aws-sdk 2.1635.0 → 2.1637.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/account-2021-02-01.min.json +101 -19
- package/apis/auditmanager-2017-07-25.min.json +57 -38
- package/apis/b2bi-2022-06-23.min.json +8 -1
- package/apis/codepipeline-2015-07-09.min.json +4 -1
- package/apis/firehose-2015-08-04.min.json +205 -159
- package/apis/fsx-2018-03-01.min.json +199 -163
- package/apis/glue-2017-03-31.min.json +176 -143
- package/apis/iotwireless-2020-11-22.min.json +3 -0
- package/apis/location-2020-11-19.min.json +1036 -754
- package/apis/location-2020-11-19.paginators.json +6 -0
- package/apis/sagemaker-2017-07-24.min.json +731 -730
- package/apis/sns-2010-03-31.min.json +7 -1
- package/apis/sqs-2012-11-05.min.json +3 -0
- package/apis/storagegateway-2013-06-30.min.json +30 -14
- package/apis/verifiedpermissions-2021-12-01.min.json +321 -84
- package/clients/account.d.ts +84 -9
- package/clients/auditmanager.d.ts +45 -33
- package/clients/b2bi.d.ts +1 -1
- package/clients/codepipeline.d.ts +4 -4
- package/clients/firehose.d.ts +73 -10
- package/clients/fsx.d.ts +62 -18
- package/clients/glue.d.ts +58 -0
- package/clients/iotwireless.d.ts +1 -1
- package/clients/location.d.ts +981 -677
- package/clients/sagemaker.d.ts +9 -4
- package/clients/sns.d.ts +7 -7
- package/clients/sqs.d.ts +5 -5
- package/clients/storagegateway.d.ts +31 -16
- package/clients/verifiedpermissions.d.ts +260 -8
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +16 -16
- package/dist/aws-sdk.js +1278 -916
- package/dist/aws-sdk.min.js +61 -61
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -28,11 +28,11 @@ declare class VerifiedPermissions extends Service {
|
|
28
28
|
*/
|
29
29
|
batchIsAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput, AWSError>;
|
30
30
|
/**
|
31
|
-
*
|
31
|
+
* Adds an identity source to a policy store–an Amazon Cognito user pool or OpenID Connect (OIDC) identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken or BatchIsAuthorizedWithToken API operations. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Identity sources provide identity (ID) tokens and access tokens. Verified Permissions derives information about your user and session from token claims. Access tokens provide action context to your policies, and ID tokens provide principal Attributes. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store To reference a user from this identity source in your Cedar policies, refer to the following syntax examples. Amazon Cognito user pool: Namespace::[Entity type]::[User pool ID]|[user principal attribute], for example MyCorp::User::us-east-1_EXAMPLE|a1b2c3d4-5678-90ab-cdef-EXAMPLE11111. OpenID Connect (OIDC) provider: Namespace::[Entity type]::[principalIdClaim]|[user principal attribute], for example MyCorp::User::MyOIDCProvider|a1b2c3d4-5678-90ab-cdef-EXAMPLE22222. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
32
32
|
*/
|
33
33
|
createIdentitySource(params: VerifiedPermissions.Types.CreateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
|
34
34
|
/**
|
35
|
-
*
|
35
|
+
* Adds an identity source to a policy store–an Amazon Cognito user pool or OpenID Connect (OIDC) identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken or BatchIsAuthorizedWithToken API operations. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Identity sources provide identity (ID) tokens and access tokens. Verified Permissions derives information about your user and session from token claims. Access tokens provide action context to your policies, and ID tokens provide principal Attributes. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store To reference a user from this identity source in your Cedar policies, refer to the following syntax examples. Amazon Cognito user pool: Namespace::[Entity type]::[User pool ID]|[user principal attribute], for example MyCorp::User::us-east-1_EXAMPLE|a1b2c3d4-5678-90ab-cdef-EXAMPLE11111. OpenID Connect (OIDC) provider: Namespace::[Entity type]::[principalIdClaim]|[user principal attribute], for example MyCorp::User::MyOIDCProvider|a1b2c3d4-5678-90ab-cdef-EXAMPLE22222. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
36
36
|
*/
|
37
37
|
createIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
|
38
38
|
/**
|
@@ -140,11 +140,11 @@ declare class VerifiedPermissions extends Service {
|
|
140
140
|
*/
|
141
141
|
isAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedOutput, AWSError>;
|
142
142
|
/**
|
143
|
-
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature.
