aws-sdk-iam 1.60.0 → 1.64.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5121819d748185a8c479668754e9c822cc93330c5b523271d5c16f6d108acb53
4
- data.tar.gz: 1d04a921fd706bc555cc590b9648c48fad89290eed9a9ee204d0ccd1b85452e7
3
+ metadata.gz: 7da1e8d9c50d6ac9e95f20cebbd3e16191de2e245a51fdabba95f2b2ab0a7025
4
+ data.tar.gz: '086f4652ca747bad0131b20051f4ea8bf17233402a5f43b8f9e4201ec973335c'
5
5
  SHA512:
6
- metadata.gz: 6e535e006859d78fb0a4a4d9096fd36ff2e1a134a2fa97fde116c711b502314db10f00ec8a75246adf40315b8a05d62f212d55d25ef8aa9e9c34f92eabc69b5b
7
- data.tar.gz: 999e98dbc352afc9912aaf7204fa72d4a281e0b277c4c43a7f9a6a526527d951f453d58cb5c361328264d7d0c0aa5b96744b425fc8512d481dfcb18b068476a4
6
+ metadata.gz: 1db87773bdc6caca4cdaecf272f6aa84bb621ea9a16f09f588ef099f7d478fafaaff4587c003ba206b31287e53d0db0853618c45e90a2c34b269cb14a8c5ef94
7
+ data.tar.gz: dba55cad7304b0edf5d3f7db7a02a0f1667473aec506bb2ee0b7a1cae5b521cce24a2fba1ffa7ab43ffafba0794b9aac4220348456619f92de1a622a76c8eaac
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.64.0 (2021-11-30)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.63.0 (2021-11-04)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
14
+ 1.62.0 (2021-10-18)
15
+ ------------------
16
+
17
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
18
+
19
+ 1.61.0 (2021-09-22)
20
+ ------------------
21
+
22
+ * Feature - Added changes to OIDC API about not using port numbers in the URL.
23
+
4
24
  1.60.0 (2021-09-01)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.60.0
1
+ 1.64.0
@@ -288,9 +288,10 @@ module Aws::IAM
288
288
  # uses the default value of `false`. The result is that passwords do not
289
289
  # require at least one lowercase character.
290
290
  # @option options [Boolean] :allow_users_to_change_password
291
- # Allows all IAM users in your account to use the Management Console to
292
- # change their own passwords. For more information, see [Letting IAM
293
- # users change their own passwords][1] in the *IAM User Guide*.
291
+ # Allows all IAM users in your account to use the Amazon Web Services
292
+ # Management Console to change their own passwords. For more
293
+ # information, see [Letting IAM users change their own passwords][1] in
294
+ # the *IAM User Guide*.
294
295
  #
295
296
  # If you do not specify a value for this parameter, then the operation
296
297
  # uses the default value of `false`. The result is that IAM users in the
@@ -119,7 +119,9 @@ module Aws::IAM
119
119
  # * EC2/ECS IMDS instance profile - When used by default, the timeouts
120
120
  # are very aggressive. Construct and pass an instance of
121
121
  # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
122
- # enable retries and extended timeouts.
122
+ # enable retries and extended timeouts. Instance profile credential
123
+ # fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
124
+ # to true.
123
125
  #
124
126
  # @option options [required, String] :region
125
127
  # The AWS region to connect to. The configured `:region` is
@@ -275,6 +277,15 @@ module Aws::IAM
275
277
  # ** Please note ** When response stubbing is enabled, no HTTP
276
278
  # requests are made, and retries are disabled.
277
279
  #
280
+ # @option options [Boolean] :use_dualstack_endpoint
281
+ # When set to `true`, dualstack enabled endpoints (with `.aws` TLD)
282
+ # will be used if available.
283
+ #
284
+ # @option options [Boolean] :use_fips_endpoint
285
+ # When set to `true`, fips compatible endpoints will be used if available.
286
+ # When a `fips` region is used, the region is normalized and this config
287
+ # is set to `true`.
288
+ #
278
289
  # @option options [Boolean] :validate_params (true)
279
290
  # When `true`, request parameters are validated before
280
291
  # sending the request.
@@ -714,9 +725,9 @@ module Aws::IAM
714
725
 
715
726
  # Changes the password of the IAM user who is calling this operation.
716
727
  # This operation can be performed using the CLI, the Amazon Web Services
717
- # API, or the **My Security Credentials** page in the Management
718
- # Console. The account root user password is not affected by this
719
- # operation.
728
+ # API, or the **My Security Credentials** page in the Amazon Web
729
+ # Services Management Console. The Amazon Web Services account root user
730
+ # password is not affected by this operation.
720
731
  #
721
732
  # Use UpdateLoginProfile to use the CLI, the Amazon Web Services API, or
722
733
  # the **Users** page in the IAM console to change the password for any
@@ -731,8 +742,8 @@ module Aws::IAM
731
742
  # The IAM user's current password.
732
743
  #
733
744
  # @option params [required, String] :new_password
734
- # The new password. The new password must conform to the account's
735
- # password policy, if one exists.
745
+ # The new password. The new password must conform to the Amazon Web
746
+ # Services account's password policy, if one exists.
736
747
  #
737
748
  # The [regex pattern][1] that is used to validate this parameter is a
738
749
  # string of characters. That string can include almost any printable
@@ -740,8 +751,9 @@ module Aws::IAM
740
751
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
741
752
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
742
753
  # of these characters are valid in a password. However, many tools, such
743
- # as the Management Console, might restrict the ability to type certain
744
- # characters because they have special meaning within that tool.
754
+ # as the Amazon Web Services Management Console, might restrict the
755
+ # ability to type certain characters because they have special meaning
756
+ # within that tool.
745
757
  #
746
758
  #
747
759
  #
@@ -781,18 +793,19 @@ module Aws::IAM
781
793
  #
782
794
  # If you do not specify a user name, IAM determines the user name
783
795
  # implicitly based on the Amazon Web Services access key ID signing the
784
- # request. This operation works for access keys under the account.
785
- # Consequently, you can use this operation to manage account root user
786
- # credentials. This is true even if the account has no associated users.
796
+ # request. This operation works for access keys under the Amazon Web
797
+ # Services account. Consequently, you can use this operation to manage
798
+ # Amazon Web Services account root user credentials. This is true even
799
+ # if the Amazon Web Services account has no associated users.
787
800
  #
788
801
  # For information about quotas on the number of keys you can create, see
789
802
  # [IAM and STS quotas][1] in the *IAM User Guide*.
790
803
  #
791
- # To ensure the security of your account, the secret access key is
792
- # accessible only during key and user creation. You must save the key
793
- # (for example, in a text file) if you want to be able to access it
794
- # again. If a secret key is lost, you can delete the access keys for the
795
- # associated user and then create new keys.
804
+ # To ensure the security of your Amazon Web Services account, the secret
805
+ # access key is accessible only during key and user creation. You must
806
+ # save the key (for example, in a text file) if you want to be able to
807
+ # access it again. If a secret key is lost, you can delete the access
808
+ # keys for the associated user and then create new keys.
796
809
  #
797
810
  #
798
811
  #
@@ -857,9 +870,9 @@ module Aws::IAM
857
870
  req.send_request(options)
858
871
  end
859
872
 
860
- # Creates an alias for your account. For information about using an
861
- # account alias, see [Using an alias for your account ID][1] in the *IAM
862
- # User Guide*.
873
+ # Creates an alias for your Amazon Web Services account. For information
874
+ # about using an Amazon Web Services account alias, see [Using an alias
875
+ # for your Amazon Web Services account ID][1] in the *IAM User Guide*.
863
876
  #
864
877
  #
865
878
  #
@@ -1125,13 +1138,14 @@ module Aws::IAM
1125
1138
  end
1126
1139
 
