aws-sdk 2.1635.0 → 2.1637.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (36) hide show
  1. package/README.md +1 -1
  2. package/apis/account-2021-02-01.min.json +101 -19
  3. package/apis/auditmanager-2017-07-25.min.json +57 -38
  4. package/apis/b2bi-2022-06-23.min.json +8 -1
  5. package/apis/codepipeline-2015-07-09.min.json +4 -1
  6. package/apis/firehose-2015-08-04.min.json +205 -159
  7. package/apis/fsx-2018-03-01.min.json +199 -163
  8. package/apis/glue-2017-03-31.min.json +176 -143
  9. package/apis/iotwireless-2020-11-22.min.json +3 -0
  10. package/apis/location-2020-11-19.min.json +1036 -754
  11. package/apis/location-2020-11-19.paginators.json +6 -0
  12. package/apis/sagemaker-2017-07-24.min.json +731 -730
  13. package/apis/sns-2010-03-31.min.json +7 -1
  14. package/apis/sqs-2012-11-05.min.json +3 -0
  15. package/apis/storagegateway-2013-06-30.min.json +30 -14
  16. package/apis/verifiedpermissions-2021-12-01.min.json +321 -84
  17. package/clients/account.d.ts +84 -9
  18. package/clients/auditmanager.d.ts +45 -33
  19. package/clients/b2bi.d.ts +1 -1
  20. package/clients/codepipeline.d.ts +4 -4
  21. package/clients/firehose.d.ts +73 -10
  22. package/clients/fsx.d.ts +62 -18
  23. package/clients/glue.d.ts +58 -0
  24. package/clients/iotwireless.d.ts +1 -1
  25. package/clients/location.d.ts +981 -677
  26. package/clients/sagemaker.d.ts +9 -4
  27. package/clients/sns.d.ts +7 -7
  28. package/clients/sqs.d.ts +5 -5
  29. package/clients/storagegateway.d.ts +31 -16
  30. package/clients/verifiedpermissions.d.ts +260 -8
  31. package/dist/aws-sdk-core-react-native.js +1 -1
  32. package/dist/aws-sdk-react-native.js +16 -16
  33. package/dist/aws-sdk.js +1278 -916
  34. package/dist/aws-sdk.min.js +61 -61
  35. package/lib/core.js +1 -1
  36. package/package.json +1 -1
@@ -28,11 +28,11 @@ declare class VerifiedPermissions extends Service {
28
28
  */
29
29
  batchIsAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput, AWSError>;
30
30
  /**
31
- * Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"&lt;CognitoUserPoolIdentifier&gt;|&lt;CognitoClientId&gt; Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
31
+ * Adds an identity source to a policy store–an Amazon Cognito user pool or OpenID Connect (OIDC) identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken or BatchIsAuthorizedWithToken API operations. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Identity sources provide identity (ID) tokens and access tokens. Verified Permissions derives information about your user and session from token claims. Access tokens provide action context to your policies, and ID tokens provide principal Attributes. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store To reference a user from this identity source in your Cedar policies, refer to the following syntax examples. Amazon Cognito user pool: Namespace::[Entity type]::[User pool ID]|[user principal attribute], for example MyCorp::User::us-east-1_EXAMPLE|a1b2c3d4-5678-90ab-cdef-EXAMPLE11111. OpenID Connect (OIDC) provider: Namespace::[Entity type]::[principalIdClaim]|[user principal attribute], for example MyCorp::User::MyOIDCProvider|a1b2c3d4-5678-90ab-cdef-EXAMPLE22222. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
32
32
  */
33
33
  createIdentitySource(params: VerifiedPermissions.Types.CreateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
34
34
  /**
35
- * Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"&lt;CognitoUserPoolIdentifier&gt;|&lt;CognitoClientId&gt; Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
35
+ * Adds an identity source to a policy store–an Amazon Cognito user pool or OpenID Connect (OIDC) identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken or BatchIsAuthorizedWithToken API operations. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Identity sources provide identity (ID) tokens and access tokens. Verified Permissions derives information about your user and session from token claims. Access tokens provide action context to your policies, and ID tokens provide principal Attributes. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store To reference a user from this identity source in your Cedar policies, refer to the following syntax examples. Amazon Cognito user pool: Namespace::[Entity type]::[User pool ID]|[user principal attribute], for example MyCorp::User::us-east-1_EXAMPLE|a1b2c3d4-5678-90ab-cdef-EXAMPLE11111. OpenID Connect (OIDC) provider: Namespace::[Entity type]::[principalIdClaim]|[user principal attribute], for example MyCorp::User::MyOIDCProvider|a1b2c3d4-5678-90ab-cdef-EXAMPLE22222. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
36
36
  */
37
37
  createIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
38
38
  /**
@@ -140,11 +140,11 @@ declare class VerifiedPermissions extends Service {
140
140
  */
141
141
  isAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedOutput, AWSError>;
142
142
  /**
143
- * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
143
+ * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store
144
144
  */
145
145
  isAuthorizedWithToken(params: VerifiedPermissions.Types.IsAuthorizedWithTokenInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
146
146
  /**
147
- * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
147
+ * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store
148
148
  */
149
149
  isAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
150
150
  /**
@@ -188,11 +188,11 @@ declare class VerifiedPermissions extends Service {
188
188
  */
189
189
  putSchema(callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
190
190
  /**
191
- * Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
191
+ * Updates the specified identity source to use a new identity provider (IdP), or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
192
192
  */
193
193
  updateIdentitySource(params: VerifiedPermissions.Types.UpdateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
194
194
  /**
195
- * Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
195
+ * Updates the specified identity source to use a new identity provider (IdP), or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
196
196
  */
197
197
  updateIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
198
198
  /**
@@ -260,6 +260,8 @@ declare namespace VerifiedPermissions {
260
260
  */
261
261
  record?: RecordAttribute;
262
262
  }
263
+ export type Audience = string;
264
+ export type Audiences = Audience[];
263
265
  export interface BatchIsAuthorizedInput {
264
266
  /**
265
267
  * Specifies the ID of the policy store. Policies in this policy store will be used to make the authorization decisions for the input.