|
143
|
+
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store
|
144
144
|
*/
|
145
145
|
isAuthorizedWithToken(params: VerifiedPermissions.Types.IsAuthorizedWithTokenInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
|
146
146
|
/**
|
147
|
-
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature.
|
147
|
+
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store
|
148
148
|
*/
|
149
149
|
isAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
|
150
150
|
/**
|
@@ -188,11 +188,11 @@ declare class VerifiedPermissions extends Service {
|
|
188
188
|
*/
|
189
189
|
putSchema(callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
|
190
190
|
/**
|
191
|
-
* Updates the specified identity source to use a new identity provider (IdP)
|
191
|
+
* Updates the specified identity source to use a new identity provider (IdP), or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
192
192
|
*/
|
193
193
|
updateIdentitySource(params: VerifiedPermissions.Types.UpdateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
194
194
|
/**
|
195
|
-
* Updates the specified identity source to use a new identity provider (IdP)
|
195
|
+
* Updates the specified identity source to use a new identity provider (IdP), or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
196
196
|
*/
|
197
197
|
updateIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
198
198
|
/**
|
@@ -260,6 +260,8 @@ declare namespace VerifiedPermissions {
|
|
260
260
|
*/
|
261
261
|
record?: RecordAttribute;
|
262
262
|
}
|
263
|
+
export type Audience = string;
|
264
|
+
export type Audiences = Audience[];
|
263
265
|
export interface BatchIsAuthorizedInput {
|
264
266
|
/**
|
265
267
|
* Specifies the ID of the policy store. Policies in this policy store will be used to make the authorization decisions for the input.
|
@@ -386,6 +388,7 @@ declare namespace VerifiedPermissions {
|
|
386
388
|
export type BatchIsAuthorizedWithTokenOutputList = BatchIsAuthorizedWithTokenOutputItem[];
|
387
389
|
export type Boolean = boolean;
|
388
390
|
export type BooleanAttribute = boolean;
|
391
|
+
export type Claim = string;
|
389
392
|
export type ClientId = string;
|
390
393
|
export type ClientIds = ClientId[];
|
391
394
|
export interface CognitoGroupConfiguration {
|
@@ -461,18 +464,30 @@ declare namespace VerifiedPermissions {
|
|
461
464
|
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
|
462
465
|
*/
|
463
466
|
cognitoUserPoolConfiguration?: CognitoUserPoolConfiguration;
|
467
|
+
/**
|
468
|
+
* Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details. Example:"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
|
469
|
+
*/
|
470
|
+
openIdConnectConfiguration?: OpenIdConnectConfiguration;
|
464
471
|
}
|
465
472
|
export interface ConfigurationDetail {
|
466
473
|
/**
|
467
474
|
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool, the policy store entity that you want to assign to user groups, and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
|
468
475
|
*/
|
469
476
|
cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationDetail;
|
477
|
+
/**
|
478
|
+
* Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details. Example:"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
|
479
|
+
*/
|
480
|
+
openIdConnectConfiguration?: OpenIdConnectConfigurationDetail;
|
470
481
|
}
|
471
482
|
export interface ConfigurationItem {
|
472
483
|
/**
|
473
484
|
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool, the policy store entity that you want to assign to user groups, and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
|
474
485
|
*/
|
475
486
|
cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationItem;
|
487
|
+
/**
|
488
|
+
* Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details. Example:"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
|
489
|
+
*/
|
490
|
+
openIdConnectConfiguration?: OpenIdConnectConfigurationItem;
|
476
491
|
}
|
477
492
|
export interface ContextDefinition {
|
478
493
|
/**
|
@@ -491,7 +506,7 @@ declare namespace VerifiedPermissions {
|
|
491
506
|
*/
|
492
507
|
policyStoreId: PolicyStoreId;
|
493
508
|
/**
|
494
|
-
* Specifies the details required to communicate with the identity provider (IdP) associated with this identity source.
|
509
|
+
* Specifies the details required to communicate with the identity provider (IdP) associated with this identity source.