1127
1140
  # Creates a password for the specified IAM user. A password allows an
1128
- # IAM user to access Amazon Web Services services through the Management
1129
- # Console.
1141
+ # IAM user to access Amazon Web Services services through the Amazon Web
1142
+ # Services Management Console.
1130
1143
  #
1131
1144
  # You can use the CLI, the Amazon Web Services API, or the **Users**
1132
1145
  # page in the IAM console to create a password for any IAM user. Use
1133
1146
  # ChangePassword to update your own existing password in the **My
1134
- # Security Credentials** page in the Management Console.
1147
+ # Security Credentials** page in the Amazon Web Services Management
1148
+ # Console.
1135
1149
  #
1136
1150
  # For more information about managing passwords, see [Managing
1137
1151
  # passwords][1] in the *IAM User Guide*.
@@ -1162,8 +1176,9 @@ module Aws::IAM
1162
1176
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
1163
1177
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
1164
1178
  # of these characters are valid in a password. However, many tools, such
1165
- # as the Management Console, might restrict the ability to type certain
1166
- # characters because they have special meaning within that tool.
1179
+ # as the Amazon Web Services Management Console, might restrict the
1180
+ # ability to type certain characters because they have special meaning
1181
+ # within that tool.
1167
1182
  #
1168
1183
  #
1169
1184
  #
@@ -1247,8 +1262,8 @@ module Aws::IAM
1247
1262
  # * A list of thumbprints of one or more server certificates that the
1248
1263
  # IdP uses
1249
1264
  #
1250
- # You get all of this information from the OIDC IdP that you want to use
1251
- # to access Amazon Web Services.
1265
+ # You get all of this information from the OIDC IdP you want to use to
1266
+ # access Amazon Web Services.
1252
1267
  #
1253
1268
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1254
1269
  # providers (IdPs) through our library of trusted certificate
@@ -1277,16 +1292,18 @@ module Aws::IAM
1277
1292
  # Connect ID tokens. Per the OIDC standard, path components are allowed
1278
1293
  # but query parameters are not. Typically the URL consists of only a
1279
1294
  # hostname, like `https://server.example.org` or `https://example.com`.
1295
+ # The URL should not contain a port number.
1280
1296
  #
1281
1297
  # You cannot register the same provider multiple times in a single
1282
- # account. If you try to submit a URL that has already been used for an
1283
- # OpenID Connect provider in the account, you will get an error.
1298
+ # Amazon Web Services account. If you try to submit a URL that has
1299
+ # already been used for an OpenID Connect provider in the Amazon Web
1300
+ # Services account, you will get an error.
1284
1301
  #
1285
1302
  # @option params [Array<String>] :client_id_list
1286
- # A list of client IDs (also known as audiences). When a mobile or web
1287
- # app registers with an OpenID Connect provider, they establish a value
1288
- # that identifies the application. (This is the value that's sent as
1289
- # the `client_id` parameter on OAuth requests.)
1303
+ # Provides a list of client IDs, also known as audiences. When a mobile
1304
+ # or web app registers with an OpenID Connect provider, they establish a
1305
+ # value that identifies the application. This is the value that's sent
1306
+ # as the `client_id` parameter on OAuth requests.
1290
1307
  #
1291
1308
  # You can register multiple client IDs with the same provider. For
1292
1309
  # example, you might have multiple applications that use the same OIDC
@@ -1313,11 +1330,11 @@ module Aws::IAM
1313
1330
  # `server.example.com` and the provider stores its keys at
1314
1331
  # https://keys.server.example.com/openid-connect. In that case, the
1315
1332
  # thumbprint string would be the hex-encoded SHA-1 hash value of the
1316
- # certificate used by https://keys.server.example.com.
1333
+ # certificate used by `https://keys.server.example.com.`
1317
1334
  #
1318
- # For more information about obtaining the OIDC provider's thumbprint,
1319
- # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
1320
- # the *IAM User Guide*.
1335
+ # For more information about obtaining the OIDC provider thumbprint, see
1336
+ # [Obtaining the thumbprint for an OpenID Connect provider][1] in the
1337
+ # *IAM User Guide*.
1321
1338
  #
1322
1339
  #
1323
1340
  #
@@ -1395,7 +1412,7 @@ module Aws::IAM
1395
1412
  req.send_request(options)
1396
1413
  end
1397
1414
 
1398
- # Creates a new managed policy for your account.
1415
+ # Creates a new managed policy for your Amazon Web Services account.
1399
1416
  #
1400
1417
  # This operation creates a policy version with a version identifier of
1401
1418
  # `v1` and sets v1 as the policy's default version. For more
@@ -1437,6 +1454,10 @@ module Aws::IAM
1437
1454
  # character (`\u007F`), including most punctuation characters, digits,
1438
1455
  # and upper and lowercased letters.
1439
1456
  #
1457
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
1458
+ #
1459
+ # </note>
1460
+ #
1440
1461
  #
1441
1462
  #
1442
1463
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -1650,10 +1671,10 @@ module Aws::IAM
1650
1671
  req.send_request(options)
1651
1672
  end
1652
1673
 
1653
- # Creates a new role for your account. For more information about roles,
1654
- # see [IAM roles][1]. For information about quotas for role names and
1655
- # the number of roles you can create, see [IAM and STS quotas][2] in the
1656
- # *IAM User Guide*.
1674
+ # Creates a new role for your Amazon Web Services account. For more
1675
+ # information about roles, see [IAM roles][1]. For information about
1676
+ # quotas for role names and the number of roles you can create, see [IAM
1677
+ # and STS quotas][2] in the *IAM User Guide*.
1657
1678
  #
1658
1679
  #
1659
1680
  #
@@ -1836,8 +1857,8 @@ module Aws::IAM
1836
1857
  # used as a principal in an IAM role's trust policy. Such a policy can
1837
1858
  # enable federated users who sign in using the SAML IdP to assume the
1838
1859
  # role. You can create an IAM role that supports Web-based single
1839
- # sign-on (SSO) to the Management Console or one that supports API
1840
- # access to Amazon Web Services.
1860
+ # sign-on (SSO) to the Amazon Web Services Management Console or one
1861
+ # that supports API access to Amazon Web Services.
1841
1862
  #
1842
1863
  # When you create the SAML provider resource, you upload a SAML metadata
1843
1864
  # document that you get from your IdP. That document includes the
@@ -1851,8 +1872,8 @@ module Aws::IAM
1851
1872
  # </note>
1852
1873
  #
1853
1874
  # For more information, see [Enabling SAML 2.0 federated users to access
1854
- # the Management Console][2] and [About SAML 2.0-based federation][3] in
1855
- # the *IAM User Guide*.
1875
+ # the Amazon Web Services Management Console][2] and [About SAML
1876
+ # 2.0-based federation][3] in the *IAM User Guide*.
1856
1877
  #
1857
1878
  #
1858
1879
  #
@@ -2096,7 +2117,7 @@ module Aws::IAM
2096
2117
  req.send_request(options)
2097
2118
  end
2098
2119
 
2099
- # Creates a new IAM user for your account.
2120
+ # Creates a new IAM user for your Amazon Web Services account.
2100
2121
  #
2101
2122
  # For information about quotas for the number of IAM users you can
2102
2123
  # create, see [IAM and STS quotas][1] in the *IAM User Guide*.
@@ -2211,10 +2232,11 @@ module Aws::IAM
2211
2232
  req.send_request(options)
2212
2233
  end
2213
2234
 
