aws-cdk-lib 2.90.0__py3-none-any.whl → 2.92.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +22 -4
- aws_cdk/_jsii/__init__.py +2 -2
- aws_cdk/_jsii/{aws-cdk-lib@2.90.0.jsii.tgz → aws-cdk-lib@2.92.0.jsii.tgz} +0 -0
- aws_cdk/aws_appstream/__init__.py +3 -3
- aws_cdk/aws_batch/__init__.py +39 -18
- aws_cdk/aws_billingconductor/__init__.py +44 -13
- aws_cdk/aws_cleanrooms/__init__.py +2 -4
- aws_cdk/aws_cloudtrail/__init__.py +35 -10
- aws_cdk/aws_cloudwatch/__init__.py +3 -3
- aws_cdk/aws_codebuild/__init__.py +7 -7
- aws_cdk/aws_cognito/__init__.py +8 -8
- aws_cdk/aws_config/__init__.py +220 -0
- aws_cdk/aws_datasync/__init__.py +22 -35
- aws_cdk/aws_dms/__init__.py +909 -4
- aws_cdk/aws_dynamodb/__init__.py +0 -1
- aws_cdk/aws_ec2/__init__.py +59 -21
- aws_cdk/aws_ecs/__init__.py +45 -21
- aws_cdk/aws_evidently/__init__.py +3 -3
- aws_cdk/aws_fsx/__init__.py +6 -5
- aws_cdk/aws_glue/__init__.py +438 -10
- aws_cdk/aws_guardduty/__init__.py +60 -17
- aws_cdk/aws_iam/__init__.py +8 -9
- aws_cdk/aws_iot/__init__.py +5 -1
- aws_cdk/aws_kms/__init__.py +95 -47
- aws_cdk/aws_lambda/__init__.py +4 -2
- aws_cdk/aws_lambda_nodejs/__init__.py +3 -3
- aws_cdk/aws_mediatailor/__init__.py +2902 -892
- aws_cdk/aws_mwaa/__init__.py +13 -8
- aws_cdk/aws_neptune/__init__.py +50 -2
- aws_cdk/aws_omics/__init__.py +80 -0
- aws_cdk/aws_opensearchserverless/__init__.py +3 -3
- aws_cdk/aws_opensearchservice/__init__.py +247 -14
- aws_cdk/aws_organizations/__init__.py +17 -17
- aws_cdk/aws_personalize/__init__.py +41 -25
- aws_cdk/aws_rds/__init__.py +24 -10
- aws_cdk/aws_resiliencehub/__init__.py +22 -22
- aws_cdk/aws_rolesanywhere/__init__.py +58 -74
- aws_cdk/aws_route53/__init__.py +3 -1
- aws_cdk/aws_s3/__init__.py +17 -7
- aws_cdk/aws_sagemaker/__init__.py +396 -5
- aws_cdk/aws_sns/__init__.py +8 -8
- aws_cdk/aws_sqs/__init__.py +231 -4
- aws_cdk/aws_ssm/__init__.py +6 -28
- aws_cdk/aws_stepfunctions/__init__.py +7 -7
- aws_cdk/aws_timestream/__init__.py +243 -0
- aws_cdk/aws_transfer/__init__.py +250 -52
- aws_cdk/aws_vpclattice/__init__.py +10 -6
- aws_cdk/aws_wafv2/__init__.py +7517 -5036
- aws_cdk/custom_resources/__init__.py +18 -30
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/METADATA +8 -8
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/RECORD +55 -55
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/WHEEL +1 -1
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/top_level.txt +0 -0
|
@@ -199,6 +199,32 @@ domain = Domain(self, "Domain",
|
|
|
199
199
|
master_user_password = domain.master_user_password
|
|
200
200
|
```
|
|
201
201
|
|
|
202
|
+
## SAML authentication
|
|
203
|
+
|
|
204
|
+
You can enable SAML authentication to use your existing identity provider
|
|
205
|
+
to offer single sign-on (SSO) for dashboards on Amazon OpenSearch Service domains
|
|
206
|
+
running OpenSearch or Elasticsearch 6.7 or later.
|
|
207
|
+
To use SAML authentication, fine-grained access control must be enabled.
|
|
208
|
+
|
|
209
|
+
```python
|
|
210
|
+
domain = Domain(self, "Domain",
|
|
211
|
+
version=EngineVersion.OPENSEARCH_1_0,
|
|
212
|
+
enforce_https=True,
|
|
213
|
+
node_to_node_encryption=True,
|
|
214
|
+
encryption_at_rest=EncryptionAtRestOptions(
|
|
215
|
+
enabled=True
|
|
216
|
+
),
|
|
217
|
+
fine_grained_access_control=AdvancedSecurityOptions(
|
|
218
|
+
master_user_name="master-user",
|
|
219
|
+
saml_authentication_enabled=True,
|
|
220
|
+
saml_authentication_options=SAMLOptionsProperty(
|
|
221
|
+
idp_entity_id="entity-id",
|
|
222
|
+
idp_metadata_content="metadata-content-with-quotes-escaped"
|
|
223
|
+
)
|
|
224
|
+
)
|
|
225
|
+
)
|
|
226
|
+
```
|
|
227
|
+
|
|
202
228
|
## Using unsigned basic auth
|
|
203
229
|
|
|
204
230
|
For convenience, the domain can be configured to allow unsigned HTTP requests
|
|
@@ -486,6 +512,8 @@ from ..aws_route53 import IHostedZone as _IHostedZone_9a6907ad
|
|
|
486
512
|
"master_user_arn": "masterUserArn",
|
|
487
513
|
"master_user_name": "masterUserName",
|
|
488
514
|
"master_user_password": "masterUserPassword",
|
|
515
|
+
"saml_authentication_enabled": "samlAuthenticationEnabled",
|
|
516
|
+
"saml_authentication_options": "samlAuthenticationOptions",
|
|
489
517
|
},
|
|
490
518
|
)
|
|
491
519
|
class AdvancedSecurityOptions:
|
|
@@ -495,12 +523,16 @@ class AdvancedSecurityOptions:
|
|
|
495
523
|
master_user_arn: typing.Optional[builtins.str] = None,
|
|
496
524
|
master_user_name: typing.Optional[builtins.str] = None,
|
|
497
525
|
master_user_password: typing.Optional[_SecretValue_3dd0ddae] = None,
|
|
526
|
+
saml_authentication_enabled: typing.Optional[builtins.bool] = None,
|
|
527
|
+
saml_authentication_options: typing.Optional[typing.Union["SAMLOptionsProperty", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
498
528
|
) -> None:
|
|
499
529
|
'''Specifies options for fine-grained access control.