|
495
510
|
*/
|
496
511
|
configuration: Configuration;
|
497
512
|
/**
|
@@ -698,6 +713,7 @@ declare namespace VerifiedPermissions {
|
|
698
713
|
}
|
699
714
|
export type EntityAttributes = {[key: string]: AttributeValue};
|
700
715
|
export type EntityId = string;
|
716
|
+
export type EntityIdPrefix = string;
|
701
717
|
export interface EntityIdentifier {
|
702
718
|
/**
|
703
719
|
* The type of an entity. Example: "entityType":"typeName"
|
@@ -718,7 +734,7 @@ declare namespace VerifiedPermissions {
|
|
718
734
|
*/
|
719
735
|
attributes?: EntityAttributes;
|
720
736
|
/**
|
721
|
-
* The
|
737
|
+
* The parent entities in the hierarchy that contains the entity. A principal or resource entity can be defined with at most 99 transitive parents per authorization request. A transitive parent is an entity in the hierarchy of entities including all direct parents, and parents of parents. For example, a user can be a member of 91 groups if one of those groups is a member of eight groups, for a total of 100: one entity, 91 entity parents, and eight parents of parents.
|
722
738
|
*/
|
723
739
|
parents?: ParentList;
|
724
740
|
}
|
@@ -1201,6 +1217,180 @@ declare namespace VerifiedPermissions {
|
|
1201
1217
|
export type Namespace = string;
|
1202
1218
|
export type NamespaceList = Namespace[];
|
1203
1219
|
export type NextToken = string;
|
1220
|
+
export interface OpenIdConnectAccessTokenConfiguration {
|
1221
|
+
/**
|
1222
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1223
|
+
*/
|
1224
|
+
principalIdClaim?: Claim;
|
1225
|
+
/**
|
1226
|
+
* The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
|
1227
|
+
*/
|
1228
|
+
audiences?: Audiences;
|
1229
|
+
}
|
1230
|
+
export interface OpenIdConnectAccessTokenConfigurationDetail {
|
1231
|
+
/**
|
1232
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1233
|
+
*/
|
1234
|
+
principalIdClaim?: Claim;
|
1235
|
+
/**
|
1236
|
+
* The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
|
1237
|
+
*/
|
1238
|
+
audiences?: Audiences;
|
1239
|
+
}
|
1240
|
+
export interface OpenIdConnectAccessTokenConfigurationItem {
|
1241
|
+
/**
|
1242
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1243
|
+
*/
|
1244
|
+
principalIdClaim?: Claim;
|
1245
|
+
/**
|
1246
|
+
* The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
|
1247
|
+
*/
|
1248
|
+
audiences?: Audiences;
|
1249
|
+
}
|
1250
|
+
export interface OpenIdConnectConfiguration {
|
1251
|
+
/**
|
1252
|
+
* The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
|
1253
|
+
*/
|
1254
|
+
issuer: Issuer;
|
1255
|
+
/**
|
1256
|
+
* A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
|
1257
|
+
*/
|
1258
|
+
entityIdPrefix?: EntityIdPrefix;
|
1259
|
+
/**
|
1260
|
+
* The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
|
1261
|
+
*/
|
1262
|
+
groupConfiguration?: OpenIdConnectGroupConfiguration;
|
1263
|
+
/**
|
1264
|
+
* The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
|
1265
|
+
*/
|
1266
|
+
tokenSelection: OpenIdConnectTokenSelection;
|
1267
|
+
}
|
1268
|
+
export interface OpenIdConnectConfigurationDetail {
|
1269
|
+
/**
|
1270
|
+
* The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
|
1271
|
+
*/
|
1272
|
+
issuer: Issuer;
|
1273
|
+
/**
|
1274
|
+
* A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
|
1275
|
+
*/
|
1276
|
+
entityIdPrefix?: EntityIdPrefix;
|
1277
|
+
/**
|
1278
|
+
* The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
|
1279
|
+
*/
|
1280
|
+
groupConfiguration?: OpenIdConnectGroupConfigurationDetail;
|
1281
|
+
/**
|
1282
|
+
* The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
|
1283
|
+
*/
|
1284
|
+
tokenSelection: OpenIdConnectTokenSelectionDetail;
|
1285
|
+
}
|
1286
|
+
export interface OpenIdConnectConfigurationItem {
|
1287
|
+
/**
|
1288
|
+
* The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
|
1289
|
+
*/
|
1290
|
+
issuer: Issuer;
|
1291
|
+
/**
|
1292
|
+
* A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
|
1293
|
+
*/
|
1294
|
+
