aws-sdk-iam 1.66.0 → 1.67.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2612e05dea27b8becae894164e08bef05d8aadaf09f1d07477f14ec3350a18c2
4
- data.tar.gz: 3feed3252673d35ed7fa98122b5f9dd0b496670f70dd8e341a1b33338f9357c7
3
+ metadata.gz: 5da2823800d51a971676fb664df4b1d6a8b479fc3c536672ece25d5b164bb33a
4
+ data.tar.gz: cde6895069144bfc4e8362394ba81ed75fca17d53ec95c0b1ce49f3d59d088bb
5
5
  SHA512:
6
- metadata.gz: 97cddd299d8152d6f96f0089e9229fe47fbea0edd37d0763357da3ca1fa1195370fb6d2b1e763b81faec24bcd3637f4ff6f28c4e2c4c3c2eb7a6639a95ce829c
7
- data.tar.gz: 4eff81d99e794c63d12913a6dcd8505e032fd8e6fbfb0ed59908275aa873e0c6428fb1ec1244bd32a6d4b6b1876d7216c062b511abf147fe6d3438382d392d5c
6
+ metadata.gz: 8e2f98e4778bcc9e10aab3397dd7fc1debf6fd556fb077bffabe18893df78c8dc6065c00a9c1a3e2e85f0552880308822c91a02cdd8c4599542333f0bdbb6ef7
7
+ data.tar.gz: 0f082c39147da1095b31ec506b63722fcee70fef5b40d1daed6b75bb9469733b74e0b8e0075888a7d57f537f711a50f2acfb045d2de61b61c2b6fd7251994acf
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.67.0 (2022-02-17)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
4
9
  1.66.0 (2022-02-03)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.66.0
1
+ 1.67.0
@@ -61,6 +61,10 @@ module Aws::IAM
61
61
  end
62
62
 
63
63
  # Specifies whether IAM users are allowed to change their own password.
64
+ # Gives IAM users permissions to `iam:ChangePassword` for only their
65
+ # user and to the `iam:GetAccountPasswordPolicy` action. This option
66
+ # does not attach a permissions policy to each user, rather the
67
+ # permissions are applied at the account-level for all users by IAM.
64
68
  # @return [Boolean]
65
69
  def allow_users_to_change_password
66
70
  data[:allow_users_to_change_password]
@@ -88,7 +92,11 @@ module Aws::IAM
88
92
  end
89
93
 
90
94
  # Specifies whether IAM users are prevented from setting a new password
91
- # after their password has expired.
95
+ # via the Amazon Web Services Management Console after their password
96
+ # has expired. The IAM user cannot access the console until an
97
+ # administrator resets the password. IAM users with `iam:ChangePassword`
98
+ # permission and active access keys can reset their own expired console
99
+ # password using the CLI or API.
92
100
  # @return [Boolean]
93
101
  def hard_expiry
94
102
  data[:hard_expiry]
@@ -290,8 +298,8 @@ module Aws::IAM
290
298
  # @option options [Boolean] :allow_users_to_change_password
291
299
  # Allows all IAM users in your account to use the Amazon Web Services
292
300
  # Management Console to change their own passwords. For more
293
- # information, see [Letting IAM users change their own passwords][1] in
294
- # the *IAM User Guide*.
301
+ # information, see [Permitting IAM users to change their own
302
+ # passwords][1] in the *IAM User Guide*.
295
303
  #
296
304
  # If you do not specify a value for this parameter, then the operation
297
305
  # uses the default value of `false`. The result is that IAM users in the
@@ -300,7 +308,7 @@ module Aws::IAM
300
308
  #
301
309
  #
302
310
  #
303
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
311
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
304
312
  # @option options [Integer] :max_password_age
305
313
  # The number of days that an IAM user password is valid.
306
314
  #
@@ -315,14 +323,26 @@ module Aws::IAM
315
323
  # uses the default value of `0`. The result is that IAM users are not
316
324
  # prevented from reusing previous passwords.
317
325
  # @option options [Boolean] :hard_expiry
318
- # Prevents IAM users from setting a new password after their password
319
- # has expired. The IAM user cannot be accessed until an administrator
320
- # resets the password.
