8937
8959
  # Lists the IAM users that have the specified path prefix. If no path
8938
- # prefix is specified, the operation returns all users in the account.
8939
- # If there are none, the operation returns an empty list.
8960
+ # prefix is specified, the operation returns all users in the Amazon Web
8961
+ # Services account. If there are none, the operation returns an empty
8962
+ # list.
8940
8963
  #
8941
8964
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8942
8965
  # attributes for the resource. For example, this operation does not
@@ -9054,10 +9077,10 @@ module Aws::IAM
9054
9077
  req.send_request(options)
9055
9078
  end
9056
9079
 
9057
- # Lists the virtual MFA devices defined in the account by assignment
9058
- # status. If you do not specify an assignment status, the operation
9059
- # returns a list of all virtual MFA devices. Assignment status can be
9060
- # `Assigned`, `Unassigned`, or `Any`.
9080
+ # Lists the virtual MFA devices defined in the Amazon Web Services
9081
+ # account by assignment status. If you do not specify an assignment
9082
+ # status, the operation returns a list of all virtual MFA devices.
9083
+ # Assignment status can be `Assigned`, `Unassigned`, or `Any`.
9061
9084
  #
9062
9085
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
9063
9086
  # attributes for the resource. For example, this operation does not
@@ -9908,7 +9931,7 @@ module Aws::IAM
9908
9931
  end
9909
9932
 
9910
9933
  # Sets the specified version of the global endpoint token as the token
9911
- # version used for the account.
9934
+ # version used for the Amazon Web Services account.
9912
9935
  #
9913
9936
  # By default, Security Token Service (STS) is available as a global
9914
9937
  # service, and all STS requests go to a single endpoint at
@@ -9921,12 +9944,13 @@ module Aws::IAM
9921
9944
  # If you make an STS call to the global endpoint, the resulting session
9922
9945
  # tokens might be valid in some Regions but not others. It depends on
9923
9946
  # the version that is set in this operation. Version 1 tokens are valid
9924
- # only in Regions that are available by default. These tokens do not
9925
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9926
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
9927
- # are longer and might affect systems where you temporarily store
9928
- # tokens. For information, see [Activating and deactivating STS in an
9929
- # Region][2] in the *IAM User Guide*.
9947
+ # only in Amazon Web Services Regions that are available by default.
9948
+ # These tokens do not work in manually enabled Regions, such as Asia
9949
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
9950
+ # However, version 2 tokens are longer and might affect systems where
9951
+ # you temporarily store tokens. For information, see [Activating and
9952
+ # deactivating STS in an Amazon Web Services Region][2] in the *IAM User
9953
+ # Guide*.
9930
9954
  #
9931
9955
  # To view the current session token version, see the
9932
9956
  # `GlobalEndpointTokenVersion` entry in the response of the
@@ -9939,14 +9963,14 @@ module Aws::IAM
9939
9963
  #
9940
9964
  # @option params [required, String] :global_endpoint_token_version
9941
9965
  # The version of the global endpoint token. Version 1 tokens are valid
9942
- # only in Regions that are available by default. These tokens do not
9943
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9944
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
9945
- # are longer and might affect systems where you temporarily store
9946
- # tokens.
9966
+ # only in Amazon Web Services Regions that are available by default.
9967
+ # These tokens do not work in manually enabled Regions, such as Asia
9968
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
9969
+ # However, version 2 tokens are longer and might affect systems where
9970
+ # you temporarily store tokens.
9947
9971
  #
9948
- # For information, see [Activating and deactivating STS in an Region][1]
9949
- # in the *IAM User Guide*.
9972
+ # For information, see [Activating and deactivating STS in an Amazon Web
9973
+ # Services Region][1] in the *IAM User Guide*.
