@aws-sdk/client-cognito-identity-provider 3.974.0 → 3.978.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,5 @@
1
1
  import { DocumentType as __DocumentType } from "@smithy/types";
2
- import { AccountTakeoverEventActionType, AdvancedSecurityEnabledModeType, AdvancedSecurityModeType, AliasAttributeType, AssetCategoryType, AssetExtensionType, AttributeDataType, AuthFactorType, AuthFlowType, ChallengeName, ChallengeNameType, ChallengeResponse, ColorSchemeModeType, CompromisedCredentialsEventActionType, CustomEmailSenderLambdaVersionType, CustomSMSSenderLambdaVersionType, DefaultEmailOptionType, DeletionProtectionType, DeliveryMediumType, DeviceRememberedStatusType, DomainStatusType, EmailSendingAccountType, EventFilterType, EventResponseType, EventSourceName, EventType, ExplicitAuthFlowsType, FeatureType, FeedbackValueType, IdentityProviderTypeType, LogLevel, MessageActionType, OAuthFlowType, PreTokenGenerationLambdaVersionType, PreventUserExistenceErrorTypes, RecoveryOptionNameType, RiskDecisionType, RiskLevelType, StatusType, TermsEnforcementType, TermsSourceType, TimeUnitsType, UserImportJobStatusType, UsernameAttributeType, UserPoolMfaType, UserPoolTierType, UserStatusType, UserVerificationType, VerifiedAttributeType } from "./enums";
2
+ import { AccountTakeoverEventActionType, AdvancedSecurityEnabledModeType, AdvancedSecurityModeType, AliasAttributeType, AssetCategoryType, AssetExtensionType, AttributeDataType, AuthFactorType, AuthFlowType, ChallengeName, ChallengeNameType, ChallengeResponse, ColorSchemeModeType, CompromisedCredentialsEventActionType, CustomEmailSenderLambdaVersionType, CustomSMSSenderLambdaVersionType, DefaultEmailOptionType, DeletionProtectionType, DeliveryMediumType, DeviceRememberedStatusType, DomainStatusType, EmailSendingAccountType, EventFilterType, EventResponseType, EventSourceName, EventType, ExplicitAuthFlowsType, FeatureType, FeedbackValueType, IdentityProviderTypeType, InboundFederationLambdaVersionType, LogLevel, MessageActionType, OAuthFlowType, PreTokenGenerationLambdaVersionType, PreventUserExistenceErrorTypes, RecoveryOptionNameType, RiskDecisionType, RiskLevelType, StatusType, TermsEnforcementType, TermsSourceType, TimeUnitsType, UserImportJobStatusType, UsernameAttributeType, UserPoolMfaType, UserPoolTierType, UserStatusType, UserVerificationType, VerifiedAttributeType } from "./enums";
3
3
  /**
4
4
  * <p>A recovery option for a user. The <code>AccountRecoverySettingType</code> data type is
5
5
  * an array of this object. Each <code>RecoveryOptionType</code> has a priority property
@@ -4933,6 +4933,24 @@ export interface CustomSMSLambdaVersionConfigType {
4933
4933
  */
4934
4934
  LambdaArn: string | undefined;
4935
4935
  }
4936
+ /**
4937
+ * <p>The properties of an inbound federation Lambda trigger.</p>
4938
+ * @public
4939
+ */
4940
+ export interface InboundFederationLambdaType {
4941
+ /**
4942
+ * <p>The user pool trigger version of the request that Amazon Cognito sends to your Lambda function. Higher-numbered versions add fields that support new features.</p>
4943
+ * <p>You must use a <code>LambdaVersion</code> of <code>V1_0</code> with an inbound federation
4944
+ * function.</p>
4945
+ * @public
4946
+ */
4947
+ LambdaVersion: InboundFederationLambdaVersionType | undefined;
4948
+ /**
4949
+ * <p>The Amazon Resource Name (ARN) of the function that you want to assign to your Lambda trigger.</p>
4950
+ * @public
4951
+ */
4952
+ LambdaArn: string | undefined;
4953
+ }
4936
4954
  /**
4937
4955
  * <p>The properties of a pre token generation Lambda trigger.</p>
4938
4956
  * @public
@@ -5055,6 +5073,11 @@ export interface LambdaConfigType {
5055
5073
  * @public
5056
5074
  */
5057
5075
  KMSKeyID?: string | undefined;
5076
+ /**
5077
+ * <p>The configuration of an inbound federation Lambda trigger. This trigger can transform federated user attributes during the authentication with external identity providers.</p>
