awscli 1.37.3__py3-none-any.whl → 1.37.5__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of awscli might be problematic. Click here for more details.

Files changed (160) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/examples/cloudfront/create-distribution-with-tags.rst +9 -13
  3. awscli/examples/cloudfront/get-distribution.rst +6 -10
  4. awscli/examples/cloudtrail/create-subscription.rst +29 -26
  5. awscli/examples/cloudtrail/create-trail.rst +13 -11
  6. awscli/examples/cloudtrail/describe-trails.rst +30 -29
  7. awscli/examples/cloudtrail/put-event-selectors.rst +9 -9
  8. awscli/examples/cloudtrail/update-subscription.rst +25 -22
  9. awscli/examples/cloudtrail/update-trail.rst +12 -10
  10. awscli/examples/codebuild/create-report-group.rst +2 -2
  11. awscli/examples/datapipeline/get-pipeline-definition.rst +1 -1
  12. awscli/examples/deploy/batch-get-deployments.rst +2 -2
  13. awscli/examples/deploy/create-deployment.rst +1 -1
  14. awscli/examples/deploy/get-application-revision.rst +2 -2
  15. awscli/examples/deploy/get-deployment.rst +1 -1
  16. awscli/examples/deploy/list-application-revisions.rst +3 -3
  17. awscli/examples/deploy/push.rst +2 -2
  18. awscli/examples/deploy/register-application-revision.rst +1 -1
  19. awscli/examples/ds-data/add-group-member.rst +12 -0
  20. awscli/examples/ds-data/create-group.rst +17 -0
  21. awscli/examples/ds-data/create-user.rst +17 -0
  22. awscli/examples/ds-data/delete-group.rst +11 -0
  23. awscli/examples/ds-data/delete-user.rst +11 -0
  24. awscli/examples/ds-data/describe-group.rst +21 -0
  25. awscli/examples/ds-data/describe-user.rst +21 -0
  26. awscli/examples/ds-data/disable-directory-data-access.rst +10 -0
  27. awscli/examples/ds-data/disable-user.rst +11 -0
  28. awscli/examples/ds-data/enable-directory-data-access.rst +10 -0
  29. awscli/examples/ds-data/list-group-members.rst +29 -0
  30. awscli/examples/ds-data/list-groups-for-member.rst +25 -0
  31. awscli/examples/ds-data/list-groups.rst +503 -0
  32. awscli/examples/ds-data/list-users.rst +57 -0
  33. awscli/examples/ds-data/remove-group-member.rst +12 -0
  34. awscli/examples/ds-data/reset-user-password.rst +12 -0
  35. awscli/examples/ds-data/search-groups.rst +25 -0
  36. awscli/examples/ds-data/search-users.rst +24 -0
  37. awscli/examples/ds-data/update-group.rst +13 -0
  38. awscli/examples/ds-data/update-user.rst +13 -0
  39. awscli/examples/ec2/accept-address-transfer.rst +1 -1
  40. awscli/examples/ec2/allocate-hosts.rst +55 -55
  41. awscli/examples/ec2/associate-address.rst +44 -35
  42. awscli/examples/ec2/authorize-security-group-egress.rst +56 -23
  43. awscli/examples/ec2/authorize-security-group-ingress.rst +15 -15
  44. awscli/examples/ec2/cancel-capacity-reservation.rst +14 -14
  45. awscli/examples/ec2/cancel-spot-fleet-requests.rst +43 -46
  46. awscli/examples/ec2/copy-snapshot.rst +2 -4
  47. awscli/examples/ec2/create-capacity-reservation.rst +95 -95
  48. awscli/examples/ec2/create-replace-root-volume-task.rst +1 -3
  49. awscli/examples/ec2/create-restore-image-task.rst +2 -2
  50. awscli/examples/ec2/create-spot-datafeed-subscription.rst +1 -1
  51. awscli/examples/ec2/create-tags.rst +43 -43
  52. awscli/examples/ec2/create-traffic-mirror-filter-rule.rst +32 -32
  53. awscli/examples/ec2/create-traffic-mirror-filter.rst +22 -12
  54. awscli/examples/ec2/create-traffic-mirror-session.rst +31 -31
  55. awscli/examples/ec2/create-traffic-mirror-target.rst +45 -35
  56. awscli/examples/ec2/create-transit-gateway-prefix-list-reference.rst +27 -27
  57. awscli/examples/ec2/create-verified-access-endpoint.rst +1 -1