2214
- # Creates a new virtual MFA device for the account. After creating the
2215
- # virtual MFA, use EnableMFADevice to attach the MFA device to an IAM
2216
- # user. For more information about creating and working with virtual MFA
2217
- # devices, see [Using a virtual MFA device][1] in the *IAM User Guide*.
2235
+ # Creates a new virtual MFA device for the Amazon Web Services account.
2236
+ # After creating the virtual MFA, use EnableMFADevice to attach the MFA
2237
+ # device to an IAM user. For more information about creating and working
2238
+ # with virtual MFA devices, see [Using a virtual MFA device][1] in the
2239
+ # *IAM User Guide*.
2218
2240
  #
2219
2241
  # For information about the maximum number of MFA devices you can
2220
2242
  # create, see [IAM and STS quotas][2] in the *IAM User Guide*.
@@ -2384,9 +2406,10 @@ module Aws::IAM
2384
2406
  #
2385
2407
  # If you do not specify a user name, IAM determines the user name
2386
2408
  # implicitly based on the Amazon Web Services access key ID signing the
2387
- # request. This operation works for access keys under the account.
2388
- # Consequently, you can use this operation to manage account root user
2389
- # credentials even if the account has no associated users.
2409
+ # request. This operation works for access keys under the Amazon Web
2410
+ # Services account. Consequently, you can use this operation to manage
2411
+ # Amazon Web Services account root user credentials even if the Amazon
2412
+ # Web Services account has no associated users.
2390
2413
  #
2391
2414
  # @option params [String] :user_name
2392
2415
  # The name of the user whose access key pair you want to delete.
@@ -2440,9 +2463,10 @@ module Aws::IAM
2440
2463
  req.send_request(options)
2441
2464
  end
2442
2465
 
2443
- # Deletes the specified account alias. For information about using an
2444
- # Amazon Web Services account alias, see [Using an alias for your
2445
- # account ID][1] in the *IAM User Guide*.
2466
+ # Deletes the specified Amazon Web Services account alias. For
2467
+ # information about using an Amazon Web Services account alias, see
2468
+ # [Using an alias for your Amazon Web Services account ID][1] in the
2469
+ # *IAM User Guide*.
2446
2470
  #
2447
2471
  #
2448
2472
  #
@@ -2486,7 +2510,8 @@ module Aws::IAM
2486
2510
  req.send_request(options)
2487
2511
  end
2488
2512
 
2489
- # Deletes the password policy for the account. There are no parameters.
2513
+ # Deletes the password policy for the Amazon Web Services account. There
2514
+ # are no parameters.
2490
2515
  #
2491
2516
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2492
2517
  #
@@ -2659,12 +2684,13 @@ module Aws::IAM
2659
2684
 
2660
2685
  # Deletes the password for the specified IAM user, which terminates the
2661
2686
  # user's ability to access Amazon Web Services services through the
2662
- # Management Console.
2687
+ # Amazon Web Services Management Console.
2663
2688
  #
2664
2689
  # You can use the CLI, the Amazon Web Services API, or the **Users**
2665
2690
  # page in the IAM console to delete a password for any IAM user. You can
2666
2691
  # use ChangePassword to update, but not delete, your own password in the
2667
- # **My Security Credentials** page in the Management Console.
2692
+ # **My Security Credentials** page in the Amazon Web Services Management
2693
+ # Console.
2668
2694
  #
2669
2695
  # Deleting a user's password does not prevent a user from accessing
2670
2696
  # Amazon Web Services through the command line interface or the API. To
@@ -3243,9 +3269,10 @@ module Aws::IAM
3243
3269
  #
3244
3270
  # If you do not specify a user name, IAM determines the user name
3245
3271
  # implicitly based on the Amazon Web Services access key ID signing the
3246
- # request. This operation works for access keys under the account.
3247
- # Consequently, you can use this operation to manage account root user
3248
- # credentials even if the account has no associated IAM users.
3272
+ # request. This operation works for access keys under the Amazon Web
3273
+ # Services account. Consequently, you can use this operation to manage
3274
+ # Amazon Web Services account root user credentials even if the Amazon
3275
+ # Web Services account has no associated IAM users.
3249
3276
  #
3250
3277
  # @option params [String] :user_name
3251
3278
  # The name of the user the signing certificate belongs to.
@@ -3298,11 +3325,11 @@ module Aws::IAM
3298
3325
  req.send_request(options)
3299
3326
  end
3300
3327
 
3301
- # Deletes the specified IAM user. Unlike the Management Console, when
3302
- # you delete a user programmatically, you must delete the items attached
3303
- # to the user manually, or the deletion fails. For more information, see
3304
- # [Deleting an IAM user][1]. Before attempting to delete a user, remove
3305
- # the following items:
3328
+ # Deletes the specified IAM user. Unlike the Amazon Web Services
3329
+ # Management Console, when you delete a user programmatically, you must
3330
+ # delete the items attached to the user manually, or the deletion fails.
3331
+ # For more information, see [Deleting an IAM user][1]. Before attempting
3332
+ # to delete a user, remove the following items:
3306
3333
  #
3307
3334
  # * Password (DeleteLoginProfile)
3308
3335
  #
@@ -3738,9 +3765,9 @@ module Aws::IAM
3738
3765
  req.send_request(options)
3739
3766
  end
3740
3767
 
3741
- # Generates a credential report for the account. For more information
3742
- # about the credential report, see [Getting credential reports][1] in
3743
- # the *IAM User Guide*.
3768
+ # Generates a credential report for the Amazon Web Services account. For
3769
+ # more information about the credential report, see [Getting credential
3770
+ # reports][1] in the *IAM User Guide*.
3744
3771
  #
3745
3772
  #
3746
3773
  #
@@ -3796,14 +3823,14 @@ module Aws::IAM
3796
3823
  #
3797
3824
  # The data includes all attempts to access Amazon Web Services, not just
3798
3825
  # the successful ones. This includes all attempts that were made using
3799
- # the Management Console, the Amazon Web Services API through any of the
3800
- # SDKs, or any of the command line tools. An unexpected entry in the
3801
- # service last accessed data does not mean that an account has been
3802
- # compromised, because the request might have been denied. Refer to your
3803
- # CloudTrail logs as the authoritative source for information about all
3804
- # API calls and whether they were successful or denied access. For more
3805
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3806
- # User Guide*.
3826
+ # the Amazon Web Services Management Console, the Amazon Web Services
3827
+ # API through any of the SDKs, or any of the command line tools. An
3828
+ # unexpected entry in the service last accessed data does not mean that
3829
+ # an account has been compromised, because the request might have been
3830
+ # denied. Refer to your CloudTrail logs as the authoritative source for
3831
+ # information about all API calls and whether they were successful or
3832
+ # denied access. For more information, see [Logging IAM events with
3833
+ # CloudTrail][2] in the *IAM User Guide*.
3807
3834
  #
3808
3835
  # This operation returns a `JobId`. Use this parameter in the `
3809
3836
  # GetOrganizationsAccessReport ` operation to check the status of the
@@ -3959,14 +3986,15 @@ module Aws::IAM
3959
3986
  #
3960
3987
  # The service last accessed data includes all attempts to access an
3961
3988
  # Amazon Web Services API, not just the successful ones. This includes
3962
- # all attempts that were made using the Management Console, the Amazon
3963
- # Web Services API through any of the SDKs, or any of the command line
3964
- # tools. An unexpected entry in the service last accessed data does not
3965
- # mean that your account has been compromised, because the request might
3966
- # have been denied. Refer to your CloudTrail logs as the authoritative
3967
- # source for information about all API calls and whether they were
3968
- # successful or denied access. For more information, see [Logging IAM
3969
- # events with CloudTrail][2] in the *IAM User Guide*.
3989
+ # all attempts that were made using the Amazon Web Services Management
3990
+ # Console, the Amazon Web Services API through any of the SDKs, or any
3991
+ # of the command line tools. An unexpected entry in the service last
3992
+ # accessed data does not mean that your account has been compromised,
3993
+ # because the request might have been denied. Refer to your CloudTrail
3994
+ # logs as the authoritative source for information about all API calls
3995
+ # and whether they were successful or denied access. For more
3996
+ # information, see [Logging IAM events with CloudTrail][2] in the *IAM
3997
+ # User Guide*.
3970
3998
  #
3971
3999
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
3972
4000
  # Use this parameter in the following operations to retrieve the
@@ -4284,10 +4312,11 @@ module Aws::IAM
4284
4312
  req.send_request(options)
4285
4313
  end
4286
4314
 