326
+ # Prevents IAM users who are accessing the account via the Amazon Web
327
+ # Services Management Console from setting a new console password after
328
+ # their password has expired. The IAM user cannot access the console
329
+ # until an administrator resets the password.
321
330
  #
322
331
  # If you do not specify a value for this parameter, then the operation
323
332
  # uses the default value of `false`. The result is that IAM users can
324
333
  # change their passwords after they expire and continue to sign in as
325
334
  # the user.
335
+ #
336
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
337
+ # policy option **Allow users to change their own password** gives IAM
338
+ # users permissions to `iam:ChangePassword` for only their user and to
339
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
340
+ # a permissions policy to each user, rather the permissions are applied
341
+ # at the account-level for all users by IAM. IAM users with
342
+ # `iam:ChangePassword` permission and active access keys can reset their
343
+ # own expired console password using the CLI or API.
344
+ #
345
+ # </note>
326
346
  # @return [EmptyStructure]
327
347
  def update(options = {})
328
348
  resp = @client.update_account_password_policy(options)
@@ -3991,9 +3991,9 @@ module Aws::IAM
3991
3991
  # Generates a report that includes details about when an IAM resource
3992
3992
  # (user, group, role, or policy) was last used in an attempt to access
3993
3993
  # Amazon Web Services services. Recent activity usually appears within
3994
- # four hours. IAM reports activity for the last 365 days, or less if
3995
- # your Region began supporting this feature within the last year. For
3996
- # more information, see [Regions where data is tracked][1].
3994
+ # four hours. IAM reports activity for at least the last 400 days, or
3995
+ # less if your Region began supporting this feature within the last
3996
+ # year. For more information, see [Regions where data is tracked][1].
3997
3997
  #
3998
3998
  # The service last accessed data includes all attempts to access an
3999
3999
  # Amazon Web Services API, not just the successful ones. This includes
@@ -9107,8 +9107,8 @@ module Aws::IAM
9107
9107
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
9108
9108
  # attributes for the resource. For example, this operation does not
9109
9109
  # return tags, even though they are an attribute of the returned object.
9110
- # To view all of the information for a virtual MFA device, see
9111
- # ListVirtualMFADevices.
9110
+ # To view tag information for a virtual MFA device, see
9111
+ # ListMFADeviceTags.
9112
9112
  #
9113
9113
  # </note>
9114
9114
  #
@@ -11844,15 +11844,13 @@ module Aws::IAM
11844
11844
  # Updates the password policy settings for the Amazon Web Services
11845
11845
  # account.
11846
11846
  #
11847
- # <note markdown="1"> * This operation does not support partial updates. No parameters are
11848
- # required, but if you do not specify a parameter, that parameter's
11849
- # value reverts to its default value. See the **Request Parameters**
11850
- # section for each parameter's default value. Also note that some
11851
- # parameters do not allow the default parameter to be explicitly set.
11852
- # Instead, to invoke the default value, do not include that parameter
11853
- # when you invoke the operation.
11854
- #
11855
- # ^
11847
+ # <note markdown="1"> This operation does not support partial updates. No parameters are
11848
+ # required, but if you do not specify a parameter, that parameter's
11849
+ # value reverts to its default value. See the **Request Parameters**
11850
+ # section for each parameter's default value. Also note that some
11851
+ # parameters do not allow the default parameter to be explicitly set.
11852
+ # Instead, to invoke the default value, do not include that parameter
11853
+ # when you invoke the operation.
11856
11854
  #
11857
11855
  # </note>
11858
11856
  #
@@ -11906,8 +11904,8 @@ module Aws::IAM
11906
11904
  # @option params [Boolean] :allow_users_to_change_password
11907
11905
  # Allows all IAM users in your account to use the Amazon Web Services
11908
11906
  # Management Console to change their own passwords. For more
11909
- # information, see [Letting IAM users change their own passwords][1] in
11910
- # the *IAM User Guide*.
11907
+ # information, see [Permitting IAM users to change their own
11908
+ # passwords][1] in the *IAM User Guide*.