9950
9974
  #
9951
9975
  #
9952
9976
  #
@@ -10136,12 +10160,12 @@ module Aws::IAM
10136
10160
  # [2]: http://wikipedia.org/wiki/regex
10137
10161
  #
10138
10162
  # @option params [String] :resource_owner
10139
- # An ARN representing the account ID that specifies the owner of any
10140
- # simulated resource that does not identify its owner in the resource
10141
- # ARN. Examples of resource ARNs include an S3 bucket or object. If
10142
- # `ResourceOwner` is specified, it is also used as the account owner of
10143
- # any `ResourcePolicy` included in the simulation. If the
10144
- # `ResourceOwner` parameter is not specified, then the owner of the
10163
+ # An ARN representing the Amazon Web Services account ID that specifies
10164
+ # the owner of any simulated resource that does not identify its owner
10165
+ # in the resource ARN. Examples of resource ARNs include an S3 bucket or
10166
+ # object. If `ResourceOwner` is specified, it is also used as the
10167
+ # account owner of any `ResourcePolicy` included in the simulation. If
10168
+ # the `ResourceOwner` parameter is not specified, then the owner of the
10145
10169
  # resources and the resource policy defaults to the account of the
10146
10170
  # identity provided in `CallerArn`. This parameter is required only if
10147
10171
  # you specify a resource-based policy and account that owns the resource
@@ -10482,16 +10506,17 @@ module Aws::IAM
10482
10506
  # [2]: http://wikipedia.org/wiki/regex
10483
10507
  #
10484
10508
  # @option params [String] :resource_owner
10485
- # An account ID that specifies the owner of any simulated resource that
10486
- # does not identify its owner in the resource ARN. Examples of resource
10487
- # ARNs include an S3 bucket or object. If `ResourceOwner` is specified,
10488
- # it is also used as the account owner of any `ResourcePolicy` included
10489
- # in the simulation. If the `ResourceOwner` parameter is not specified,
10490
- # then the owner of the resources and the resource policy defaults to
10491
- # the account of the identity provided in `CallerArn`. This parameter is
10492
- # required only if you specify a resource-based policy and account that
10493
- # owns the resource is different from the account that owns the
10494
- # simulated calling user `CallerArn`.
10509
+ # An Amazon Web Services account ID that specifies the owner of any
10510
+ # simulated resource that does not identify its owner in the resource
10511
+ # ARN. Examples of resource ARNs include an S3 bucket or object. If
10512
+ # `ResourceOwner` is specified, it is also used as the account owner of
10513
+ # any `ResourcePolicy` included in the simulation. If the
10514
+ # `ResourceOwner` parameter is not specified, then the owner of the
10515
+ # resources and the resource policy defaults to the account of the
10516
+ # identity provided in `CallerArn`. This parameter is required only if
10517
+ # you specify a resource-based policy and account that owns the resource
10518
+ # is different from the account that owns the simulated calling user
10519
+ # `CallerArn`.
10495
10520
  #
10496
10521
  # @option params [String] :caller_arn
10497
10522
  # The ARN of the IAM user that you want to specify as the simulated
@@ -11723,9 +11748,10 @@ module Aws::IAM
11723
11748
  #
11724
11749
  # If the `UserName` is not specified, the user name is determined
11725
11750
  # implicitly based on the Amazon Web Services access key ID used to sign
11726
- # the request. This operation works for access keys under the account.
11727
- # Consequently, you can use this operation to manage account root user
11728
- # credentials even if the account has no associated users.
11751
+ # the request. This operation works for access keys under the Amazon Web
11752
+ # Services account. Consequently, you can use this operation to manage
11753
+ # Amazon Web Services account root user credentials even if the Amazon
11754
+ # Web Services account has no associated users.
11729
11755
  #
11730
11756
  # For information about rotating keys, see [Managing keys and
11731
11757
  # certificates][1] in the *IAM User Guide*.
@@ -11793,7 +11819,8 @@ module Aws::IAM
11793
11819
  req.send_request(options)
11794
11820
  end
11795
11821
 
11796
- # Updates the password policy settings for the account.
11822
+ # Updates the password policy settings for the Amazon Web Services
11823
+ # account.
11797
11824
  #
11798
11825
  # <note markdown="1"> * This operation does not support partial updates. No parameters are
11799
11826
  # required, but if you do not specify a parameter, that parameter's
@@ -11855,9 +11882,10 @@ module Aws::IAM
11855
11882
  # require at least one lowercase character.
11856
11883
  #
11857
11884
  # @option params [Boolean] :allow_users_to_change_password
11858
- # Allows all IAM users in your account to use the Management Console to
11859
- # change their own passwords. For more information, see [Letting IAM
11860
- # users change their own passwords][1] in the *IAM User Guide*.
11885
+ # Allows all IAM users in your account to use the Amazon Web Services
11886
+ # Management Console to change their own passwords. For more
11887
+ # information, see [Letting IAM users change their own passwords][1] in
11888
+ # the *IAM User Guide*.