4287
- # Retrieves the password policy for the account. This tells you the
4288
- # complexity requirements and mandatory rotation periods for the IAM
4289
- # user passwords in your account. For more information about using a
4290
- # password policy, see [Managing an IAM password policy][1].
4315
+ # Retrieves the password policy for the Amazon Web Services account.
4316
+ # This tells you the complexity requirements and mandatory rotation
4317
+ # periods for the IAM user passwords in your account. For more
4318
+ # information about using a password policy, see [Managing an IAM
4319
+ # password policy][1].
4291
4320
  #
4292
4321
  #
4293
4322
  #
@@ -4554,9 +4583,9 @@ module Aws::IAM
4554
4583
  req.send_request(options)
4555
4584
  end
4556
4585
 
4557
- # Retrieves a credential report for the account. For more information
4558
- # about the credential report, see [Getting credential reports][1] in
4559
- # the *IAM User Guide*.
4586
+ # Retrieves a credential report for the Amazon Web Services account. For
4587
+ # more information about the credential report, see [Getting credential
4588
+ # reports][1] in the *IAM User Guide*.
4560
4589
  #
4561
4590
  #
4562
4591
  #
@@ -4842,18 +4871,20 @@ module Aws::IAM
4842
4871
  end
4843
4872
 
4844
4873
  # Retrieves the user name for the specified IAM user. A login profile is
4845
- # created when you create a password for the user to access the
4846
- # Management Console. If the user does not exist or does not have a
4847
- # password, the operation returns a 404 (`NoSuchEntity`) error.
4874
+ # created when you create a password for the user to access the Amazon
4875
+ # Web Services Management Console. If the user does not exist or does
4876
+ # not have a password, the operation returns a 404 (`NoSuchEntity`)
4877
+ # error.
4848
4878
  #
4849
4879
  # If you create an IAM user with access to the console, the `CreateDate`
4850
4880
  # reflects the date you created the initial password for the user.
4851
4881
  #
4852
4882
  # If you create an IAM user with programmatic access, and then later add
4853
- # a password for the user to access the Management Console, the
4854
- # `CreateDate` reflects the initial password creation date. A user with
4855
- # programmatic access does not have a login profile unless you create a
4856
- # password for the user to access the Management Console.
4883
+ # a password for the user to access the Amazon Web Services Management
4884
+ # Console, the `CreateDate` reflects the initial password creation date.
4885
+ # A user with programmatic access does not have a login profile unless
4886
+ # you create a password for the user to access the Amazon Web Services
4887
+ # Management Console.
4857
4888
  #
4858
4889
  # @option params [required, String] :user_name
4859
4890
  # The name of the user whose login profile you want to retrieve.
@@ -6131,12 +6162,13 @@ module Aws::IAM
6131
6162
  #
6132
6163
  # If the `UserName` field is not specified, the user name is determined
6133
6164
  # implicitly based on the Amazon Web Services access key ID used to sign
6134
- # the request. This operation works for access keys under the account.
6135
- # Consequently, you can use this operation to manage account root user
6136
- # credentials even if the account has no associated users.
6165
+ # the request. This operation works for access keys under the Amazon Web
6166
+ # Services account. Consequently, you can use this operation to manage
6167
+ # Amazon Web Services account root user credentials even if the Amazon
6168
+ # Web Services account has no associated users.
6137
6169
  #
6138
- # <note markdown="1"> To ensure the security of your account, the secret access key is
6139
- # accessible only during key and user creation.
6170
+ # <note markdown="1"> To ensure the security of your Amazon Web Services account, the secret
6171
+ # access key is accessible only during key and user creation.
6140
6172
  #
6141
6173
  # </note>
6142
6174
  #
@@ -6231,9 +6263,10 @@ module Aws::IAM
6231
6263
  req.send_request(options)
6232
6264
  end
6233
6265
 
6234
- # Lists the account alias associated with the account (Note: you can
6235
- # have only one). For information about using an account alias, see
6236
- # [Using an alias for your account ID][1] in the *IAM User Guide*.
6266
+ # Lists the account alias associated with the Amazon Web Services
6267
+ # account (Note: you can have only one). For information about using an
6268
+ # Amazon Web Services account alias, see [Using an alias for your Amazon
6269
+ # Web Services account ID][1] in the *IAM User Guide*.
6237
6270
  #
6238
6271
  #
6239
6272
  #
@@ -7510,7 +7543,7 @@ module Aws::IAM
7510
7543
  end
7511
7544
 
7512
7545
  # Lists information about the IAM OpenID Connect (OIDC) provider
7513
- # resource objects defined in the account.
7546
+ # resource objects defined in the Amazon Web Services account.
7514
7547
  #
7515
7548
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7516
7549
  # attributes for the resource. For example, this operation does not
@@ -7538,9 +7571,9 @@ module Aws::IAM
7538
7571
  req.send_request(options)
7539
7572
  end
7540
7573
 
7541
- # Lists all the managed policies that are available in your account,
7542
- # including your own customer-defined managed policies and all Amazon
7543
- # Web Services managed policies.
7574
+ # Lists all the managed policies that are available in your Amazon Web
7575
+ # Services account, including your own customer-defined managed policies
7576
+ # and all Amazon Web Services managed policies.
7544
7577
  #
7545
7578
  # You can filter the list of policies that is returned using the
7546
7579
  # optional `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For
@@ -7570,8 +7603,8 @@ module Aws::IAM
7570
7603
  # The scope to use for filtering the results.
7571
7604
  #
7572
7605
  # To list only Amazon Web Services managed policies, set `Scope` to
7573
- # `AWS`. To list only the customer managed policies in your account, set
7574
- # `Scope` to `Local`.
7606
+ # `AWS`. To list only the customer managed policies in your Amazon Web
7607
+ # Services account, set `Scope` to `Local`.
7575
7608
  #
7576
7609
  # This parameter is optional. If it is not included, or if it is set to
7577
7610
  # `All`, all policies are returned.
@@ -8671,9 +8704,9 @@ module Aws::IAM
8671
8704
  # If the `UserName` field is not specified, the user name is determined
8672
8705
  # implicitly based on the Amazon Web Services access key ID used to sign
8673
8706
  # the request for this operation. This operation works for access keys
8674
- # under the account. Consequently, you can use this operation to manage
8675
- # account root user credentials even if the account has no associated
8676
- # users.
8707
+ # under the Amazon Web Services account. Consequently, you can use this
8708
+ # operation to manage Amazon Web Services account root user credentials
8709
+ # even if the Amazon Web Services account has no associated users.
8677
8710
  #
8678
8711
  # @option params [String] :user_name
8679
8712
  # The name of the IAM user whose signing certificates you want to
@@ -8935,8 +8968,9 @@ module Aws::IAM
8935
8968
  end
8936
8969
 