5078
+ * @public
5079
+ */
5080
+ InboundFederation?: InboundFederationLambdaType | undefined;
5058
5081
  }
5059
5082
  /**
5060
5083
  * <p>The password policy settings for a user pool, including complexity, history, and
@@ -11273,354 +11296,3 @@ export interface UpdateUserPoolRequest {
11273
11296
  */
11274
11297
  export interface UpdateUserPoolResponse {
11275
11298
  }
11276
- /**
11277
- * <p>Represents the request to update the user pool client.</p>
11278
- * @public
11279
- */
11280
- export interface UpdateUserPoolClientRequest {
11281
- /**
11282
- * <p>The ID of the user pool where you want to update the app client.</p>
11283
- * @public
11284
- */
11285
- UserPoolId: string | undefined;
11286
- /**
11287
- * <p>The ID of the app client that you want to update.</p>
11288
- * @public
11289
- */
11290
- ClientId: string | undefined;
11291
- /**
11292
- * <p>A friendly name for the app client.</p>
11293
- * @public
11294
- */
11295
- ClientName?: string | undefined;
11296
- /**
11297
- * <p>The refresh token time limit. After this limit expires, your user can't use
11298
- * their refresh token. To specify the time unit for <code>RefreshTokenValidity</code> as
11299
- * <code>seconds</code>, <code>minutes</code>, <code>hours</code>, or <code>days</code>,
11300
- * set a <code>TokenValidityUnits</code> value in your API request.</p>
11301
- * <p>For example, when you set <code>RefreshTokenValidity</code> as <code>10</code> and
11302
- * <code>TokenValidityUnits</code> as <code>days</code>, your user can refresh their session
11303
- * and retrieve new access and ID tokens for 10 days.</p>
11304
- * <p>The default time unit for <code>RefreshTokenValidity</code> in an API request is days.
11305
- * You can't set <code>RefreshTokenValidity</code> to 0. If you do, Amazon Cognito overrides the
11306
- * value with the default value of 30 days. <i>Valid range</i> is displayed below
11307
- * in seconds.</p>
11308
- * <p>If you don't specify otherwise in the configuration of your app client, your refresh
11309
- * tokens are valid for 30 days.</p>
11310
- * @public
11311
- */
11312
- RefreshTokenValidity?: number | undefined;
11313
- /**
11314
- * <p>The access token time limit. After this limit expires, your user can't use
11315
- * their access token. To specify the time unit for <code>AccessTokenValidity</code> as
11316
- * <code>seconds</code>, <code>minutes</code>, <code>hours</code>, or <code>days</code>,
11317
- * set a <code>TokenValidityUnits</code> value in your API request.</p>
11318
- * <p>For example, when you set <code>AccessTokenValidity</code> to <code>10</code> and
11319
- * <code>TokenValidityUnits</code> to <code>hours</code>, your user can authorize access with
11320
- * their access token for 10 hours.</p>
11321
- * <p>The default time unit for <code>AccessTokenValidity</code> in an API request is hours.
11322
- * <i>Valid range</i> is displayed below in seconds.</p>
11323
- * <p>If you don't specify otherwise in the configuration of your app client, your access
11324
- * tokens are valid for one hour.</p>
11325
- * @public
11326
- */
11327
- AccessTokenValidity?: number | undefined;
11328
- /**
11329
- * <p>The ID token time limit. After this limit expires, your user can't use
11330
- * their ID token. To specify the time unit for <code>IdTokenValidity</code> as
11331
- * <code>seconds</code>, <code>minutes</code>, <code>hours</code>, or <code>days</code>,
11332
- * set a <code>TokenValidityUnits</code> value in your API request.</p>
11333
- * <p>For example, when you set <code>IdTokenValidity</code> as <code>10</code> and
11334
- * <code>TokenValidityUnits</code> as <code>hours</code>, your user can authenticate their
11335
- * session with their ID token for 10 hours.</p>
11336
- * <p>The default time unit for <code>IdTokenValidity</code> in an API request is hours.
