@aws-sdk/client-cognito-identity-provider 3.864.0 → 3.872.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/README.md +40 -0
  2. package/dist-cjs/auth/httpAuthSchemeProvider.js +4 -0
  3. package/dist-cjs/index.js +361 -58
  4. package/dist-es/CognitoIdentityProvider.js +10 -0
  5. package/dist-es/auth/httpAuthSchemeProvider.js +4 -0
  6. package/dist-es/commands/CreateTermsCommand.js +23 -0
  7. package/dist-es/commands/DeleteTermsCommand.js +22 -0
  8. package/dist-es/commands/DescribeTermsCommand.js +23 -0
  9. package/dist-es/commands/GetTokensFromRefreshTokenCommand.js +2 -1
  10. package/dist-es/commands/GetUICustomizationCommand.js +1 -1
  11. package/dist-es/commands/GetUserAttributeVerificationCodeCommand.js +1 -1
  12. package/dist-es/commands/GetUserCommand.js +1 -1
  13. package/dist-es/commands/ListTermsCommand.js +22 -0
  14. package/dist-es/commands/UpdateTermsCommand.js +23 -0
  15. package/dist-es/commands/index.js +5 -0
  16. package/dist-es/models/models_0.js +34 -45
  17. package/dist-es/models/models_1.js +50 -1
  18. package/dist-es/protocols/Aws_json1_1.js +157 -2
  19. package/dist-types/CognitoIdentityProvider.d.ts +35 -0
  20. package/dist-types/CognitoIdentityProviderClient.d.ts +7 -2
  21. package/dist-types/commands/AdminResetUserPasswordCommand.d.ts +6 -2
  22. package/dist-types/commands/CreateManagedLoginBrandingCommand.d.ts +1 -1
  23. package/dist-types/commands/CreateTermsCommand.d.ts +151 -0
  24. package/dist-types/commands/DeleteTermsCommand.d.ts +113 -0
  25. package/dist-types/commands/DescribeTermsCommand.d.ts +123 -0
  26. package/dist-types/commands/ForgotPasswordCommand.d.ts +6 -3
  27. package/dist-types/commands/GetTokensFromRefreshTokenCommand.d.ts +2 -1
  28. package/dist-types/commands/GetUICustomizationCommand.d.ts +1 -1
  29. package/dist-types/commands/GetUserAttributeVerificationCodeCommand.d.ts +1 -1
  30. package/dist-types/commands/GetUserCommand.d.ts +1 -1
  31. package/dist-types/commands/ListTermsCommand.d.ts +121 -0
  32. package/dist-types/commands/UpdateAuthEventFeedbackCommand.d.ts +1 -1
  33. package/dist-types/commands/UpdateManagedLoginBrandingCommand.d.ts +1 -1
  34. package/dist-types/commands/UpdateTermsCommand.d.ts +147 -0
  35. package/dist-types/commands/index.d.ts +5 -0
  36. package/dist-types/models/models_0.d.ts +485 -366
  37. package/dist-types/models/models_1.d.ts +600 -119
  38. package/dist-types/protocols/Aws_json1_1.d.ts +45 -0
  39. package/dist-types/ts3.4/CognitoIdentityProvider.d.ts +85 -0
  40. package/dist-types/ts3.4/CognitoIdentityProviderClient.d.ts +30 -0
  41. package/dist-types/ts3.4/commands/CreateTermsCommand.d.ts +47 -0
  42. package/dist-types/ts3.4/commands/DeleteTermsCommand.d.ts +45 -0
  43. package/dist-types/ts3.4/commands/DescribeTermsCommand.d.ts +50 -0
  44. package/dist-types/ts3.4/commands/GetTokensFromRefreshTokenCommand.d.ts +2 -4
  45. package/dist-types/ts3.4/commands/GetUICustomizationCommand.d.ts +1 -1
  46. package/dist-types/ts3.4/commands/GetUserAttributeVerificationCodeCommand.d.ts +1 -1
  47. package/dist-types/ts3.4/commands/GetUserCommand.d.ts +1 -1
  48. package/dist-types/ts3.4/commands/ListTermsCommand.d.ts +47 -0
  49. package/dist-types/ts3.4/commands/UpdateTermsCommand.d.ts +47 -0
  50. package/dist-types/ts3.4/commands/index.d.ts +5 -0
  51. package/dist-types/ts3.4/models/models_0.d.ts +60 -65
  52. package/dist-types/ts3.4/models/models_1.d.ts +98 -1
  53. package/dist-types/ts3.4/protocols/Aws_json1_1.d.ts +60 -0
  54. package/package.json +2 -2
@@ -1660,39 +1660,83 @@ export interface AdminInitiateAuthRequest {
1660
1660
  AuthFlow: AuthFlowType | undefined;
1661
1661
  /**
1662
1662
  * <p>The authentication parameters. These are inputs corresponding to the
1663
- * <code>AuthFlow</code> that you're invoking. The required values depend on the value
1664
- * of <code>AuthFlow</code> for example:</p>
1665
- * <ul>
1666
- * <li>
1667
- * <p>For <code>USER_AUTH</code>: <code>USERNAME</code> (required),
1668
- * <code>PREFERRED_CHALLENGE</code>. If you don't provide a value for
1669
- * <code>PREFERRED_CHALLENGE</code>, Amazon Cognito responds with the
1670
- * <code>AvailableChallenges</code> parameter that specifies the available
1671
- * sign-in methods.</p>
1672
- * </li>
1673
- * <li>
1674
- * <p>For <code>USER_SRP_AUTH</code>: <code>USERNAME</code> (required),
1675
- * <code>SRP_A</code> (required), <code>SECRET_HASH</code> (required if the app
1676
- * client is configured with a client secret), <code>DEVICE_KEY</code>.</p>
1677
- * </li>
1678
- * <li>
1679
- * <p>For <code>ADMIN_USER_PASSWORD_AUTH</code>: <code>USERNAME</code> (required),
1680
- * <code>PASSWORD</code> (required), <code>SECRET_HASH</code> (required if the
1681
- * app client is configured with a client secret), <code>DEVICE_KEY</code>.</p>
1682
- * </li>
1683
- * <li>
1684
- * <p>For <code>REFRESH_TOKEN_AUTH/REFRESH_TOKEN</code>: <code>REFRESH_TOKEN</code>
1685
- * (required), <code>SECRET_HASH</code> (required if the app client is configured
1686