8937
8970
  # Lists the IAM users that have the specified path prefix. If no path
8938
- # prefix is specified, the operation returns all users in the account.
8939
- # If there are none, the operation returns an empty list.
8971
+ # prefix is specified, the operation returns all users in the Amazon Web
8972
+ # Services account. If there are none, the operation returns an empty
8973
+ # list.
8940
8974
  #
8941
8975
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8942
8976
  # attributes for the resource. For example, this operation does not
@@ -9054,10 +9088,10 @@ module Aws::IAM
9054
9088
  req.send_request(options)
9055
9089
  end
9056
9090
 
9057
- # Lists the virtual MFA devices defined in the account by assignment
9058
- # status. If you do not specify an assignment status, the operation
9059
- # returns a list of all virtual MFA devices. Assignment status can be
9060
- # `Assigned`, `Unassigned`, or `Any`.
9091
+ # Lists the virtual MFA devices defined in the Amazon Web Services
9092
+ # account by assignment status. If you do not specify an assignment
9093
+ # status, the operation returns a list of all virtual MFA devices.
9094
+ # Assignment status can be `Assigned`, `Unassigned`, or `Any`.
9061
9095
  #
9062
9096
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
9063
9097
  # attributes for the resource. For example, this operation does not
@@ -9908,7 +9942,7 @@ module Aws::IAM
9908
9942
  end
9909
9943
 
9910
9944
  # Sets the specified version of the global endpoint token as the token
9911
- # version used for the account.
9945
+ # version used for the Amazon Web Services account.
9912
9946
  #
9913
9947
  # By default, Security Token Service (STS) is available as a global
9914
9948
  # service, and all STS requests go to a single endpoint at
@@ -9921,12 +9955,13 @@ module Aws::IAM
9921
9955
  # If you make an STS call to the global endpoint, the resulting session
9922
9956
  # tokens might be valid in some Regions but not others. It depends on
9923
9957
  # the version that is set in this operation. Version 1 tokens are valid
9924
- # only in Regions that are available by default. These tokens do not
9925
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9926
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
9927
- # are longer and might affect systems where you temporarily store
9928
- # tokens. For information, see [Activating and deactivating STS in an
9929
- # Region][2] in the *IAM User Guide*.
9958
+ # only in Amazon Web Services Regions that are available by default.
9959
+ # These tokens do not work in manually enabled Regions, such as Asia
9960
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
9961
+ # However, version 2 tokens are longer and might affect systems where
9962
+ # you temporarily store tokens. For information, see [Activating and
9963
+ # deactivating STS in an Amazon Web Services Region][2] in the *IAM User
9964
+ # Guide*.
9930
9965
  #
9931
9966
  # To view the current session token version, see the
9932
9967
  # `GlobalEndpointTokenVersion` entry in the response of the
@@ -9939,14 +9974,14 @@ module Aws::IAM
9939
9974
  #
9940
9975
  # @option params [required, String] :global_endpoint_token_version
9941
9976
  # The version of the global endpoint token. Version 1 tokens are valid
9942
- # only in Regions that are available by default. These tokens do not
9943
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
9944
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
9945
- # are longer and might affect systems where you temporarily store
9946
- # tokens.
9977
+ # only in Amazon Web Services Regions that are available by default.
9978
+ # These tokens do not work in manually enabled Regions, such as Asia
9979
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
9980
+ # However, version 2 tokens are longer and might affect systems where
9981
+ # you temporarily store tokens.
9947
9982
  #
9948
- # For information, see [Activating and deactivating STS in an Region][1]
9949
- # in the *IAM User Guide*.
9983
+ # For information, see [Activating and deactivating STS in an Amazon Web
9984
+ # Services Region][1] in the *IAM User Guide*.
9950
9985
  #
9951
9986
  #
9952
9987
  #
@@ -10136,12 +10171,12 @@ module Aws::IAM
10136
10171
  # [2]: http://wikipedia.org/wiki/regex
10137
10172
  #
10138
10173
  # @option params [String] :resource_owner
10139
- # An ARN representing the account ID that specifies the owner of any
10140
- # simulated resource that does not identify its owner in the resource
10141
- # ARN. Examples of resource ARNs include an S3 bucket or object. If
10142
- # `ResourceOwner` is specified, it is also used as the account owner of
10143
- # any `ResourcePolicy` included in the simulation. If the
10144
- # `ResourceOwner` parameter is not specified, then the owner of the
10174
+ # An ARN representing the Amazon Web Services account ID that specifies
10175
+ # the owner of any simulated resource that does not identify its owner
10176
+ # in the resource ARN. Examples of resource ARNs include an S3 bucket or
10177
+ # object. If `ResourceOwner` is specified, it is also used as the
10178
+ # account owner of any `ResourcePolicy` included in the simulation. If
10179
+ # the `ResourceOwner` parameter is not specified, then the owner of the
10145
10180
  # resources and the resource policy defaults to the account of the
10146
10181
  # identity provided in `CallerArn`. This parameter is required only if
10147
10182
  # you specify a resource-based policy and account that owns the resource
@@ -10482,16 +10517,17 @@ module Aws::IAM
10482
10517
  # [2]: http://wikipedia.org/wiki/regex
10483
10518
  #
10484
10519
  # @option params [String] :resource_owner
10485
- # An account ID that specifies the owner of any simulated resource that
10486
- # does not identify its owner in the resource ARN. Examples of resource
10487
- # ARNs include an S3 bucket or object. If `ResourceOwner` is specified,
10488
- # it is also used as the account owner of any `ResourcePolicy` included
10489
- # in the simulation. If the `ResourceOwner` parameter is not specified,
10490
- # then the owner of the resources and the resource policy defaults to
10491
- # the account of the identity provided in `CallerArn`. This parameter is
10492
- # required only if you specify a resource-based policy and account that
10493
- # owns the resource is different from the account that owns the
10494
- # simulated calling user `CallerArn`.
10520
+ # An Amazon Web Services account ID that specifies the owner of any
10521
+ # simulated resource that does not identify its owner in the resource
10522
+ # ARN. Examples of resource ARNs include an S3 bucket or object. If
10523
+ # `ResourceOwner` is specified, it is also used as the account owner of
10524
+ # any `ResourcePolicy` included in the simulation. If the
10525
+ # `ResourceOwner` parameter is not specified, then the owner of the
10526
+ # resources and the resource policy defaults to the account of the
10527
+ # identity provided in `CallerArn`. This parameter is required only if
10528
+ # you specify a resource-based policy and account that owns the resource
10529
+ # is different from the account that owns the simulated calling user
10530
+ # `CallerArn`.
10495
10531
  #
10496
10532
  # @option params [String] :caller_arn
10497
10533
  # The ARN of the IAM user that you want to specify as the simulated
@@ -11723,9 +11759,10 @@ module Aws::IAM
11723
11759
  #
11724
11760
  # If the `UserName` is not specified, the user name is determined
11725
11761
  # implicitly based on the Amazon Web Services access key ID used to sign
11726
- # the request. This operation works for access keys under the account.
11727
- # Consequently, you can use this operation to manage account root user
11728
- # credentials even if the account has no associated users.
11762
+ # the request. This operation works for access keys under the Amazon Web
11763
+ # Services account. Consequently, you can use this operation to manage
11764
+ # Amazon Web Services account root user credentials even if the Amazon
11765
+ # Web Services account has no associated users.
11729
11766
  #
11730
11767
  # For information about rotating keys, see [Managing keys and
11731
11768
  # certificates][1] in the *IAM User Guide*.
@@ -11793,7 +11830,8 @@ module Aws::IAM
11793
11830
  req.send_request(options)
11794
11831
  end
11795
11832
 