|
|
500
530
|
|
|
501
531
|
:param master_user_arn: ARN for the master user. Only specify this or masterUserName, but not both. Default: - fine-grained access control is disabled
|
|
502
532
|
:param master_user_name: Username for the master user. Only specify this or masterUserArn, but not both. Default: - fine-grained access control is disabled
|
|
503
533
|
:param master_user_password: Password for the master user. You can use ``SecretValue.unsafePlainText`` to specify a password in plain text or use ``secretsmanager.Secret.fromSecretAttributes`` to reference a secret in Secrets Manager. Default: - A Secrets Manager generated password
|
|
534
|
+
:param saml_authentication_enabled: True to enable SAML authentication for a domain. Default: - SAML authentication is disabled. Enabled if ``samlAuthenticationOptions`` is set.
|
|
535
|
+
:param saml_authentication_options: Container for information about the SAML configuration for OpenSearch Dashboards. If set, ``samlAuthenticationEnabled`` will be enabled. Default: - no SAML authentication options
|
|
504
536
|
|
|
505
537
|
:exampleMetadata: infused
|
|
506
538
|
|
|
@@ -514,21 +546,24 @@ class AdvancedSecurityOptions:
|
|
|
514
546
|
enabled=True
|
|
515
547
|
),
|
|
516
548
|
fine_grained_access_control=AdvancedSecurityOptions(
|
|
517
|
-
master_user_name="master-user"
|
|
518
|
-
|
|
519
|
-
|
|
520
|
-
|
|
521
|
-
|
|
522
|
-
|
|
523
|
-
slow_index_log_enabled=True
|
|
549
|
+
master_user_name="master-user",
|
|
550
|
+
saml_authentication_enabled=True,
|
|
551
|
+
saml_authentication_options=SAMLOptionsProperty(
|
|
552
|
+
idp_entity_id="entity-id",
|
|
553
|
+
idp_metadata_content="metadata-content-with-quotes-escaped"
|
|
554
|
+
)
|
|
524
555
|
)
|
|
525
556
|
)
|
|
526
557
|
'''
|
|
558
|
+
if isinstance(saml_authentication_options, dict):
|
|
559
|
+
saml_authentication_options = SAMLOptionsProperty(**saml_authentication_options)
|
|
527
560
|
if __debug__:
|
|
528
561
|
type_hints = typing.get_type_hints(_typecheckingstub__c1e95392d4761126042f2d6d6160889a80c269d2f13c21476fe92febdb7f04e3)
|
|
529
562
|
check_type(argname="argument master_user_arn", value=master_user_arn, expected_type=type_hints["master_user_arn"])
|
|
530
563
|
check_type(argname="argument master_user_name", value=master_user_name, expected_type=type_hints["master_user_name"])
|
|
531
564
|
check_type(argname="argument master_user_password", value=master_user_password, expected_type=type_hints["master_user_password"])
|
|
565
|
+
check_type(argname="argument saml_authentication_enabled", value=saml_authentication_enabled, expected_type=type_hints["saml_authentication_enabled"])
|
|
566
|
+
check_type(argname="argument saml_authentication_options", value=saml_authentication_options, expected_type=type_hints["saml_authentication_options"])
|
|
532
567
|
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
533
568
|
if master_user_arn is not None:
|
|
534
569
|
self._values["master_user_arn"] = master_user_arn
|
|
@@ -536,6 +571,10 @@ class AdvancedSecurityOptions:
|
|
|
536
571
|
self._values["master_user_name"] = master_user_name
|
|
537
572
|
if master_user_password is not None:
|
|
538
573
|
self._values["master_user_password"] = master_user_password
|
|
574
|
+
if saml_authentication_enabled is not None:
|
|
575
|
+
self._values["saml_authentication_enabled"] = saml_authentication_enabled
|
|
576
|
+
if saml_authentication_options is not None:
|
|
577
|
+
self._values["saml_authentication_options"] = saml_authentication_options
|
|
539
578
|
|
|
540
579
|
@builtins.property
|
|
541
580
|
def master_user_arn(self) -> typing.Optional[builtins.str]:
|
|
@@ -572,6 +611,28 @@ class AdvancedSecurityOptions:
|
|
|
572
611
|
result = self._values.get("master_user_password")
|
|
573
612
|
return typing.cast(typing.Optional[_SecretValue_3dd0ddae], result)
|
|
574
613
|
|
|
614
|
+
@builtins.property
|
|
615
|
+
def saml_authentication_enabled(self) -> typing.Optional[builtins.bool]:
|
|
616
|
+
'''True to enable SAML authentication for a domain.
|
|
617
|
+
|
|
618
|
+
:default: - SAML authentication is disabled. Enabled if ``samlAuthenticationOptions`` is set.
|
|
619
|
+
|
|
620
|
+
:see: https://docs.aws.amazon.com/opensearch-service/latest/developerguide/saml.html
|
|
621
|
+
'''
|
|
622
|
+
result = self._values.get("saml_authentication_enabled")
|
|
623
|
+
return typing.cast(typing.Optional[builtins.bool], result)
|
|
624
|
+
|
|
625
|
+
@builtins.property
|
|
626
|
+
def saml_authentication_options(self) -> typing.Optional["SAMLOptionsProperty"]:
|
|
627
|
+
'''Container for information about the SAML configuration for OpenSearch Dashboards.
|
|
628
|
+
|
|
629
|
+
If set, ``samlAuthenticationEnabled`` will be enabled.