@@ -386,6 +388,7 @@ declare namespace VerifiedPermissions {
386
388
  export type BatchIsAuthorizedWithTokenOutputList = BatchIsAuthorizedWithTokenOutputItem[];
387
389
  export type Boolean = boolean;
388
390
  export type BooleanAttribute = boolean;
391
+ export type Claim = string;
389
392
  export type ClientId = string;
390
393
  export type ClientIds = ClientId[];
391
394
  export interface CognitoGroupConfiguration {
@@ -461,18 +464,30 @@ declare namespace VerifiedPermissions {
461
464
  * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
462
465
  */
463
466
  cognitoUserPoolConfiguration?: CognitoUserPoolConfiguration;
467
+ /**
468
+ * Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details. Example:"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
469
+ */
470
+ openIdConnectConfiguration?: OpenIdConnectConfiguration;
464
471
  }
465
472
  export interface ConfigurationDetail {
466
473
  /**
467
474
  * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool, the policy store entity that you want to assign to user groups, and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
468
475
  */
469
476
  cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationDetail;
477
+ /**
478
+ * Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details. Example:"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
479
+ */
480
+ openIdConnectConfiguration?: OpenIdConnectConfigurationDetail;
470
481
  }
471
482
  export interface ConfigurationItem {
472
483
  /**
473
484
  * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool, the policy store entity that you want to assign to user groups, and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
474
485
  */
475
486
  cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationItem;
487
+ /**
488
+ * Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details. Example:"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
489
+ */
490
+ openIdConnectConfiguration?: OpenIdConnectConfigurationItem;
476
491
  }
477
492
  export interface ContextDefinition {
478
493
  /**
@@ -491,7 +506,7 @@ declare namespace VerifiedPermissions {
491
506
  */
492
507
  policyStoreId: PolicyStoreId;
493
508
  /**
494
- * Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. At this time, the only valid member of this structure is a Amazon Cognito user pool configuration. You must specify a UserPoolArn, and optionally, a ClientId.
509
+ * Specifies the details required to communicate with the identity provider (IdP) associated with this identity source.
495
510
  */
496
511
  configuration: Configuration;
497
512
  /**
@@ -698,6 +713,7 @@ declare namespace VerifiedPermissions {
698
713
  }
699
714
  export type EntityAttributes = {[key: string]: AttributeValue};
700
715
  export type EntityId = string;
716
+ export type EntityIdPrefix = string;
701
717
  export interface EntityIdentifier {
702
718
  /**
703
719
  * The type of an entity. Example: "entityType":"typeName"
@@ -718,7 +734,7 @@ declare namespace VerifiedPermissions {
718
734
  */
719
735
  attributes?: EntityAttributes;
720
736
  /**
721
- * The parents in the hierarchy that contains the entity.
737
+ * The parent entities in the hierarchy that contains the entity. A principal or resource entity can be defined with at most 99 transitive parents per authorization request. A transitive parent is an entity in the hierarchy of entities including all direct parents, and parents of parents. For example, a user can be a member of 91 groups if one of those groups is a member of eight groups, for a total of 100: one entity, 91 entity parents, and eight parents of parents.
722
738
  */
723
739
  parents?: ParentList;
724
740
  }
@@ -1201,6 +1217,180 @@ declare namespace VerifiedPermissions {
1201
1217
  export type Namespace = string;
1202
1218
  export type NamespaceList = Namespace[];
1203
1219
  export type NextToken = string;
1220
+ export interface OpenIdConnectAccessTokenConfiguration {
1221
+ /**
1222
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1223
+ */
1224
+ principalIdClaim?: Claim;
1225
+ /**
1226
+ * The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
1227
+ */
1228
+ audiences?: Audiences;
1229
+ }
1230
+ export interface OpenIdConnectAccessTokenConfigurationDetail {
1231
+ /**
1232
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1233
+ */
1234
+ principalIdClaim?: Claim;
1235
+ /**
1236
+ * The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
1237
+ */
1238
+ audiences?: Audiences;
1239
+ }
1240
+ export interface OpenIdConnectAccessTokenConfigurationItem {
1241
+ /**
1242
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1243
+ */
1244
+ principalIdClaim?: Claim;
1245
+ /**
1246
+ * The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
1247
+ */
1248
+ audiences?: Audiences;
1249
+ }
1250
+ export interface OpenIdConnectConfiguration {
1251
+ /**
1252
+ * The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
1253
+ */
1254
+ issuer: Issuer;
1255
+ /**
1256
+ * A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
1257
+ */
1258
+ entityIdPrefix?: EntityIdPrefix;
1259
+ /**
1260
+ * The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
1261
+ */
1262
+ groupConfiguration?: OpenIdConnectGroupConfiguration;
1263
+ /**
1264
+ * The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
1265
+ */
1266
+ tokenSelection: OpenIdConnectTokenSelection;
1267
+ }
1268
+ export interface OpenIdConnectConfigurationDetail {
1269
+ /**
1270
+ * The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
1271
+ */
1272
+ issuer: Issuer;
1273
+ /**
1274
+ * A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
1275
+ */
1276
+ entityIdPrefix?: EntityIdPrefix;
1277
+ /**
1278
+ * The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
1279
+ */
1280
+ groupConfiguration?: OpenIdConnectGroupConfigurationDetail;
1281
+ /**
1282
+ * The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
1283
+ */
1284
+ tokenSelection: OpenIdConnectTokenSelectionDetail;
1285
+ }
1286
+ export interface OpenIdConnectConfigurationItem {
1287
+ /**
1288
+ * The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
1289
+ */
1290
+ issuer: Issuer;
1291
+ /**
1292
+ * A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
1293
+ */
1294
+ entityIdPrefix?: EntityIdPrefix;
1295
+ /**
1296
+ * The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
1297
+ */
1298
+ groupConfiguration?: OpenIdConnectGroupConfigurationItem;
1299
+ /**
1300
+ * The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
1301
+ */
1302
+ tokenSelection: OpenIdConnectTokenSelectionItem;
1303
+ }
1304
+ export interface OpenIdConnectGroupConfiguration {
1305
+ /**
1306
+ * The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
1307
+ */
1308
+ groupClaim: Claim;
1309
+ /**
1310
+ * The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
1311
+ */
1312
+ groupEntityType: GroupEntityType;
1313
+ }
1314
+ export interface OpenIdConnectGroupConfigurationDetail {
1315
+ /**
1316
+ * The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
1317
+ */
1318
+ groupClaim: Claim;
1319
+ /**
1320
+ * The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
1321
+ */
1322
+ groupEntityType: GroupEntityType;
1323
+ }
1324
+ export interface OpenIdConnectGroupConfigurationItem {
1325
+ /**
1326
+ * The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
1327
+ */
1328
+ groupClaim: Claim;
1329
+ /**
1330
+ * The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
1331
+ */
1332
+ groupEntityType: GroupEntityType;
1333
+ }
1334
+ export interface OpenIdConnectIdentityTokenConfiguration {
1335
+ /**
1336
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1337
+ */
1338
+ principalIdClaim?: Claim;
1339
+ /**
1340
+ * The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
1341
+ */
1342
+ clientIds?: ClientIds;
1343
+ }
1344
+ export interface OpenIdConnectIdentityTokenConfigurationDetail {
1345
+ /**
1346
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1347
+ */
1348
+ principalIdClaim?: Claim;
1349
+ /**
1350
+ * The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
1351
+ */
1352
+ clientIds?: ClientIds;
1353
+ }
1354
+ export interface OpenIdConnectIdentityTokenConfigurationItem {
1355
+ /**
1356
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1357
+ */
1358
+ principalIdClaim?: Claim;
1359
+ /**
1360
+ * The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
1361
+ */
1362
+ clientIds?: ClientIds;
1363
+ }
1364
+ export interface OpenIdConnectTokenSelection {
1365
+ /**
1366
+ * The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
1367
+ */
1368
+ accessTokenOnly?: OpenIdConnectAccessTokenConfiguration;
1369
+ /**
1370
+ * The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
1371
+ */
1372
+ identityTokenOnly?: OpenIdConnectIdentityTokenConfiguration;
1373
+ }
1374
+ export interface OpenIdConnectTokenSelectionDetail {
1375
+ /**
1376
+ * The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
1377
+ */
1378
+ accessTokenOnly?: OpenIdConnectAccessTokenConfigurationDetail;
1379
+ /**
1380
+ * The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
1381
+ */
1382
+ identityTokenOnly?: OpenIdConnectIdentityTokenConfigurationDetail;
1383
+ }
1384
+ export interface OpenIdConnectTokenSelectionItem {
1385
+ /**
1386
+ * The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
1387
+ */
1388
+ accessTokenOnly?: OpenIdConnectAccessTokenConfigurationItem;
1389
+ /**
1390
+ * The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
1391
+ */
1392
+ identityTokenOnly?: OpenIdConnectIdentityTokenConfigurationItem;
1393
+ }
1204
1394
  export type OpenIdIssuer = "COGNITO"|string;
1205
1395
  export type ParentList = EntityIdentifier[];
1206
1396
  export interface PolicyDefinition {
@@ -1485,6 +1675,10 @@ declare namespace VerifiedPermissions {
1485
1675
  * Contains configuration details of a Amazon Cognito user pool.