11796
- # Updates the password policy settings for the account.
11833
+ # Updates the password policy settings for the Amazon Web Services
11834
+ # account.
11797
11835
  #
11798
11836
  # <note markdown="1"> * This operation does not support partial updates. No parameters are
11799
11837
  # required, but if you do not specify a parameter, that parameter's
@@ -11855,9 +11893,10 @@ module Aws::IAM
11855
11893
  # require at least one lowercase character.
11856
11894
  #
11857
11895
  # @option params [Boolean] :allow_users_to_change_password
11858
- # Allows all IAM users in your account to use the Management Console to
11859
- # change their own passwords. For more information, see [Letting IAM
11860
- # users change their own passwords][1] in the *IAM User Guide*.
11896
+ # Allows all IAM users in your account to use the Amazon Web Services
11897
+ # Management Console to change their own passwords. For more
11898
+ # information, see [Letting IAM users change their own passwords][1] in
11899
+ # the *IAM User Guide*.
11861
11900
  #
11862
11901
  # If you do not specify a value for this parameter, then the operation
11863
11902
  # uses the default value of `false`. The result is that IAM users in the
@@ -12092,7 +12131,7 @@ module Aws::IAM
12092
12131
  # the Amazon Web Services API, or the **Users** page in the IAM console
12093
12132
  # to change the password for any IAM user. Use ChangePassword to change
12094
12133
  # your own password in the **My Security Credentials** page in the
12095
- # Management Console.
12134
+ # Amazon Web Services Management Console.
12096
12135
  #
12097
12136
  # For more information about modifying passwords, see [Managing
12098
12137
  # passwords][1] in the *IAM User Guide*.
@@ -12129,8 +12168,8 @@ module Aws::IAM
12129
12168
  # carriage return (`\u000D`)
12130
12169
  #
12131
12170
  # However, the format can be further restricted by the account
12132
- # administrator by setting a password policy on the account. For more
12133
- # information, see UpdateAccountPasswordPolicy.
12171
+ # administrator by setting a password policy on the Amazon Web Services
12172
+ # account. For more information, see UpdateAccountPasswordPolicy.
12134
12173
  #
12135
12174
  #
12136
12175
  #
@@ -12597,9 +12636,10 @@ module Aws::IAM
12597
12636
  #
12598
12637
  # If the `UserName` field is not specified, the user name is determined
12599
12638
  # implicitly based on the Amazon Web Services access key ID used to sign
12600
- # the request. This operation works for access keys under the account.
12601
- # Consequently, you can use this operation to manage account root user
12602
- # credentials even if the account has no associated users.
12639
+ # the request. This operation works for access keys under the Amazon Web
12640
+ # Services account. Consequently, you can use this operation to manage
12641
+ # Amazon Web Services account root user credentials even if the Amazon
12642
+ # Web Services account has no associated users.
12603
12643
  #
12604
12644
  # @option params [String] :user_name
12605
12645
  # The name of the IAM user the signing certificate belongs to.
@@ -12820,9 +12860,10 @@ module Aws::IAM
12820
12860
  req.send_request(options)
12821
12861
  end
12822
12862
 
12823
- # Uploads a server certificate entity for the account. The server
12824
- # certificate entity includes a public key certificate, a private key,
12825
- # and an optional certificate chain, which should all be PEM-encoded.
12863
+ # Uploads a server certificate entity for the Amazon Web Services
12864
+ # account. The server certificate entity includes a public key
12865
+ # certificate, a private key, and an optional certificate chain, which
12866
+ # should all be PEM-encoded.
12826
12867
  #
12827
12868
  # We recommend that you use [Certificate Manager][1] to provision,
12828
12869
  # manage, and deploy your server certificates. With ACM you can request
@@ -13047,9 +13088,10 @@ module Aws::IAM
13047
13088
  #
13048
13089
  # If the `UserName` is not specified, the IAM user name is determined
13049
13090
  # implicitly based on the Amazon Web Services access key ID used to sign
13050
- # the request. This operation works for access keys under the account.
13051
- # Consequently, you can use this operation to manage account root user
13052
- # credentials even if the account has no associated users.
13091
+ # the request. This operation works for access keys under the Amazon Web
13092
+ # Services account. Consequently, you can use this operation to manage
13093
+ # Amazon Web Services account root user credentials even if the Amazon
13094
+ # Web Services account has no associated users.
13053
13095
  #
13054
13096
  # <note markdown="1"> Because the body of an X.509 certificate can be large, you should use
13055
13097
  # POST rather than GET when calling `UploadSigningCertificate`. For
@@ -13160,7 +13202,7 @@ module Aws::IAM
13160
13202
  params: params,
13161
13203
  config: config)
13162
13204
  context[:gem_name] = 'aws-sdk-iam'
13163
- context[:gem_version] = '1.60.0'
13205
+ context[:gem_version] = '1.64.0'
13164
13206
  Seahorse::Client::Request.new(handlers, context)
13165
13207
  end
13166
13208
 
