@aws-sdk/client-verifiedpermissions 3.799.0 → 3.801.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/README.md +25 -65
  2. package/dist-cjs/index.js +158 -0
  3. package/dist-es/VerifiedPermissions.js +6 -0
  4. package/dist-es/commands/ListTagsForResourceCommand.js +22 -0
  5. package/dist-es/commands/TagResourceCommand.js +22 -0
  6. package/dist-es/commands/UntagResourceCommand.js +22 -0
  7. package/dist-es/commands/index.js +3 -0
  8. package/dist-es/models/models_0.js +18 -0
  9. package/dist-es/protocols/Aws_json1_0.js +73 -1
  10. package/dist-types/VerifiedPermissions.d.ts +22 -65
  11. package/dist-types/VerifiedPermissionsClient.d.ts +6 -67
  12. package/dist-types/commands/BatchGetPolicyCommand.d.ts +2 -88
  13. package/dist-types/commands/BatchIsAuthorizedCommand.d.ts +2 -103
  14. package/dist-types/commands/BatchIsAuthorizedWithTokenCommand.d.ts +2 -101
  15. package/dist-types/commands/CreateIdentitySourceCommand.d.ts +3 -121
  16. package/dist-types/commands/CreatePolicyCommand.d.ts +3 -111
  17. package/dist-types/commands/CreatePolicyStoreCommand.d.ts +6 -95
  18. package/dist-types/commands/CreatePolicyTemplateCommand.d.ts +3 -97
  19. package/dist-types/commands/DeleteIdentitySourceCommand.d.ts +3 -88
  20. package/dist-types/commands/DeletePolicyCommand.d.ts +3 -87
  21. package/dist-types/commands/DeletePolicyStoreCommand.d.ts +2 -85
  22. package/dist-types/commands/DeletePolicyTemplateCommand.d.ts +3 -90
  23. package/dist-types/commands/GetIdentitySourceCommand.d.ts +1 -82
  24. package/dist-types/commands/GetPolicyCommand.d.ts +1 -82
  25. package/dist-types/commands/GetPolicyStoreCommand.d.ts +6 -82
  26. package/dist-types/commands/GetPolicyTemplateCommand.d.ts +1 -82
  27. package/dist-types/commands/GetSchemaCommand.d.ts +1 -82
  28. package/dist-types/commands/IsAuthorizedCommand.d.ts +2 -88
  29. package/dist-types/commands/IsAuthorizedWithTokenCommand.d.ts +2 -96
  30. package/dist-types/commands/ListIdentitySourcesCommand.d.ts +1 -82
  31. package/dist-types/commands/ListPoliciesCommand.d.ts +1 -82
  32. package/dist-types/commands/ListPolicyStoresCommand.d.ts +1 -82
  33. package/dist-types/commands/ListPolicyTemplatesCommand.d.ts +1 -82
  34. package/dist-types/commands/ListTagsForResourceCommand.d.ts +107 -0
  35. package/dist-types/commands/PutSchemaCommand.d.ts +3 -95
  36. package/dist-types/commands/TagResourceCommand.d.ts +108 -0
  37. package/dist-types/commands/UntagResourceCommand.d.ts +105 -0
  38. package/dist-types/commands/UpdateIdentitySourceCommand.d.ts +3 -92
  39. package/dist-types/commands/UpdatePolicyCommand.d.ts +3 -135
  40. package/dist-types/commands/UpdatePolicyStoreCommand.d.ts +3 -91
  41. package/dist-types/commands/UpdatePolicyTemplateCommand.d.ts +3 -97
  42. package/dist-types/commands/index.d.ts +3 -0
  43. package/dist-types/index.d.ts +1 -65
  44. package/dist-types/models/models_0.d.ts +385 -1235
  45. package/dist-types/protocols/Aws_json1_0.d.ts +27 -0
  46. package/dist-types/ts3.4/VerifiedPermissions.d.ts +51 -0
  47. package/dist-types/ts3.4/VerifiedPermissionsClient.d.ts +18 -0
  48. package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +51 -0
  49. package/dist-types/ts3.4/commands/TagResourceCommand.d.ts +47 -0
  50. package/dist-types/ts3.4/commands/UntagResourceCommand.d.ts +47 -0
  51. package/dist-types/ts3.4/commands/index.d.ts +3 -0
  52. package/dist-types/ts3.4/models/models_0.d.ts +33 -0
  53. package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +36 -0
  54. package/package.json +1 -1
@@ -27,13 +27,7 @@ declare const UpdatePolicyStoreCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Modifies the validation setting for a policy store.</p>
31
- * <note>
32
- * <p>Verified Permissions is <i>
33
- * <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a>
34
- * </i>. It can take a few seconds for a new or changed element to propagate through
35
- * the service and be visible in the results of other Verified Permissions operations.</p>
36
- * </note>
30
+ * <p>Modifies the validation setting for a policy store.</p> <note> <p>Verified Permissions is <i> <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a> </i>. It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.</p> </note>
37
31
  * @example
38
32
  * Use a bare-bones client and the command you need to make an API call.