entityIdPrefix?: EntityIdPrefix;
|
1295
|
+
/**
|
1296
|
+
* The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
|
1297
|
+
*/
|
1298
|
+
groupConfiguration?: OpenIdConnectGroupConfigurationItem;
|
1299
|
+
/**
|
1300
|
+
* The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
|
1301
|
+
*/
|
1302
|
+
tokenSelection: OpenIdConnectTokenSelectionItem;
|
1303
|
+
}
|
1304
|
+
export interface OpenIdConnectGroupConfiguration {
|
1305
|
+
/**
|
1306
|
+
* The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
|
1307
|
+
*/
|
1308
|
+
groupClaim: Claim;
|
1309
|
+
/**
|
1310
|
+
* The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
|
1311
|
+
*/
|
1312
|
+
groupEntityType: GroupEntityType;
|
1313
|
+
}
|
1314
|
+
export interface OpenIdConnectGroupConfigurationDetail {
|
1315
|
+
/**
|
1316
|
+
* The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
|
1317
|
+
*/
|
1318
|
+
groupClaim: Claim;
|
1319
|
+
/**
|
1320
|
+
* The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
|
1321
|
+
*/
|
1322
|
+
groupEntityType: GroupEntityType;
|
1323
|
+
}
|
1324
|
+
export interface OpenIdConnectGroupConfigurationItem {
|
1325
|
+
/**
|
1326
|
+
* The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
|
1327
|
+
*/
|
1328
|
+
groupClaim: Claim;
|
1329
|
+
/**
|
1330
|
+
* The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
|
1331
|
+
*/
|
1332
|
+
groupEntityType: GroupEntityType;
|
1333
|
+
}
|
1334
|
+
export interface OpenIdConnectIdentityTokenConfiguration {
|
1335
|
+
/**
|
1336
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1337
|
+
*/
|
1338
|
+
principalIdClaim?: Claim;
|
1339
|
+
/**
|
1340
|
+
* The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
|
1341
|
+
*/
|
1342
|
+
clientIds?: ClientIds;
|
1343
|
+
}
|
1344
|
+
export interface OpenIdConnectIdentityTokenConfigurationDetail {
|
1345
|
+
/**
|
1346
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1347
|
+
*/
|
1348
|
+
principalIdClaim?: Claim;
|
1349
|
+
/**
|
1350
|
+
* The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
|
1351
|
+
*/
|
1352
|
+
clientIds?: ClientIds;
|
1353
|
+
}
|
1354
|
+
export interface OpenIdConnectIdentityTokenConfigurationItem {
|
1355
|
+
/**
|
1356
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1357
|
+
*/
|
1358
|
+
principalIdClaim?: Claim;
|
1359
|
+
/**
|
1360
|
+
* The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
|
1361
|
+
*/
|
1362
|
+
clientIds?: ClientIds;
|
1363
|
+
}
|
1364
|
+
export interface OpenIdConnectTokenSelection {
|
1365
|
+
/**
|
1366
|
+
* The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
|
1367
|
+
*/
|
1368
|
+
accessTokenOnly?: OpenIdConnectAccessTokenConfiguration;
|
1369
|
+
/**
|
1370
|
+
* The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
|
1371
|
+
*/
|
1372
|
+
identityTokenOnly?: OpenIdConnectIdentityTokenConfiguration;
|
1373
|
+
}
|
1374
|
+
export interface OpenIdConnectTokenSelectionDetail {
|
1375
|
+
/**
|
1376
|
+
* The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
|
1377
|
+
*/
|
1378
|
+
accessTokenOnly?: OpenIdConnectAccessTokenConfigurationDetail;
|
1379
|
+
/**
|
1380
|
+
* The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
|
1381
|
+
*/
|
1382
|
+
identityTokenOnly?: OpenIdConnectIdentityTokenConfigurationDetail;
|
1383
|
+
}
|
1384
|
+
export interface OpenIdConnectTokenSelectionItem {
|
1385
|
+
/**
|
1386
|
+
* The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
|
1387
|
+
*/
|
1388
|
+
accessTokenOnly?: OpenIdConnectAccessTokenConfigurationItem;
|
1389
|
+
/**
|
1390
|
+
* The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
|
1391
|
+
*/
|
1392
|
+
identityTokenOnly?: OpenIdConnectIdentityTokenConfigurationItem;
|
1393
|
+
}
|
1204
1394
|
export type OpenIdIssuer = "COGNITO"|string;
|
1205
1395
|
export type ParentList = EntityIdentifier[];
|
1206
1396
|
export interface PolicyDefinition {
|
@@ -1485,6 +1675,10 @@ declare namespace VerifiedPermissions {
|
|
1485
1675
|
* Contains configuration details of a Amazon Cognito user pool.