1486
1676
  */
1487
1677
  cognitoUserPoolConfiguration?: UpdateCognitoUserPoolConfiguration;
1678
+ /**
1679
+ * Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
1680
+ */
1681
+ openIdConnectConfiguration?: UpdateOpenIdConnectConfiguration;
1488
1682
  }
1489
1683
  export interface UpdateIdentitySourceInput {
1490
1684
  /**
@@ -1522,6 +1716,64 @@ declare namespace VerifiedPermissions {
1522
1716
  */
1523
1717
  policyStoreId: PolicyStoreId;
1524
1718
  }
1719
+ export interface UpdateOpenIdConnectAccessTokenConfiguration {
1720
+ /**
1721
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1722
+ */
1723
+ principalIdClaim?: Claim;
1724
+ /**
1725
+ * The access token aud claim values that you want to accept in your policy store. For example, https://myapp.example.com, https://myapp2.example.com.
1726
+ */
1727
+ audiences?: Audiences;
1728
+ }
1729
+ export interface UpdateOpenIdConnectConfiguration {
1730
+ /**
1731
+ * The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
1732
+ */
1733
+ issuer: Issuer;
1734
+ /**
1735
+ * A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an entityIdPrefix of MyOIDCProvider, you can reference principals in your policies in the format MyCorp::User::MyOIDCProvider|Carlos.
1736
+ */
1737
+ entityIdPrefix?: EntityIdPrefix;
1738
+ /**
1739
+ * The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups claim to MyCorp::UserGroup.
1740
+ */
1741
+ groupConfiguration?: UpdateOpenIdConnectGroupConfiguration;
1742
+ /**
1743
+ * The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
1744
+ */
1745
+ tokenSelection: UpdateOpenIdConnectTokenSelection;
1746
+ }
1747
+ export interface UpdateOpenIdConnectGroupConfiguration {
1748
+ /**
1749
+ * The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
1750
+ */
1751
+ groupClaim: Claim;
1752
+ /**
1753
+ * The policy store entity type that you want to map your users' group claim to. For example, MyCorp::UserGroup. A group entity type is an entity that can have a user entity type as a member.
1754
+ */
1755
+ groupEntityType: GroupEntityType;
1756
+ }
1757
+ export interface UpdateOpenIdConnectIdentityTokenConfiguration {
1758
+ /**
1759
+ * The claim that determines the principal in OIDC access tokens. For example, sub.
1760
+ */
1761
+ principalIdClaim?: Claim;
1762
+ /**
1763
+ * The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example, 1example23456789, 2example10111213.
1764
+ */
1765
+ clientIds?: ClientIds;
1766
+ }
1767
+ export interface UpdateOpenIdConnectTokenSelection {
1768
+ /**
1769
+ * The OIDC configuration for processing access tokens. Contains allowed audience claims, for example https://auth.example.com, and the claim that you want to map to the principal, for example sub.
1770
+ */
1771
+ accessTokenOnly?: UpdateOpenIdConnectAccessTokenConfiguration;
1772
+ /**
1773
+ * The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example 1example23456789, and the claim that you want to map to the principal, for example sub.
1774
+ */
1775
+ identityTokenOnly?: UpdateOpenIdConnectIdentityTokenConfiguration;
1776
+ }
1525
1777
  export interface UpdatePolicyDefinition {
1526
1778
  /**
1527
1779
  * Contains details about the updates to be applied to a static policy.
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1635.0',
86
+ VERSION: '2.1637.0',
87
87
 
88
88
  /**
89
89
  * @api private