11911
11909
  #
11912
11910
  # If you do not specify a value for this parameter, then the operation
11913
11911
  # uses the default value of `false`. The result is that IAM users in the
@@ -11916,7 +11914,7 @@ module Aws::IAM
11916
11914
  #
11917
11915
  #
11918
11916
  #
11919
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
11917
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
11920
11918
  #
11921
11919
  # @option params [Integer] :max_password_age
11922
11920
  # The number of days that an IAM user password is valid.
@@ -11934,15 +11932,27 @@ module Aws::IAM
11934
11932
  # prevented from reusing previous passwords.
11935
11933
  #
11936
11934
  # @option params [Boolean] :hard_expiry
11937
- # Prevents IAM users from setting a new password after their password
11938
- # has expired. The IAM user cannot be accessed until an administrator
11939
- # resets the password.
11935
+ # Prevents IAM users who are accessing the account via the Amazon Web
11936
+ # Services Management Console from setting a new console password after
11937
+ # their password has expired. The IAM user cannot access the console
11938
+ # until an administrator resets the password.
11940
11939
  #
11941
11940
  # If you do not specify a value for this parameter, then the operation
11942
11941
  # uses the default value of `false`. The result is that IAM users can
11943
11942
  # change their passwords after they expire and continue to sign in as
11944
11943
  # the user.
11945
11944
  #
11945
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
11946
+ # policy option **Allow users to change their own password** gives IAM
11947
+ # users permissions to `iam:ChangePassword` for only their user and to
11948
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
11949
+ # a permissions policy to each user, rather the permissions are applied
11950
+ # at the account-level for all users by IAM. IAM users with
11951
+ # `iam:ChangePassword` permission and active access keys can reset their
11952
+ # own expired console password using the CLI or API.
11953
+ #
11954
+ # </note>
11955
+ #
11946
11956
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
11947
11957
  #
11948
11958
  #
@@ -13213,7 +13223,7 @@ module Aws::IAM
13213
13223
  params: params,
13214
13224
  config: config)
13215
13225
  context[:gem_name] = 'aws-sdk-iam'
13216
- context[:gem_version] = '1.66.0'
13226
+ context[:gem_version] = '1.67.0'
13217
13227
  Seahorse::Client::Request.new(handlers, context)
13218
13228
  end
13219
13229
 
@@ -142,8 +142,8 @@ module Aws::IAM
142
142
  # @option options [Boolean] :allow_users_to_change_password
143
143
  # Allows all IAM users in your account to use the Amazon Web Services
144
144
  # Management Console to change their own passwords. For more
145
- # information, see [Letting IAM users change their own passwords][1] in
146
- # the *IAM User Guide*.
145
+ # information, see [Permitting IAM users to change their own
146
+ # passwords][1] in the *IAM User Guide*.
147
147
  #
148
148
  # If you do not specify a value for this parameter, then the operation
149
149
  # uses the default value of `false`. The result is that IAM users in the
@@ -152,7 +152,7 @@ module Aws::IAM
152
152
  #
153
153
  #
154
154
  #
155
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
155
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
156
156
  # @option options [Integer] :max_password_age
157
157
  # The number of days that an IAM user password is valid.
158
158
  #
@@ -167,14 +167,26 @@ module Aws::IAM
167
167
  # uses the default value of `0`. The result is that IAM users are not
168
168
  # prevented from reusing previous passwords.
169
169
  # @option options [Boolean] :hard_expiry
170
- # Prevents IAM users from setting a new password after their password
171
- # has expired. The IAM user cannot be accessed until an administrator
172
- # resets the password.
170
+ # Prevents IAM users who are accessing the account via the Amazon Web
171
+ # Services Management Console from setting a new console password after
172
+ # their password has expired. The IAM user cannot access the console
173
+ # until an administrator resets the password.
173
174
  #
174
175
  # If you do not specify a value for this parameter, then the operation
175
176
  # uses the default value of `false`. The result is that IAM users can
176
177
  # change their passwords after they expire and continue to sign in as
177
178
  # the user.
179
+ #
180
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
181
+ # policy option **Allow users to change their own password** gives IAM
182
+ # users permissions to `iam:ChangePassword` for only their user and to
183
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
184
+ # a permissions policy to each user, rather the permissions are applied
185
+ # at the account-level for all users by IAM. IAM users with
186
+ # `iam:ChangePassword` permission and active access keys can reset their
187
+ # own expired console password using the CLI or API.