|
|
630
|
+
|
|
631
|
+
:default: - no SAML authentication options
|
|
632
|
+
'''
|
|
633
|
+
result = self._values.get("saml_authentication_options")
|
|
634
|
+
return typing.cast(typing.Optional["SAMLOptionsProperty"], result)
|
|
635
|
+
|
|
575
636
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
576
637
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
577
638
|
|
|
@@ -4772,13 +4833,12 @@ class EncryptionAtRestOptions:
|
|
|
4772
4833
|
enabled=True
|
|
4773
4834
|
),
|
|
4774
4835
|
fine_grained_access_control=AdvancedSecurityOptions(
|
|
4775
|
-
master_user_name="master-user"
|
|
4776
|
-
|
|
4777
|
-
|
|
4778
|
-
|
|
4779
|
-
|
|
4780
|
-
|
|
4781
|
-
slow_index_log_enabled=True
|
|
4836
|
+
master_user_name="master-user",
|
|
4837
|
+
saml_authentication_enabled=True,
|
|
4838
|
+
saml_authentication_options=SAMLOptionsProperty(
|
|
4839
|
+
idp_entity_id="entity-id",
|
|
4840
|
+
idp_metadata_content="metadata-content-with-quotes-escaped"
|
|
4841
|
+
)
|
|
4782
4842
|
)
|
|
4783
4843
|
)
|
|
4784
4844
|
'''
|
|
@@ -6619,6 +6679,163 @@ class LoggingOptions:
|
|
|
6619
6679
|
)
|
|
6620
6680
|
|
|
6621
6681
|
|
|
6682
|
+
@jsii.data_type(
|
|
6683
|
+
jsii_type="aws-cdk-lib.aws_opensearchservice.SAMLOptionsProperty",
|
|
6684
|
+
jsii_struct_bases=[],
|
|
6685
|
+
name_mapping={
|
|
6686
|
+
"idp_entity_id": "idpEntityId",
|
|
6687
|
+
"idp_metadata_content": "idpMetadataContent",
|
|
6688
|
+
"master_backend_role": "masterBackendRole",
|
|
6689
|
+
"master_user_name": "masterUserName",
|
|
6690
|
+
"roles_key": "rolesKey",
|
|
6691
|
+
"session_timeout_minutes": "sessionTimeoutMinutes",
|
|
6692
|
+
"subject_key": "subjectKey",
|
|
6693
|
+
},
|
|
6694
|
+
)
|
|
6695
|
+
class SAMLOptionsProperty:
|
|
6696
|
+
def __init__(
|
|
6697
|
+
self,
|
|
6698
|
+
*,
|
|
6699
|
+
idp_entity_id: builtins.str,
|
|
6700
|
+
idp_metadata_content: builtins.str,
|
|
6701
|
+
master_backend_role: typing.Optional[builtins.str] = None,
|
|
6702
|
+
master_user_name: typing.Optional[builtins.str] = None,
|
|
6703
|
+
roles_key: typing.Optional[builtins.str] = None,
|
|
6704
|
+
session_timeout_minutes: typing.Optional[jsii.Number] = None,
|
|
6705
|
+
subject_key: typing.Optional[builtins.str] = None,
|
|
6706
|
+
) -> None:
|
|
6707
|
+
'''Container for information about the SAML configuration for OpenSearch Dashboards.
|
|
6708
|
+
|
|
6709
|
+
:param idp_entity_id: The unique entity ID of the application in the SAML identity provider.
|
|
6710
|
+
:param idp_metadata_content: The metadata of the SAML application, in XML format.
|
|
6711
|
+
:param master_backend_role: The backend role that the SAML master user is mapped to. Any users with this backend role receives full permission in OpenSearch Dashboards/Kibana. To use a SAML master backend role, configure the ``rolesKey`` property. Default: - The master user is not mapped to a backend role
|
|
6712
|
+
:param master_user_name: The SAML master username, which is stored in the domain's internal user database. This SAML user receives full permission in OpenSearch Dashboards/Kibana. Creating a new master username does not delete any existing master usernames. Default: - No master user name is configured
|
|
6713
|
+
:param roles_key: Element of the SAML assertion to use for backend roles. Default: - roles
|
|
6714
|
+
:param session_timeout_minutes: The duration, in minutes, after which a user session becomes inactive. Default: - 60
|
|
6715
|
+
:param subject_key: Element of the SAML assertion to use for the user name. Default: - NameID element of the SAML assertion fot the user name
|
|
6716
|
+
|
|
6717
|
+
:exampleMetadata: infused
|
|
6718
|
+
|
|
6719
|
+
Example::
|
|
6720
|
+
|
|
6721
|
+
domain = Domain(self, "Domain",
|
|
6722
|
+
version=EngineVersion.OPENSEARCH_1_0,
|
|
6723
|
+
enforce_https=True,
|
|
6724
|
+
node_to_node_encryption=True,
|
|
6725
|
+
encryption_at_rest=EncryptionAtRestOptions(
|
|
6726
|
+
enabled=True
|
|
6727
|
+
),
|
|
6728
|
+
fine_grained_access_control=AdvancedSecurityOptions(
|
|
6729
|
+
master_user_name="master-user",
|
|
6730
|
+
saml_authentication_enabled=True,
|
|
6731
|
+
saml_authentication_options=SAMLOptionsProperty(
|
|
6732
|
+
idp_entity_id="entity-id",
|
|
6733
|
+
idp_metadata_content="metadata-content-with-quotes-escaped"
|
|
6734
|
+
)
|
|
6735
|
+
)
|
|
6736
|
+
)
|
|
6737
|
+
'''
|
|
6738
|
+
if __debug__:
|
|
6739
|
+
type_hints = typing.get_type_hints(_typecheckingstub__3971b3c73627d57587c667b1ede64fbba4de4fd4a086af959dc2d0f812f8e36b)
|
|
6740
|
+
check_type(argname="argument idp_entity_id", value=idp_entity_id, expected_type=type_hints["idp_entity_id"])
|
|
6741
|
+
check_type(argname="argument idp_metadata_content", value=idp_metadata_content, expected_type=type_hints["idp_metadata_content"])
|
|
6742
|
+
check_type(argname="argument master_backend_role", value=master_backend_role, expected_type=type_hints["master_backend_role"])
|
|
6743
|
+
check_type(argname="argument master_user_name", value=master_user_name, expected_type=type_hints["master_user_name"])
|
|
6744
|
+
check_type(argname="argument roles_key", value=roles_key, expected_type=type_hints["roles_key"])
|
|
6745
|
+
check_type(argname="argument session_timeout_minutes", value=session_timeout_minutes, expected_type=type_hints["session_timeout_minutes"])
|
|
6746
|
+
check_type(argname="argument subject_key", value=subject_key, expected_type=type_hints["subject_key"])
|
|
6747
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
6748
|
+
"idp_entity_id": idp_entity_id,
|
|
6749
|
+
"idp_metadata_content": idp_metadata_content,
|
|
6750
|
+
}
|
|
6751
|
+
if master_backend_role is not None:
|
|
6752
|
+
self._values["master_backend_role"] = master_backend_role
|
|
6753
|
+
if master_user_name is not None:
|
|
6754
|
+
self._values["master_user_name"] = master_user_name
|
|
6755
|
+
if roles_key is not None:
|
|
6756
|
+
self._values["roles_key"] = roles_key
|
|
6757
|
+
if session_timeout_minutes is not None:
|
|
6758
|
+
self._values["session_timeout_minutes"] = session_timeout_minutes
|
|
6759
|
+
if subject_key is not None:
|
|
6760
|
+
self._values["subject_key"] = subject_key
|
|
6761
|
+
|
|
6762
|
+
@builtins.property
|
|
6763
|
+
def idp_entity_id(self) -> builtins.str:
|
|
6764
|
+
'''The unique entity ID of the application in the SAML identity provider.'''