@@ -197,8 +197,9 @@ module Aws::IAM
197
197
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
198
198
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
199
199
  # of these characters are valid in a password. However, many tools, such
200
- # as the Management Console, might restrict the ability to type certain
201
- # characters because they have special meaning within that tool.
200
+ # as the Amazon Web Services Management Console, might restrict the
201
+ # ability to type certain characters because they have special meaning
202
+ # within that tool.
202
203
  #
203
204
  #
204
205
  #
@@ -251,8 +252,8 @@ module Aws::IAM
251
252
  # carriage return (`\u000D`)
252
253
  #
253
254
  # However, the format can be further restricted by the account
254
- # administrator by setting a password policy on the account. For more
255
- # information, see UpdateAccountPasswordPolicy.
255
+ # administrator by setting a password policy on the Amazon Web Services
256
+ # account. For more information, see UpdateAccountPasswordPolicy.
256
257
  #
257
258
  #
258
259
  #
@@ -45,8 +45,8 @@ module Aws::IAM
45
45
  # @option options [required, String] :old_password
46
46
  # The IAM user's current password.
47
47
  # @option options [required, String] :new_password
48
- # The new password. The new password must conform to the account's
49
- # password policy, if one exists.
48
+ # The new password. The new password must conform to the Amazon Web
49
+ # Services account's password policy, if one exists.
50
50
  #
51
51
  # The [regex pattern][1] that is used to validate this parameter is a
52
52
  # string of characters. That string can include almost any printable
@@ -54,8 +54,9 @@ module Aws::IAM
54
54
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
55
55
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
56
56
  # of these characters are valid in a password. However, many tools, such
57
- # as the Management Console, might restrict the ability to type certain
58
- # characters because they have special meaning within that tool.
57
+ # as the Amazon Web Services Management Console, might restrict the
58
+ # ability to type certain characters because they have special meaning
59
+ # within that tool.
59
60
  #
60
61
  #
61
62
  #
@@ -139,9 +140,10 @@ module Aws::IAM
139
140
  # uses the default value of `false`. The result is that passwords do not
140
141
  # require at least one lowercase character.
141
142
  # @option options [Boolean] :allow_users_to_change_password
142
- # Allows all IAM users in your account to use the Management Console to
143
- # change their own passwords. For more information, see [Letting IAM
144
- # users change their own passwords][1] in the *IAM User Guide*.
143
+ # Allows all IAM users in your account to use the Amazon Web Services
144
+ # Management Console to change their own passwords. For more
145
+ # information, see [Letting IAM users change their own passwords][1] in
146
+ # the *IAM User Guide*.
145
147
  #
146
148
  # If you do not specify a value for this parameter, then the operation
147
149
  # uses the default value of `false`. The result is that IAM users in the
@@ -325,6 +327,10 @@ module Aws::IAM
325
327
  # character (`\u007F`), including most punctuation characters, digits,
326
328
  # and upper and lowercased letters.
327
329
  #
330
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
331
+ #
332
+ # </note>
333
+ #
328
334
  #
329
335
  #
330
336
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -1015,8 +1021,8 @@ module Aws::IAM
1015
1021
  # The scope to use for filtering the results.
1016
1022
  #
1017
1023
  # To list only Amazon Web Services managed policies, set `Scope` to
1018
- # `AWS`. To list only the customer managed policies in your account, set
1019
- # `Scope` to `Local`.
1024
+ # `AWS`. To list only the customer managed policies in your Amazon Web
1025
+ # Services account, set `Scope` to `Local`.
1020
1026
  #
1021
1027
  # This parameter is optional. If it is not included, or if it is set to
1022
1028
  # `All`, all policies are returned.
@@ -186,8 +186,9 @@ module Aws::IAM
186
186
  # @return [String]
187
187
  #
188
188
  # @!attribute [rw] region
189
- # The Region where this access key was most recently used. The value
190
- # for this field is "N/A" in the following situations:
189
+ # The Amazon Web Services Region where this access key was most
190
+ # recently used. The value for this field is "N/A" in the following
191
+ # situations:
191
192
  #
192
193
  # * The user does not have an access key.
193
194
  #
@@ -196,8 +197,8 @@ module Aws::IAM
196
197
  #
197
198
  # * There is no sign-in data associated with the user.
198
199
  #
199
- # For more information about Regions, see [Regions and endpoints][1]
200
- # in the Amazon Web Services General Reference.
200
+ # For more information about Amazon Web Services Regions, see [Regions
201
+ # and endpoints][1] in the Amazon Web Services General Reference.
201
202
  #
202
203
  #
203
204
  #
@@ -574,8 +575,8 @@ module Aws::IAM
574
575
  # @return [String]
575
576
  #
576
577
  # @!attribute [rw] new_password
577
- # The new password. The new password must conform to the account's
578
- # password policy, if one exists.
578
+ # The new password. The new password must conform to the Amazon Web
579
+ # Services account's password policy, if one exists.
579
580
  #
580
581
  # The [regex pattern][1] that is used to validate this parameter is a
581
582
  # string of characters. That string can include almost any printable
@@ -583,9 +584,9 @@ module Aws::IAM
583
584
  # ASCII character range (`\u00FF`). You can also include the tab
584
585
  # (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
585
586
  # characters. Any of these characters are valid in a password.
586
- # However, many tools, such as the Management Console, might restrict
587
- # the ability to type certain characters because they have special
588
- # meaning within that tool.
587
+ # However, many tools, such as the Amazon Web Services Management
588
+ # Console, might restrict the ability to type certain characters
589
+ # because they have special meaning within that tool.
589
590
  #
590
591
  #
591
592
  #
@@ -911,9 +912,9 @@ module Aws::IAM
911
912
  # ASCII character range (`\u00FF`). You can also include the tab
912
913
  # (`\u0009`), line feed (`\u000A`), and carriage return (`\u000D`)
913
914
  # characters. Any of these characters are valid in a password.
914
- # However, many tools, such as the Management Console, might restrict
915
- # the ability to type certain characters because they have special
916
- # meaning within that tool.
915
+ # However, many tools, such as the Amazon Web Services Management
916
+ # Console, might restrict the ability to type certain characters
917
+ # because they have special meaning within that tool.
917
918
  #
918
919
  #
919
920
  #
@@ -970,18 +971,19 @@ module Aws::IAM
970
971
  # Connect ID tokens. Per the OIDC standard, path components are
971
972
  # allowed but query parameters are not. Typically the URL consists of
972
973
  # only a hostname, like `https://server.example.org` or
973
- # `https://example.com`.
974
+ # `https://example.com`. The URL should not contain a port number.
974
975
  #
975
976
  # You cannot register the same provider multiple times in a single
976
- # account. If you try to submit a URL that has already been used for
977
- # an OpenID Connect provider in the account, you will get an error.
977
+ # Amazon Web Services account. If you try to submit a URL that has
978
+ # already been used for an OpenID Connect provider in the Amazon Web
979
+ # Services account, you will get an error.
978
980
  # @return [String]
979
981
  #
980
982
  # @!attribute [rw] client_id_list
981
- # A list of client IDs (also known as audiences). When a mobile or web
982
- # app registers with an OpenID Connect provider, they establish a
983
- # value that identifies the application. (This is the value that's
984
- # sent as the `client_id` parameter on OAuth requests.)
983
+ # Provides a list of client IDs, also known as audiences. When a
984
+ # mobile or web app registers with an OpenID Connect provider, they
985
+ # establish a value that identifies the application. This is the value
986
+ # that's sent as the `client_id` parameter on OAuth requests.
985
987
  #
986
988
  # You can register multiple client IDs with the same provider. For
987
989
  # example, you might have multiple applications that use the same OIDC
@@ -1010,11 +1012,11 @@ module Aws::IAM
1010
1012
  # `server.example.com` and the provider stores its keys at
1011
1013
  # https://keys.server.example.com/openid-connect. In that case, the
1012
1014
  # thumbprint string would be the hex-encoded SHA-1 hash value of the
1013
- # certificate used by https://keys.server.example.com.
1015
+ # certificate used by `https://keys.server.example.com.`
1014
1016
  #
1015
- # For more information about obtaining the OIDC provider's
1016
- # thumbprint, see [Obtaining the thumbprint for an OpenID Connect
1017
- # provider][1] in the *IAM User Guide*.
1017
+ # For more information about obtaining the OIDC provider thumbprint,
1018
+ # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
1019
+ # the *IAM User Guide*.
1018
1020
  #
1019
1021
  #
1020
1022
  #
@@ -1119,6 +1121,10 @@ module Aws::IAM
1119
1121
  # DEL character (`\u007F`), including most punctuation characters,
1120
1122
  # digits, and upper and lowercased letters.
1121
1123
  #
1124
+ # <note markdown="1"> You cannot use an asterisk (*) in the path name.
1125
+ #
1126
+ # </note>
1127
+ #
1122
1128
  #
1123
1129
  #
1124
1130