11861
11889
  #
11862
11890
  # If you do not specify a value for this parameter, then the operation
11863
11891
  # uses the default value of `false`. The result is that IAM users in the
@@ -12092,7 +12120,7 @@ module Aws::IAM
12092
12120
  # the Amazon Web Services API, or the **Users** page in the IAM console
12093
12121
  # to change the password for any IAM user. Use ChangePassword to change
12094
12122
  # your own password in the **My Security Credentials** page in the
12095
- # Management Console.
12123
+ # Amazon Web Services Management Console.
12096
12124
  #
12097
12125
  # For more information about modifying passwords, see [Managing
12098
12126
  # passwords][1] in the *IAM User Guide*.
@@ -12129,8 +12157,8 @@ module Aws::IAM
12129
12157
  # carriage return (`\u000D`)
12130
12158
  #
12131
12159
  # However, the format can be further restricted by the account
12132
- # administrator by setting a password policy on the account. For more
12133
- # information, see UpdateAccountPasswordPolicy.
12160
+ # administrator by setting a password policy on the Amazon Web Services
12161
+ # account. For more information, see UpdateAccountPasswordPolicy.
12134
12162
  #
12135
12163
  #
12136
12164
  #
@@ -12597,9 +12625,10 @@ module Aws::IAM
12597
12625
  #
12598
12626
  # If the `UserName` field is not specified, the user name is determined
12599
12627
  # implicitly based on the Amazon Web Services access key ID used to sign
12600
- # the request. This operation works for access keys under the account.
12601
- # Consequently, you can use this operation to manage account root user
12602
- # credentials even if the account has no associated users.
12628
+ # the request. This operation works for access keys under the Amazon Web
12629
+ # Services account. Consequently, you can use this operation to manage
12630
+ # Amazon Web Services account root user credentials even if the Amazon
12631
+ # Web Services account has no associated users.
12603
12632
  #
12604
12633
  # @option params [String] :user_name
12605
12634
  # The name of the IAM user the signing certificate belongs to.
@@ -12820,9 +12849,10 @@ module Aws::IAM
12820
12849
  req.send_request(options)
12821
12850
  end
12822
12851
 
12823
- # Uploads a server certificate entity for the account. The server
12824
- # certificate entity includes a public key certificate, a private key,
12825
- # and an optional certificate chain, which should all be PEM-encoded.
12852
+ # Uploads a server certificate entity for the Amazon Web Services
12853
+ # account. The server certificate entity includes a public key
12854
+ # certificate, a private key, and an optional certificate chain, which
12855
+ # should all be PEM-encoded.
12826
12856
  #
12827
12857
  # We recommend that you use [Certificate Manager][1] to provision,
12828
12858
  # manage, and deploy your server certificates. With ACM you can request
@@ -13047,9 +13077,10 @@ module Aws::IAM
13047
13077
  #
13048
13078
  # If the `UserName` is not specified, the IAM user name is determined
13049
13079
  # implicitly based on the Amazon Web Services access key ID used to sign
13050
- # the request. This operation works for access keys under the account.
13051
- # Consequently, you can use this operation to manage account root user
13052
- # credentials even if the account has no associated users.
13080
+ # the request. This operation works for access keys under the Amazon Web
13081
+ # Services account. Consequently, you can use this operation to manage
13082
+ # Amazon Web Services account root user credentials even if the Amazon
13083
+ # Web Services account has no associated users.
13053
13084
  #
13054
13085
  # <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
13055
13086
  # POST rather than GET when calling `UploadSigningCertificate`. For
@@ -13160,7 +13191,7 @@ module Aws::IAM
13160
13191
  params: params,
13161
13192
  config: config)
13162
13193
  context[:gem_name] = 'aws-sdk-iam'
13163
- context[:gem_version] = '1.60.0'
13194
+ context[:gem_version] = '1.61.0'
13164
13195
  Seahorse::Client::Request.new(handlers, context)
13165
13196
  end
13166
13197
 
@@ -197,8 +197,9 @@ module Aws::IAM
197
197
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
198
198
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
199
199
  # of these characters are valid in a password. However, many tools, such
200
- # as the Management Console, might restrict the ability to type certain
201
- # characters because they have special meaning within that tool.
200
+ # as the Amazon Web Services Management Console, might restrict the
201
+ # ability to type certain characters because they have special meaning
202
+ # within that tool.