|
|
6765
|
+
result = self._values.get("idp_entity_id")
|
|
6766
|
+
assert result is not None, "Required property 'idp_entity_id' is missing"
|
|
6767
|
+
return typing.cast(builtins.str, result)
|
|
6768
|
+
|
|
6769
|
+
@builtins.property
|
|
6770
|
+
def idp_metadata_content(self) -> builtins.str:
|
|
6771
|
+
'''The metadata of the SAML application, in XML format.'''
|
|
6772
|
+
result = self._values.get("idp_metadata_content")
|
|
6773
|
+
assert result is not None, "Required property 'idp_metadata_content' is missing"
|
|
6774
|
+
return typing.cast(builtins.str, result)
|
|
6775
|
+
|
|
6776
|
+
@builtins.property
|
|
6777
|
+
def master_backend_role(self) -> typing.Optional[builtins.str]:
|
|
6778
|
+
'''The backend role that the SAML master user is mapped to.
|
|
6779
|
+
|
|
6780
|
+
Any users with this backend role receives full permission in OpenSearch Dashboards/Kibana.
|
|
6781
|
+
To use a SAML master backend role, configure the ``rolesKey`` property.
|
|
6782
|
+
|
|
6783
|
+
:default: - The master user is not mapped to a backend role
|
|
6784
|
+
'''
|
|
6785
|
+
result = self._values.get("master_backend_role")
|
|
6786
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
6787
|
+
|
|
6788
|
+
@builtins.property
|
|
6789
|
+
def master_user_name(self) -> typing.Optional[builtins.str]:
|
|
6790
|
+
'''The SAML master username, which is stored in the domain's internal user database.
|
|
6791
|
+
|
|
6792
|
+
This SAML user receives full permission in OpenSearch Dashboards/Kibana.
|
|
6793
|
+
Creating a new master username does not delete any existing master usernames.
|
|
6794
|
+
|
|
6795
|
+
:default: - No master user name is configured
|
|
6796
|
+
'''
|
|
6797
|
+
result = self._values.get("master_user_name")
|
|
6798
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
6799
|
+
|
|
6800
|
+
@builtins.property
|
|
6801
|
+
def roles_key(self) -> typing.Optional[builtins.str]:
|
|
6802
|
+
'''Element of the SAML assertion to use for backend roles.
|
|
6803
|
+
|
|
6804
|
+
:default: - roles
|
|
6805
|
+
'''
|
|
6806
|
+
result = self._values.get("roles_key")
|
|
6807
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
6808
|
+
|
|
6809
|
+
@builtins.property
|
|
6810
|
+
def session_timeout_minutes(self) -> typing.Optional[jsii.Number]:
|
|
6811
|
+
'''The duration, in minutes, after which a user session becomes inactive.
|
|
6812
|
+
|
|
6813
|
+
:default: - 60
|
|
6814
|
+
'''
|
|
6815
|
+
result = self._values.get("session_timeout_minutes")
|
|
6816
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
6817
|
+
|
|
6818
|
+
@builtins.property
|
|
6819
|
+
def subject_key(self) -> typing.Optional[builtins.str]:
|
|
6820
|
+
'''Element of the SAML assertion to use for the user name.
|
|
6821
|
+
|
|
6822
|
+
:default: - NameID element of the SAML assertion fot the user name
|
|
6823
|
+
'''
|
|
6824
|
+
result = self._values.get("subject_key")
|
|
6825
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
6826
|
+
|
|
6827
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
6828
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
6829
|
+
|
|
6830
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
6831
|
+
return not (rhs == self)
|
|
6832
|
+
|
|
6833
|
+
def __repr__(self) -> str:
|
|
6834
|
+
return "SAMLOptionsProperty(%s)" % ", ".join(
|
|
6835
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
6836
|
+
)
|
|
6837
|
+
|
|
6838
|
+
|
|
6622
6839
|
@jsii.enum(jsii_type="aws-cdk-lib.aws_opensearchservice.TLSSecurityPolicy")
|
|
6623
6840
|
class TLSSecurityPolicy(enum.Enum):
|
|
6624
6841
|
'''The minimum TLS version required for traffic to the domain.'''