188
+ #
189
+ # </note>
178
190
  # @return [AccountPasswordPolicy]
179
191
  def create_account_password_policy(options = {})
180
192
  @client.update_account_password_policy(options)
@@ -8440,7 +8440,11 @@ module Aws::IAM
8440
8440
  #
8441
8441
  # @!attribute [rw] allow_users_to_change_password
8442
8442
  # Specifies whether IAM users are allowed to change their own
8443
- # password.
8443
+ # password. Gives IAM users permissions to `iam:ChangePassword` for
8444
+ # only their user and to the `iam:GetAccountPasswordPolicy` action.
8445
+ # This option does not attach a permissions policy to each user,
8446
+ # rather the permissions are applied at the account-level for all
8447
+ # users by IAM.
8444
8448
  # @return [Boolean]
8445
8449
  #
8446
8450
  # @!attribute [rw] expire_passwords
@@ -8460,7 +8464,11 @@ module Aws::IAM
8460
8464
  #
8461
8465
  # @!attribute [rw] hard_expiry
8462
8466
  # Specifies whether IAM users are prevented from setting a new
8463
- # password after their password has expired.
8467
+ # password via the Amazon Web Services Management Console after their
8468
+ # password has expired. The IAM user cannot access the console until
8469
+ # an administrator resets the password. IAM users with
8470
+ # `iam:ChangePassword` permission and active access keys can reset
8471
+ # their own expired console password using the CLI or API.
8464
8472
  # @return [Boolean]
8465
8473
  #
8466
8474
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PasswordPolicy AWS API Documentation
@@ -11922,8 +11930,8 @@ module Aws::IAM
11922
11930
  # @!attribute [rw] allow_users_to_change_password
11923
11931
  # Allows all IAM users in your account to use the Amazon Web Services
11924
11932
  # Management Console to change their own passwords. For more
11925
- # information, see [Letting IAM users change their own passwords][1]
11926
- # in the *IAM User Guide*.
11933
+ # information, see [Permitting IAM users to change their own
11934
+ # passwords][1] in the *IAM User Guide*.
11927
11935
  #
11928
11936
  # If you do not specify a value for this parameter, then the operation
11929
11937
  # uses the default value of `false`. The result is that IAM users in
@@ -11932,7 +11940,7 @@ module Aws::IAM
11932
11940
  #
11933
11941
  #
11934
11942
  #
11935
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
11943
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
11936
11944
  # @return [Boolean]
11937
11945
  #
11938
11946
  # @!attribute [rw] max_password_age
@@ -11953,14 +11961,26 @@ module Aws::IAM
11953
11961
  # @return [Integer]
11954
11962
  #
11955
11963
  # @!attribute [rw] hard_expiry
11956
- # Prevents IAM users from setting a new password after their password
11957
- # has expired. The IAM user cannot be accessed until an administrator
11958
- # resets the password.
11964
+ # Prevents IAM users who are accessing the account via the Amazon Web
11965
+ # Services Management Console from setting a new console password
11966
+ # after their password has expired. The IAM user cannot access the
11967
+ # console until an administrator resets the password.
11959
11968
  #
11960
11969
  # If you do not specify a value for this parameter, then the operation
11961
11970
  # uses the default value of `false`. The result is that IAM users can
11962
11971
  # change their passwords after they expire and continue to sign in as
11963
11972
  # the user.
11973
+ #
11974
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
11975
+ # policy option **Allow users to change their own password** gives IAM
11976
+ # users permissions to `iam:ChangePassword` for only their user and to
11977
+ # the `iam:GetAccountPasswordPolicy` action. This option does not
11978
+ # attach a permissions policy to each user, rather the permissions are
11979
+ # applied at the account-level for all users by IAM. IAM users with
11980
+ # `iam:ChangePassword` permission and active access keys can reset
11981
+ # their own expired console password using the CLI or API.
11982
+ #
11983
+ # </note>
11964
11984
  # @return [Boolean]
11965
11985
  #
11966
11986
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UpdateAccountPasswordPolicyRequest AWS API Documentation
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.66.0'
73
+ GEM_VERSION = '1.67.0'
74
74
 
75
75
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.66.0
4
+ version: 1.67.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-02-03 00:00:00.000000000 Z
11
+ date: 2022-02-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core