202
203
  #
203
204
  #
204
205
  #
@@ -251,8 +252,8 @@ module Aws::IAM
251
252
  # carriage return (`\u000D`)
252
253
  #
253
254
  # However, the format can be further restricted by the account
254
- # administrator by setting a password policy on the account. For more
255
- # information, see UpdateAccountPasswordPolicy.
255
+ # administrator by setting a password policy on the Amazon Web Services
256
+ # account. For more information, see UpdateAccountPasswordPolicy.
256
257
  #
257
258
  #
258
259
  #
@@ -45,8 +45,8 @@ module Aws::IAM
45
45
  # @option options [required, String] :old_password
46
46
  # The IAM user's current password.
47
47
  # @option options [required, String] :new_password
48
- # The new password. The new password must conform to the account's
49
- # password policy, if one exists.
48
+ # The new password. The new password must conform to the Amazon Web
49
+ # Services account's password policy, if one exists.
50
50
  #
51
51
  # The [regex pattern][1] that is used to validate this parameter is a
52
52
  # string of characters. That string can include almost any printable
@@ -54,8 +54,9 @@ module Aws::IAM
54
54
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
55
55
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
56
56
  # of these characters are valid in a password. However, many tools, such
57
- # as the Management Console, might restrict the ability to type certain
58
- # characters because they have special meaning within that tool.
57
+ # as the Amazon Web Services Management Console, might restrict the
58
+ # ability to type certain characters because they have special meaning
59
+ # within that tool.
59
60
  #
60
61
  #
61
62
  #
@@ -139,9 +140,10 @@ module Aws::IAM
139
140
  # uses the default value of `false`. The result is that passwords do not
140
141
  # require at least one lowercase character.
141
142
  # @option options [Boolean] :allow_users_to_change_password
142
- # Allows all IAM users in your account to use the Management Console to
143
- # change their own passwords. For more information, see [Letting IAM
144
- # users change their own passwords][1] in the *IAM User Guide*.
143
+ # Allows all IAM users in your account to use the Amazon Web Services
144
+ # Management Console to change their own passwords. For more
145
+ # information, see [Letting IAM users change their own passwords][1] in
146
+ # the *IAM User Guide*.
145
147
  #
146
148
  # If you do not specify a value for this parameter, then the operation
147
149
  # uses the default value of `false`. The result is that IAM users in the
@@ -325,6 +327,10 @@ module Aws::IAM
325
327
  # character (`\u007F`), including most punctuation characters, digits,
326
328
  # and upper and lowercased letters.
327
329
  #
330
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
331
+ #
332
+ # </note>
333
+ #
328
334
  #
329
335
  #
330
336
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -1015,8 +1021,8 @@ module Aws::IAM
1015
1021
  # The scope to use for filtering the results.
1016
1022
  #
1017
1023
  # To list only Amazon Web Services managed policies, set `Scope` to
1018
- # `AWS`. To list only the customer managed policies in your account, set
1019
- # `Scope` to `Local`.
1024
+ # `AWS`. To list only the customer managed policies in your Amazon Web
1025
+ # Services account, set `Scope` to `Local`.
1020
1026
  #
1021
1027
  # This parameter is optional. If it is not included, or if it is set to
1022
1028
  # `All`, all policies are returned.
@@ -186,8 +186,9 @@ module Aws::IAM
186
186
  # @return [String]
187
187
  #
188
188
  # @!attribute [rw] region
189
- # The Region where this access key was most recently used. The value
190
- # for this field is "N/A" in the following situations:
189
+ # The Amazon Web Services Region where this access key was most
190
+ # recently used. The value for this field is "N/A" in the following
191
+ # situations:
191
192
  #
192
193
  # * The user does not have an access key.
193
194
  #
@@ -196,8 +197,8 @@ module Aws::IAM
196
197
  #
197
198
  # * There is no sign-in data associated with the user.
198
199
  #
199
- # For more information about Regions, see [Regions and endpoints][1]
200
- # in the Amazon Web Services General Reference.
200
+ # For more information about Amazon Web Services Regions, see [Regions
201
+ # and endpoints][1] in the Amazon Web Services General Reference.
201
202
  #
202
203
  #
203
204
  #
@@ -574,8 +575,8 @@ module Aws::IAM
574
575
  # @return [String]
575
576
  #
576
577
  # @!attribute [rw] new_password
577
- # The new password. The new password must conform to the account's
578
- # password policy, if one exists.
