@aws-sdk/client-sts 3.40.0 → 3.45.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -13,7 +13,7 @@ export interface AssumeRoleWithSAMLCommandOutput extends AssumeRoleWithSAMLRespo
13
13
  * credentials or configuration. For a comparison of <code>AssumeRoleWithSAML</code> with the
14
14
  * other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
15
15
  * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
16
- * STS API operations</a> in the <i>IAM User Guide</i>.</p>
16
+ * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
17
17
  * <p>The temporary security credentials returned by this operation consist of an access key
18
18
  * ID, a secret access key, and a security token. Applications can use these temporary
19
19
  * security credentials to sign calls to Amazon Web Services services.</p>
@@ -35,15 +35,15 @@ export interface AssumeRoleWithSAMLCommandOutput extends AssumeRoleWithSAMLRespo
35
35
  * console URL. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html">Using IAM Roles</a> in the
36
36
  * <i>IAM User Guide</i>.</p>
37
37
  * <note>
38
- * <p>
39
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html#iam-term-role-chaining">Role chaining</a> limits your CLI or Amazon Web Services API
40
- * role session to a maximum of one hour. When you use the <code>AssumeRole</code> API
41
- * operation to assume a role, you can specify the duration of your role session with
42
- * the <code>DurationSeconds</code> parameter. You can specify a parameter value of up
43
- * to 43200 seconds (12 hours), depending on the maximum session duration setting for
44
- * your role. However, if you assume a role using role chaining and provide a
45
- * <code>DurationSeconds</code> parameter value greater than one hour, the
46
- * operation fails.</p>
38
+ * <p>
39
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html#iam-term-role-chaining">Role chaining</a> limits your CLI or Amazon Web Services API role
40
+ * session to a maximum of one hour. When you use the <code>AssumeRole</code> API operation
41
+ * to assume a role, you can specify the duration of your role session with the
42
+ * <code>DurationSeconds</code> parameter. You can specify a parameter value of up to
43
+ * 43200 seconds (12 hours), depending on the maximum session duration setting for your
44
+ * role. However, if you assume a role using role chaining and provide a
45
+ * <code>DurationSeconds</code> parameter value greater than one hour, the operation
46
+ * fails.</p>
47
47
  * </note>
48
48
  * <p>
49
49
  * <b>Permissions</b>
@@ -95,9 +95,9 @@ export interface AssumeRoleWithSAMLCommandOutput extends AssumeRoleWithSAMLRespo
95
95
  * request are to the upper size limit.
96
96
  * </p>
97
97
  * </note>
98
- * <p>You can pass a session tag with the same key as a tag that is
99
- * attached to the role. When you do, session tags override the role's tags with the same
100
- * key.</p>
98
+ *
99
+ * <p>You can pass a session tag with the same key as a tag that is attached to the role. When
100
+ * you do, session tags override the role's tags with the same key.</p>
101
101
  * <p>An administrator must grant you the permissions necessary to pass session tags. The
102
102
  * administrator can also create granular permissions to allow you to pass only specific
103
103
  * session tags. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html">Tutorial: Using Tags
@@ -151,7 +151,7 @@ export interface AssumeRoleWithSAMLCommandOutput extends AssumeRoleWithSAMLRespo
151
151
  *
152
152
  * @see {@link AssumeRoleWithSAMLCommandInput} for command's `input` shape.
153
153
  * @see {@link AssumeRoleWithSAMLCommandOutput} for command's `response` shape.
154
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
154
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
155
155
  *
156
156
  */
157
157
  export declare class AssumeRoleWithSAMLCommand extends $Command<AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput, STSClientResolvedConfig> {
@@ -29,7 +29,7 @@ export interface AssumeRoleWithWebIdentityCommandOutput extends AssumeRoleWithWe
29
29
  * <code>AssumeRoleWithWebIdentity</code> with the other API operations that produce
30
30
  * temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
31
31
  * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
32
- * STS API operations</a> in the <i>IAM User Guide</i>.</p>
32
+ * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
33
33
  * <p>The temporary security credentials returned by this API consist of an access key ID, a
34
34
  * secret access key, and a security token. Applications can use these temporary security
35
35
  * credentials to sign calls to Amazon Web Services service API operations.</p>
@@ -87,9 +87,9 @@ export interface AssumeRoleWithWebIdentityCommandOutput extends AssumeRoleWithWe
87
87
  * request are to the upper size limit.