39
33
  * ```javascript
@@ -66,8 +60,7 @@ declare const UpdatePolicyStoreCommand_base: {
66
60
  * @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
67
61
  *
68
62
  * @throws {@link ConflictException} (client fault)
69
- * <p>The request failed because another request to modify a resource occurred at the
70
- * same.</p>
63
+ * <p>The request failed because another request to modify a resource occurred at the same.</p>
71
64
  *
72
65
  * @throws {@link ResourceNotFoundException} (client fault)
73
66
  * <p>The request failed because it references a resource that doesn't exist.</p>
@@ -82,88 +75,7 @@ declare const UpdatePolicyStoreCommand_base: {
82
75
  * <p>The request failed because it exceeded a throttling quota.</p>
83
76
  *
84
77
  * @throws {@link ValidationException} (client fault)
85
- * <p>The request failed because one or more input parameters don't satisfy their constraint
86
- * requirements. The output is provided as a list of fields and a reason for each field that
87
- * isn't valid.</p>
88
- * <p>The possible reasons include the following:</p>
89
- * <ul>
90
- * <li>
91
- * <p>
92
- * <b>UnrecognizedEntityType</b>
93
- * </p>
94
- * <p>The policy includes an entity type that isn't found in the schema.</p>
95
- * </li>
96
- * <li>
97
- * <p>
98
- * <b>UnrecognizedActionId</b>
99
- * </p>
100
- * <p>The policy includes an action id that isn't found in the schema.</p>
101
- * </li>
102
- * <li>
103
- * <p>
104
- * <b>InvalidActionApplication</b>
105
- * </p>
106
- * <p>The policy includes an action that, according to the schema, doesn't support
107
- * the specified principal and resource.</p>
108
- * </li>
109
- * <li>
110
- * <p>
111
- * <b>UnexpectedType</b>
112
- * </p>
113
- * <p>The policy included an operand that isn't a valid type for the specified
114
- * operation.</p>
115
- * </li>
116
- * <li>
117
- * <p>
118
- * <b>IncompatibleTypes</b>
119
- * </p>
120
- * <p>The types of elements included in a <code>set</code>, or the types of
121
- * expressions used in an <code>if...then...else</code> clause aren't compatible in
122
- * this context.</p>
123
- * </li>
124
- * <li>
125
- * <p>
126
- * <b>MissingAttribute</b>
127
- * </p>
128
- * <p>The policy attempts to access a record or entity attribute that isn't
129
- * specified in the schema. Test for the existence of the attribute first before
130
- * attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
131
- * <i>Cedar Policy Language Guide</i>.</p>
132
- * </li>
133
- * <li>
134
- * <p>
135
- * <b>UnsafeOptionalAttributeAccess</b>
136
- * </p>
137
- * <p>The policy attempts to access a record or entity attribute that is optional
138
- * and isn't guaranteed to be present. Test for the existence of the attribute
139
- * first before attempting to access its value. For more information, see the
140
- * <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
141
- * <i>Cedar Policy Language Guide</i>.</p>
142
- * </li>
143
- * <li>
144
- * <p>
145
- * <b>ImpossiblePolicy</b>
146
- * </p>
147
- * <p>Cedar has determined that a policy condition always evaluates to false. If
148
- * the policy is always false, it can never apply to any query, and so it can never
149
- * affect an authorization decision.</p>
150
- * </li>
151
- * <li>
152
- * <p>
153
- * <b>WrongNumberArguments</b>
154
- * </p>
155
- * <p>The policy references an extension type with the wrong number of
156
- * arguments.</p>
157
- * </li>
158
- * <li>
159
- * <p>
160
- * <b>FunctionArgumentValidationError</b>
161
- * </p>
162
- * <p>Cedar couldn't parse the argument passed to an extension type. For example,
163
- * a string that is to be parsed as an IPv4 address can contain only digits and the
164
- * period character.</p>
165
- * </li>
166
- * </ul>
78
+ * <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
167
79
  *
168
80
  * @throws {@link VerifiedPermissionsServiceException}
169
81
  * <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
@@ -27,19 +27,7 @@ declare const UpdatePolicyTemplateCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Updates the specified policy template. You can update only the description and the some elements
31
- * of the <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_UpdatePolicyTemplate.html#amazonverifiedpermissions-UpdatePolicyTemplate-request-policyBody">policyBody</a>. </p>
32
- * <important>
33
- * <p>Changes you make to the policy template content are immediately (within the constraints of