11337
- * <i>Valid range</i> is displayed below in seconds.</p>
11338
- * <p>If you don't specify otherwise in the configuration of your app client, your ID
11339
- * tokens are valid for one hour.</p>
11340
- * @public
11341
- */
11342
- IdTokenValidity?: number | undefined;
11343
- /**
11344
- * <p>The units that validity times are represented in. The default unit for refresh tokens
11345
- * is days, and the default for ID and access tokens are hours.</p>
11346
- * @public
11347
- */
11348
- TokenValidityUnits?: TokenValidityUnitsType | undefined;
11349
- /**
11350
- * <p>The list of user attributes that you want your app client to have read access to.
11351
- * After your user authenticates in your app, their access token authorizes them to read
11352
- * their own attribute value for any attribute in this list.</p>
11353
- * <p>When you don't specify the <code>ReadAttributes</code> for your app client, your
11354
- * app can read the values of <code>email_verified</code>,
11355
- * <code>phone_number_verified</code>, and the standard attributes of your user pool.
11356
- * When your user pool app client has read access to these default attributes,
11357
- * <code>ReadAttributes</code> doesn't return any information. Amazon Cognito only
11358
- * populates <code>ReadAttributes</code> in the API response if you have specified your own
11359
- * custom set of read attributes.</p>
11360
- * @public
11361
- */
11362
- ReadAttributes?: string[] | undefined;
11363
- /**
11364
- * <p>The list of user attributes that you want your app client to have write access to.
11365
- * After your user authenticates in your app, their access token authorizes them to set or
11366
- * modify their own attribute value for any attribute in this list.</p>
11367
- * <p>When you don't specify the <code>WriteAttributes</code> for your app client, your
11368
- * app can write the values of the Standard attributes of your user pool. When your user
11369
- * pool has write access to these default attributes, <code>WriteAttributes</code>
11370
- * doesn't return any information. Amazon Cognito only populates
11371
- * <code>WriteAttributes</code> in the API response if you have specified your own
11372
- * custom set of write attributes.</p>
11373
- * <p>If your app client allows users to sign in through an IdP, this array must include all
11374
- * attributes that you have mapped to IdP attributes. Amazon Cognito updates mapped attributes when
11375
- * users sign in to your application through an IdP. If your app client does not have write
11376
- * access to a mapped attribute, Amazon Cognito throws an error when it tries to update the
11377
- * attribute. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-specifying-attribute-mapping.html">Specifying IdP Attribute Mappings for Your user
11378
- * pool</a>.</p>
11379
- * @public
11380
- */
11381
- WriteAttributes?: string[] | undefined;
11382
- /**
11383
- * <p>The <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-authentication-flow-methods.html">authentication flows</a> that you want your user pool client to support. For each app
11384
- * client in your user pool, you can sign in your users with any combination of one or more flows, including with
11385
- * a user name and Secure Remote Password (SRP), a user name and password, or a custom authentication process that
11386
- * you define with Lambda functions.</p>
11387
- * <note>
11388
- * <p>If you don't specify a value for <code>ExplicitAuthFlows</code>, your app client supports
11389
- * <code>ALLOW_REFRESH_TOKEN_AUTH</code>, <code>ALLOW_USER_SRP_AUTH</code>, and <code>ALLOW_CUSTOM_AUTH</code>.
11390
- * </p>
11391
- * </note>
11392
- * <p>The values for authentication flow options include the following.</p>
11393
- * <ul>
11394
- * <li>
11395
- * <p>
11396
- * <code>ALLOW_USER_AUTH</code>: Enable selection-based sign-in
11397
- * with <code>USER_AUTH</code>. This setting covers username-password,
11398
- * secure remote password (SRP), passwordless, and passkey authentication.
11399
- * This authentiation flow can do username-password and SRP authentication
11400
- * without other <code>ExplicitAuthFlows</code> permitting them. For example
11401
- * users can complete an SRP challenge through <code>USER_AUTH</code>
11402
- * without the flow <code>USER_SRP_AUTH</code> being active for the app
11403
- * client. This flow doesn't include <code>CUSTOM_AUTH</code>.
11404
- * </p>
11405
- * <p>To activate this setting, your user pool must be in the <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-essentials.html">
11406
- * Essentials tier</a> or higher.</p>
11407
- * </li>
11408
- * <li>
11409
- * <p>
11410
- * <code>ALLOW_ADMIN_USER_PASSWORD_AUTH</code>: Enable admin based user password
11411
- * authentication flow <code>ADMIN_USER_PASSWORD_AUTH</code>. This setting replaces
11412
- * the <code>ADMIN_NO_SRP_AUTH</code> setting. With this authentication flow, your app
11413
- * passes a user name and password to Amazon Cognito in the request, instead of using the Secure
11414
- * Remote Password (SRP) protocol to securely transmit the password.</p>
11415
- * </li>
11416
- * <li>
11417
- * <p>
11418
- * <code>ALLOW_CUSTOM_AUTH</code>: Enable Lambda trigger based
11419
- * authentication.</p>
11420
- * </li>
11421
- * <li>
11422
- * <p>
11423
- * <code>ALLOW_USER_PASSWORD_AUTH</code>: Enable user password-based
11424
- * authentication. In this flow, Amazon Cognito receives the password in the request instead
11425
- * of using the SRP protocol to verify passwords.</p>
11426
- * </li>
11427
- * <li>
11428
- * <p>
11429
- * <code>ALLOW_USER_SRP_AUTH</code>: Enable SRP-based authentication.</p>
11430
- * </li>
11431
- * <li>
11432
- * <p>
11433
- * <code>ALLOW_REFRESH_TOKEN_AUTH</code>: Enable authflow to refresh
11434
- * tokens.</p>
11435
- * </li>
11436
- * </ul>
11437
- * <p>In some environments, you will see the values <code>ADMIN_NO_SRP_AUTH</code>, <code>CUSTOM_AUTH_FLOW_ONLY</code>, or <code>USER_PASSWORD_AUTH</code>.
11438
- * You can't assign these legacy <code>ExplicitAuthFlows</code> values to user pool clients at the same time as values that begin with <code>ALLOW_</code>,
11439
- * like <code>ALLOW_USER_SRP_AUTH</code>.</p>
11440
- * @public
11441
- */
11442
- ExplicitAuthFlows?: ExplicitAuthFlowsType[] | undefined;
11443
- /**
11444
- * <p>A list of provider names for the identity providers (IdPs) that are supported on this
11445
- * client. The following are supported: <code>COGNITO</code>, <code>Facebook</code>,
11446
- * <code>Google</code>, <code>SignInWithApple</code>, and <code>LoginWithAmazon</code>.
11447
- * You can also specify the names that you configured for the SAML and OIDC IdPs in your
11448
- * user pool, for example <code>MySAMLIdP</code> or <code>MyOIDCIdP</code>.</p>
11449
- * <p>This parameter sets the IdPs that <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html">managed
11450
- * login</a> will display on the login page for your app client. The removal of
11451
- * <code>COGNITO</code> from this list doesn't prevent authentication operations
11452
- * for local users with the user pools API in an Amazon Web Services SDK. The only way to prevent
11453
- * SDK-based authentication is to block access with a <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-waf.html">WAF rule</a>.
11454
- * </p>
11455
- * @public
11456
- */
11457
- SupportedIdentityProviders?: string[] | undefined;
11458
- /**
11459
- * <p>A list of allowed redirect, or callback, URLs for managed login authentication. These
11460
- * URLs are the paths where you want to send your users' browsers after they complete
11461
- * authentication with managed login or a third-party IdP. Typically, callback URLs are the
11462
- * home of an application that uses OAuth or OIDC libraries to process authentication
11463
- * outcomes.</p>
11464
- * <p>A redirect URI must meet the following requirements:</p>
11465
- * <ul>
11466
- * <li>
11467
- * <p>Be an absolute URI.</p>
11468
- * </li>
11469
- * <li>
11470
- * <p>Be registered with the authorization server. Amazon Cognito doesn't accept
11471
- * authorization requests with <code>redirect_uri</code> values that aren't in
11472
- * the list of <code>CallbackURLs</code> that you provide in this parameter.</p>
11473
- * </li>
11474
- * <li>
11475
- * <p>Not include a fragment component.</p>
11476
- * </li>
11477
- * </ul>
11478
- * <p>See <a href="https://tools.ietf.org/html/rfc6749#section-3.1.2">OAuth 2.0 -
11479
- * Redirection Endpoint</a>.</p>
11480
- * <p>Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes
11481
- * only.</p>
11482
- * <p>App callback URLs such as <code>myapp://example</code> are also supported.</p>
11483
- * @public
11484
- */
11485
- CallbackURLs?: string[] | undefined;
11486
- /**
11487
- * <p>A list of allowed logout URLs for managed login authentication. When you pass
11488
- * <code>logout_uri</code> and <code>client_id</code> parameters to
11489
- * <code>/logout</code>, Amazon Cognito signs out your user and redirects them to the logout
11490
- * URL. This parameter describes the URLs that you want to be the permitted targets of
11491
- * <code>logout_uri</code>. A typical use of these URLs is when a user selects "Sign
11492
- * out" and you redirect them to your public homepage. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/logout-endpoint.html">Logout
11493
- * endpoint</a>.</p>
11494
- * @public
11495
- */
11496
- LogoutURLs?: string[] | undefined;
11497
- /**
11498
- * <p>The default redirect URI. In app clients with one assigned IdP, replaces
11499
- * <code>redirect_uri</code> in authentication requests. Must be in the
11500
- * <code>CallbackURLs</code> list.</p>
11501
- * @public
11502
- */
11503
- DefaultRedirectURI?: string | undefined;
11504
- /**
11505
- * <p>The OAuth grant types that you want your app client to generate. To create an app
11506
- * client that generates client credentials grants, you must add
11507
- * <code>client_credentials</code> as the only allowed OAuth flow.</p>
11508
- * <dl>
11509
- * <dt>code</dt>
11510
- * <dd>
11511
- * <p>Use a code grant flow, which provides an authorization code as the
11512
- * response. This code can be exchanged for access tokens with the
11513
- * <code>/oauth2/token</code> endpoint.</p>
11514
- * </dd>
11515
- * <dt>implicit</dt>
11516
- * <dd>
11517
- * <p>Issue the access token (and, optionally, ID token, based on scopes)
11518
- * directly to your user.</p>
11519
- * </dd>
11520
- * <dt>client_credentials</dt>
11521
- * <dd>
11522
- * <p>Issue the access token from the <code>/oauth2/token</code> endpoint
11523
- * directly to a non-person user using a combination of the client ID and
11524
- * client secret.</p>
11525
- * </dd>
11526
- * </dl>
11527
- * @public
11528
- */
11529
- AllowedOAuthFlows?: OAuthFlowType[] | undefined;
11530
- /**
11531
- * <p>The OAuth, OpenID Connect (OIDC), and custom scopes that you want to permit your app
11532
- * client to authorize access with. Scopes govern access control to user pool self-service
11533
- * API operations, user data from the <code>userInfo</code> endpoint, and third-party APIs.
11534
- * Scope values include <code>phone</code>, <code>email</code>, <code>openid</code>, and
11535
- * <code>profile</code>. The <code>aws.cognito.signin.user.admin</code> scope
11536
- * authorizes user self-service operations. Custom scopes with resource servers authorize
11537
- * access to external APIs.</p>
11538
- * @public
11539
- */
11540
- AllowedOAuthScopes?: string[] | undefined;
11541
- /**
11542
- * <p>Set to <code>true</code> to use OAuth 2.0 authorization server features in your app client.</p>
11543
- * <p>This parameter must have a value of <code>true</code> before you can configure
11544
- * the following features in your app client.</p>
11545
- * <ul>
11546
- * <li>
11547
- * <p>
11548
- * <code>CallBackURLs</code>: Callback URLs.</p>
11549
- * </li>
11550
- * <li>
11551
- * <p>
11552
- * <code>LogoutURLs</code>: Sign-out redirect URLs.</p>
11553
- * </li>
11554
- * <li>
11555
- * <p>
11556
- * <code>AllowedOAuthScopes</code>: OAuth 2.0 scopes.</p>
11557
- * </li>
11558
- * <li>
11559
- * <p>
11560
- * <code>AllowedOAuthFlows</code>: Support for authorization code, implicit, and client credentials OAuth 2.0 grants.</p>
11561
- * </li>
11562
- * </ul>
11563
- * <p>To use authorization server features, configure one of these features in the Amazon Cognito console or set
11564
- * <code>AllowedOAuthFlowsUserPoolClient</code> to <code>true</code> in a <code>CreateUserPoolClient</code> or
11565
- * <code>UpdateUserPoolClient</code> API request. If you don't set a value for
11566
- * <code>AllowedOAuthFlowsUserPoolClient</code> in a request with the CLI or SDKs, it defaults
11567
- * to <code>false</code>. When <code>false</code>, only SDK-based API sign-in is permitted.</p>
11568
- * @public
11569
- */
11570
- AllowedOAuthFlowsUserPoolClient?: boolean | undefined;
11571
- /**
11572
- * <p>The user pool analytics configuration for collecting metrics and sending them to your
11573
- * Amazon Pinpoint campaign.</p>
11574
- * <p>In Amazon Web Services Regions where Amazon Pinpoint isn't available, user pools might not have access to
11575
- * analytics or might be configurable with campaigns in the US East (N. Virginia) Region.
11576
- * For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-pinpoint-integration.html">Using Amazon Pinpoint analytics</a>.</p>
11577
- * @public
11578
- */
11579
- AnalyticsConfiguration?: AnalyticsConfigurationType | undefined;
11580
- /**
11581
- * <p>When <code>ENABLED</code>, suppresses messages that might indicate a valid user exists
11582
- * when someone attempts sign-in. This parameters sets your preference for the errors and
11583
- * responses that you want Amazon Cognito APIs to return during authentication, account
11584
- * confirmation, and password recovery when the user doesn't exist in the user pool. When
11585
- * set to <code>ENABLED</code> and the user doesn't exist, authentication returns an error
11586
- * indicating either the username or password was incorrect. Account confirmation and
11587
- * password recovery return a response indicating a code was sent to a simulated
11588
- * destination. When set to <code>LEGACY</code>, those APIs return a
11589
- * <code>UserNotFoundException</code> exception if the user doesn't exist in the user
11590
- * pool.</p>
11591
- * <p>Defaults to <code>LEGACY</code>.</p>
11592
- * @public
11593
- */
11594
- PreventUserExistenceErrors?: PreventUserExistenceErrorTypes | undefined;
11595
- /**
11596
- * <p>Activates or deactivates <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/token-revocation.html">token
11597
- * revocation</a> in the target app client.</p>
11598
- * @public
11599
- */
11600
- EnableTokenRevocation?: boolean | undefined;
11601
- /**
11602
- * <p>When <code>true</code>, your application can include additional
11603
- * <code>UserContextData</code> in authentication requests. This data includes the IP
11604
- * address, and contributes to analysis by threat protection features. For more information
11605
- * about propagation of user context data, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-adaptive-authentication.html#user-pool-settings-adaptive-authentication-device-fingerprint">Adding session data to API requests</a>. If you don’t include this parameter,
11606
- * you can't send the source IP address to Amazon Cognito threat protection features. You can only
11607
- * activate <code>EnablePropagateAdditionalUserContextData</code> in an app client that has
11608
- * a client secret.</p>
11609
- * @public
11610
- */
11611
- EnablePropagateAdditionalUserContextData?: boolean | undefined;
11612
- /**
11613
- * <p>Amazon Cognito creates a session token for each API request in an authentication flow. <code>AuthSessionValidity</code> is the duration,
11614
- * in minutes, of that session token. Your user pool native user must respond to each authentication challenge before the session expires.</p>
11615
- * @public
11616
- */
11617
- AuthSessionValidity?: number | undefined;
11618
- /**
11619
- * <p>The configuration of your app client for refresh token rotation. When enabled, your
11620
- * app client issues new ID, access, and refresh tokens when users renew their sessions
11621
- * with refresh tokens. When disabled, token refresh issues only ID and access
11622
- * tokens.</p>
11623
- * @public
11624
- */
11625
- RefreshTokenRotation?: RefreshTokenRotationType | undefined;
11626
- }