- * with a client secret), <code>DEVICE_KEY</code>.</p>
1687
- * </li>
1688
- * <li>
1689
- * <p>For <code>CUSTOM_AUTH</code>: <code>USERNAME</code> (required),
1690
- * <code>SECRET_HASH</code> (if app client is configured with client secret),
1691
- * <code>DEVICE_KEY</code>. To start the authentication flow with password
1692
- * verification, include <code>ChallengeName: SRP_A</code> and <code>SRP_A: (The
1693
- * SRP_A Value)</code>.</p>
1694
- * </li>
1695
- * </ul>
1663
+ * <code>AuthFlow</code> that you're invoking.</p>
1664
+ * <p>The following are some authentication flows and their parameters. Add a
1665
+ * <code>SECRET_HASH</code> parameter if your app client has a client secret. Add
1666
+ * <code>DEVICE_KEY</code> if you want to bypass multi-factor authentication with a
1667
+ * remembered device. </p>
1668
+ * <dl>
1669
+ * <dt>USER_AUTH</dt>
1670
+ * <dd>
1671
+ * <ul>
1672
+ * <li>
1673
+ * <p>
1674
+ * <code>USERNAME</code> (required)</p>
1675
+ * </li>
1676
+ * <li>
1677
+ * <p>
1678
+ * <code>PREFERRED_CHALLENGE</code>. If you don't provide a
1679
+ * value for <code>PREFERRED_CHALLENGE</code>, Amazon Cognito responds with the
1680
+ * <code>AvailableChallenges</code> parameter that specifies the
1681
+ * available sign-in methods.</p>
1682
+ * </li>
1683
+ * </ul>
1684
+ * </dd>
1685
+ * <dt>USER_SRP_AUTH</dt>
1686
+ * <dd>
1687
+ * <ul>
1688
+ * <li>
1689
+ * <p>
1690
+ * <code>USERNAME</code> (required)</p>
1691
+ * </li>
1692
+ * <li>
1693
+ * <p>
1694
+ * <code>SRP_A</code> (required)</p>
1695
+ * </li>
1696
+ * </ul>
1697
+ * </dd>
1698
+ * <dt>ADMIN_USER_PASSWORD_AUTH</dt>
1699
+ * <dd>
1700
+ * <ul>
1701
+ * <li>
1702
+ * <p>
1703
+ * <code>USERNAME</code> (required)</p>
1704
+ * </li>
1705
+ * <li>
1706
+ * <p>
1707
+ * <code>PASSWORD</code> (required)</p>
1708
+ * </li>
1709
+ * </ul>
1710
+ * </dd>
1711
+ * <dt>REFRESH_TOKEN_AUTH/REFRESH_TOKEN</dt>
1712
+ * <dd>
1713
+ * <ul>
1714
+ * <li>
1715
+ * <p>
1716
+ * <code>REFRESH_TOKEN</code>(required)</p>
1717
+ * </li>
1718
+ * </ul>
1719
+ * </dd>
1720
+ * <dt>CUSTOM_AUTH</dt>
1721
+ * <dd>
1722
+ * <ul>
1723
+ * <li>
1724
+ * <p>
1725
+ * <code>USERNAME</code> (required)</p>
1726
+ * </li>
1727
+ * <li>
1728
+ * <p>
1729
+ * <code>ChallengeName: SRP_A</code> (when preceding custom
1730
+ * authentication with SRP authentication)</p>
1731
+ * </li>
1732
+ * <li>
1733
+ * <p>
1734
+ * <code>SRP_A: (An SRP_A value)</code> (when preceding custom
1735
+ * authentication with SRP authentication)</p>
1736
+ * </li>
1737
+ * </ul>
1738
+ * </dd>
1739
+ * </dl>
1696
1740
  * <p>For more information about <code>SECRET_HASH</code>, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/signing-up-users-in-your-app.html#cognito-user-pools-computing-secret-hash">Computing secret hash values</a>. For information about
1697
1741
  * <code>DEVICE_KEY</code>, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html">Working with user devices in your user pool</a>.</p>
1698
1742
  * @public
@@ -1893,59 +1937,66 @@ export interface AdminInitiateAuthResponse {
1893
1937
  * <p>Possible challenges include the following:</p>
1894
1938
  * <note>
1895
1939
  * <p>All of the following challenges require <code>USERNAME</code> and, when the app
1896
- * client has a client secret, <code>SECRET_HASH</code> in the parameters.</p>
1940
+ * client has a client secret, <code>SECRET_HASH</code> in the parameters. Include a
1941
+ * <code>DEVICE_KEY</code> for device authentication.</p>
1897
1942
  * </note>
1898
1943
  * <ul>
1899
1944
  * <li>
1900
1945
  * <p>
1901
1946
  * <code>WEB_AUTHN</code>: Respond to the challenge with the results of a
1902
- * successful authentication with a WebAuthn authenticator, or passkey. Examples
1903
- * of WebAuthn authenticators include biometric devices and security keys.</p>
1947
+ * successful authentication with a WebAuthn authenticator, or passkey, as
1948
+ * <code>CREDENTIAL</code>. Examples of WebAuthn authenticators include
1949
+ * biometric devices and security keys.</p>
1950
+ * </li>
1951
+ * <li>
1952
+ * <p>
1953
+ * <code>PASSWORD</code>: Respond with the user's password as <code>PASSWORD</code>.</p>
1904
1954
  * </li>
1905
1955
  * <li>
1906
1956
  * <p>
1907
- * <code>PASSWORD</code>: Respond with <code>USER_PASSWORD_AUTH</code>
1908
- * parameters: <code>USERNAME</code> (required), <code>PASSWORD</code> (required),
1909
- * <code>SECRET_HASH</code> (required if the app client is configured with a
1910
- * client secret), <code>DEVICE_KEY</code>.</p>
1957
+ * <code>PASSWORD_SRP</code>: Respond with the initial SRP secret as <code>SRP_A</code>.</p>
1911
1958
  * </li>
1912
1959
  * <li>
1913
1960
  * <p>
1914
- * <code>PASSWORD_SRP</code>: Respond with <code>USER_SRP_AUTH</code> parameters:
1915
- * <code>USERNAME</code> (required), <code>SRP_A</code> (required),
1916
- * <code>SECRET_HASH</code> (required if the app client is configured with a
1917
- * client secret), <code>DEVICE_KEY</code>.</p>
1961
+ * <code>SELECT_CHALLENGE</code>: Respond with a challenge selection as <code>ANSWER</code>.