|
|
@@ -7823,6 +8040,7 @@ __all__ = [
|
|
|
7823
8040
|
"EngineVersion",
|
|
7824
8041
|
"IDomain",
|
|
7825
8042
|
"LoggingOptions",
|
|
8043
|
+
"SAMLOptionsProperty",
|
|
7826
8044
|
"TLSSecurityPolicy",
|
|
7827
8045
|
"WindowStartTime",
|
|
7828
8046
|
"ZoneAwarenessConfig",
|
|
@@ -7835,6 +8053,8 @@ def _typecheckingstub__c1e95392d4761126042f2d6d6160889a80c269d2f13c21476fe92febd
|
|
|
7835
8053
|
master_user_arn: typing.Optional[builtins.str] = None,
|
|
7836
8054
|
master_user_name: typing.Optional[builtins.str] = None,
|
|
7837
8055
|
master_user_password: typing.Optional[_SecretValue_3dd0ddae] = None,
|
|
8056
|
+
saml_authentication_enabled: typing.Optional[builtins.bool] = None,
|
|
8057
|
+
saml_authentication_options: typing.Optional[typing.Union[SAMLOptionsProperty, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
7838
8058
|
) -> None:
|
|
7839
8059
|
"""Type checking stubs"""
|
|
7840
8060
|
pass
|
|
@@ -8378,6 +8598,19 @@ def _typecheckingstub__6f2efbcf1fc757504a748851740a44deb59ed98ee9c1d8c213d60960f
|
|
|
8378
8598
|
"""Type checking stubs"""
|
|
8379
8599
|
pass
|
|
8380
8600
|
|
|
8601
|
+
def _typecheckingstub__3971b3c73627d57587c667b1ede64fbba4de4fd4a086af959dc2d0f812f8e36b(
|
|
8602
|
+
*,
|
|
8603
|
+
idp_entity_id: builtins.str,
|
|
8604
|
+
idp_metadata_content: builtins.str,
|
|
8605
|
+
master_backend_role: typing.Optional[builtins.str] = None,
|
|
8606
|
+
master_user_name: typing.Optional[builtins.str] = None,
|
|
8607
|
+
roles_key: typing.Optional[builtins.str] = None,
|
|
8608
|
+
session_timeout_minutes: typing.Optional[jsii.Number] = None,
|
|
8609
|
+
subject_key: typing.Optional[builtins.str] = None,
|
|
8610
|
+
) -> None:
|
|
8611
|
+
"""Type checking stubs"""
|
|
8612
|
+
pass
|
|
8613
|
+
|
|
8381
8614
|
def _typecheckingstub__6aa10c95f5a58e650c77a0c42630f2fa77e6475974ad59138caebb586e5fad2c(
|
|
8382
8615
|
*,
|
|
8383
8616
|
hours: jsii.Number,
|
|
@@ -62,15 +62,15 @@ class CfnAccount(
|
|
|
62
62
|
AWS CloudFormation uses the ```CreateAccount`` <https://docs.aws.amazon.com/organizations/latest/APIReference/API_CreateAccount.html>`_ operation to create accounts. This is an asynchronous request that AWS performs in the background. Because ``CreateAccount`` operates asynchronously, it can return a successful completion message even though account initialization might still be in progress. You might need to wait a few minutes before you can successfully access the account. To check the status of the request, do one of the following:
|
|
63
63
|
|
|
64
64
|
- Use the ``Id`` value of the ``CreateAccountStatus`` response element from the ``CreateAccount`` operation to provide as a parameter to the ```DescribeCreateAccountStatus`` <https://docs.aws.amazon.com/organizations/latest/APIReference/API_DescribeCreateAccountStatus.html>`_ operation.
|
|
65
|
-
- Check the CloudTrail log for the ``CreateAccountResult`` event. For information on using CloudTrail with AWS Organizations , see `Logging and monitoring in AWS Organizations <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_security_incident-response.html#orgs_cloudtrail-integration>`_ in the *AWS Organizations User Guide
|
|
65
|
+
- Check the CloudTrail log for the ``CreateAccountResult`` event. For information on using CloudTrail with AWS Organizations , see `Logging and monitoring in AWS Organizations <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_security_incident-response.html#orgs_cloudtrail-integration>`_ in the *AWS Organizations User Guide* .
|
|
66
66
|
|
|
67
|
-
The user who calls the API to create an account must have the ``organizations:CreateAccount`` permission. If you enabled all features in the organization, AWS Organizations creates the required service-linked role named ``AWSServiceRoleForOrganizations`` . For more information, see `AWS Organizations and
|
|
67
|
+
The user who calls the API to create an account must have the ``organizations:CreateAccount`` permission. If you enabled all features in the organization, AWS Organizations creates the required service-linked role named ``AWSServiceRoleForOrganizations`` . For more information, see `AWS Organizations and service-linked roles <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_integrate_services.html#orgs_integrate_services-using_slrs>`_ in the *AWS Organizations User Guide* .
|
|
68
68
|
|
|
69
69
|
If the request includes tags, then the requester must have the ``organizations:TagResource`` permission.
|
|
70
70
|
|
|
71
71
|
AWS Organizations preconfigures the new member account with a role (named ``OrganizationAccountAccessRole`` by default) that grants users in the management account administrator permissions in the new member account. Principals in the management account can assume the role. AWS Organizations clones the company name and address information for the new account from the organization's management account.
|
|
72
72
|
|
|
73
|
-
For more information about creating accounts, see `Creating
|
|
73
|
+
For more information about creating accounts, see `Creating a member account in your organization <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_create.html>`_ in the *AWS Organizations User Guide* .
|
|
74
74
|
|
|
75
75
|
This operation can be called only from the organization's management account.
|
|
76
76
|
|
|
@@ -85,14 +85,14 @@ class CfnAccount(
|
|
|
85
85
|
- Email
|
|
86
86
|
- RoleName
|
|
87
87
|
|
|
88
|
-
If you attempt to update the listed parameters, CloudFormation will attempt the update, but you will receive an error message as those updates are not supported from an Organizations management account or a `registered delegated administrator <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html>`_ account. Both the update and the update roll-back will fail, so you must skip the account resource update. To update parameters ``AccountName`` and ``Email`` , you must sign in to the AWS Management Console as the AWS account root user. For more information, see `
|
|
88
|
+
If you attempt to update the listed parameters, CloudFormation will attempt the update, but you will receive an error message as those updates are not supported from an Organizations management account or a `registered delegated administrator <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html>`_ account. Both the update and the update roll-back will fail, so you must skip the account resource update. To update parameters ``AccountName`` and ``Email`` , you must sign in to the AWS Management Console as the AWS account root user. For more information, see `Update the AWS account name, email address, or password for the root user <https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-update-root-user.html>`_ in the *AWS Account Management Reference Guide* .
|
|
89
89
|
|
|
90
|
-
- When you create an account in an organization using the AWS Organizations console, API, or AWS CLI commands, we don't automatically collect the information required for the account to operate as a standalone account. That includes collecting the payment method and signing the end user license agreement (EULA). If you must remove an account from your organization later, you can do so only after you provide the missing information.
|
|
90
|
+
- When you create an account in an organization using the AWS Organizations console, API, or AWS CLI commands, we don't automatically collect the information required for the account to operate as a standalone account. That includes collecting the payment method and signing the end user license agreement (EULA). If you must remove an account from your organization later, you can do so only after you provide the missing information. For more information, see `Considerations before removing an account from an organization <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_account-before-remove.html>`_ in the *AWS Organizations User Guide* .
|
|
91
91
|
- When you create an account in an organization using AWS CloudFormation , you can't specify a value for the ``CreateAccount`` operation parameter ``IamUserAccessToBilling`` . The default value for parameter ``IamUserAccessToBilling`` is ``ALLOW`` , and IAM users and roles with the required permissions can access billing information for the new account.
|
|
92
92
|
- If you get an exception that indicates ``DescribeCreateAccountStatus returns IN_PROGRESS state before time out`` . You must check the account creation status using the ```DescribeCreateAccountStatus`` <https://docs.aws.amazon.com/organizations/latest/APIReference/API_DescribeCreateAccountStatus.html>`_ operation. If the account state returns as ``SUCCEEDED`` , you can import the account into AWS CloudFormation management using ```resource import`` <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/resource-import.html>`_ .
|
|
93
93
|
- If you get an exception that indicates you have exceeded your account quota for the organization, you can request an increase by using the `Service Quotas console <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_reference_limits.html>`_ .
|
|
94
94
|
- If you get an exception that indicates the operation failed because your organization is still initializing, wait one hour and then try again. If the error persists, contact `AWS Support <https://docs.aws.amazon.com/support/home#/>`_ .
|
|
95
|
-
- We don't recommend that you use the ``CreateAccount`` operation to create multiple temporary accounts. You can close accounts using the ```CloseAccount`` <https://docs.aws.amazon.com/organizations/latest/APIReference/API_CloseAccount.html>`_ operation or from the AWS Organizations console in the organization's management account. For information on the requirements and process for closing an account, see `Closing
|
|
95
|
+
- We don't recommend that you use the ``CreateAccount`` operation to create multiple temporary accounts. You can close accounts using the ```CloseAccount`` <https://docs.aws.amazon.com/organizations/latest/APIReference/API_CloseAccount.html>`_ operation or from the AWS Organizations console in the organization's management account. For information on the requirements and process for closing an account, see `Closing a member account in your organization <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_close.html>`_ in the *AWS Organizations User Guide* .
|
|
96
96
|
|
|
97
97
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-organizations-account.html
|
|
98
98
|
:exampleMetadata: fixture=_generated
|
|
@@ -134,7 +134,7 @@ class CfnAccount(
|
|
|
134
134
|
:param account_name: The account name given to the account when it was created.
|
|
135
135
|
:param email: The email address associated with the AWS account. The `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ for this parameter is a string of characters that represents a standard internet email address.
|
|
136
136
|
:param parent_ids: The unique identifier (ID) of the root or organizational unit (OU) that you want to create the new account in. If you don't specify this parameter, the ``ParentId`` defaults to the root ID. This parameter only accepts a string array with one string value. The `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ for a parent ID string requires one of the following: - *Root* - A string that begins with "r-" followed by from 4 to 32 lowercase letters or digits. - *Organizational unit (OU)* - A string that begins with "ou-" followed by from 4 to 32 lowercase letters or digits (the ID of the root that the OU is in). This string is followed by a second "-" dash and from 8 to 32 additional lowercase letters or digits.
|
|
137
|
-
:param role_name: The name of an IAM role that AWS Organizations automatically preconfigures in the new member account. This role trusts the management account, allowing users in the management account to assume the role, as permitted by the management account administrator. The role has administrator permissions in the new member account. If you don't specify this parameter, the role name defaults to ``OrganizationAccountAccessRole`` . For more information about how to use this role to access the member account, see the following links: - `
|
|
137
|
+
:param role_name: The name of an IAM role that AWS Organizations automatically preconfigures in the new member account. This role trusts the management account, allowing users in the management account to assume the role, as permitted by the management account administrator. The role has administrator permissions in the new member account. If you don't specify this parameter, the role name defaults to ``OrganizationAccountAccessRole`` . For more information about how to use this role to access the member account, see the following links: - `Creating the OrganizationAccountAccessRole in an invited member account <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html#orgs_manage_accounts_create-cross-account-role>`_ in the *AWS Organizations User Guide* - Steps 2 and 3 in `IAM Tutorial: Delegate access across AWS accounts using IAM roles <https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html>`_ in the *IAM User Guide* The `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ that is used to validate this parameter. The pattern can include uppercase letters, lowercase letters, digits with no spaces, and any of the following characters: =,.@- Default: - "OrganizationAccountAccessRole"
|
|
138
138
|
:param tags: A list of tags that you want to attach to the newly created account. For each tag in the list, you must specify both a tag key and a value. You can set the value to an empty string, but you can't set it to ``null`` . For more information about tagging, see `Tagging AWS Organizations resources <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_tagging.html>`_ in the AWS Organizations User Guide. .. epigraph:: If any one of the tags is not valid or if you exceed the maximum allowed number of tags for an account, then the entire request fails and the account is not created.
|
|
139
139
|
'''
|
|
140
140
|
if __debug__:
|
|
@@ -339,7 +339,7 @@ class CfnAccountProps:
|
|
|
339
339
|
:param account_name: The account name given to the account when it was created.
|
|
340
340
|
:param email: The email address associated with the AWS account. The `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ for this parameter is a string of characters that represents a standard internet email address.