  58. awscli/examples/ec2/create-vpc-endpoint-service-configuration.rst +67 -65
  59. awscli/examples/ec2/create-vpc-endpoint.rst +4 -4
  60. awscli/examples/ec2/describe-capacity-reservations.rst +46 -31
  61. awscli/examples/ec2/describe-instance-image-metadata.rst +186 -0
  62. awscli/examples/ec2/describe-spot-datafeed-subscription.rst +1 -1
  63. awscli/examples/ec2/describe-vpc-endpoint-service-configurations.rst +62 -62
  64. awscli/examples/ec2/describe-vpc-endpoint-services.rst +132 -134
  65. awscli/examples/ec2/describe-vpc-endpoints.rst +89 -89
  66. awscli/examples/ec2/register-image.rst +32 -32
  67. awscli/examples/ecr-public/get-registry-catalog-data.rst +14 -0
  68. awscli/examples/ecr-public/get-repository-catalog-data.rst +29 -0
  69. awscli/examples/ecr-public/list-tags-for-resource.rst +28 -0
  70. awscli/examples/ecr-public/put-registry-catalog-data.rst +15 -0
  71. awscli/examples/ecr-public/put-repository-catalog-data.rst +5 -4
  72. awscli/examples/ecr-public/tag-resource.rst +21 -0
  73. awscli/examples/ecr-public/untag-resource.rst +12 -0
  74. awscli/examples/ecs/describe-service-deployments.rst +54 -0
  75. awscli/examples/ecs/describe-service-revisions.rst +60 -0
  76. awscli/examples/ecs/list-service-deployments.rst +25 -0
  77. awscli/examples/eks/describe-cluster.rst +1 -1
  78. awscli/examples/emr/create-cluster-examples.rst +4 -4
  79. awscli/examples/emr/schedule-hbase-backup.rst +23 -23
  80. awscli/examples/importexport/create-job.rst +2 -2
  81. awscli/examples/importexport/get-shipping-label.rst +1 -1
  82. awscli/examples/importexport/get-status.rst +1 -1
  83. awscli/examples/ivs-realtime/create-storage-configuration.rst +20 -20
  84. awscli/examples/ivs-realtime/get-storage-configuration.rst +20 -20
  85. awscli/examples/ivs-realtime/list-storage-configurations.rst +29 -29
  86. awscli/examples/kendra/create-data-source.rst +23 -23
  87. awscli/examples/kendra/describe-data-source.rst +83 -83
  88. awscli/examples/kendra/update-data-source.rst +18 -18
  89. awscli/examples/macie2/describe-buckets.rst +13 -11
  90. awscli/examples/oam/create-link.rst +24 -0
  91. awscli/examples/oam/create-sink.rst +17 -0
  92. awscli/examples/oam/delete-link.rst +10 -0
  93. awscli/examples/oam/delete-sink.rst +10 -0
  94. awscli/examples/oam/get-link.rst +22 -0
  95. awscli/examples/oam/get-sink-policy.rst +16 -0
  96. awscli/examples/oam/get-sink.rst +17 -0
  97. awscli/examples/oam/list-attached-links.rst +23 -0
  98. awscli/examples/oam/list-links.rst +21 -0
  99. awscli/examples/oam/list-sinks.rst +19 -0
  100. awscli/examples/oam/list-tags-for-resource.rst +16 -0
  101. awscli/examples/oam/put-sink-policy.rst +17 -0
  102. awscli/examples/oam/tag-resource.rst +11 -0
  103. awscli/examples/oam/untag-resource.rst +11 -0
  104. awscli/examples/oam/update-link.rst +24 -0
  105. awscli/examples/polly/get-speech-synthesis-task.rst +23 -23
  106. awscli/examples/polly/list-speech-synthesis-tasks.rst +25 -25
  107. awscli/examples/polly/start-speech-synthesis-task.rst +27 -27
  108. awscli/examples/qldb/describe-journal-s3-export.rst +1 -1
  109. awscli/examples/qldb/export-journal-to-s3.rst +1 -1
  110. awscli/examples/qldb/list-journal-s3-exports-for-ledger.rst +1 -1
  111. awscli/examples/qldb/list-journal-s3-exports.rst +2 -2
  112. awscli/examples/rds/download-db-log-file-portion.rst +7 -3
  113. awscli/examples/resourcegroupstaggingapi/untag-resources.rst +1 -1
  114. awscli/examples/s3/cp.rst +7 -7
  115. awscli/examples/s3/ls.rst +2 -2
  116. awscli/examples/s3/mv.rst +5 -5
  117. awscli/examples/s3/sync.rst +5 -5
  118. awscli/examples/s3api/put-bucket-acl.rst +1 -1
  119. awscli/examples/s3api/put-bucket-cors.rst +1 -1