578
+ # The new password. The new password must conform to the Amazon Web
579
+ # Services account's password policy, if one exists.
579
580
  #
580
581
  # The [regex pattern][1] that is used to validate this parameter is a
581
582
  # string of characters. That string can include almost any printable
@@ -583,9 +584,9 @@ module Aws::IAM
583
584
  # ASCII character range (`\u00FF`). You can also include the tab
584
585
  # (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
585
586
  # characters. Any of these characters are valid in a password.
586
- # However, many tools, such as the Management Console, might restrict
587
- # the ability to type certain characters because they have special
588
- # meaning within that tool.
587
+ # However, many tools, such as the Amazon Web Services Management
588
+ # Console, might restrict the ability to type certain characters
589
+ # because they have special meaning within that tool.
589
590
  #
590
591
  #
591
592
  #
@@ -911,9 +912,9 @@ module Aws::IAM
911
912
  # ASCII character range (`\u00FF`). You can also include the tab
912
913
  # (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
913
914
  # characters. Any of these characters are valid in a password.
914
- # However, many tools, such as the Management Console, might restrict
915
- # the ability to type certain characters because they have special
916
- # meaning within that tool.
915
+ # However, many tools, such as the Amazon Web Services Management
916
+ # Console, might restrict the ability to type certain characters
917
+ # because they have special meaning within that tool.
917
918
  #
918
919
  #
919
920
  #
@@ -970,18 +971,19 @@ module Aws::IAM
970
971
  # Connect ID tokens. Per the OIDC standard, path components are
971
972
  # allowed but query parameters are not. Typically the URL consists of
972
973
  # only a hostname, like `https://server.example.org` or
973
- # `https://example.com`.
974
+ # `https://example.com`. The URL should not contain a port number.
974
975
  #
975
976
  # You cannot register the same provider multiple times in a single
976
- # account. If you try to submit a URL that has already been used for
977
- # an OpenID Connect provider in the account, you will get an error.
977
+ # Amazon Web Services account. If you try to submit a URL that has
978
+ # already been used for an OpenID Connect provider in the Amazon Web
979
+ # Services account, you will get an error.
978
980
  # @return [String]
979
981
  #
980
982
  # @!attribute [rw] client_id_list
981
- # A list of client IDs (also known as audiences). When a mobile or web
982
- # app registers with an OpenID Connect provider, they establish a
983
- # value that identifies the application. (This is the value that's
984
- # sent as the `client_id` parameter on OAuth requests.)
983
+ # Provides a list of client IDs, also known as audiences. When a
984
+ # mobile or web app registers with an OpenID Connect provider, they
985
+ # establish a value that identifies the application. This is the value
986
+ # that's sent as the `client_id` parameter on OAuth requests.
985
987
  #
986
988
  # You can register multiple client IDs with the same provider. For
987
989
  # example, you might have multiple applications that use the same OIDC
@@ -1010,11 +1012,11 @@ module Aws::IAM
1010
1012
  # `server.example.com` and the provider stores its keys at
1011
1013
  # https://keys.server.example.com/openid-connect. In that case, the
1012
1014
  # thumbprint string would be the hex-encoded SHA-1 hash value of the
1013
- # certificate used by https://keys.server.example.com.
1015
+ # certificate used by `https://keys.server.example.com.`
1014
1016
  #
1015
- # For more information about obtaining the OIDC provider's
1016
- # thumbprint, see [Obtaining the thumbprint for an OpenID Connect
1017
- # provider][1] in the *IAM User Guide*.
1017
+ # For more information about obtaining the OIDC provider thumbprint,
1018
+ # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
1019
+ # the *IAM User Guide*.
1018
1020
  #
1019
1021
  #
1020
1022
  #
@@ -1119,6 +1121,10 @@ module Aws::IAM
1119
1121
  # DEL character (`\u007F`), including most punctuation characters,
1120
1122
  # digits, and upper and lowercased letters.
1121
1123
  #
1124
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
1125
+ #
1126
+ # </note>
1127
+ #
1122
1128
  #
1123
1129
  #
1124
1130
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -3911,7 +3917,7 @@ module Aws::IAM
3911
3917
  #
3912
3918
  # @!attribute [rw] create_date
3913
3919
  # The date and time when the IAM OIDC provider resource object was
3914
- # created in the account.
3920
+ # created in the Amazon Web Services account.