1962
+ * It must be one of the challenge types in the <code>AvailableChallenges</code> response
1963
+ * parameter. Add the parameters of the selected challenge, for example <code>USERNAME</code>
1964
+ * and <code>SMS_OTP</code>.</p>
1918
1965
  * </li>
1919
1966
  * <li>
1920
1967
  * <p>
1921
- * <code>SELECT_CHALLENGE</code>: Respond to the challenge with
1922
- * <code>USERNAME</code> and an <code>ANSWER</code> that matches one of the
1923
- * challenge types in the <code>AvailableChallenges</code> response
1924
- * parameter.</p>
1968
+ * <code>SMS_MFA</code>: Respond with the code that your user pool delivered in an SMS
1969
+ * message, as <code>SMS_MFA_CODE</code>
1970
+ * </p>
1925
1971
  * </li>
1926
1972
  * <li>
1927
1973
  * <p>
1928
- * <code>SMS_MFA</code>: Respond with an
1929
- * <code>SMS_MFA_CODE</code> that your user pool delivered in an SMS message.</p>
1974
+ * <code>EMAIL_MFA</code>: Respond with the code that your user pool delivered in an email
1975
+ * message, as <code>EMAIL_MFA_CODE</code>
1976
+ * </p>
1930
1977
  * </li>
1931
1978
  * <li>
1932
1979
  * <p>
1933
- * <code>EMAIL_OTP</code>: Respond with an
1934
- * <code>EMAIL_OTP_CODE</code> that your user pool delivered in an email
1935
- * message.</p>
1980
+ * <code>EMAIL_OTP</code>: Respond with the code that your user pool delivered in an email
1981
+ * message, as <code>EMAIL_OTP_CODE</code> .</p>
1936
1982
  * </li>
1937
1983
  * <li>
1938
1984
  * <p>
1939
- * <code>PASSWORD_VERIFIER</code>: Respond with
1940
- * <code>PASSWORD_CLAIM_SIGNATURE</code>,
1941
- * <code>PASSWORD_CLAIM_SECRET_BLOCK</code>, and <code>TIMESTAMP</code> after
1942
- * client-side SRP calculations.</p>
1985
+ * <code>SMS_OTP</code>: Respond with the code that your user pool delivered in an SMS
1986
+ * message, as <code>SMS_OTP_CODE</code>.</p>
1987
+ * </li>
1988
+ * <li>
1989
+ * <p>
1990
+ * <code>PASSWORD_VERIFIER</code>: Respond with the second stage of SRP secrets as
1991
+ * <code>PASSWORD_CLAIM_SIGNATURE</code>, <code>PASSWORD_CLAIM_SECRET_BLOCK</code>,
1992
+ * and <code>TIMESTAMP</code>.</p>
1943
1993
  * </li>
1944
1994
  * <li>
1945
1995
  * <p>
1946
1996
  * <code>CUSTOM_CHALLENGE</code>: This is returned if your custom authentication
1947
1997
  * flow determines that the user should pass another challenge before tokens are
1948
- * issued. The parameters of the challenge are determined by your Lambda function.</p>
1998
+ * issued. The parameters of the challenge are determined by your Lambda function
1999
+ * and issued in the <code>ChallengeParameters</code> of a challenge response.</p>
1949
2000
  * </li>
1950
2001
  * <li>
1951
2002
  * <p>
@@ -2467,6 +2518,32 @@ export type ChallengeResponse = (typeof ChallengeResponse)[keyof typeof Challeng
2467
2518
  * </li>
2468
2519
  * </ul>
2469
2520
  * </dd>
2521
+ * <dt>WEB_AUTHN</dt>
2522
+ * <dd>
2523
+ * <p>
2524
+ * <code>"ChallengeName": "WEB_AUTHN", "ChallengeResponses": \{
2525
+ * "USERNAME": "[username]",
2526
+ * "CREDENTIAL": "[AuthenticationResponseJSON]"\}</code>
2527
+ * </p>
2528
+ * <p>See <a href="https://www.w3.org/TR/WebAuthn-3/#dictdef-authenticationresponsejson">
2529
+ * AuthenticationResponseJSON</a>.</p>
2530
+ * </dd>
2531
+ * <dt>PASSWORD</dt>
2532
+ * <dd>
2533
+ * <p>
2534
+ * <code>"ChallengeName": "PASSWORD", "ChallengeResponses": \{
2535
+ * "USERNAME": "[username]",
2536
+ * "PASSWORD": "[password]"\}</code>
2537
+ * </p>
2538
+ * </dd>
2539
+ * <dt>PASSWORD_SRP</dt>
2540
+ * <dd>
2541
+ * <p>
2542
+ * <code>"ChallengeName": "PASSWORD_SRP", "ChallengeResponses": \{
2543
+ * "USERNAME": "[username]",
2544
+ * "SRP_A": "[SRP_A]"\}</code>
2545
+ * </p>
2546
+ * </dd>
2470
2547
  * <dt>SMS_OTP</dt>
2471
2548
  * <dd>
2472
2549
  * <p>
@@ -2500,8 +2577,6 @@ export type ChallengeResponse = (typeof ChallengeResponse)[keyof typeof Challeng
2500
2577
  * "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
2501
2578
  * [timestamp], "USERNAME": "[username]"\}</code>
2502
2579
  * </p>
2503
- * <p>Add <code>"DEVICE_KEY"</code> when you sign in with a remembered
2504
- * device.</p>
2505
2580
  * </dd>
2506
2581
  * <dt>CUSTOM_CHALLENGE</dt>
2507
2582
  * <dd>
@@ -2509,8 +2584,6 @@ export type ChallengeResponse = (typeof ChallengeResponse)[keyof typeof Challeng
2509
2584
  * <code>"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
2510
2585
  * \{"USERNAME": "[username]", "ANSWER": "[challenge_answer]"\}</code>
2511
2586
  * </p>
2512
- * <p>Add <code>"DEVICE_KEY"</code> when you sign in with a remembered
2513
- * device.</p>
2514
2587
  * </dd>
2515
2588
  * <dt>NEW_PASSWORD_REQUIRED</dt>
2516
2589
  * <dd>
@@ -2568,7 +2641,7 @@ export type ChallengeResponse = (typeof ChallengeResponse)[keyof typeof Challeng
2568
2641
  * <dd>
2569
2642
  * <p>
2570
2643
  * <code>"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses": \{"USERNAME":
2571
- * "[username]", "ANSWER": "[SMS_MFA or SOFTWARE_TOKEN_MFA]"\}</code>
2644
+ * "[username]", "ANSWER": "[SMS_MFA|EMAIL_MFA|SOFTWARE_TOKEN_MFA]"\}</code>
2572
2645
  * </p>
2573
2646
  * </dd>
2574
2647
  * </dl>
@@ -2942,59 +3015,66 @@ export interface AdminRespondToAuthChallengeRequest {
2942
3015
  * <p>Possible challenges include the following:</p>
2943
3016
  * <note>
2944
3017
  * <p>All of the following challenges require <code>USERNAME</code> and, when the app
2945
- * client has a client secret, <code>SECRET_HASH</code> in the parameters.</p>
3018
+ * client has a client secret, <code>SECRET_HASH</code> in the parameters. Include a
3019
+ * <code>DEVICE_KEY</code> for device authentication.</p>
2946
3020
  * </note>
2947
3021
  * <ul>
2948
3022
  * <li>
2949
3023
  * <p>
2950
3024
  * <code>WEB_AUTHN</code>: Respond to the challenge with the results of a
2951
- * successful authentication with a WebAuthn authenticator, or passkey. Examples
2952
- * of WebAuthn authenticators include biometric devices and security keys.</p>
3025
+ * successful authentication with a WebAuthn authenticator, or passkey, as
3026
+ * <code>CREDENTIAL</code>. Examples of WebAuthn authenticators include
3027
+ * biometric devices and security keys.</p>
2953
3028
  * </li>
2954
3029
  * <li>
2955
3030
  * <p>
2956
- * <code>PASSWORD</code>: Respond with <code>USER_PASSWORD_AUTH</code>
2957
- * parameters: <code>USERNAME</code> (required), <code>PASSWORD</code> (required),
2958
- * <code>SECRET_HASH</code> (required if the app client is configured with a
2959
- * client secret), <code>DEVICE_KEY</code>.</p>
3031
+ * <code>PASSWORD</code>: Respond with the user's password as <code>PASSWORD</code>.</p>
2960
3032
  * </li>
2961
3033
  * <li>
2962
3034
  * <p>
2963
- * <code>PASSWORD_SRP</code>: Respond with <code>USER_SRP_AUTH</code> parameters:
2964
- * <code>USERNAME</code> (required), <code>SRP_A</code> (required),
2965
- * <code>SECRET_HASH</code> (required if the app client is configured with a
2966
- * client secret), <code>DEVICE_KEY</code>.</p>
3035
+ * <code>PASSWORD_SRP</code>: Respond with the initial SRP secret as <code>SRP_A</code>.</p>
2967
3036
  * </li>
2968
3037
  * <li>
2969
3038
  * <p>
2970
- * <code>SELECT_CHALLENGE</code>: Respond to the challenge with
2971
- * <code>USERNAME</code> and an <code>ANSWER</code> that matches one of the
2972
- * challenge types in the <code>AvailableChallenges</code> response
2973
- * parameter.</p>
3039
+ * <code>SELECT_CHALLENGE</code>: Respond with a challenge selection as <code>ANSWER</code>.
3040
+ * It must be one of the challenge types in the <code>AvailableChallenges</code> response
3041
+ * parameter. Add the parameters of the selected challenge, for example <code>USERNAME</code>
3042
+ * and <code>SMS_OTP</code>.</p>
2974
3043
  * </li>
2975
3044
  * <li>
2976
3045
  * <p>
2977
- * <code>SMS_MFA</code>: Respond with an
2978
- * <code>SMS_MFA_CODE</code> that your user pool delivered in an SMS message.</p>
3046
+ * <code>SMS_MFA</code>: Respond with the code that your user pool delivered in an SMS
3047
+ * message, as <code>SMS_MFA_CODE</code>
3048
+ * </p>
2979
3049
  * </li>
2980
3050
  * <li>
2981
3051
  * <p>
2982
- * <code>EMAIL_OTP</code>: Respond with an
2983
- * <code>EMAIL_OTP_CODE</code> that your user pool delivered in an email
2984
- * message.</p>
3052
+ * <code>EMAIL_MFA</code>: Respond with the code that your user pool delivered in an email
3053
+ * message, as <code>EMAIL_MFA_CODE</code>
3054
+ * </p>
2985
3055
  * </li>
2986
3056
  * <li>
2987
3057
  * <p>
2988
- * <code>PASSWORD_VERIFIER</code>: Respond with
2989
- * <code>PASSWORD_CLAIM_SIGNATURE</code>,
2990
- * <code>PASSWORD_CLAIM_SECRET_BLOCK</code>, and <code>TIMESTAMP</code> after
2991
- * client-side SRP calculations.</p>
3058
+ * <code>EMAIL_OTP</code>: Respond with the code that your user pool delivered in an email
3059
+ * message, as <code>EMAIL_OTP_CODE</code> .</p>
3060
+ * </li>
3061
+ * <li>
3062
+ * <p>
3063
+ * <code>SMS_OTP</code>: Respond with the code that your user pool delivered in an SMS
3064
+ * message, as <code>SMS_OTP_CODE</code>.</p>
3065
+ * </li>
3066
+ * <li>
3067
+ * <p>
3068
+ * <code>PASSWORD_VERIFIER</code>: Respond with the second stage of SRP secrets as
3069
+ * <code>PASSWORD_CLAIM_SIGNATURE</code>, <code>PASSWORD_CLAIM_SECRET_BLOCK</code>,
3070
+ * and <code>TIMESTAMP</code>.</p>
2992
3071
  * </li>
2993
3072
  * <li>
2994
3073
  * <p>
2995
3074
  * <code>CUSTOM_CHALLENGE</code>: This is returned if your custom authentication
2996
3075
  * flow determines that the user should pass another challenge before tokens are
2997
- * issued. The parameters of the challenge are determined by your Lambda function.</p>
3076
+ * issued. The parameters of the challenge are determined by your Lambda function
3077
+ * and issued in the <code>ChallengeParameters</code> of a challenge response.</p>
2998
3078
  * </li>
2999
3079
  * <li>
3000
3080
  * <p>
@@ -3116,6 +3196,32 @@ export interface AdminRespondToAuthChallengeRequest {
3116
3196
  * </li>
3117
3197
  * </ul>
3118
3198
  * </dd>
3199
+ * <dt>WEB_AUTHN</dt>
3200
+ * <dd>
3201
+ * <p>
3202
+ * <code>"ChallengeName": "WEB_AUTHN", "ChallengeResponses": \{
3203
+ * "USERNAME": "[username]",
3204
+ * "CREDENTIAL": "[AuthenticationResponseJSON]"\}</code>
3205
+ * </p>
3206
+ * <p>See <a href="https://www.w3.org/TR/WebAuthn-3/#dictdef-authenticationresponsejson">
3207
+ * AuthenticationResponseJSON</a>.</p>
3208
+ * </dd>
3209
+ * <dt>PASSWORD</dt>
3210
+ * <dd>
3211
+ * <p>
3212
+ * <code>"ChallengeName": "PASSWORD", "ChallengeResponses": \{
3213
+ * "USERNAME": "[username]",
3214
+ * "PASSWORD": "[password]"\}</code>
3215
+ * </p>
3216
+ * </dd>
3217
+ * <dt>PASSWORD_SRP</dt>
3218
+ * <dd>
3219
+ * <p>
3220
+ * <code>"ChallengeName": "PASSWORD_SRP", "ChallengeResponses": \{
3221
+ * "USERNAME": "[username]",
3222
+ * "SRP_A": "[SRP_A]"\}</code>
3223
+ * </p>
3224
+ * </dd>
3119
3225
  * <dt>SMS_OTP</dt>
3120
3226
  * <dd>
3121
3227
  * <p>
@@ -3149,8 +3255,6 @@ export interface AdminRespondToAuthChallengeRequest {
3149
3255
  * "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
3150
3256
  * [timestamp], "USERNAME": "[username]"\}</code>
3151
3257
  * </p>
3152
- * <p>Add <code>"DEVICE_KEY"</code> when you sign in with a remembered
3153
- * device.</p>
3154
3258
  * </dd>
3155
3259
  * <dt>CUSTOM_CHALLENGE</dt>
3156
3260
  * <dd>
@@ -3158,8 +3262,6 @@ export interface AdminRespondToAuthChallengeRequest {
3158
3262
  * <code>"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
3159
3263
  * \{"USERNAME": "[username]", "ANSWER": "[challenge_answer]"\}</code>
3160
3264
  * </p>
3161
- * <p>Add <code>"DEVICE_KEY"</code> when you sign in with a remembered
3162
- * device.</p>
3163
3265
  * </dd>
3164
3266
  * <dt>NEW_PASSWORD_REQUIRED</dt>
3165
3267
  * <dd>
@@ -3217,7 +3319,7 @@ export interface AdminRespondToAuthChallengeRequest {
3217
3319
  * <dd>
3218
3320
  * <p>
3219
3321
  * <code>"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses": \{"USERNAME":
3220
- * "[username]", "ANSWER": "[SMS_MFA or SOFTWARE_TOKEN_MFA]"\}</code>
3322
+ * "[username]", "ANSWER": "[SMS_MFA|EMAIL_MFA|SOFTWARE_TOKEN_MFA]"\}</code>
3221
3323
  * </p>
3222
3324
  * </dd>
3223
3325
  * </dl>
@@ -3325,59 +3427,66 @@ export interface AdminRespondToAuthChallengeResponse {
3325
3427
  * <p>Possible challenges include the following:</p>
3326
3428
  * <note>
3327
3429
  * <p>All of the following challenges require <code>USERNAME</code> and, when the app
3328
- * client has a client secret, <code>SECRET_HASH</code> in the parameters.</p>
3430
+ * client has a client secret, <code>SECRET_HASH</code> in the parameters. Include a
3431
+ * <code>DEVICE_KEY</code> for device authentication.</p>
3329
3432
  * </note>
3330
3433
  * <ul>
3331
3434
  * <li>
3332
3435
  * <p>
3333
3436
  * <code>WEB_AUTHN</code>: Respond to the challenge with the results of a
3334
- * successful authentication with a WebAuthn authenticator, or passkey. Examples
3335
- * of WebAuthn authenticators include biometric devices and security keys.</p>
3437
+ * successful authentication with a WebAuthn authenticator, or passkey, as
3438
+ * <code>CREDENTIAL</code>. Examples of WebAuthn authenticators include
3439
+ * biometric devices and security keys.</p>
3336
3440
  * </li>
3337
3441
  * <li>
3338
3442
  * <p>
3339
- * <code>PASSWORD</code>: Respond with <code>USER_PASSWORD_AUTH</code>
3340
- * parameters: <code>USERNAME</code> (required), <code>PASSWORD</code> (required),
3341
- * <code>SECRET_HASH</code> (required if the app client is configured with a
3342
- * client secret), <code>DEVICE_KEY</code>.</p>
3443
+ * <code>PASSWORD</code>: Respond with the user's password as <code>PASSWORD</code>.</p>
3343
3444
  * </li>
3344
3445
  * <li>
3345
3446
  * <p>
3346
- * <code>PASSWORD_SRP</code>: Respond with <code>USER_SRP_AUTH</code> parameters:
3347
- * <code>USERNAME</code> (required), <code>SRP_A</code> (required),
3348
- * <code>SECRET_HASH</code> (required if the app client is configured with a
3349
- * client secret), <code>DEVICE_KEY</code>.</p>
3447
+ * <code>PASSWORD_SRP</code>: Respond with the initial SRP secret as <code>SRP_A</code>.</p>
3350
3448
  * </li>
3351
3449
  * <li>
3352
3450
  * <p>
3353
- * <code>SELECT_CHALLENGE</code>: Respond to the challenge with
3354
- * <code>USERNAME</code> and an <code>ANSWER</code> that matches one of the
3355
- * challenge types in the <code>AvailableChallenges</code> response
3356
- * parameter.</p>
3451
+ * <code>SELECT_CHALLENGE</code>: Respond with a challenge selection as <code>ANSWER</code>.
3452
+ * It must be one of the challenge types in the <code>AvailableChallenges</code> response
3453
+ * parameter. Add the parameters of the selected challenge, for example <code>USERNAME</code>
3454
+ * and <code>SMS_OTP</code>.</p>
3357
3455
  * </li>
3358
3456
  * <li>
3359
3457
  * <p>
3360
- * <code>SMS_MFA</code>: Respond with an
3361
- * <code>SMS_MFA_CODE</code> that your user pool delivered in an SMS message.</p>
3458
+ * <code>SMS_MFA</code>: Respond with the code that your user pool delivered in an SMS
3459
+ * message, as <code>SMS_MFA_CODE</code>
3460
+ * </p>
3362
3461
  * </li>
3363
3462
  * <li>
3364
3463
  * <p>
3365
- * <code>EMAIL_OTP</code>: Respond with an
3366
- * <code>EMAIL_OTP_CODE</code> that your user pool delivered in an email
3367
- * message.</p>
3464
+ * <code>EMAIL_MFA</code>: Respond with the code that your user pool delivered in an email
3465
+ * message, as <code>EMAIL_MFA_CODE</code>
3466
+ * </p>
3368
3467
  * </li>
3369
3468
  * <li>
3370
3469
  * <p>
3371
- * <code>PASSWORD_VERIFIER</code>: Respond with
3372
- * <code>PASSWORD_CLAIM_SIGNATURE</code>,
3373
- * <code>PASSWORD_CLAIM_SECRET_BLOCK</code>, and <code>TIMESTAMP</code> after
3374
- * client-side SRP calculations.</p>
3470
+ * <code>EMAIL_OTP</code>: Respond with the code that your user pool delivered in an email
3471
+ * message, as <code>EMAIL_OTP_CODE</code> .</p>
3472
+ * </li>
3473
+ * <li>
3474
+ * <p>
3475
+ * <code>SMS_OTP</code>: Respond with the code that your user pool delivered in an SMS
3476
+ * message, as <code>SMS_OTP_CODE</code>.</p>
3477
+ * </li>
3478
+ * <li>
3479
+ * <p>
3480
+ * <code>PASSWORD_VERIFIER</code>: Respond with the second stage of SRP secrets as
3481
+ * <code>PASSWORD_CLAIM_SIGNATURE</code>, <code>PASSWORD_CLAIM_SECRET_BLOCK</code>,
3482
+ * and <code>TIMESTAMP</code>.</p>
3375
3483
  * </li>
3376
3484
  * <li>
3377
3485
  * <p>
3378
3486
  * <code>CUSTOM_CHALLENGE</code>: This is returned if your custom authentication
3379
3487
  * flow determines that the user should pass another challenge before tokens are
3380
- * issued. The parameters of the challenge are determined by your Lambda function.</p>
3488
+ * issued. The parameters of the challenge are determined by your Lambda function
3489
+ * and issued in the <code>ChallengeParameters</code> of a challenge response.</p>
3381
3490
  * </li>
3382
3491
  * <li>
3383
3492
  * <p>
@@ -5060,7 +5169,7 @@ export interface CreateManagedLoginBrandingRequest {
5060
5169
  ClientId: string | undefined;
5061
5170
  /**
5062
5171
  * <p>When true, applies the default branding style options. These default options are
5063
- * managed by Amazon Cognito. You can modify them later in the branding designer.</p>
5172
+ * managed by Amazon Cognito. You can modify them later in the branding editor.</p>
5064
5173
  * <p>When you specify <code>true</code> for this option, you must also omit values for
5065
5174
  * <code>Settings</code> and <code>Assets</code> in the request.</p>
5066
5175
  * @public
@@ -5069,6 +5178,30 @@ export interface CreateManagedLoginBrandingRequest {
5069
5178
  /**
5070
5179
  * <p>A JSON file, encoded as a <code>Document</code> type, with the the settings that you
5071
5180
  * want to apply to your style.</p>
5181
+ * <p>The following components are not currently implemented and reserved for future
5182
+ * use:</p>
5183
+ * <ul>
5184
+ * <li>
5185
+ * <p>
5186
+ * <code>signUp</code>
5187
+ * </p>
5188
+ * </li>
5189
+ * <li>
5190
+ * <p>
5191
+ * <code>instructions</code>
5192
+ * </p>
5193
+ * </li>
5194
+ * <li>
5195
+ * <p>
5196
+ * <code>sessionTimerDisplay</code>
5197
+ * </p>
5198
+ * </li>
5199
+ * <li>
5200
+ * <p>
5201
+ * <code>languageSelector</code> (for localization, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-localization">Managed login localization)</a>
5202
+ * </p>
5203
+ * </li>
5204
+ * </ul>
5072
5205
  * @public
5073
5206
  */
5074
5207
  Settings?: __DocumentType | undefined;
@@ -5098,7 +5231,7 @@ export interface ManagedLoginBrandingType {
5098
5231
  /**
5099
5232
  * <p>When true, applies the default branding style options. This option reverts to default
5100
5233
  * style options that are managed by Amazon Cognito. You can modify them later in the branding
5101
- * designer.</p>
5234
+ * editor.</p>
5102
5235
  * <p>When you specify <code>true</code> for this option, you must also omit values for
5103
5236
  * <code>Settings</code> and <code>Assets</code> in the request.</p>
5104
5237
  * @public
@@ -5107,6 +5240,30 @@ export interface ManagedLoginBrandingType {
5107
5240
  /**
5108
5241
  * <p>A JSON file, encoded as a <code>Document</code> type, with the the settings that you
5109
5242
  * want to apply to your style.</p>
5243
+ * <p>The following components are not currently implemented and reserved for future
5244
+ * use:</p>
5245
+ * <ul>
5246
+ * <li>
5247
+ * <p>
5248
+ * <code>signUp</code>
5249
+ * </p>
5250
+ * </li>
5251
+ * <li>
5252
+ * <p>
5253
+ * <code>instructions</code>
5254
+ * </p>
5255
+ * </li>
5256
+ * <li>
5257
+ * <p>
5258
+ * <code>sessionTimerDisplay</code>
5259
+ * </p>
5260
+ * </li>
5261
+ * <li>
5262
+ * <p>
5263
+ * <code>languageSelector</code> (for localization, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-localization">Managed login localization)</a>
5264
+ * </p>
5265
+ * </li>
5266
+ * </ul>
5110
5267
  * @public
5111
5268
  */
5112
5269
  Settings?: __DocumentType | undefined;
@@ -5250,6 +5407,152 @@ export interface CreateResourceServerResponse {
5250
5407
  */
5251
5408
  ResourceServer: ResourceServerType | undefined;
5252
5409
  }
5410
+ /**
5411
+ * @public
5412
+ * @enum
5413
+ */
5414
+ export declare const TermsEnforcementType: {
5415
+ readonly NONE: "NONE";
5416
+ };
5417
+ /**
5418
+ * @public
5419
+ */
5420
+ export type TermsEnforcementType = (typeof TermsEnforcementType)[keyof typeof TermsEnforcementType];
5421
+ /**
5422
+ * @public
5423
+ * @enum
5424
+ */
5425
+ export declare const TermsSourceType: {
5426
+ readonly LINK: "LINK";
5427
+ };
5428
+ /**
5429
+ * @public
5430
+ */
5431
+ export type TermsSourceType = (typeof TermsSourceType)[keyof typeof TermsSourceType];
5432
+ /**
5433
+ * @public
5434
+ */
5435
+ export interface CreateTermsRequest {
5436
+ /**
5437
+ * <p>The ID of the user pool where you want to create terms documents.</p>
5438
+ * @public
5439
+ */
5440
+ UserPoolId: string | undefined;
5441
+ /**
5442
+ * <p>The ID of the app client where you want to create terms documents. Must be an app
5443
+ * client in the requested user pool.</p>
5444
+ * @public
5445
+ */
5446
+ ClientId: string | undefined;
5447
+ /**
5448
+ * <p>A friendly name for the document that you want to create in the current request. Must
5449
+ * begin with <code>terms-of-use</code> or <code>privacy-policy</code> as identification of
5450
+ * the document type. Provide URLs for both <code>terms-of-use</code> and
5451
+ * <code>privacy-policy</code> in separate requests.</p>
5452
+ * @public
5453
+ */
5454
+ TermsName: string | undefined;
5455
+ /**
5456
+ * <p>This parameter is reserved for future use and currently accepts only one value.</p>
5457
+ * @public
5458
+ */
5459
+ TermsSource: TermsSourceType | undefined;
5460
+ /**
5461
+ * <p>This parameter is reserved for future use and currently accepts only one value.</p>
5462
+ * @public
5463
+ */
5464
+ Enforcement: TermsEnforcementType | undefined;
5465
+ /**
5466
+ * <p>A map of URLs to languages. For each localized language that will view the requested
5467
+ * <code>TermsName</code>, assign a URL. A selection of <code>cognito:default</code>
5468
+ * displays for all languages that don't have a language-specific URL.</p>
5469
+ * <p>For example, <code>"cognito:default": "https://terms.example.com", "cognito:spanish":
5470
+ * "https://terms.example.com/es"</code>.</p>
5471
+ * @public
5472
+ */
5473
+ Links?: Record<string, string> | undefined;
5474
+ }
5475
+ /**
5476
+ * <p>The details of a set of terms documents. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html#managed-login-terms-documents">Terms documents</a>.</p>
5477
+ * @public
5478
+ */
5479
+ export interface TermsType {
5480
+ /**
5481
+ * <p>The ID of the terms documents.</p>
5482
+ * @public
5483
+ */
5484
+ TermsId: string | undefined;
5485
+ /**
5486
+ * <p>The ID of the user pool that contains the terms documents.</p>
5487
+ * @public
5488
+ */
5489
+ UserPoolId: string | undefined;
5490
+ /**
5491
+ * <p>The ID of the app client that the terms documents are assigned to.</p>
5492
+ * @public
5493
+ */
5494
+ ClientId: string | undefined;
5495
+ /**
5496
+ * <p>The type and friendly name of the terms documents.</p>
5497
+ * @public
5498
+ */
5499
+ TermsName: string | undefined;
5500
+ /**
5501
+ * <p>This parameter is reserved for future use and currently accepts one value.</p>
5502
+ * @public
5503
+ */
5504
+ TermsSource: TermsSourceType | undefined;
5505
+ /**
5506
+ * <p>This parameter is reserved for future use and currently accepts one value.</p>
5507
+ * @public
5508
+ */
5509
+ Enforcement: TermsEnforcementType | undefined;
5510
+ /**
5511
+ * <p>A map of URLs to languages. For each localized language that will view the requested
5512
+ * <code>TermsName</code>, assign a URL. A selection of <code>cognito:default</code>
5513
+ * displays for all languages that don't have a language-specific URL.</p>
5514
+ * <p>For example, <code>"cognito:default": "https://terms.example.com", "cognito:spanish":
5515
+ * "https://terms.example.com/es"</code>.</p>
5516
+ * @public
5517
+ */
5518
+ Links: Record<string, string> | undefined;
5519
+ /**
5520
+ * <p>The date and time when the item was created. Amazon Cognito returns this timestamp in UNIX epoch time format. Your SDK might render the output in a
5521
+ * human-readable format like ISO 8601 or a Java <code>Date</code> object.</p>
5522
+ * @public
5523
+ */
5524
+ CreationDate: Date | undefined;
5525
+ /**
5526
+ * <p>The date and time when the item was modified. Amazon Cognito returns this timestamp in UNIX epoch time format. Your SDK might render the output in a
5527
+ * human-readable format like ISO 8601 or a Java <code>Date</code> object.</p>
5528
+ * @public
5529
+ */
5530
+ LastModifiedDate: Date | undefined;
5531
+ }
5532
+ /**
5533
+ * @public
5534
+ */
5535
+ export interface CreateTermsResponse {
5536
+ /**
5537
+ * <p>A summary of your terms documents. Includes a unique identifier for later changes to
5538
+ * the terms documents.</p>
5539
+ * @public
5540
+ */
5541
+ Terms?: TermsType | undefined;
5542
+ }
5543
+ /**
5544
+ * <p>Terms document names must be unique to the app client. This exception is thrown when
5545
+ * you attempt to create terms documents with a duplicate <code>TermsName</code>.</p>
5546
+ * @public
5547
+ */
5548
+ export declare class TermsExistsException extends __BaseException {
5549
+ readonly name: "TermsExistsException";
5550
+ readonly $fault: "client";
5551
+ /**
5552
+ * @internal
5553
+ */
5554
+ constructor(opts: __ExceptionOptionType<TermsExistsException, __BaseException>);
5555
+ }
5253
5556
  /**
5254
5557
  * <p>Represents the request to create the user import job.</p>
5255
5558
  * @public
@@ -7679,6 +7982,22 @@ export interface DeleteResourceServerRequest {
7679
7982
  */
7680
7983
  Identifier: string | undefined;
7681
7984
  }
7985
+ /**
7986
+ * @public
7987
+ */
7988
+ export interface DeleteTermsRequest {
7989
+ /**
7990
+ * <p>The ID of the terms documents that you want to delete.</p>
7991
+ * @public
7992
+ */
7993
+ TermsId: string | undefined;
7994
+ /**
7995
+ * <p>The ID of the user pool that contains the terms documents that you want to
7996
+ * delete.</p>
7997
+ * @public
7998
+ */
7999
+ UserPoolId: string | undefined;
8000
+ }
7682
8001
  /**
7683
8002
  * <p>Represents the request to delete a user.</p>
7684
8003
  * @public
@@ -8060,6 +8379,33 @@ export interface DescribeRiskConfigurationResponse {
8060
8379
  */
8061
8380
  RiskConfiguration: RiskConfigurationType | undefined;
8062
8381
  }
8382
+ /**
8383
+ * @public
8384
+ */
8385
+ export interface DescribeTermsRequest {
8386
+ /**
8387
+ * <p>The ID of the terms documents that you want to describe.</p>
8388
+ * @public
8389
+ */
8390
+ TermsId: string | undefined;
8391
+ /**
8392
+ * <p>The ID of the user pool that contains the terms documents that you want to
8393
+ * describe.</p>
8394
+ * @public
8395
+ */
8396
+ UserPoolId: string | undefined;
8397
+ }
8398
+ /**
8399
+ * @public
8400
+ */
8401
+ export interface DescribeTermsResponse {
8402
+ /**
8403
+ * <p>A summary of the requested terms documents. Includes a unique identifier for later
8404
+ * changes to the terms documents.</p>
8405
+ * @public
8406
+ */
8407
+ Terms?: TermsType | undefined;
8408
+ }
8063
8409
  /**
8064
8410
  * <p>Represents the request to describe the user import job.</p>
8065
8411
  * @public
@@ -8665,7 +9011,7 @@ export interface GetTokensFromRefreshTokenRequest {
8665
9011
  /**
8666
9012
  * <p>A valid refresh token that can authorize the request for new tokens. When refresh
8667
9013
  * token rotation is active in the requested app client, this token is invalidated after
8668
- * the request is complete.</p>
9014
+ * the request is complete and after an optional grace period.</p>
8669
9015
  * @public
8670
9016
  */
8671
9017
  RefreshToken: string | undefined;
@@ -8686,8 +9032,8 @@ export interface GetTokensFromRefreshTokenRequest {
8686
9032
  * <code>GetTokensFromRefreshToken</code> in a user pool with device remembering, you
8687
9033
  * must capture the device key from the initial authentication request. If your application
8688
9034
  * doesn't provide the key of a registered device, Amazon Cognito issues a new one. You must
8689
- * provide the confirmed device key in this request if device remembering is
8690
- * enabled in your user pool.</p>
9035
+ * provide the confirmed device key in this request if device remembering is enabled in
9036
+ * your user pool.</p>
8691
9037
  * <p>For more information about device remembering, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html">Working with devices</a>.</p>
8692
9038
  * @public
8693
9039
  */
@@ -8723,221 +9069,6 @@ export interface GetTokensFromRefreshTokenRequest {
8723
9069
  */
8724
9070
  ClientMetadata?: Record<string, string> | undefined;
8725
9071
  }
8726
- /**
8727
- * @public
8728
- */
8729
- export interface GetTokensFromRefreshTokenResponse {
8730
- /**
8731
- * <p>The object that your application receives after authentication. Contains tokens and
8732
- * information for device authentication.</p>
8733
- * @public
8734
- */
8735
- AuthenticationResult?: AuthenticationResultType | undefined;
8736
- }
8737
- /**
8738
- * <p>This exception is throw when your application requests token refresh with a refresh
8739
- * token that has been invalidated by refresh-token rotation.</p>
8740
- * @public
8741
- */
8742
- export declare class RefreshTokenReuseException extends __BaseException {
8743
- readonly name: "RefreshTokenReuseException";
8744
- readonly $fault: "client";
8745
- /**
8746
- * @internal
8747
- */
8748
- constructor(opts: __ExceptionOptionType<RefreshTokenReuseException, __BaseException>);
8749
- }
8750
- /**
8751
- * @public
8752
- */
8753
- export interface GetUICustomizationRequest {
8754
- /**
8755
- * <p>The ID of the user pool that you want to query for branding settings.</p>
8756
- * @public
8757
- */
8758
- UserPoolId: string | undefined;
8759
- /**
8760
- * <p>The ID of the app client that you want to query for branding settings.</p>
8761
- * @public
8762
- */
8763
- ClientId?: string | undefined;
8764
- }
8765
- /**
8766
- * <p>A container for the UI customization information for the hosted UI in a user
8767
- * pool.</p>
8768
- * @public
8769
- */
8770
- export interface UICustomizationType {
8771
- /**
8772
- * <p>The ID of the user pool with hosted UI customizations.</p>
8773
- * @public
8774
- */
8775
- UserPoolId?: string | undefined;
8776
- /**
8777
- * <p>The app client ID for your UI customization. When this value isn't present, the
8778
- * customization applies to all user pool app clients that don't have client-level
8779
- * settings..</p>
8780
- * @public
8781
- */
8782
- ClientId?: string | undefined;
8783
- /**
8784
- * <p>A URL path to the hosted logo image of your UI customization.</p>
8785
- * @public
8786
- */
8787
- ImageUrl?: string | undefined;
8788
- /**
8789
- * <p>The CSS values in the UI customization.</p>
8790
- * @public
8791
- */
8792
- CSS?: string | undefined;
8793
- /**
8794
- * <p>The CSS version number.</p>
8795
- * @public
8796
- */
8797
- CSSVersion?: string | undefined;
8798
- /**
8799
- * <p>The date and time when the item was modified. Amazon Cognito returns this timestamp in UNIX epoch time format. Your SDK might render the output in a
8800
- * human-readable format like ISO 8601 or a Java <code>Date</code> object.</p>
8801
- * @public
8802
- */
8803
- LastModifiedDate?: Date | undefined;
8804
- /**
8805
- * <p>The date and time when the item was created. Amazon Cognito returns this timestamp in UNIX epoch time format. Your SDK might render the output in a
8806
- * human-readable format like ISO 8601 or a Java <code>Date</code> object.</p>
8807
- * @public
8808
- */
8809
- CreationDate?: Date | undefined;
8810
- }
8811
- /**
8812
- * @public
8813
- */
8814
- export interface GetUICustomizationResponse {
8815
- /**
8816
- * <p>Information about the classic hosted UI custom CSS and logo-image branding that you
8817
- * applied to the user pool or app client.</p>
8818
- * @public
8819
- */
8820
- UICustomization: UICustomizationType | undefined;
8821
- }
8822
- /**
8823
- * <p>Represents the request to get information about the user.</p>
8824
- * @public
8825
- */
8826
- export interface GetUserRequest {
8827
- /**
8828
- * <p>A valid access token that Amazon Cognito issued to the currently signed-in user. Must include a scope claim for
8829
- * <code>aws.cognito.signin.user.admin</code>.</p>
8830
- * @public
8831
- */
8832
- AccessToken: string | undefined;
8833
- }
8834
- /**
8835
- * <p>Represents the response from the server from the request to get information about the
8836
- * user.</p>
8837
- * @public
8838
- */
8839
- export interface GetUserResponse {
8840
- /**
8841
- * <p>The name of the user that you requested.</p>
8842
- * @public
8843
- */
8844
- Username: string | undefined;
8845
- /**
8846
- * <p>An array of name-value pairs representing user attributes.</p>
8847
- * <p>Custom attributes are prepended with the <code>custom:</code> prefix.</p>
8848
- * @public
8849
- */
8850
- UserAttributes: AttributeType[] | undefined;
8851
- /**
8852
- * <p>
8853
- * <i>This response parameter is no longer supported.</i> It provides
8854
- * information only about SMS MFA configurations. It doesn't provide information about
8855
- * time-based one-time password (TOTP) software token MFA configurations. To look up
8856
- * information about either type of MFA configuration, use UserMFASettingList
8857
- * instead.</p>
8858
- * @public
8859
- */
8860
- MFAOptions?: MFAOptionType[] | undefined;
8861
- /**
8862
- * <p>The user's preferred MFA. Users can prefer SMS message, email message, or TOTP
8863
- * MFA.</p>
8864
- * @public
8865
- */
8866
- PreferredMfaSetting?: string | undefined;
8867
- /**
8868
- * <p>The MFA options that are activated for the user. The possible values in this list are
8869
- * <code>SMS_MFA</code>, <code>EMAIL_OTP</code>, and
8870
- * <code>SOFTWARE_TOKEN_MFA</code>.</p>
8871
- * @public
8872
- */
8873
- UserMFASettingList?: string[] | undefined;
8874
- }
8875
- /**
8876
- * <p>Represents the request to get user attribute verification.</p>
8877
- * @public
8878
- */
8879
- export interface GetUserAttributeVerificationCodeRequest {
8880
- /**
8881
- * <p>A valid access token that Amazon Cognito issued to the currently signed-in user. Must include a scope claim for
8882
- * <code>aws.cognito.signin.user.admin</code>.</p>
8883
- * @public
8884
- */
8885
- AccessToken: string | undefined;
8886
- /**
8887
- * <p>The name of the attribute that the user wants to verify, for example
8888
- * <code>email</code>.</p>
8889
- * @public
8890
- */
8891
- AttributeName: string | undefined;
8892
- /**
8893
- * <p>A map of custom key-value pairs that you can provide as input for any custom workflows
8894
- * that this action triggers.</p>
8895
- * <p>You create custom workflows by assigning Lambda functions to user pool
8896
- * triggers. When you use the GetUserAttributeVerificationCode API action, Amazon Cognito invokes
8897
- * the function that is assigned to the <i>custom message</i> trigger. When
8898
- * Amazon Cognito invokes this function, it passes a JSON payload, which the function receives as
8899
- * input. This payload contains a <code>clientMetadata</code> attribute, which provides the
8900
- * data that you assigned to the ClientMetadata parameter in your
8901
- * GetUserAttributeVerificationCode request. In your function code in Lambda, you can process the <code>clientMetadata</code> value to enhance your workflow for
8902
- * your specific needs.</p>
8903
- * <p>For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-identity-pools-working-with-aws-lambda-triggers.html">
8904
- * Using Lambda triggers</a> in the <i>Amazon Cognito Developer Guide</i>.</p>
8905
- * <note>
8906
- * <p>When you use the <code>ClientMetadata</code> parameter, note that Amazon Cognito won't do the
8907
- * following:</p>
8908
- * <ul>
8909
- * <li>
8910
- * <p>Store the <code>ClientMetadata</code> value. This data is available only
8911
- * to Lambda triggers that are assigned to a user pool to support custom
8912
- * workflows. If your user pool configuration doesn't include triggers, the
8913
- * <code>ClientMetadata</code> parameter serves no purpose.</p>
8914
- * </li>
8915
- * <li>
8916
- * <p>Validate the <code>ClientMetadata</code> value.</p>
8917
- * </li>
8918
- * <li>
8919
- * <p>Encrypt the <code>ClientMetadata</code> value. Don't send sensitive
8920
- * information in this parameter.</p>
8921
- * </li>
8922
- * </ul>
8923
- * </note>
8924
- * @public
8925
- */
8926
- ClientMetadata?: Record<string, string> | undefined;
8927
- }
8928
- /**
8929
- * <p>The verification code response returned by the server response to get the user
8930
- * attribute verification code.</p>
8931
- * @public
8932
- */
8933
- export interface GetUserAttributeVerificationCodeResponse {
8934
- /**
8935
- * <p>Information about the delivery destination of the user attribute verification
8936
- * code.</p>
8937
- * @public
8938
- */
8939
- CodeDeliveryDetails?: CodeDeliveryDetailsType | undefined;
8940
- }
8941
9072
  /**
8942
9073
  * @internal
8943
9074
  */
@@ -9114,6 +9245,18 @@ export declare const ConfirmSignUpResponseFilterSensitiveLog: (obj: ConfirmSignU
9114
9245
  * @internal
9115
9246
  */
9116
9247
  export declare const CreateManagedLoginBrandingRequestFilterSensitiveLog: (obj: CreateManagedLoginBrandingRequest) => any;
9248
+ /**
9249
+ * @internal
9250
+ */
9251
+ export declare const CreateTermsRequestFilterSensitiveLog: (obj: CreateTermsRequest) => any;
9252
+ /**
9253
+ * @internal
9254
+ */
9255
+ export declare const TermsTypeFilterSensitiveLog: (obj: TermsType) => any;
9256
+ /**
9257
+ * @internal
9258
+ */
9259
+ export declare const CreateTermsResponseFilterSensitiveLog: (obj: CreateTermsResponse) => any;
9117
9260
  /**
9118
9261
  * @internal
9119
9262
  */
@@ -9154,6 +9297,10 @@ export declare const RiskConfigurationTypeFilterSensitiveLog: (obj: RiskConfigur
9154
9297
  * @internal
9155
9298
  */
9156
9299
  export declare const DescribeRiskConfigurationResponseFilterSensitiveLog: (obj: DescribeRiskConfigurationResponse) => any;
9300
+ /**
9301
+ * @internal
9302
+ */
9303
+ export declare const DescribeTermsResponseFilterSensitiveLog: (obj: DescribeTermsResponse) => any;
9157
9304
  /**
9158
9305
  * @internal
9159
9306
  */
@@ -9182,31 +9329,3 @@ export declare const GetDeviceResponseFilterSensitiveLog: (obj: GetDeviceRespons
9182
9329
  * @internal
9183
9330
  */
9184
9331
  export declare const GetTokensFromRefreshTokenRequestFilterSensitiveLog: (obj: GetTokensFromRefreshTokenRequest) => any;
9185
- /**
9186
- * @internal
9187
- */
9188
- export declare const GetTokensFromRefreshTokenResponseFilterSensitiveLog: (obj: GetTokensFromRefreshTokenResponse) => any;
9189
- /**
9190
- * @internal
9191
- */
9192
- export declare const GetUICustomizationRequestFilterSensitiveLog: (obj: GetUICustomizationRequest) => any;
9193
- /**
9194
- * @internal
9195
- */
9196
- export declare const UICustomizationTypeFilterSensitiveLog: (obj: UICustomizationType) => any;
9197
- /**
9198
- * @internal
9199
- */
9200
- export declare const GetUICustomizationResponseFilterSensitiveLog: (obj: GetUICustomizationResponse) => any;
9201
- /**
9202
- * @internal
9203
- */
9204
- export declare const GetUserRequestFilterSensitiveLog: (obj: GetUserRequest) => any;
9205
- /**
9206
- * @internal
9207
- */
9208
- export declare const GetUserResponseFilterSensitiveLog: (obj: GetUserResponse) => any;
9209
- /**
9210
- * @internal
9211
- */
9212
- export declare const GetUserAttributeVerificationCodeRequestFilterSensitiveLog: (obj: GetUserAttributeVerificationCodeRequest) => any;