  120. awscli/examples/s3api/put-bucket-logging.rst +10 -10
  121. awscli/examples/s3api/put-bucket-policy.rst +5 -5
  122. awscli/examples/s3api/put-object-acl.rst +1 -1
  123. awscli/examples/securitylake/create-subscriber.rst +83 -0
  124. awscli/examples/synthetics/associate-resource.rst +11 -0
  125. awscli/examples/synthetics/create-canary.rst +48 -0
  126. awscli/examples/synthetics/create-group.rst +21 -0
  127. awscli/examples/synthetics/delete-canary.rst +10 -0
  128. awscli/examples/synthetics/delete-group.rst +10 -0
  129. awscli/examples/synthetics/describe-canaries-last-run.rst +31 -0
  130. awscli/examples/synthetics/describe-canaries.rst +48 -0
  131. awscli/examples/synthetics/describe-runtime-versions.rst +74 -0
  132. awscli/examples/synthetics/disassociate-resource.rst +11 -0
  133. awscli/examples/synthetics/get-canary-runs.rst +29 -0
  134. awscli/examples/synthetics/get-canary.rst +47 -0
  135. awscli/examples/synthetics/get-group.rst +21 -0
  136. awscli/examples/synthetics/list-associated-groups.rst +20 -0
  137. awscli/examples/synthetics/list-group-resources.rst +16 -0
  138. awscli/examples/synthetics/list-groups.rst +19 -0
  139. awscli/examples/synthetics/list-tags-for-resource.rst +31 -0
  140. awscli/examples/synthetics/start-canary.rst +10 -0
  141. awscli/examples/synthetics/stop-canary.rst +10 -0
  142. awscli/examples/synthetics/tag-resource.rst +21 -0
  143. awscli/examples/synthetics/untag-resource.rst +21 -0
  144. awscli/examples/synthetics/update-canary.rst +11 -0
  145. {awscli-1.37.3.dist-info → awscli-1.37.5.dist-info}/METADATA +2 -2
  146. {awscli-1.37.3.dist-info → awscli-1.37.5.dist-info}/RECORD +158 -93
  147. awscli/examples/securitylake/create-subscriber-data-access.rst +0 -41
  148. awscli/examples/securitylake/create-subscriber-query-access.rst +0 -41
  149. /awscli/examples/securitylake/{create-aws-logsource.rst → create-aws-log-source.rst} +0 -0
  150. /awscli/examples/securitylake/{create-custom-logsource.rst → create-custom-log-source.rst} +0 -0
  151. /awscli/examples/securitylake/{delete-aws-logsource.rst → delete-aws-log-source.rst} +0 -0
  152. /awscli/examples/securitylake/{delete-custom-logsource.rst → delete-custom-log-source.rst} +0 -0
  153. {awscli-1.37.3.data → awscli-1.37.5.data}/scripts/aws +0 -0
  154. {awscli-1.37.3.data → awscli-1.37.5.data}/scripts/aws.cmd +0 -0
  155. {awscli-1.37.3.data → awscli-1.37.5.data}/scripts/aws_bash_completer +0 -0
  156. {awscli-1.37.3.data → awscli-1.37.5.data}/scripts/aws_completer +0 -0
  157. {awscli-1.37.3.data → awscli-1.37.5.data}/scripts/aws_zsh_completer.sh +0 -0
  158. {awscli-1.37.3.dist-info → awscli-1.37.5.dist-info}/LICENSE.txt +0 -0
  159. {awscli-1.37.3.dist-info → awscli-1.37.5.dist-info}/WHEEL +0 -0
  160. {awscli-1.37.3.dist-info → awscli-1.37.5.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,11 @@
1
+ **To delete a user**
2
+
3
+ The following ``delete-user`` example deletes the specified user from the specified directory. ::
4
+
5
+ aws ds-data delete-user \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Deleting an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_delete_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,21 @@
1
+ **To list details of a group**
2
+
3
+ The following ``describe-group`` example gets information for the specified group in the specified directory. ::
4
+
5
+ aws ds-data describe-group \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'sales'
8
+
9
+ Output::
10
+
11
+ {
12
+ "DirectoryId": "d-1234567890",
13
+ "DistinguishedName": "CN=sales,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
14
+ "GroupScope": "Global",
15