3915
3921
  # @return [Time]
3916
3922
  #
3917
3923
  # @!attribute [rw] tags
@@ -6594,8 +6600,8 @@ module Aws::IAM
6594
6600
  # request.
6595
6601
  #
6596
6602
  # @!attribute [rw] open_id_connect_provider_list
6597
- # The list of IAM OIDC provider resource objects defined in the
6598
- # account.
6603
+ # The list of IAM OIDC provider resource objects defined in the Amazon
6604
+ # Web Services account.
6599
6605
  # @return [Array<Types::OpenIDConnectProviderListEntry>]
6600
6606
  #
6601
6607
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOpenIDConnectProvidersResponse AWS API Documentation
@@ -6739,8 +6745,8 @@ module Aws::IAM
6739
6745
  # The scope to use for filtering the results.
6740
6746
  #
6741
6747
  # To list only Amazon Web Services managed policies, set `Scope` to
6742
- # `AWS`. To list only the customer managed policies in your account,
6743
- # set `Scope` to `Local`.
6748
+ # `AWS`. To list only the customer managed policies in your Amazon Web
6749
+ # Services account, set `Scope` to `Local`.
6744
6750
  #
6745
6751
  # This parameter is optional. If it is not included, or if it is set
6746
6752
  # to `All`, all policies are returned.
@@ -8132,8 +8138,8 @@ module Aws::IAM
8132
8138
  # and GetLoginProfile operations.
8133
8139
  #
8134
8140
  # @!attribute [rw] user_name
8135
- # The name of the user, which can be used for signing in to the
8136
- # Management Console.
8141
+ # The name of the user, which can be used for signing in to the Amazon
8142
+ # Web Services Management Console.
8137
8143
  # @return [String]
8138
8144
  #
8139
8145
  # @!attribute [rw] create_date
@@ -9813,7 +9819,8 @@ module Aws::IAM
9813
9819
  # @return [Time]
9814
9820
  #
9815
9821
  # @!attribute [rw] region
9816
- # The name of the Region in which the role was last used.
9822
+ # The name of the Amazon Web Services Region in which the role was
9823
+ # last used.
9817
9824
  # @return [String]
9818
9825
  #
9819
9826
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/RoleLastUsed AWS API Documentation
@@ -10347,14 +10354,14 @@ module Aws::IAM
10347
10354
  #
10348
10355
  # @!attribute [rw] global_endpoint_token_version
10349
10356
  # The version of the global endpoint token. Version 1 tokens are valid
10350
- # only in Regions that are available by default. These tokens do not
10351
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
10352
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
10353
- # are longer and might affect systems where you temporarily store
10354
- # tokens.
10357
+ # only in Amazon Web Services Regions that are available by default.
10358
+ # These tokens do not work in manually enabled Regions, such as Asia
10359
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
10360
+ # However, version 2 tokens are longer and might affect systems where
10361
+ # you temporarily store tokens.
10355
10362
  #
10356
- # For information, see [Activating and deactivating STS in an
10357
- # Region][1] in the *IAM User Guide*.
10363
+ # For information, see [Activating and deactivating STS in an Amazon
10364
+ # Web Services Region][1] in the *IAM User Guide*.
10358
10365
  #
10359
10366
  #
10360
10367
  #
@@ -10563,17 +10570,17 @@ module Aws::IAM
10563
10570
  # @return [String]
10564
10571
  #
10565
10572
  # @!attribute [rw] resource_owner
10566
- # An ARN representing the account ID that specifies the owner of any
10567
- # simulated resource that does not identify its owner in the resource
10568
- # ARN. Examples of resource ARNs include an S3 bucket or object. If
10569
- # `ResourceOwner` is specified, it is also used as the account owner
10570
- # of any `ResourcePolicy` included in the simulation. If the
10571
- # `ResourceOwner` parameter is not specified, then the owner of the
10572
- # resources and the resource policy defaults to the account of the
10573
- # identity provided in `CallerArn`. This parameter is required only if
10574
- # you specify a resource-based policy and account that owns the
10575
- # resource is different from the account that owns the simulated
10576
- # calling user `CallerArn`.