88
88
  * </p>
89
89
  * </note>
90
- * <p>You can pass a session tag with the same key as a tag that is
91
- * attached to the role. When you do, the session tag overrides the role tag with the same
92
- * key.</p>
90
+ *
91
+ * <p>You can pass a session tag with the same key as a tag that is attached to the role. When
92
+ * you do, the session tag overrides the role tag with the same key.</p>
93
93
  * <p>An administrator must grant you the permissions necessary to pass session tags. The
94
94
  * administrator can also create granular permissions to allow you to pass only specific
95
95
  * session tags. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html">Tutorial: Using Tags
@@ -155,7 +155,7 @@ export interface AssumeRoleWithWebIdentityCommandOutput extends AssumeRoleWithWe
155
155
  *
156
156
  * @see {@link AssumeRoleWithWebIdentityCommandInput} for command's `input` shape.
157
157
  * @see {@link AssumeRoleWithWebIdentityCommandOutput} for command's `response` shape.
158
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
158
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
159
159
  *
160
160
  */
161
161
  export declare class AssumeRoleWithWebIdentityCommand extends $Command<AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput, STSClientResolvedConfig> {
@@ -18,9 +18,9 @@ export interface DecodeAuthorizationMessageCommandOutput extends DecodeAuthoriza
18
18
  * documentation for an individual operation indicates whether that operation returns an
19
19
  * encoded message in addition to returning an HTTP code.</p>
20
20
  * </note>
21
- * <p>The message is encoded because the details of the authorization status can constitute
21
+ * <p>The message is encoded because the details of the authorization status can contain
22
22
  * privileged information that the user who requested the operation should not see. To decode
23
- * an authorization status message, a user must be granted permissions via an IAM policy to
23
+ * an authorization status message, a user must be granted permissions through an IAM <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">policy</a> to
24
24
  * request the <code>DecodeAuthorizationMessage</code>
25
25
  * (<code>sts:DecodeAuthorizationMessage</code>) action. </p>
26
26
  * <p>The decoded message includes the following type of information:</p>
@@ -55,7 +55,7 @@ export interface DecodeAuthorizationMessageCommandOutput extends DecodeAuthoriza
55
55
  *
56
56
  * @see {@link DecodeAuthorizationMessageCommandInput} for command's `input` shape.
57
57
  * @see {@link DecodeAuthorizationMessageCommandOutput} for command's `response` shape.
58
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
58
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
59
59
  *
60
60
  */
61
61
  export declare class DecodeAuthorizationMessageCommand extends $Command<DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput, STSClientResolvedConfig> {
@@ -8,23 +8,23 @@ export interface GetAccessKeyInfoCommandOutput extends GetAccessKeyInfoResponse,
8
8
  }
9
9
  /**
10
10
  * <p>Returns the account identifier for the specified access key ID.</p>
11
- * <p>Access keys consist of two parts: an access key ID (for example,
12
- * <code>AKIAIOSFODNN7EXAMPLE</code>) and a secret access key (for example,
13
- * <code>wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY</code>). For more information about
14
- * access keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html">Managing Access Keys for IAM
15
- * Users</a> in the <i>IAM User Guide</i>.</p>
16
- * <p>When you pass an access key ID to this operation, it returns the ID of the Amazon Web Services
17
- * account to which the keys belong. Access key IDs beginning with <code>AKIA</code> are
18
- * long-term credentials for an IAM user or the Amazon Web Services account root user. Access key IDs
19
- * beginning with <code>ASIA</code> are temporary credentials that are created using STS
20
- * operations. If the account in the response belongs to you, you can sign in as the root
21
- * user and review your root user access keys. Then, you can pull a <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html">credentials report</a> to learn which IAM user owns the keys. To learn who
22
- * requested the temporary credentials for an <code>ASIA</code> access key, view the STS
23
- * events in your <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html">CloudTrail logs</a> in the
24
- * <i>IAM User Guide</i>.</p>
25
- * <p>This operation does not indicate the state of the access key. The key might be active,
26
- * inactive, or deleted. Active keys might not have permissions to perform an operation.
27
- * Providing a deleted access key might return an error that the key doesn't exist.</p>
11
+ * <p>Access keys consist of two parts: an access key ID (for example,
12
+ * <code>AKIAIOSFODNN7EXAMPLE</code>) and a secret access key (for example,
13
+ * <code>wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY</code>). For more information about
14
+ * access keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html">Managing Access Keys for IAM
15
+ * Users</a> in the <i>IAM User Guide</i>.</p>
16
+ * <p>When you pass an access key ID to this operation, it returns the ID of the Amazon Web Services account
17
+ * to which the keys belong. Access key IDs beginning with <code>AKIA</code> are long-term
18
+ * credentials for an IAM user or the Amazon Web Services account root user. Access key IDs beginning with
19
+ * <code>ASIA</code> are temporary credentials that are created using STS operations. If
20
+ * the account in the response belongs to you, you can sign in as the root user and review
21
+ * your root user access keys. Then, you can pull a <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html">credentials report</a> to
22
+ * learn which IAM user owns the keys. To learn who requested the temporary credentials for
23
+ * an <code>ASIA</code> access key, view the STS events in your <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html">CloudTrail logs</a> in the
24
+ * <i>IAM User Guide</i>.</p>
25
+ * <p>This operation does not indicate the state of the access key. The key might be active,
26
+ * inactive, or deleted. Active keys might not have permissions to perform an operation.
27
+ * Providing a deleted access key might return an error that the key doesn't exist.</p>
28
28
  * @example
29
29
  * Use a bare-bones client and the command you need to make an API call.
30
30
  * ```javascript
@@ -37,7 +37,7 @@ export interface GetAccessKeyInfoCommandOutput extends GetAccessKeyInfoResponse,
37
37
  *
38
38
  * @see {@link GetAccessKeyInfoCommandInput} for command's `input` shape.
39
39
  * @see {@link GetAccessKeyInfoCommandOutput} for command's `response` shape.
40
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
40
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
41
41
  *
42
42
  */
43
43
  export declare class GetAccessKeyInfoCommand extends $Command<GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput, STSClientResolvedConfig> {
@@ -8,15 +8,15 @@ export interface GetCallerIdentityCommandOutput extends GetCallerIdentityRespons
8
8
  }
9
9
  /**
10
10
  * <p>Returns details about the IAM user or role whose credentials are used to call the
11
- * operation.</p>
12
- * <note>
11
+ * operation.</p>
12
+ * <note>
13
13
  * <p>No permissions are required to perform this operation. If an administrator adds a
14
- * policy to your IAM user or role that explicitly denies access to the
15
- * <code>sts:GetCallerIdentity</code> action, you can still perform this operation.
16
- * Permissions are not required because the same information is returned when an IAM
17
- * user or role is denied access. To view an example response, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa">I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a> in the
18
- * <i>IAM User Guide</i>.</p>
19
- * </note>
14
+ * policy to your IAM user or role that explicitly denies access to the
15
+ * <code>sts:GetCallerIdentity</code> action, you can still perform this operation.
16
+ * Permissions are not required because the same information is returned when an IAM user
17
+ * or role is denied access. To view an example response, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa">I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a> in the
18
+ * <i>IAM User Guide</i>.</p>
19
+ * </note>
20
20
  * @example
21
21
  * Use a bare-bones client and the command you need to make an API call.
22
22
  * ```javascript
@@ -29,7 +29,7 @@ export interface GetCallerIdentityCommandOutput extends GetCallerIdentityRespons
29
29
  *
30
30
  * @see {@link GetCallerIdentityCommandInput} for command's `input` shape.
31
31
  * @see {@link GetCallerIdentityCommandOutput} for command's `response` shape.
32
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
32
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
33
33
  *
34
34
  */
35
35
  export declare class GetCallerIdentityCommand extends $Command<GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput, STSClientResolvedConfig> {
@@ -16,7 +16,7 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
16
16
  * server-based application. For a comparison of <code>GetFederationToken</code> with the
17
17
  * other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
18
18
  * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
19
- * STS API operations</a> in the <i>IAM User Guide</i>.</p>
19
+ * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
20
20
  * <note>
21
21
  * <p>You can create a mobile-based or browser-based app that can authenticate users using
22
22
  * a web identity provider like Login with Amazon, Facebook, Google, or an OpenID
@@ -35,8 +35,8 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
35
35
  * </p>
36
36
  * <p>The temporary credentials are valid for the specified duration, from 900 seconds (15
37
37
  * minutes) up to a maximum of 129,600 seconds (36 hours). The default session duration is
38
- * 43,200 seconds (12 hours). Temporary credentials that are obtained by using Amazon Web Services account
39
- * root user credentials have a maximum duration of 3,600 seconds (1 hour).</p>
38
+ * 43,200 seconds (12 hours). Temporary credentials obtained by using the Amazon Web Services account root
39
+ * user credentials have a maximum duration of 3,600 seconds (1 hour).</p>
40
40
  * <p>
41
41
  * <b>Permissions</b>
42
42
  * </p>
@@ -74,78 +74,25 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
74
74
  * <p>(Optional) You can pass tag key-value pairs to your session. These are called session
75
75
  * tags. For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the
76
76
  * <i>IAM User Guide</i>.</p>
77
- * <note>
78
- * <p>You can create a mobile-based or browser-based app that can authenticate users
79
- * using a web identity provider like Login with Amazon, Facebook, Google, or an OpenID
80
- * Connect-compatible identity provider. In this case, we recommend that you use <a href="http://aws.amazon.com/cognito/">Amazon Cognito</a> or
81
- * <code>AssumeRoleWithWebIdentity</code>. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity">Federation Through a Web-based Identity Provider</a> in the
82
- * <i>IAM User Guide</i>.</p>
83
- * </note>
84
- * <p>You can also call <code>GetFederationToken</code> using the security credentials of an
85
- * Amazon Web Services account root user, but we do not recommend it. Instead, we recommend that you
86
- * create an IAM user for the purpose of the proxy application. Then attach a policy to
87
- * the IAM user that limits federated users to only the actions and resources that they
88
- * need to access. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html">IAM Best Practices</a> in the
89
- * <i>IAM User Guide</i>. </p>
90
- * <p>
91
- * <b>Session duration</b>
92
- * </p>
93
- * <p>The temporary credentials are valid for the specified duration, from 900 seconds (15
94
- * minutes) up to a maximum of 129,600 seconds (36 hours). The default session duration is
95
- * 43,200 seconds (12 hours). Temporary credentials that are obtained by using Amazon Web Services
96
- * account root user credentials have a maximum duration of 3,600 seconds (1 hour).</p>
97
- * <p>
98
- * <b>Permissions</b>
99
- * </p>
100
- * <p>You can use the temporary credentials created by <code>GetFederationToken</code> in
101
- * any Amazon Web Services service except the following:</p>
102
- * <ul>
103
- * <li>
104
- * <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API.
105
- * </p>
106
- * </li>
107
- * <li>
108
- * <p>You cannot call any STS operations except
109
- * <code>GetCallerIdentity</code>.</p>
110
- * </li>
111
- * </ul>
112
- * <p>You must pass an inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policy</a> to
113
- * this operation. You can pass a single JSON policy document to use as an inline session
114
- * policy. You can also specify up to 10 managed policies to use as managed session
115
- * policies. The plain text that you use for both inline and managed session policies can't
116
- * exceed 2,048 characters.</p>
117
- * <p>Though the session policy parameters are optional, if you do not pass a policy, then
118
- * the resulting federated user session has no permissions. When you pass session policies,
119
- * the session permissions are the intersection of the IAM user policies and the session
120
- * policies that you pass. This gives you a way to further restrict the permissions for a
121
- * federated user. You cannot use session policies to grant more permissions than those
122
- * that are defined in the permissions policy of the IAM user. For more information, see
123
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session Policies</a>
124
- * in the <i>IAM User Guide</i>. For information about using
125
- * <code>GetFederationToken</code> to create temporary security credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken">GetFederationToken—Federation Through a Custom Identity Broker</a>. </p>
126
- * <p>You can use the credentials to access a resource that has a resource-based policy. If
127
- * that policy specifically references the federated user session in the
128
- * <code>Principal</code> element of the policy, the session has the permissions
129
- * allowed by the policy. These permissions are granted in addition to the permissions
130
- * granted by the session policies.</p>
131
- * <p>
132
- * <b>Tags</b>
133
- * </p>
134
- * <p>(Optional) You can pass tag key-value pairs to your session. These are called session
135
- * tags. For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
136
- * the <i>IAM User Guide</i>.</p>
137
- * <p>An administrator must grant you the permissions necessary to pass session tags. The
138
- * administrator can also create granular permissions to allow you to pass only specific
139
- * session tags. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html">Tutorial: Using
140
- * Tags for Attribute-Based Access Control</a> in the
141
- * <i>IAM User Guide</i>.</p>
142
- * <p>Tag key–value pairs are not case sensitive, but case is preserved. This means that you
143
- * cannot have separate <code>Department</code> and <code>department</code> tag keys.
144
- * Assume that the user that you are federating has the
145
- * <code>Department</code>=<code>Marketing</code> tag and you pass the
146
- * <code>department</code>=<code>engineering</code> session tag.
147
- * <code>Department</code> and <code>department</code> are not saved as separate tags,
148
- * and the session tag passed in the request takes precedence over the user tag.</p>
77
+ * <note>
78
+ * <p>You can create a mobile-based or browser-based app that can authenticate users using
79
+ * a web identity provider like Login with Amazon, Facebook, Google, or an OpenID
80
+ * Connect-compatible identity provider. In this case, we recommend that you use <a href="http://aws.amazon.com/cognito/">Amazon Cognito</a> or
81
+ * <code>AssumeRoleWithWebIdentity</code>. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity">Federation Through a Web-based Identity Provider</a> in the
82
+ * <i>IAM User Guide</i>.</p>
83
+ * </note>
84
+ * <p>An administrator must grant you the permissions necessary to pass session tags. The
85
+ * administrator can also create granular permissions to allow you to pass only specific
86
+ * session tags. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html">Tutorial: Using Tags
87
+ * for Attribute-Based Access Control</a> in the
88
+ * <i>IAM User Guide</i>.</p>
89
+ * <p>Tag key–value pairs are not case sensitive, but case is preserved. This means that you
90
+ * cannot have separate <code>Department</code> and <code>department</code> tag keys. Assume
91
+ * that the user that you are federating has the
92
+ * <code>Department</code>=<code>Marketing</code> tag and you pass the
93
+ * <code>department</code>=<code>engineering</code> session tag. <code>Department</code>
94
+ * and <code>department</code> are not saved as separate tags, and the session tag passed in
95
+ * the request takes precedence over the user tag.</p>
149
96
  * @example
150
97
  * Use a bare-bones client and the command you need to make an API call.
151
98
  * ```javascript
@@ -158,7 +105,7 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
158
105
  *
159
106
  * @see {@link GetFederationTokenCommandInput} for command's `input` shape.
160
107
  * @see {@link GetFederationTokenCommandOutput} for command's `response` shape.
161
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
108
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
162
109
  *
163
110
  */
164
111
  export declare class GetFederationTokenCommand extends $Command<GetFederationTokenCommandInput, GetFederationTokenCommandOutput, STSClientResolvedConfig> {
@@ -18,7 +18,7 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
18
18
  * the API returns an access denied error. For a comparison of <code>GetSessionToken</code>
19
19
  * with the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
20
20
  * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
21
- * STS API operations</a> in the <i>IAM User Guide</i>.</p>
21
+ * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
22
22
  * <p>
23
23
  * <b>Session Duration</b>
24
24
  * </p>
@@ -71,7 +71,7 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
71
71
  *
72
72
  * @see {@link GetSessionTokenCommandInput} for command's `input` shape.
73
73
  * @see {@link GetSessionTokenCommandOutput} for command's `response` shape.
74
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
74
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
75
75
  *
76
76
  */
77
77
  export declare class GetSessionTokenCommand extends $Command<GetSessionTokenCommandInput, GetSessionTokenCommandOutput, STSClientResolvedConfig> {