+ "GroupType": "Security",
16
+ "Realm": "corp.example.com",
17
+ "SAMAccountName": "sales",
18
+ "SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
19
+ }
20
+
21
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,21 @@
1
+ **To list information for a user**
2
+
3
+ The following ``describe-user`` example gets information for the specified user in the specified directory. ::
4
+
5
+ aws ds-data describe-user command-name \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ Output::
10
+
11
+ {
12
+ "DirectoryId": "d-1234567890",
13
+ "DistinguishedName": "CN=john.doe,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
14
+ "Enabled": false,
15
+ "Realm": "corp.example.com",
16
+ "SAMAccountName": "john.doe",
17
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567",
18
+ "UserPrincipalName": "john.doe@CORP.EXAMPLE.COM"
19
+ }
20
+
21
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,10 @@
1
+ **To disable Directory Service Data API for a directory**
2
+
3
+ The following ``disable-directory-data-access`` example disables the Directory Service Data API for the specified directory. ::
4
+
5
+ aws ds disable-directory-data-access \
6
+ --directory-id d-1234567890
7
+
8
+ This command produces no output.
9
+
10
+ For more information, see `Enabling or disabling user and group management or AWS Directory Service Data <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,11 @@
1
+ **To disable a user**
2
+
3
+ The following ``disable-user`` example disables the specified user in the specified directory. ::
4
+
5
+ aws ds-data disable-user \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Disabling an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_disable_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,10 @@
1
+ **To enable Directory Service Data API for a directory**
2
+
3
+ The following ``enable-directory-data-access`` example enables the Directory Service Data API for the specified directory. ::
4
+
5
+ aws ds enable-directory-data-access \
6
+ --directory-id d-1234567890
7
+
8
+ This command produces no output.
9
+
10
+ For more information, see `Enabling or disabling user and group management or AWS Directory Service Data <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,29 @@
1
+ **To list a directory's group members**
2
+
3
+ The following ``list-group-members`` example lists the group members for the specified group in the specified directory. ::
4
+
5
+ aws ds-data list-group-members \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'sales'
8
+
9
+ Output::
10
+
11
+ {
12
+ "Members": [
13
+ {
14
+ "MemberType": "USER",
15
+ "SAMAccountName": "Jane Doe",
16
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
17
+ },
18
+ {
19
+ "MemberType": "USER",
20
+ "SAMAccountName": "John Doe",
21
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4569"
22
+ }
23
+ ],
24
+ "DirectoryId": "d-1234567890",
25
+ "MemberRealm": "corp.example.com",
26
+ "Realm": "corp.example.com"
27
+ }
28
+
29
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,25 @@
1
+ **To list a directory's group membership**
2
+
3
+ The following ``list-groups-for-member`` example lists group membership for the specified user in the specified directory. ::
4
+
5
+ aws ds-data list-groups-for-member \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ Output::
10
+
11
+ {
12
+ "Groups": [
13
+ {
14
+ "GroupScope": "Global",
15
+ "GroupType": "Security",
16
+ "SAMAccountName": "Domain Users",
17
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
18
+ }
19
+ ],
20
+ "DirectoryId": "d-1234567890",
21
+ "MemberRealm": "corp.example.com",
22
+ "Realm": "corp.example.com"
23
+ }
24
+
25
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,503 @@
1
+ **To list a directory's groups**
2
+
3
+ The following ``list-groups`` example lists groups in the specified directory. ::
4
+
5
+ aws ds-data list-groups \
6
+ --directory-id d-1234567890
7
+
8
+ Output::
9
+
10
+ {
11
+ "Groups": [
12
+ {
13
+ "GroupScope": "BuiltinLocal",
14
+ "GroupType": "Security",
15
+ "SAMAccountName": "Administrators",
16
+ "SID": "S-1-2-33-441"
17
+ },
18
+ {
19
+ "GroupScope": "BuiltinLocal",
20
+ "GroupType": "Security",
21
+ "SAMAccountName": "Users",
22
+ "SID": "S-1-2-33-442"
23
+ },
24
+ {
25
+ "GroupScope": "BuiltinLocal",
26
+ "GroupType": "Security",
27
+ "SAMAccountName": "Guests",
28
+ "SID": "S-1-2-33-443"
29
+ },
30
+ {
31
+ "GroupScope": "BuiltinLocal",
32
+ "GroupType": "Security",
33
+ "SAMAccountName": "Print Operators",
34
+ "SID": "S-1-2-33-444"
35
+ },
36
+ {
37
+ "GroupScope": "BuiltinLocal",
38
+ "GroupType": "Security",
39
+ "SAMAccountName": "Backup Operators",
40
+ "SID": "S-1-2-33-445"
41
+ },
42
+ {
43
+ "GroupScope": "BuiltinLocal",
44
+ "GroupType": "Security",
45
+ "SAMAccountName": "Replicator",
46
+ "SID": "S-1-2-33-446"
47
+ },
48
+ {
49
+ "GroupScope": "BuiltinLocal",
50
+ "GroupType": "Security",
51
+ "SAMAccountName": "Remote Desktop Users",
52
+ "SID": "S-1-2-33-447"
53
+ },
54
+ {
55
+ "GroupScope": "BuiltinLocal",
56
+ "GroupType": "Security",
57
+ "SAMAccountName": "Network Configuration Operators",
58
+ "SID": "S-1-2-33-448"
59
+ },
60
+ {
61
+ "GroupScope": "BuiltinLocal",
62
+ "GroupType": "Security",
63
+ "SAMAccountName": "Performance Monitor Users",
64
+ "SID": "S-1-2-33-449"
65
+ },
66
+ {
67
+ "GroupScope": "BuiltinLocal",
68
+ "GroupType": "Security",
69
+ "SAMAccountName": "Performance Log Users",
70
+ "SID": "S-1-2-33-450"
71
+ },
72
+ {
73
+ "GroupScope": "BuiltinLocal",
74
+ "GroupType": "Security",
75
+ "SAMAccountName": "Distributed COM Users",
76
+ "SID": "S-1-2-33-451"
77
+ },
78
+ {
79
+ "GroupScope": "BuiltinLocal",
80
+ "GroupType": "Security",
81
+ "SAMAccountName": "IIS_IUSRS",
82
+ "SID": "S-1-2-33-452"
83
+ },
84
+ {
85
+ "GroupScope": "BuiltinLocal",
86
+ "GroupType": "Security",
87
+ "SAMAccountName": "Cryptographic Operators",
88
+ "SID": "S-1-2-33-453"
89
+ },
90
+ {
91
+ "GroupScope": "BuiltinLocal",
92
+ "GroupType": "Security",
93
+ "SAMAccountName": "Event Log Readers",
94
+ "SID": "S-1-2-33-454"
95
+ },
96
+ {
97
+ "GroupScope": "BuiltinLocal",
98
+ "GroupType": "Security",
99
+ "SAMAccountName": "Certificate Service DCOM Access",
100
+ "SID": "S-1-2-33-456"
101
+ },
102
+ {
103
+ "GroupScope": "BuiltinLocal",
104
+ "GroupType": "Security",
105
+ "SAMAccountName": "RDS Remote Access Servers",
106
+ "SID": "S-1-2-33-457"
107
+ },
108
+ {
109
+ "GroupScope": "BuiltinLocal",
110
+ "GroupType": "Security",
111
+ "SAMAccountName": "RDS Endpoint Servers",
112
+ "SID": "S-1-2-33-458"
113
+ },
114
+ {
115
+ "GroupScope": "BuiltinLocal",
116
+ "GroupType": "Security",
117
+ "SAMAccountName": "RDS Management Servers",
118
+ "SID": "S-1-2-33-459"
119
+ },
120
+ {
121
+ "GroupScope": "BuiltinLocal",
122
+ "GroupType": "Security",
123
+ "SAMAccountName": "Hyper-V Administrators",
124
+ "SID": "S-1-2-33-460"
125
+ },
126
+ {
127
+ "GroupScope": "BuiltinLocal",
128
+ "GroupType": "Security",
129
+ "SAMAccountName": "Access Control Assistance Operators",
130
+ "SID": "S-1-2-33-461"
131
+ },
132
+ {
133
+ "GroupScope": "BuiltinLocal",
134
+ "GroupType": "Security",
135
+ "SAMAccountName": "Remote Management Users",
136
+ "SID": "S-1-2-33-462"
137
+ },
138
+ {
139
+ "GroupScope": "BuiltinLocal",
140
+ "GroupType": "Security",
141
+ "SAMAccountName": "Storage Replica Administrators",