|
1486
1676
|
*/
|
1487
1677
|
cognitoUserPoolConfiguration?: UpdateCognitoUserPoolConfiguration;
|
1678
|
+
/**
|
1679
|
+
* Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
|
1680
|
+
*/
|
1681
|
+
openIdConnectConfiguration?: UpdateOpenIdConnectConfiguration;
|
1488
1682
|
}
|
1489
1683
|
export interface UpdateIdentitySourceInput {
|
1490
1684
|
/**
|
@@ -1522,6 +1716,64 @@ declare namespace VerifiedPermissions {
|
|
1522
1716
|
*/
|
1523
1717
|
policyStoreId: PolicyStoreId;
|
1524
1718
|
}
|
1719
|
+
export interface UpdateOpenIdConnectAccessTokenConfiguration {
|
1720
|
+
/**
|
1721
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1722
|
+
*/
|
1723
|
+
principalIdClaim?: Claim;
|
1724
|
+
/**
|
1725
|
+
* The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
|
1726
|
+
*/
|
1727
|
+
audiences?: Audiences;
|
1728
|
+
}
|
1729
|
+
export interface UpdateOpenIdConnectConfiguration {
|
1730
|
+
/**
|
1731
|
+
* The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
|
1732
|
+
*/
|
1733
|
+
issuer: Issuer;
|
1734
|
+
/**
|
1735
|
+
* A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
|
1736
|
+
*/
|
1737
|
+
entityIdPrefix?: EntityIdPrefix;
|
1738
|
+
/**
|
1739
|
+
* The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
|
1740
|
+
*/
|
1741
|
+
groupConfiguration?: UpdateOpenIdConnectGroupConfiguration;
|
1742
|
+
/**
|
1743
|
+
* The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
|
1744
|
+
*/
|
1745
|
+
tokenSelection: UpdateOpenIdConnectTokenSelection;
|
1746
|
+
}
|
1747
|
+
export interface UpdateOpenIdConnectGroupConfiguration {
|
1748
|
+
/**
|
1749
|
+
* The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
|
1750
|
+
*/
|
1751
|
+
groupClaim: Claim;
|
1752
|
+
/**
|
1753
|
+
* The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
|
1754
|
+
*/
|
1755
|
+
groupEntityType: GroupEntityType;
|
1756
|
+
}
|
1757
|
+
export interface UpdateOpenIdConnectIdentityTokenConfiguration {
|
1758
|
+
/**
|
1759
|
+
* The claim that determines the principal in OIDC access tokens. For example, sub.
|
1760
|
+
*/
|
1761
|
+
principalIdClaim?: Claim;
|
1762
|
+
/**
|
1763
|
+
* The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
|
1764
|
+
*/
|
1765
|
+
clientIds?: ClientIds;
|
1766
|
+
}
|
1767
|
+
export interface UpdateOpenIdConnectTokenSelection {
|
1768
|
+
/**
|
1769
|
+
* The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
|
1770
|
+
*/
|
1771
|
+
accessTokenOnly?: UpdateOpenIdConnectAccessTokenConfiguration;
|
1772
|
+
/**
|
1773
|
+
* The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
|
1774
|
+
*/
|
1775
|
+
identityTokenOnly?: UpdateOpenIdConnectIdentityTokenConfiguration;
|
1776
|
+
}
|
1525
1777
|
export interface UpdatePolicyDefinition {
|
1526
1778
|
/**
|
1527
1779
|
* Contains details about the updates to be applied to a static policy.
|