34
- * eventual consistency) reflected in authorization decisions that involve all template-linked policies
35
- * instantiated from this template.</p>
36
- * </important>
37
- * <note>
38
- * <p>Verified Permissions is <i>
39
- * <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a>
40
- * </i>. It can take a few seconds for a new or changed element to propagate through
41
- * the service and be visible in the results of other Verified Permissions operations.</p>
42
- * </note>
30
+ * <p>Updates the specified policy template. You can update only the description and the some elements of the <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_UpdatePolicyTemplate.html#amazonverifiedpermissions-UpdatePolicyTemplate-request-policyBody">policyBody</a>. </p> <important> <p>Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template.</p> </important> <note> <p>Verified Permissions is <i> <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a> </i>. It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.</p> </note>
43
31
  * @example
44
32
  * Use a bare-bones client and the command you need to make an API call.
45
33
  * ```javascript
@@ -70,8 +58,7 @@ declare const UpdatePolicyTemplateCommand_base: {
70
58
  * @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
71
59
  *
72
60
  * @throws {@link ConflictException} (client fault)
73
- * <p>The request failed because another request to modify a resource occurred at the
74
- * same.</p>
61
+ * <p>The request failed because another request to modify a resource occurred at the same.</p>
75
62
  *
76
63
  * @throws {@link ResourceNotFoundException} (client fault)
77
64
  * <p>The request failed because it references a resource that doesn't exist.</p>
@@ -86,88 +73,7 @@ declare const UpdatePolicyTemplateCommand_base: {
86
73
  * <p>The request failed because it exceeded a throttling quota.</p>
87
74
  *
88
75
  * @throws {@link ValidationException} (client fault)
89
- * <p>The request failed because one or more input parameters don't satisfy their constraint
90
- * requirements. The output is provided as a list of fields and a reason for each field that
91
- * isn't valid.</p>
92
- * <p>The possible reasons include the following:</p>
93
- * <ul>
94
- * <li>
95
- * <p>
96
- * <b>UnrecognizedEntityType</b>
97
- * </p>
98
- * <p>The policy includes an entity type that isn't found in the schema.</p>
99
- * </li>
100
- * <li>
101
- * <p>
102
- * <b>UnrecognizedActionId</b>
103
- * </p>
104
- * <p>The policy includes an action id that isn't found in the schema.</p>
105
- * </li>
106
- * <li>
107
- * <p>
108
- * <b>InvalidActionApplication</b>
109
- * </p>
110
- * <p>The policy includes an action that, according to the schema, doesn't support
111
- * the specified principal and resource.</p>
112
- * </li>
113
- * <li>
114
- * <p>
115
- * <b>UnexpectedType</b>
116
- * </p>
117
- * <p>The policy included an operand that isn't a valid type for the specified
118
- * operation.</p>
119
- * </li>
120
- * <li>
121
- * <p>
122
- * <b>IncompatibleTypes</b>
123
- * </p>
124
- * <p>The types of elements included in a <code>set</code>, or the types of
125
- * expressions used in an <code>if...then...else</code> clause aren't compatible in
126
- * this context.</p>
127
- * </li>
128
- * <li>
129
- * <p>
130
- * <b>MissingAttribute</b>
131
- * </p>
132
- * <p>The policy attempts to access a record or entity attribute that isn't
133
- * specified in the schema. Test for the existence of the attribute first before
134
- * attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
135
- * <i>Cedar Policy Language Guide</i>.</p>
136
- * </li>
137
- * <li>
138
- * <p>
139
- * <b>UnsafeOptionalAttributeAccess</b>
140
- * </p>
141
- * <p>The policy attempts to access a record or entity attribute that is optional
142
- * and isn't guaranteed to be present. Test for the existence of the attribute
143
- * first before attempting to access its value. For more information, see the
144
- * <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
145
- * <i>Cedar Policy Language Guide</i>.</p>
146
- * </li>
147
- * <li>
148
- * <p>
149
- * <b>ImpossiblePolicy</b>
150
- * </p>
151
- * <p>Cedar has determined that a policy condition always evaluates to false. If
152
- * the policy is always false, it can never apply to any query, and so it can never
153
- * affect an authorization decision.</p>
154
- * </li>
155
- * <li>
156
- * <p>
157
- * <b>WrongNumberArguments</b>
158
- * </p>
159
- * <p>The policy references an extension type with the wrong number of
160
- * arguments.</p>
161
- * </li>
162
- * <li>
163
- * <p>
164
- * <b>FunctionArgumentValidationError</b>
165
- * </p>
166
- * <p>Cedar couldn't parse the argument passed to an extension type. For example,
167
- * a string that is to be parsed as an IPv4 address can contain only digits and the
168
- * period character.</p>
169
- * </li>
170
- * </ul>
76
+ * <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
171
77
  *
172
78
  * @throws {@link VerifiedPermissionsServiceException}
173
79
  * <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
@@ -20,7 +20,10 @@ export * from "./ListIdentitySourcesCommand";
20
20
  export * from "./ListPoliciesCommand";
21
21
  export * from "./ListPolicyStoresCommand";
22
22
  export * from "./ListPolicyTemplatesCommand";
23
+ export * from "./ListTagsForResourceCommand";
23
24
  export * from "./PutSchemaCommand";
25
+ export * from "./TagResourceCommand";
26
+ export * from "./UntagResourceCommand";
24
27
  export * from "./UpdateIdentitySourceCommand";
25
28
  export * from "./UpdatePolicyCommand";
26
29
  export * from "./UpdatePolicyStoreCommand";
@@ -1,69 +1,5 @@
1
1
  /**
2
- * <p>Amazon Verified Permissions is a permissions management service from Amazon Web Services. You can use Verified Permissions to manage
3
- * permissions for your application, and authorize user access based on those permissions.
4
- * Using Verified Permissions, application developers can grant access based on information about the
5
- * users, resources, and requested actions. You can also evaluate additional information
6
- * like group membership, attributes of the resources, and session context, such as time of
7
- * request and IP addresses. Verified Permissions manages these permissions by letting you create and
8
- * store authorization policies for your applications, such as consumer-facing web sites
9
- * and enterprise business systems.</p>
10
- * <p>Verified Permissions uses Cedar as the policy language to express your permission requirements.
11
- * Cedar supports both role-based access control (RBAC) and attribute-based access
12
- * control (ABAC) authorization models.</p>
13
- * <p>For more information about configuring, administering, and using Amazon Verified Permissions in your
14
- * applications, see the <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/userguide/">Amazon Verified Permissions User Guide</a>.</p>
15
- * <p>For more information about the Cedar policy language, see the <a href="https://docs.cedarpolicy.com/">Cedar Policy Language Guide</a>.</p>
16
- * <important>
17
- * <p>When you write Cedar policies that reference principals, resources and actions,
18
- * you can define the unique identifiers used for each of those elements. We strongly
19
- * recommend that you follow these best practices:</p>
20
- * <ul>
21
- * <li>
22
- * <p>
23
- * <b>Use values like universally unique identifiers
24
- * (UUIDs) for all principal and resource identifiers.</b>
25
- * </p>
26
- * <p>For example, if user <code>jane</code> leaves the company, and you later
27
- * let someone else use the name <code>jane</code>, then that new user
28
- * automatically gets access to everything granted by policies that still
29
- * reference <code>User::"jane"</code>. Cedar can’t distinguish between the
30
- * new user and the old. This applies to both principal and resource
31
- * identifiers. Always use identifiers that are guaranteed unique and never
32
- * reused to ensure that you don’t unintentionally grant access because of the
33
- * presence of an old identifier in a policy.</p>
34
- * <p>Where you use a UUID for an entity, we recommend that you follow it with
35
- * the // comment specifier and the ‘friendly’ name of your entity. This helps
36
- * to make your policies easier to understand. For example: principal ==
37
- * User::"a1b2c3d4-e5f6-a1b2-c3d4-EXAMPLE11111", // alice</p>
38
- * </li>
39
- * <li>
40
- * <p>
41
- * <b>Do not include personally identifying, confidential,
42
- * or sensitive information as part of the unique identifier for your
43
- * principals or resources.</b> These identifiers are included in
44
- * log entries shared in CloudTrail trails.</p>
45
- * </li>
46
- * </ul>
47
- * </important>
48
- * <p>Several operations return structures that appear similar, but have different purposes.
49
- * As new functionality is added to the product, the structure used in a parameter of one
50
- * operation might need to change in a way that wouldn't make sense for the same parameter
51
- * in a different operation. To help you understand the purpose of each, the following
52
- * naming convention is used for the structures:</p>
53
- * <ul>
54
- * <li>
55
- * <p>Parameter type structures that end in <code>Detail</code> are used in
56
- * <code>Get</code> operations.</p>
57
- * </li>
58
- * <li>
59
- * <p>Parameter type structures that end in <code>Item</code> are used in
60
- * <code>List</code> operations.</p>
61
- * </li>
62
- * <li>
63
- * <p>Parameter type structures that use neither suffix are used in the mutating
64
- * (create and update) operations.</p>
65
- * </li>
66
- * </ul>
2
+ * <p>Amazon Verified Permissions is a permissions management service from Amazon Web Services. You can use Verified Permissions to manage permissions for your application, and authorize user access based on those permissions. Using Verified Permissions, application developers can grant access based on information about the users, resources, and requested actions. You can also evaluate additional information like group membership, attributes of the resources, and session context, such as time of request and IP addresses. Verified Permissions manages these permissions by letting you create and store authorization policies for your applications, such as consumer-facing web sites and enterprise business systems.</p> <p>Verified Permissions uses Cedar as the policy language to express your permission requirements. Cedar supports both role-based access control (RBAC) and attribute-based access control (ABAC) authorization models.</p> <p>For more information about configuring, administering, and using Amazon Verified Permissions in your applications, see the <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/userguide/">Amazon Verified Permissions User Guide</a>.</p> <p>For more information about the Cedar policy language, see the <a href="https://docs.cedarpolicy.com/">Cedar Policy Language Guide</a>.</p> <important> <p>When you write Cedar policies that reference principals, resources and actions, you can define the unique identifiers used for each of those elements. We strongly recommend that you follow these best practices:</p> <ul> <li> <p> <b>Use values like universally unique identifiers (UUIDs) for all principal and resource identifiers.</b> </p> <p>For example, if user <code>jane</code> leaves the company, and you later let someone else use the name <code>jane</code>, then that new user automatically gets access to everything granted by policies that still reference <code>User::"jane"</code>. Cedar can’t distinguish between the new user and the old. This applies to both principal and resource identifiers. Always use identifiers that are guaranteed unique and never reused to ensure that you don’t unintentionally grant access because of the presence of an old identifier in a policy.</p> <p>Where you use a UUID for an entity, we recommend that you follow it with the // comment specifier and the ‘friendly’ name of your entity. This helps to make your policies easier to understand. For example: principal == User::"a1b2c3d4-e5f6-a1b2-c3d4-EXAMPLE11111", // alice</p> </li> <li> <p> <b>Do not include personally identifying, confidential, or sensitive information as part of the unique identifier for your principals or resources.</b> These identifiers are included in log entries shared in CloudTrail trails.</p> </li> </ul> </important> <p>Several operations return structures that appear similar, but have different purposes. As new functionality is added to the product, the structure used in a parameter of one operation might need to change in a way that wouldn't make sense for the same parameter in a different operation. To help you understand the purpose of each, the following naming convention is used for the structures:</p> <ul> <li> <p>Parameter type structures that end in <code>Detail</code> are used in <code>Get</code> operations.</p> </li> <li> <p>Parameter type structures that end in <code>Item</code> are used in <code>List</code> operations.</p> </li> <li> <p>Parameter type structures that use neither suffix are used in the mutating (create and update) operations.</p> </li> </ul>
67
3
  *
68
4
  * @packageDocumentation
69
5
  */