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
@@ -3911,7 +3917,7 @@ module Aws::IAM
3911
3917
  #
3912
3918
  # @!attribute [rw] create_date
3913
3919
  # The date and time when the IAM OIDC provider resource object was
3914
- # created in the account.
3920
+ # created in the Amazon Web Services account.
3915
3921
  # @return [Time]
3916
3922
  #
3917
3923
  # @!attribute [rw] tags
@@ -6594,8 +6600,8 @@ module Aws::IAM
6594
6600
  # request.
6595
6601
  #
6596
6602
  # @!attribute [rw] open_id_connect_provider_list
6597
- # The list of IAM OIDC provider resource objects defined in the
6598
- # account.
6603
+ # The list of IAM OIDC provider resource objects defined in the Amazon
6604
+ # Web Services account.
6599
6605
  # @return [Array<Types::OpenIDConnectProviderListEntry>]
6600
6606
  #
6601
6607
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/ListOpenIDConnectProvidersResponse AWS API Documentation
@@ -6739,8 +6745,8 @@ module Aws::IAM
6739
6745
  # The scope to use for filtering the results.
6740
6746
  #
6741
6747
  # To list only Amazon Web Services managed policies, set `Scope` to
6742
- # `AWS`. To list only the customer managed policies in your account,
6743
- # set `Scope` to `Local`.
6748
+ # `AWS`. To list only the customer managed policies in your Amazon Web
6749
+ # Services account, set `Scope` to `Local`.
6744
6750
  #
6745
6751
  # This parameter is optional. If it is not included, or if it is set
6746
6752
  # to `All`, all policies are returned.
@@ -8132,8 +8138,8 @@ module Aws::IAM
8132
8138
  # and GetLoginProfile operations.
8133
8139
  #
8134
8140
  # @!attribute [rw] user_name
8135
- # The name of the user, which can be used for signing in to the
8136
- # Management Console.
8141
+ # The name of the user, which can be used for signing in to the Amazon
8142
+ # Web Services Management Console.
8137
8143
  # @return [String]
8138
8144
  #
8139
8145
  # @!attribute [rw] create_date
@@ -9813,7 +9819,8 @@ module Aws::IAM
9813
9819
  # @return [Time]
9814
9820
  #
9815
9821
  # @!attribute [rw] region
9816
- # The name of the Region in which the role was last used.
9822
+ # The name of the Amazon Web Services Region in which the role was
9823
+ # last used.
9817
9824
  # @return [String]
9818
9825
  #
9819
9826
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/RoleLastUsed AWS API Documentation
@@ -10347,14 +10354,14 @@ module Aws::IAM
10347
10354
  #
10348
10355
  # @!attribute [rw] global_endpoint_token_version
10349
10356
  # The version of the global endpoint token. Version 1 tokens are valid
10350
- # only in Regions that are available by default. These tokens do not
10351
- # work in manually enabled Regions, such as Asia Pacific (Hong Kong).
10352
- # Version 2 tokens are valid in all Regions. However, version 2 tokens
10353
- # are longer and might affect systems where you temporarily store
10354
- # tokens.
10357
+ # only in Amazon Web Services Regions that are available by default.
10358
+ # These tokens do not work in manually enabled Regions, such as Asia
10359
+ # Pacific (Hong Kong). Version 2 tokens are valid in all Regions.
10360
+ # However, version 2 tokens are longer and might affect systems where
10361
+ # you temporarily store tokens.
10355
10362
  #
10356
- # For information, see [Activating and deactivating STS in an
10357
- # Region][1] in the *IAM User Guide*.
10363
+ # For information, see [Activating and deactivating STS in an Amazon
10364
+ # Web Services Region][1] in the *IAM User Guide*.
10358
10365
  #
10359
10366
  #
10360
10367
  #
@@ -10563,17 +10570,17 @@ module Aws::IAM
10563
10570
  # @return [String]
10564
10571
  #
10565
10572
  # @!attribute [rw] resource_owner
10566
- # An ARN representing the account ID that specifies the owner of any
10567
- # simulated resource that does not identify its owner in the resource
10568
- # ARN. Examples of resource ARNs include an S3 bucket or object. If
10569
- # `ResourceOwner` is specified, it is also used as the account owner
10570
- # of any `ResourcePolicy` included in the simulation. If the
10571
- # `ResourceOwner` parameter is not specified, then the owner of the
10572
- # resources and the resource policy defaults to the account of the
10573
- # identity provided in `CallerArn`. This parameter is required only if
10574
- # you specify a resource-based policy and account that owns the
10575
- # resource is different from the account that owns the simulated
10576
- # calling user `CallerArn`.
10573
+ # An ARN representing the Amazon Web Services account ID that
10574
+ # specifies the owner of any simulated resource that does not identify
10575
+ # its owner in the resource ARN. Examples of resource ARNs include an
10576
+ # S3 bucket or object. If `ResourceOwner` is specified, it is also
10577
+ # used as the account owner of any `ResourcePolicy` included in the
10578
+ # simulation. If the `ResourceOwner` parameter is not specified, then
10579
+ # the owner of the resources and the resource policy defaults to the
10580
+ # account of the identity provided in `CallerArn`. This parameter is
10581
+ # required only if you specify a resource-based policy and account
10582
+ # that owns the resource is different from the account that owns the
10583
+ # simulated calling user `CallerArn`.
10577
10584
  #
10578
10585
  # The ARN for an account uses the following syntax:
10579
10586
  # `arn:aws:iam::AWS-account-ID:root`. For example, to represent the
@@ -10880,17 +10887,17 @@ module Aws::IAM
10880
10887
  # @return [String]
10881
10888
  #
10882
10889
  # @!attribute [rw] resource_owner
10883
- # An account ID that specifies the owner of any simulated resource
10884
- # that does not identify its owner in the resource ARN. Examples of
10885
- # resource ARNs include an S3 bucket or object. If `ResourceOwner` is
10886
- # specified, it is also used as the account owner of any
10887
- # `ResourcePolicy` included in the simulation. If the `ResourceOwner`
10888
- # parameter is not specified, then the owner of the resources and the
10889
- # resource policy defaults to the account of the identity provided in
10890
- # `CallerArn`. This parameter is required only if you specify a
10891
- # resource-based policy and account that owns the resource is
10892
- # different from the account that owns the simulated calling user
10893
- # `CallerArn`.
10890
+ # An Amazon Web Services account ID that specifies the owner of any
10891
+ # simulated resource that does not identify its owner in the resource
10892
+ # ARN. Examples of resource ARNs include an S3 bucket or object. If
10893
+ # `ResourceOwner` is specified, it is also used as the account owner
10894
+ # of any `ResourcePolicy` included in the simulation. If the
10895
+ # `ResourceOwner` parameter is not specified, then the owner of the
10896
+ # resources and the resource policy defaults to the account of the
10897
+ # identity provided in `CallerArn`. This parameter is required only if
10898
+ # you specify a resource-based policy and account that owns the
10899
+ # resource is different from the account that owns the simulated
10900
+ # calling user `CallerArn`.
10894
10901
  # @return [String]
10895
10902
  #
10896
10903
  # @!attribute [rw] caller_arn
@@ -11913,9 +11920,10 @@ module Aws::IAM
11913
11920
  # @return [Boolean]
11914
11921
  #
11915
11922
  # @!attribute [rw] allow_users_to_change_password
11916
- # Allows all IAM users in your account to use the Management Console
11917
- # to change their own passwords. For more information, see [Letting
11918
- # IAM users change their own passwords][1] in the *IAM User Guide*.
11923
+ # Allows all IAM users in your account to use the Amazon Web Services
11924
+ # Management Console to change their own passwords. For more
11925
+ # information, see [Letting IAM users change their own passwords][1]
11926
+ # in the *IAM User Guide*.
11919
11927
  #
11920
11928
  # If you do not specify a value for this parameter, then the operation
11921
11929
  # uses the default value of `false`. The result is that IAM users in
@@ -12123,8 +12131,9 @@ module Aws::IAM
12123
12131
  # carriage return (`\u000D`)
12124
12132
  #
12125
12133
  # However, the format can be further restricted by the account
12126
- # administrator by setting a password policy on the account. For more
12127
- # information, see UpdateAccountPasswordPolicy.
12134
+ # administrator by setting a password policy on the Amazon Web
12135
+ # Services account. For more information, see
12136
+ # UpdateAccountPasswordPolicy.
12128
12137
  #
12129
12138
  #
12130
12139
  #
@@ -439,8 +439,9 @@ module Aws::IAM
439
439
  # character range (`\u00FF`). You can also include the tab (`\u0009`),
440
440
  # line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
441
441
  # of these characters are valid in a password. However, many tools, such
442
- # as the Management Console, might restrict the ability to type certain
443
- # characters because they have special meaning within that tool.
442
+ # as the Amazon Web Services Management Console, might restrict the
443
+ # ability to type certain characters because they have special meaning
444
+ # within that tool.
444
445
  #
445
446
  #
446
447
  #
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.60.0'
73
+ GEM_VERSION = '1.64.0'
74
74
 
75
75
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.60.0
4
+ version: 1.64.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-09-01 00:00:00.000000000 Z
11
+ date: 2021-11-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.120.0
22
+ version: 3.122.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.120.0
32
+ version: 3.122.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement