@aws-sdk/client-cognito-identity-provider 3.787.0 → 3.794.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (36) hide show
  1. package/README.md +8 -0
  2. package/dist-cjs/index.js +124 -32
  3. package/dist-es/CognitoIdentityProvider.js +2 -0
  4. package/dist-es/commands/GetTokensFromRefreshTokenCommand.js +23 -0
  5. package/dist-es/commands/GetUserAuthFactorsCommand.js +1 -1
  6. package/dist-es/commands/index.js +1 -0
  7. package/dist-es/models/models_0.js +40 -8
  8. package/dist-es/models/models_1.js +8 -12
  9. package/dist-es/protocols/Aws_json1_1.js +37 -5
  10. package/dist-types/CognitoIdentityProvider.d.ts +7 -0
  11. package/dist-types/CognitoIdentityProviderClient.d.ts +3 -2
  12. package/dist-types/commands/AdminInitiateAuthCommand.d.ts +4 -0
  13. package/dist-types/commands/CreateUserPoolClientCommand.d.ts +12 -0
  14. package/dist-types/commands/CreateUserPoolDomainCommand.d.ts +4 -0
  15. package/dist-types/commands/DeleteUserPoolDomainCommand.d.ts +4 -0
  16. package/dist-types/commands/DescribeUserPoolClientCommand.d.ts +4 -0
  17. package/dist-types/commands/GetTokensFromRefreshTokenCommand.d.ts +132 -0
  18. package/dist-types/commands/GetUserAuthFactorsCommand.d.ts +1 -1
  19. package/dist-types/commands/GetUserPoolMfaConfigCommand.d.ts +1 -2
  20. package/dist-types/commands/InitiateAuthCommand.d.ts +4 -0
  21. package/dist-types/commands/UpdateUserPoolClientCommand.d.ts +12 -0
  22. package/dist-types/commands/UpdateUserPoolDomainCommand.d.ts +4 -0
  23. package/dist-types/commands/index.d.ts +1 -0
  24. package/dist-types/models/models_0.d.ts +198 -149
  25. package/dist-types/models/models_1.d.ts +127 -14
  26. package/dist-types/protocols/Aws_json1_1.d.ts +9 -0
  27. package/dist-types/ts3.4/CognitoIdentityProvider.d.ts +17 -0
  28. package/dist-types/ts3.4/CognitoIdentityProviderClient.d.ts +6 -0
  29. package/dist-types/ts3.4/commands/GetTokensFromRefreshTokenCommand.d.ts +51 -0
  30. package/dist-types/ts3.4/commands/GetUserAuthFactorsCommand.d.ts +1 -1
  31. package/dist-types/ts3.4/commands/GetUserPoolMfaConfigCommand.d.ts +4 -2
  32. package/dist-types/ts3.4/commands/index.d.ts +1 -0
  33. package/dist-types/ts3.4/models/models_0.d.ts +41 -29
  34. package/dist-types/ts3.4/models/models_1.d.ts +32 -10
  35. package/dist-types/ts3.4/protocols/Aws_json1_1.d.ts +12 -0
  36. package/package.json +1 -1
@@ -70,8 +70,8 @@ export declare const AccountTakeoverEventActionType: {
70
70
  export type AccountTakeoverEventActionType = (typeof AccountTakeoverEventActionType)[keyof typeof AccountTakeoverEventActionType];
71
71
  /**
72
72
  * <p>The automated response to a risk level for adaptive authentication in full-function,
73
- * or <code>ENFORCED</code>, mode. You can assign an action to each risk level that
74
- * threat protection evaluates.</p>
73
+ * or <code>ENFORCED</code>, mode. You can assign an action to each risk level that threat
74
+ * protection evaluates.</p>
75
75
  * @public
76
76
  */
77
77
  export interface AccountTakeoverActionType {
@@ -136,9 +136,8 @@ export interface AccountTakeoverActionsType {
136
136
  HighAction?: AccountTakeoverActionType | undefined;
137
137
  }
138
138
  /**
139
- * <p>The template for email messages that threat protection sends to a user when
140
- * your threat protection automated response has a <i>Notify</i>
141
- * action.</p>
139
+ * <p>The template for email messages that threat protection sends to a user when your
140
+ * threat protection automated response has a <i>Notify</i> action.</p>
142
141
  * @public
143
142
  */
144
143
  export interface NotifyEmailType {
@@ -163,9 +162,9 @@ export interface NotifyEmailType {
163
162
  TextBody?: string | undefined;
164
163
  }
165
164
  /**
166
- * <p>The configuration for Amazon SES email messages that threat protection sends to a
167
- * user when your adaptive authentication automated response has a
168
- * <i>Notify</i> action.</p>
165
+ * <p>The configuration for Amazon SES email messages that threat protection sends to a user when
166
+ * your adaptive authentication automated response has a <i>Notify</i>
167
+ * action.</p>
169
168
  * @public
170
169
  */
171
170
  export interface NotifyConfigurationType {
@@ -214,9 +213,10 @@ export interface NotifyConfigurationType {
214
213
  */
215
214
  export interface AccountTakeoverRiskConfigurationType {
216
215
  /**
217
- * <p>The settings for composing and sending an email message when threat protection assesses a risk level with adaptive authentication. When you choose to notify
218
- * users in <code>AccountTakeoverRiskConfiguration</code>, Amazon Cognito sends an email message
219
- * using the method and template that you set with this data type.</p>
216
+ * <p>The settings for composing and sending an email message when threat protection
217
+ * assesses a risk level with adaptive authentication. When you choose to notify users in
218
+ * <code>AccountTakeoverRiskConfiguration</code>, Amazon Cognito sends an email message using
219
+ * the method and template that you set with this data type.</p>
220
220
  * @public
221
221
  */
222
222
  NotifyConfiguration?: NotifyConfigurationType | undefined;
@@ -2078,6 +2078,19 @@ export declare class PasswordResetRequiredException extends __BaseException {
2078
2078
  */
2079
2079
  constructor(opts: __ExceptionOptionType<PasswordResetRequiredException, __BaseException>);
2080
2080
  }
2081
+ /**
2082
+ * <p>Exception that is thrown when you attempt to perform an operation that isn't enabled
2083
+ * for the user pool client.</p>
2084
+ * @public
2085
+ */
2086
+ export declare class UnsupportedOperationException extends __BaseException {
2087
+ readonly name: "UnsupportedOperationException";
2088
+ readonly $fault: "client";
2089
+ /**
2090
+ * @internal
2091
+ */
2092
+ constructor(opts: __ExceptionOptionType<UnsupportedOperationException, __BaseException>);
2093
+ }
2081
2094
  /**
2082
2095
  * <p>This exception is thrown when a user isn't confirmed successfully.</p>
2083
2096
  * @public
@@ -2622,8 +2635,8 @@ export declare const FeedbackValueType: {
2622
2635
  */
2623
2636
  export type FeedbackValueType = (typeof FeedbackValueType)[keyof typeof FeedbackValueType];
2624
2637
  /**
2625
- * <p>The feedback that your application submitted to a threat protection event
2626
- * log, as displayed in an <code>AdminListUserAuthEvents</code> response.</p>
2638
+ * <p>The feedback that your application submitted to a threat protection event log, as
2639
+ * displayed in an <code>AdminListUserAuthEvents</code> response.</p>
2627
2640
  * @public
2628
2641
  */
2629
2642
  export interface EventFeedbackType {
@@ -2732,7 +2745,8 @@ export declare const EventType: {
2732
2745
  */
2733
2746
  export type EventType = (typeof EventType)[keyof typeof EventType];
2734
2747
  /**
2735
- * <p>One authentication event that Amazon Cognito logged in a user pool with threat protection active. Contains user and device metadata and a risk assessment from your user
2748
+ * <p>One authentication event that Amazon Cognito logged in a user pool with threat protection
2749
+ * active. Contains user and device metadata and a risk assessment from your user
2736
2750
  * pool.</p>
2737
2751
  * @public
2738
2752
  */
@@ -5994,9 +6008,9 @@ export interface UsernameConfigurationType {
5994
6008
  */
5995
6009
  export interface UserPoolAddOnsType {
5996
6010
  /**
5997
- * <p>The operating mode of threat protection for standard authentication types in
5998
- * your user pool, including username-password and secure remote password (SRP)
5999
- * authentication. </p>
6011
+ * <p>The operating mode of threat protection for standard authentication types in your user
6012
+ * pool, including username-password and secure remote password (SRP) authentication.
6013
+ * </p>
6000
6014
  * @public
6001
6015
  */
6002
6016
  AdvancedSecurityMode: AdvancedSecurityModeType | undefined;
@@ -6665,6 +6679,41 @@ export declare const PreventUserExistenceErrorTypes: {
6665
6679
  * @public
6666
6680
  */
6667
6681
  export type PreventUserExistenceErrorTypes = (typeof PreventUserExistenceErrorTypes)[keyof typeof PreventUserExistenceErrorTypes];
6682
+ /**
6683
+ * @public
6684
+ * @enum
6685
+ */
6686
+ export declare const FeatureType: {
6687
+ readonly DISABLED: "DISABLED";
6688
+ readonly ENABLED: "ENABLED";
6689
+ };
6690
+ /**
6691
+ * @public
6692
+ */
6693
+ export type FeatureType = (typeof FeatureType)[keyof typeof FeatureType];
6694
+ /**
6695
+ * <p>The configuration of your app client for refresh token rotation. When enabled, your
6696
+ * app client issues new ID, access, and refresh tokens when users renew their sessions
6697
+ * with refresh tokens. When disabled, token refresh issues only ID and access
6698
+ * tokens.</p>
6699
+ * @public
6700
+ */
6701
+ export interface RefreshTokenRotationType {
6702
+ /**
6703
+ * <p>The state of refresh token rotation for the current app client.</p>
6704
+ * @public
6705
+ */
6706
+ Feature: FeatureType | undefined;
6707
+ /**
6708
+ * <p>When you request a token refresh with <code>GetTokensFromRefreshToken</code>, the
6709
+ * original refresh token that you're rotating out can remain valid for a period of time of
6710
+ * up to 60 seconds. This allows for client-side retries. When
6711
+ * <code>RetryGracePeriodSeconds</code> is <code>0</code>, the grace period is disabled
6712
+ * and a successful request immediately invalidates the submitted refresh token.</p>
6713
+ * @public
6714
+ */
6715
+ RetryGracePeriodSeconds?: number | undefined;
6716
+ }
6668
6717
  /**
6669
6718
  * @public
6670
6719
  * @enum
@@ -7059,6 +7108,14 @@ export interface CreateUserPoolClientRequest {
7059
7108
  * @public
7060
7109
  */
7061
7110
  AuthSessionValidity?: number | undefined;
7111
+ /**
7112
+ * <p>The configuration of your app client for refresh token rotation. When enabled, your
7113
+ * app client issues new ID, access, and refresh tokens when users renew their sessions
7114
+ * with refresh tokens. When disabled, token refresh issues only ID and access
7115
+ * tokens.</p>
7116
+ * @public
7117
+ */
7118
+ RefreshTokenRotation?: RefreshTokenRotationType | undefined;
7062
7119
  }
7063
7120
  /**
7064
7121
  * <p>The configuration of a user pool client.</p>
@@ -7411,9 +7468,9 @@ export interface UserPoolClientType {
7411
7468
  /**
7412
7469
  * <p>When <code>EnablePropagateAdditionalUserContextData</code> is true, Amazon Cognito accepts an
7413
7470
  * <code>IpAddress</code> value that you send in the <code>UserContextData</code>
7414
- * parameter. The <code>UserContextData</code> parameter sends information to Amazon Cognito
7415
- * threat protection for risk analysis. You can send <code>UserContextData</code> when you
7416
- * sign in Amazon Cognito native users with the <code>InitiateAuth</code> and
7471
+ * parameter. The <code>UserContextData</code> parameter sends information to Amazon Cognito threat
7472
+ * protection for risk analysis. You can send <code>UserContextData</code> when you sign in
7473
+ * Amazon Cognito native users with the <code>InitiateAuth</code> and
7417
7474
  * <code>RespondToAuthChallenge</code> API operations.</p>
7418
7475
  * <p>When <code>EnablePropagateAdditionalUserContextData</code> is false, you can't send
7419
7476
  * your user's source IP address to Amazon Cognito threat protection with unauthenticated API
@@ -7433,6 +7490,14 @@ export interface UserPoolClientType {
7433
7490
  * @public
7434
7491
  */
7435
7492
  AuthSessionValidity?: number | undefined;
7493
+ /**
7494
+ * <p>The configuration of your app client for refresh token rotation. When enabled, your
7495
+ * app client issues new ID, access, and refresh tokens when users renew their sessions
7496
+ * with refresh tokens. When disabled, token refresh issues only ID and access
7497
+ * tokens.</p>
7498
+ * @public
7499
+ */
7500
+ RefreshTokenRotation?: RefreshTokenRotationType | undefined;
7436
7501
  }
7437
7502
  /**
7438
7503
  * <p>Represents the response from the server to create a user pool client.</p>
@@ -7880,8 +7945,8 @@ export declare const CompromisedCredentialsEventActionType: {
7880
7945
  */
7881
7946
  export type CompromisedCredentialsEventActionType = (typeof CompromisedCredentialsEventActionType)[keyof typeof CompromisedCredentialsEventActionType];
7882
7947
  /**
7883
- * <p>Settings for user pool actions when Amazon Cognito detects compromised credentials with
7884
- * threat protection in full-function <code>ENFORCED</code> mode.</p>
7948
+ * <p>Settings for user pool actions when Amazon Cognito detects compromised credentials with threat
7949
+ * protection in full-function <code>ENFORCED</code> mode.</p>
7885
7950
  * @public
7886
7951
  */
7887
7952
  export interface CompromisedCredentialsActionsType {
@@ -7943,7 +8008,8 @@ export interface RiskExceptionConfigurationType {
7943
8008
  SkippedIPRangeList?: string[] | undefined;
7944
8009
  }
7945
8010
  /**
7946
- * <p>The settings of risk configuration for threat protection with threat protection in a user pool.</p>
8011
+ * <p>The settings of risk configuration for threat protection with threat protection in a
8012
+ * user pool.</p>
7947
8013
  * @public
7948
8014
  */
7949
8015
  export interface RiskConfigurationType {
@@ -7960,7 +8026,8 @@ export interface RiskConfigurationType {
7960
8026
  */
7961
8027
  ClientId?: string | undefined;
7962
8028
  /**
7963
- * <p>Settings for compromised-credentials actions and authentication types with threat protection in full-function <code>ENFORCED</code> mode.</p>
8029
+ * <p>Settings for compromised-credentials actions and authentication types with threat
8030
+ * protection in full-function <code>ENFORCED</code> mode.</p>
7964
8031
  * @public
7965
8032
  */
7966
8033
  CompromisedCredentialsRiskConfiguration?: CompromisedCredentialsRiskConfigurationType | undefined;
@@ -8462,7 +8529,8 @@ export type EventSourceName = (typeof EventSourceName)[keyof typeof EventSourceN
8462
8529
  */
8463
8530
  export interface FirehoseConfigurationType {
8464
8531
  /**
8465
- * <p>The ARN of an Amazon Data Firehose stream that's the destination for threat protection log export.</p>
8532
+ * <p>The ARN of an Amazon Data Firehose stream that's the destination for threat protection log
8533
+ * export.</p>
8466
8534
  * @public
8467
8535
  */
8468
8536
  StreamArn?: string | undefined;
@@ -8480,14 +8548,14 @@ export declare const LogLevel: {
8480
8548
  */
8481
8549
  export type LogLevel = (typeof LogLevel)[keyof typeof LogLevel];
8482
8550
  /**
8483
- * <p>Configuration for the Amazon S3 bucket destination of user activity log export with
8484
- * threat protection.</p>
8551
+ * <p>Configuration for the Amazon S3 bucket destination of user activity log export with threat
8552
+ * protection.</p>
8485
8553
  * @public
8486
8554
  */
8487
8555
  export interface S3ConfigurationType {
8488
8556
  /**
8489
- * <p>The ARN of an Amazon S3 bucket that's the destination for threat protection
8490
- * log export.</p>
8557
+ * <p>The ARN of an Amazon S3 bucket that's the destination for threat protection log
8558
+ * export.</p>
8491
8559
  * @public
8492
8560
  */
8493
8561
  BucketArn?: string | undefined;
@@ -8524,13 +8592,15 @@ export interface LogConfigurationType {
8524
8592
  */
8525
8593
  CloudWatchLogsConfiguration?: CloudWatchLogsConfigurationType | undefined;
8526
8594
  /**
8527
- * <p>The Amazon S3 bucket destination of user activity log export with threat protection. To activate this setting, your user pool must be on the <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html">
8595
+ * <p>The Amazon S3 bucket destination of user activity log export with threat protection.
8596
+ * To activate this setting, your user pool must be on the <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html">
8528
8597
  * Plus tier</a>.</p>
8529
8598
  * @public
8530
8599
  */
8531
8600
  S3Configuration?: S3ConfigurationType | undefined;
8532
8601
  /**
8533
- * <p>The Amazon Data Firehose stream destination of user activity log export with threat protection. To activate this setting, your user pool must be on the <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html">
8602
+ * <p>The Amazon Data Firehose stream destination of user activity log export with threat protection.
8603
+ * To activate this setting, your user pool must be on the <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html">
8534
8604
  * Plus tier</a>.</p>
8535
8605
  * @public
8536
8606
  */
@@ -8588,6 +8658,95 @@ export interface GetSigningCertificateResponse {
8588
8658
  */
8589
8659
  Certificate?: string | undefined;
8590
8660
  }
8661
+ /**
8662
+ * @public
8663
+ */
8664
+ export interface GetTokensFromRefreshTokenRequest {
8665
+ /**
8666
+ * <p>A valid refresh token that can authorize the request for new tokens. When refresh
8667
+ * token rotation is active in the requested app client, this token is invalidated after
8668
+ * the request is complete.</p>
8669
+ * @public
8670
+ */
8671
+ RefreshToken: string | undefined;
8672
+ /**
8673
+ * <p>The app client that issued the refresh token to the user who wants to request new
8674
+ * tokens.</p>
8675
+ * @public
8676
+ */
8677
+ ClientId: string | undefined;
8678
+ /**
8679
+ * <p>The client secret of the requested app client, if the client has a secret.</p>
8680
+ * @public
8681
+ */
8682
+ ClientSecret?: string | undefined;
8683
+ /**
8684
+ * <p>When you enable device remembering, Amazon Cognito issues a device key that you can use for
8685
+ * device authentication that bypasses multi-factor authentication (MFA). To implement
8686
+ * <code>GetTokensFromRefreshToken</code> in a user pool with device remembering, you
8687
+ * must capture the device key from the initial authentication request. If your application
8688
+ * doesn't provide the key of a registered device, Amazon Cognito issues a new one. You must
8689
+ * provide the confirmed device key in this request if device remembering is
8690
+ * enabled in your user pool.</p>
8691
+ * <p>For more information about device remembering, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html">Working with devices</a>.</p>
8692
+ * @public
8693
+ */
8694
+ DeviceKey?: string | undefined;
8695
+ /**
8696
+ * <p>A map of custom key-value pairs that you can provide as input for certain custom
8697
+ * workflows that this action triggers.</p>
8698
+ * <p>You create custom workflows by assigning Lambda functions to user pool triggers.
8699
+ * When you use the <code>GetTokensFromRefreshToken</code> API action, Amazon Cognito invokes the
8700
+ * Lambda function the pre token generation trigger.</p>
8701
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-identity-pools-working-with-aws-lambda-triggers.html">
8702
+ * Using Lambda triggers</a> in the <i>Amazon Cognito Developer Guide</i>.</p>
8703
+ * <note>
8704
+ * <p>When you use the <code>ClientMetadata</code> parameter, note that Amazon Cognito won't do the
8705
+ * following:</p>
8706
+ * <ul>
8707
+ * <li>
8708
+ * <p>Store the <code>ClientMetadata</code> value. This data is available only
8709
+ * to Lambda triggers that are assigned to a user pool to support custom
8710
+ * workflows. If your user pool configuration doesn't include triggers, the
8711
+ * <code>ClientMetadata</code> parameter serves no purpose.</p>
8712
+ * </li>
8713
+ * <li>
8714
+ * <p>Validate the <code>ClientMetadata</code> value.</p>
8715
+ * </li>
8716
+ * <li>
8717
+ * <p>Encrypt the <code>ClientMetadata</code> value. Don't send sensitive
8718
+ * information in this parameter.</p>
8719
+ * </li>
8720
+ * </ul>
8721
+ * </note>
8722
+ * @public
8723
+ */
8724
+ ClientMetadata?: Record<string, string> | undefined;
8725
+ }
8726
+ /**
8727
+ * @public
8728
+ */
8729
+ export interface GetTokensFromRefreshTokenResponse {
8730
+ /**
8731
+ * <p>The object that your application receives after authentication. Contains tokens and
8732
+ * information for device authentication.</p>
8733
+ * @public
8734
+ */
8735
+ AuthenticationResult?: AuthenticationResultType | undefined;
8736
+ }
8737
+ /**
8738
+ * <p>This exception is throw when your application requests token refresh with a refresh
8739
+ * token that has been invalidated by refresh-token rotation.</p>
8740
+ * @public
8741
+ */
8742
+ export declare class RefreshTokenReuseException extends __BaseException {
8743
+ readonly name: "RefreshTokenReuseException";
8744
+ readonly $fault: "client";
8745
+ /**
8746
+ * @internal
8747
+ */
8748
+ constructor(opts: __ExceptionOptionType<RefreshTokenReuseException, __BaseException>);
8749
+ }
8591
8750
  /**
8592
8751
  * @public
8593
8752
  */
@@ -8779,116 +8938,6 @@ export interface GetUserAttributeVerificationCodeResponse {
8779
8938
  */
8780
8939
  CodeDeliveryDetails?: CodeDeliveryDetailsType | undefined;
8781
8940
  }
8782
- /**
8783
- * @public
8784
- */
8785
- export interface GetUserAuthFactorsRequest {
8786
- /**
8787
- * <p>A valid access token that Amazon Cognito issued to the currently signed-in user. Must include a scope claim for
8788
- * <code>aws.cognito.signin.user.admin</code>.</p>
8789
- * @public
8790
- */
8791
- AccessToken: string | undefined;
8792
- }
8793
- /**
8794
- * @public
8795
- */
8796
- export interface GetUserAuthFactorsResponse {
8797
- /**
8798
- * <p>The name of the user who is eligible for the authentication factors in the
8799
- * response.</p>
8800
- * @public
8801
- */
8802
- Username: string | undefined;
8803
- /**
8804
- * <p>The challenge method that Amazon Cognito returns to the user in response to sign-in requests.
8805
- * Users can prefer SMS message, email message, or TOTP MFA.</p>
8806
- * @public
8807
- */
8808
- PreferredMfaSetting?: string | undefined;
8809
- /**
8810
- * <p>The MFA options that are activated for the user. The possible values in this list are
8811
- * <code>SMS_MFA</code>, <code>EMAIL_OTP</code>, and
8812
- * <code>SOFTWARE_TOKEN_MFA</code>.</p>
8813
- * @public
8814
- */
8815
- UserMFASettingList?: string[] | undefined;
8816
- /**
8817
- * <p>The authentication types that are available to the user with <code>USER_AUTH</code>
8818
- * sign-in, for example <code>["PASSWORD", "WEB_AUTHN"]</code>.</p>
8819
- * @public
8820
- */
8821
- ConfiguredUserAuthFactors?: AuthFactorType[] | undefined;
8822
- }
8823
- /**
8824
- * @public
8825
- */
8826
- export interface GetUserPoolMfaConfigRequest {
8827
- /**
8828
- * <p>The ID of the user pool where you want to query WebAuthn and MFA configuration.</p>
8829
- * @public
8830
- */
8831
- UserPoolId: string | undefined;
8832
- }
8833
- /**
8834
- * <p>Sets or shows configuration for user pool email message MFA and sign-in with one-time
8835
- * passwords (OTPs). Includes the subject and body of the email message template for
8836
- * sign-in and MFA messages. To activate this setting, your user pool must be in the <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-essentials.html">
8837
- * Essentials tier</a> or higher.</p>
8838
- * @public
8839
- */
8840
- export interface EmailMfaConfigType {
8841
- /**
8842
- * <p>The template for the email messages that your user pool sends to users with codes for
8843
- * MFA and sign-in with email OTPs. The message must contain the <code>\{####\}</code>
8844
- * placeholder. In the message, Amazon Cognito replaces this placeholder with the code. If you
8845
- * don't provide this parameter, Amazon Cognito sends messages in the default format.</p>
8846
- * @public
8847
- */
8848
- Message?: string | undefined;
8849
- /**
8850
- * <p>The subject of the email messages that your user pool sends to users with codes for
8851
- * MFA and email OTP sign-in.</p>
8852
- * @public
8853
- */
8854
- Subject?: string | undefined;
8855
- }
8856
- /**
8857
- * <p>The configuration of multi-factor authentication (MFA) with SMS messages in a user
8858
- * pool.</p>
8859
- * @public
8860
- */
8861
- export interface SmsMfaConfigType {
8862
- /**
8863
- * <p>The SMS authentication message that will be sent to users with the code they must sign
8864
- * in with. The message must contain the <code>\{####\}</code> placeholder. Your user pool
8865
- * replaces the placeholder with the MFA code. If this parameter isn't provided, your user
8866
- * pool sends a default message.</p>
8867
- * @public
8868
- */
8869
- SmsAuthenticationMessage?: string | undefined;
8870
- /**
8871
- * <p>User pool configuration for delivery of SMS messages with Amazon Simple Notification Service. To send SMS
8872
- * messages with Amazon SNS in the Amazon Web Services Region that you want, the Amazon Cognito user pool uses an
8873
- * Identity and Access Management (IAM) role in your Amazon Web Services account.</p>
8874
- * <p>You can set <code>SmsConfiguration</code> in <code>CreateUserPool</code> and <code>
8875
- * UpdateUserPool</code>, or in <code>SetUserPoolMfaConfig</code>.</p>
8876
- * @public
8877
- */
8878
- SmsConfiguration?: SmsConfigurationType | undefined;
8879
- }
8880
- /**
8881
- * <p>Settings for time-based one-time password (TOTP) multi-factor authentication (MFA) in
8882
- * a user pool. Enables and disables availability of this feature.</p>
8883
- * @public
8884
- */
8885
- export interface SoftwareTokenMfaConfigType {
8886
- /**
8887
- * <p>The activation state of TOTP MFA.</p>
8888
- * @public
8889
- */
8890
- Enabled?: boolean | undefined;
8891
- }
8892
8941
  /**
8893
8942
  * @internal
8894
8943
  */
@@ -9132,32 +9181,32 @@ export declare const GetDeviceResponseFilterSensitiveLog: (obj: GetDeviceRespons
9132
9181
  /**
9133
9182
  * @internal
9134
9183
  */
9135
- export declare const GetUICustomizationRequestFilterSensitiveLog: (obj: GetUICustomizationRequest) => any;
9184
+ export declare const GetTokensFromRefreshTokenRequestFilterSensitiveLog: (obj: GetTokensFromRefreshTokenRequest) => any;
9136
9185
  /**
9137
9186
  * @internal
9138
9187
  */
9139
- export declare const UICustomizationTypeFilterSensitiveLog: (obj: UICustomizationType) => any;
9188
+ export declare const GetTokensFromRefreshTokenResponseFilterSensitiveLog: (obj: GetTokensFromRefreshTokenResponse) => any;
9140
9189
  /**
9141
9190
  * @internal
9142
9191
  */
9143
- export declare const GetUICustomizationResponseFilterSensitiveLog: (obj: GetUICustomizationResponse) => any;
9192
+ export declare const GetUICustomizationRequestFilterSensitiveLog: (obj: GetUICustomizationRequest) => any;
9144
9193
  /**
9145
9194
  * @internal
9146
9195
  */
9147
- export declare const GetUserRequestFilterSensitiveLog: (obj: GetUserRequest) => any;
9196
+ export declare const UICustomizationTypeFilterSensitiveLog: (obj: UICustomizationType) => any;
9148
9197
  /**
9149
9198
  * @internal
9150
9199
  */
9151
- export declare const GetUserResponseFilterSensitiveLog: (obj: GetUserResponse) => any;
9200
+ export declare const GetUICustomizationResponseFilterSensitiveLog: (obj: GetUICustomizationResponse) => any;
9152
9201
  /**
9153
9202
  * @internal
9154
9203
  */
9155
- export declare const GetUserAttributeVerificationCodeRequestFilterSensitiveLog: (obj: GetUserAttributeVerificationCodeRequest) => any;
9204
+ export declare const GetUserRequestFilterSensitiveLog: (obj: GetUserRequest) => any;
9156
9205
  /**
9157
9206
  * @internal
9158
9207
  */
9159
- export declare const GetUserAuthFactorsRequestFilterSensitiveLog: (obj: GetUserAuthFactorsRequest) => any;
9208
+ export declare const GetUserResponseFilterSensitiveLog: (obj: GetUserResponse) => any;
9160
9209
  /**
9161
9210
  * @internal
9162
9211
  */
9163
- export declare const GetUserAuthFactorsResponseFilterSensitiveLog: (obj: GetUserAuthFactorsResponse) => any;
9212
+ export declare const GetUserAttributeVerificationCodeRequestFilterSensitiveLog: (obj: GetUserAttributeVerificationCodeRequest) => any;