|
|
341
341
|
:param parent_ids: The unique identifier (ID) of the root or organizational unit (OU) that you want to create the new account in. If you don't specify this parameter, the ``ParentId`` defaults to the root ID. This parameter only accepts a string array with one string value. The `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ for a parent ID string requires one of the following: - *Root* - A string that begins with "r-" followed by from 4 to 32 lowercase letters or digits. - *Organizational unit (OU)* - A string that begins with "ou-" followed by from 4 to 32 lowercase letters or digits (the ID of the root that the OU is in). This string is followed by a second "-" dash and from 8 to 32 additional lowercase letters or digits.
|
|
342
|
-
:param role_name: The name of an IAM role that AWS Organizations automatically preconfigures in the new member account. This role trusts the management account, allowing users in the management account to assume the role, as permitted by the management account administrator. The role has administrator permissions in the new member account. If you don't specify this parameter, the role name defaults to ``OrganizationAccountAccessRole`` . For more information about how to use this role to access the member account, see the following links: - `
|
|
342
|
+
:param role_name: The name of an IAM role that AWS Organizations automatically preconfigures in the new member account. This role trusts the management account, allowing users in the management account to assume the role, as permitted by the management account administrator. The role has administrator permissions in the new member account. If you don't specify this parameter, the role name defaults to ``OrganizationAccountAccessRole`` . For more information about how to use this role to access the member account, see the following links: - `Creating the OrganizationAccountAccessRole in an invited member account <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html#orgs_manage_accounts_create-cross-account-role>`_ in the *AWS Organizations User Guide* - Steps 2 and 3 in `IAM Tutorial: Delegate access across AWS accounts using IAM roles <https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html>`_ in the *IAM User Guide* The `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ that is used to validate this parameter. The pattern can include uppercase letters, lowercase letters, digits with no spaces, and any of the following characters: =,.@- Default: - "OrganizationAccountAccessRole"
|
|
343
343
|
:param tags: A list of tags that you want to attach to the newly created account. For each tag in the list, you must specify both a tag key and a value. You can set the value to an empty string, but you can't set it to ``null`` . For more information about tagging, see `Tagging AWS Organizations resources <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_tagging.html>`_ in the AWS Organizations User Guide. .. epigraph:: If any one of the tags is not valid or if you exceed the maximum allowed number of tags for an account, then the entire request fails and the account is not created.
|
|
344
344
|
|
|
345
345
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-organizations-account.html
|
|
@@ -432,8 +432,8 @@ class CfnAccountProps:
|
|
|
432
432
|
|
|
433
433
|
For more information about how to use this role to access the member account, see the following links:
|
|
434
434
|
|
|
435
|
-
- `
|
|
436
|
-
- Steps 2 and 3 in `Tutorial: Delegate
|
|
435
|
+
- `Creating the OrganizationAccountAccessRole in an invited member account <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html#orgs_manage_accounts_create-cross-account-role>`_ in the *AWS Organizations User Guide*
|
|
436
|
+
- Steps 2 and 3 in `IAM Tutorial: Delegate access across AWS accounts using IAM roles <https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html>`_ in the *IAM User Guide*
|
|
437
437
|
|
|
438
438
|
The `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ that is used to validate this parameter. The pattern can include uppercase letters, lowercase letters, digits with no spaces, and any of the following characters: =,.@-
|
|
439
439
|
|
|
@@ -484,10 +484,10 @@ class CfnOrganization(
|
|
|
484
484
|
.. epigraph::
|
|
485
485
|
|
|
486
486
|
- If you delete an organization, you can't recover it. If you created any policies inside of the organization, they're also deleted and you can't recover them.
|
|
487
|
-
- You can delete an organization only after you remove all member accounts from the organization. If you created some of your member accounts using AWS Organizations , you might be blocked from removing those accounts. You can remove a member account only if it has all the information that's required to operate as a standalone AWS account. For more information about how to provide that information and then remove the account, see `
|
|
487
|
+
- You can delete an organization only after you remove all member accounts from the organization. If you created some of your member accounts using AWS Organizations , you might be blocked from removing those accounts. You can remove a member account only if it has all the information that's required to operate as a standalone AWS account. For more information about how to provide that information and then remove the account, see `Leave an organization from your member account <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_leave-as-member.html>`_ in the *AWS Organizations User Guide* .
|
|
488
488
|
- If you closed a member account before you remove it from the organization, it enters a 'suspended' state for a period of time and you can't remove the account from the organization until it is finally closed. This can take up to 90 days and can prevent you from deleting the organization until all member accounts are completely closed.
|
|
489
489
|
|
|
490
|
-
For more information, see `Deleting
|
|
490
|
+
For more information, see `Deleting an organization <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_org_delete.html>`_ in the *AWS Organizations User Guide* .
|
|
491
491
|
|
|
492
492
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-organizations-organization.html
|
|
493
493
|
:exampleMetadata: fixture=_generated
|
|
@@ -513,7 +513,7 @@ class CfnOrganization(
|
|
|
513
513
|
'''
|
|
514
514
|
:param scope: Scope in which this resource is defined.
|
|
515
515
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
516
|
-
:param feature_set: Specifies the feature set supported by the new organization. Each feature set supports different levels of functionality. - ``ALL`` In addition to all the features supported by the consolidated billing feature set, the management account gains access to advanced features that give you more control over accounts in your organization. By default or if you set the ``FeatureSet`` property to ``ALL`` , the new organization is created with all features enabled and service control policies automatically enabled in the `root <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#root>`_ . For more information, see `All features <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-all>`_ in the *AWS Organizations User Guide* . - ``CONSOLIDATED_BILLING`` All member accounts have their bills consolidated to and paid by the management account. For more information, see `Consolidated billing <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-cb-only>`_ in the *AWS Organizations User Guide
|
|
516
|
+
:param feature_set: Specifies the feature set supported by the new organization. Each feature set supports different levels of functionality. - ``ALL`` In addition to all the features supported by the consolidated billing feature set, the management account gains access to advanced features that give you more control over accounts in your organization. By default or if you set the ``FeatureSet`` property to ``ALL`` , the new organization is created with all features enabled and service control policies automatically enabled in the `root <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#root>`_ . For more information, see `All features <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-all>`_ in the *AWS Organizations User Guide* . - ``CONSOLIDATED_BILLING`` All member accounts have their bills consolidated to and paid by the management account. For more information, see `Consolidated billing <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-cb-only>`_ in the *AWS Organizations User Guide* . The consolidated billing feature subset isn't available for organizations in the AWS GovCloud (US) Region. Feature set ``ALL`` provides the following advanced features: - Apply any `policy type <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html#orgs-policy-types>`_ to any member account in the organization. - Apply `service control policies (SCPs) <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html>`_ to member accounts that restrict the services and actions that users (including the root user) and roles in an account can access. Using SCPs you can prevent member accounts from leaving the organization. - Enable `integration with supported AWS services <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_integrate_services_list.html>`_ to let those services provide functionality across all of the accounts in your organization. If you don't specify this property, the default value is ``ALL`` . Default: - "ALL"
|
|
517
517
|
'''
|
|
518
518
|
if __debug__:
|
|
519
519
|
type_hints = typing.get_type_hints(_typecheckingstub__450a54c6b7334fcb8f406a9a29b8e1f90a618bcbd127f2d5a6a9fa43ff254400)
|
|
@@ -638,7 +638,7 @@ class CfnOrganizationProps:
|
|
|
638
638
|
def __init__(self, *, feature_set: typing.Optional[builtins.str] = None) -> None:
|
|
639
639
|
'''Properties for defining a ``CfnOrganization``.
|
|
640
640
|
|
|
641
|
-
:param feature_set: Specifies the feature set supported by the new organization. Each feature set supports different levels of functionality. - ``ALL`` In addition to all the features supported by the consolidated billing feature set, the management account gains access to advanced features that give you more control over accounts in your organization. By default or if you set the ``FeatureSet`` property to ``ALL`` , the new organization is created with all features enabled and service control policies automatically enabled in the `root <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#root>`_ . For more information, see `All features <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-all>`_ in the *AWS Organizations User Guide* . - ``CONSOLIDATED_BILLING`` All member accounts have their bills consolidated to and paid by the management account. For more information, see `Consolidated billing <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-cb-only>`_ in the *AWS Organizations User Guide
|
|
641
|
+
:param feature_set: Specifies the feature set supported by the new organization. Each feature set supports different levels of functionality. - ``ALL`` In addition to all the features supported by the consolidated billing feature set, the management account gains access to advanced features that give you more control over accounts in your organization. By default or if you set the ``FeatureSet`` property to ``ALL`` , the new organization is created with all features enabled and service control policies automatically enabled in the `root <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#root>`_ . For more information, see `All features <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-all>`_ in the *AWS Organizations User Guide* . - ``CONSOLIDATED_BILLING`` All member accounts have their bills consolidated to and paid by the management account. For more information, see `Consolidated billing <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-cb-only>`_ in the *AWS Organizations User Guide* . The consolidated billing feature subset isn't available for organizations in the AWS GovCloud (US) Region. Feature set ``ALL`` provides the following advanced features: - Apply any `policy type <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html#orgs-policy-types>`_ to any member account in the organization. - Apply `service control policies (SCPs) <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html>`_ to member accounts that restrict the services and actions that users (including the root user) and roles in an account can access. Using SCPs you can prevent member accounts from leaving the organization. - Enable `integration with supported AWS services <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_integrate_services_list.html>`_ to let those services provide functionality across all of the accounts in your organization. If you don't specify this property, the default value is ``ALL`` . Default: - "ALL"
|
|
642
642
|
|
|
643
643
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-organizations-organization.html
|
|
644
644
|
:exampleMetadata: fixture=_generated
|
|
@@ -665,7 +665,7 @@ class CfnOrganizationProps:
|
|
|
665
665
|
'''Specifies the feature set supported by the new organization. Each feature set supports different levels of functionality.
|
|
666
666
|
|
|
667
667
|
- ``ALL`` In addition to all the features supported by the consolidated billing feature set, the management account gains access to advanced features that give you more control over accounts in your organization. By default or if you set the ``FeatureSet`` property to ``ALL`` , the new organization is created with all features enabled and service control policies automatically enabled in the `root <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#root>`_ . For more information, see `All features <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-all>`_ in the *AWS Organizations User Guide* .
|
|
668
|
-
- ``CONSOLIDATED_BILLING`` All member accounts have their bills consolidated to and paid by the management account. For more information, see `Consolidated billing <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-cb-only>`_ in the *AWS Organizations User Guide
|
|
668
|
+
- ``CONSOLIDATED_BILLING`` All member accounts have their bills consolidated to and paid by the management account. For more information, see `Consolidated billing <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html#feature-set-cb-only>`_ in the *AWS Organizations User Guide* .
|
|
669
669
|
|
|
670
670
|
The consolidated billing feature subset isn't available for organizations in the AWS GovCloud (US) Region.
|
|
671
671
|
|
|
@@ -706,7 +706,7 @@ class CfnOrganizationalUnit(
|
|
|
706
706
|
|
|
707
707
|
An OU is a container for accounts that enables you to organize your accounts to apply policies according to your business requirements. The number of levels deep that you can nest OUs is dependent upon the policy types enabled for that root. For service control policies, the limit is five.
|
|
708
708
|
|
|
709
|
-
For more information about OUs, see `Managing
|
|
709
|
+
For more information about OUs, see `Managing organizational units (OUs) <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_ous.html>`_ in the *AWS Organizations User Guide* .
|
|
710
710
|
|
|
711
711
|
If the request includes tags, then the requester must have the ``organizations:TagResource`` permission.
|
|
712
712
|
|
|
@@ -976,7 +976,7 @@ class CfnPolicy(
|
|
|
976
976
|
):
|
|
977
977
|
'''Creates a policy of a specified type that you can attach to a root, an organizational unit (OU), or an individual AWS account .
|
|
978
978
|
|
|
979
|
-
For more information about policies and their use, see `Managing
|
|
979
|
+
For more information about policies and their use, see `Managing AWS Organizations policies <https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html>`_ .
|
|
980
980
|
|
|
981
981
|
If the request includes tags, then the requester must have the ``organizations:TagResource`` permission.
|
|
982
982
|
|