10573
+ # An ARN representing the Amazon Web Services account ID that
10574
+ # specifies the owner of any simulated resource that does not identify
10575
+ # its owner in the resource ARN. Examples of resource ARNs include an
10576
+ # S3 bucket or object. If `ResourceOwner` is specified, it is also
10577
+ # used as the account owner of any `ResourcePolicy` included in the
10578
+ # simulation. If the `ResourceOwner` parameter is not specified, then
10579
+ # the owner of the resources and the resource policy defaults to the
10580
+ # account of the identity provided in `CallerArn`. This parameter is
10581
+ # required only if you specify a resource-based policy and account
10582
+ # that owns the resource is different from the account that owns the
10583
+ # simulated calling user `CallerArn`.
10577
10584
  #
10578
10585
  # The ARN for an account uses the following syntax:
10579
10586
  # `arn:aws:iam::AWS-account-ID:root`. For example, to represent the
@@ -10880,17 +10887,17 @@ module Aws::IAM
10880
10887
  # @return [String]
10881
10888
  #
10882
10889
  # @!attribute [rw] resource_owner
10883
- # An account ID that specifies the owner of any simulated resource
10884
- # that does not identify its owner in the resource ARN. Examples of
10885
- # resource ARNs include an S3 bucket or object. If `ResourceOwner` is
10886
- # specified, it is also used as the account owner of any
10887
- # `ResourcePolicy` included in the simulation. If the `ResourceOwner`
10888
- # parameter is not specified, then the owner of the resources and the
10889
- # resource policy defaults to the account of the identity provided in
10890
- # `CallerArn`. This parameter is required only if you specify a
10891
- # resource-based policy and account that owns the resource is
10892
- # different from the account that owns the simulated calling user
10893
- # `CallerArn`.
10890
+ # An Amazon Web Services account ID that specifies the owner of any
10891
+ # simulated resource that does not identify its owner in the resource
10892
+ # ARN. Examples of resource ARNs include an S3 bucket or object. If
10893
+ # `ResourceOwner` is specified, it is also used as the account owner
10894
+ # of any `ResourcePolicy` included in the simulation. If the
10895
+ # `ResourceOwner` parameter is not specified, then the owner of the
10896
+ # resources and the resource policy defaults to the account of the
10897
+ # identity provided in `CallerArn`. This parameter is required only if
10898
+ # you specify a resource-based policy and account that owns the
10899
+ # resource is different from the account that owns the simulated
10900
+ # calling user `CallerArn`.
10894
10901
  # @return [String]
10895
10902
  #
10896
10903
  # @!attribute [rw] caller_arn
@@ -11913,9 +11920,10 @@ module Aws::IAM
11913
11920
  # @return [Boolean]
11914
11921
  #
11915
11922
  # @!attribute [rw] allow_users_to_change_password
11916
- # Allows all IAM users in your account to use the Management Console
11917
- # to change their own passwords. For more information, see [Letting
11918
- # IAM users change their own passwords][1] in the *IAM User Guide*.
11923
+ # Allows all IAM users in your account to use the Amazon Web Services
11924
+ # Management Console to change their own passwords. For more
11925
+ # information, see [Letting IAM users change their own passwords][1]
11926
+ # in the *IAM User Guide*.
11919
11927
  #
11920
11928
  # If you do not specify a value for this parameter, then the operation
11921
11929
  # uses the default value of `false`. The result is that IAM users in
@@ -12123,8 +12131,9 @@ module Aws::IAM
12123
12131
  # carriage return (`\u000D`)
12124
12132
  #
12125
12133
  # However, the format can be further restricted by the account
12126
- # administrator by setting a password policy on the account. For more
12127
- # information, see UpdateAccountPasswordPolicy.
12134
+ # administrator by setting a password policy on the Amazon Web
12135
+ # Services account. For more information, see
12136
+ # UpdateAccountPasswordPolicy.
12128
12137
  #
12129
12138
  #
12130
12139
  #
@@ -439,8 +439,9 @@ module Aws::IAM
439
439
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
440
440
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
441
441
  # of these characters are valid in a password. However, many tools, such
442
- # as the Management Console, might restrict the ability to type certain
443
- # characters because they have special meaning within that tool.
442
+ # as the Amazon Web Services Management Console, might restrict the
443
+ # ability to type certain characters because they have special meaning
444
+ # within that tool.
444
445
  #
445
446
  #
446
447
  #
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.60.0'
73
+ GEM_VERSION = '1.61.0'
74
74
 
75
75
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.60.0
4
+ version: 1.61.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-09-01 00:00:00.000000000 Z
11
+ date: 2021-09-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core