142
+ "SID": "S-1-2-33-463"
143
+ },
144
+ {
145
+ "GroupScope": "Global",
146
+ "GroupType": "Security",
147
+ "SAMAccountName": "Domain Computers",
148
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-789"
149
+ },
150
+ {
151
+ "GroupScope": "Global",
152
+ "GroupType": "Security",
153
+ "SAMAccountName": "Domain Controllers",
154
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-790"
155
+ },
156
+ {
157
+ "GroupScope": "Universal",
158
+ "GroupType": "Security",
159
+ "SAMAccountName": "Schema Admins",
160
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-791"
161
+ },
162
+ {
163
+ "GroupScope": "Universal",
164
+ "GroupType": "Security",
165
+ "SAMAccountName": "Enterprise Admins",
166
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-792"
167
+ },
168
+ {
169
+ "GroupScope": "DomainLocal",
170
+ "GroupType": "Security",
171
+ "SAMAccountName": "Cert Publishers",
172
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-793"
173
+ },
174
+ {
175
+ "GroupScope": "Global",
176
+ "GroupType": "Security",
177
+ "SAMAccountName": "Domain Admins",
178
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-794"
179
+ },
180
+ {
181
+ "GroupScope": "Global",
182
+ "GroupType": "Security",
183
+ "SAMAccountName": "Domain Users",
184
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-795"
185
+ },
186
+ {
187
+ "GroupScope": "Global",
188
+ "GroupType": "Security",
189
+ "SAMAccountName": "Domain Guests",
190
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-796"
191
+ },
192
+ {
193
+ "GroupScope": "Global",
194
+ "GroupType": "Security",
195
+ "SAMAccountName": "Group Policy Creator Owners",
196
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-797"
197
+ },
198
+ {
199
+ "GroupScope": "DomainLocal",
200
+ "GroupType": "Security",
201
+ "SAMAccountName": "RAS and IAS Servers",
202
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-798"
203
+ },
204
+ {
205
+ "GroupScope": "BuiltinLocal",
206
+ "GroupType": "Security",
207
+ "SAMAccountName": "Server Operators",
208
+ "SID": "S-1-2-33-464"
209
+ },
210
+ {
211
+ "GroupScope": "BuiltinLocal",
212
+ "GroupType": "Security",
213
+ "SAMAccountName": "Account Operators",
214
+ "SID": "S-1-2-33-465"
215
+ },
216
+ {
217
+ "GroupScope": "BuiltinLocal",
218
+ "GroupType": "Security",
219
+ "SAMAccountName": "Pre-Windows 2000 Compatible Access",
220
+ "SID": "S-1-2-33-466"
221
+ },
222
+ {
223
+ "GroupScope": "BuiltinLocal",
224
+ "GroupType": "Security",
225
+ "SAMAccountName": "Incoming Forest Trust Builders",
226
+ "SID": "S-1-2-33-467"
227
+ },
228
+ {
229
+ "GroupScope": "BuiltinLocal",
230
+ "GroupType": "Security",
231
+ "SAMAccountName": "Windows Authorization Access Group",
232
+ "SID": "S-1-2-33-468"
233
+ },
234
+ {
235
+ "GroupScope": "BuiltinLocal",
236
+ "GroupType": "Security",
237
+ "SAMAccountName": "Terminal Server License Servers",
238
+ "SID": "S-1-2-33-469"
239
+ },
240
+ {
241
+ "GroupScope": "DomainLocal",
242
+ "GroupType": "Security",
243
+ "SAMAccountName": "Allowed RODC Password Replication Group",
244
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-798"
245
+ },
246
+ {
247
+ "GroupScope": "DomainLocal",
248
+ "GroupType": "Security",
249
+ "SAMAccountName": "Denied RODC Password Replication Group",
250
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-799"
251
+ },
252
+ {
253
+ "GroupScope": "Global",
254
+ "GroupType": "Security",
255
+ "SAMAccountName": "Read-only Domain Controllers",
256
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-800"
257
+ },
258
+ {
259
+ "GroupScope": "Universal",
260
+ "GroupType": "Security",
261
+ "SAMAccountName": "Enterprise Read-only Domain Controllers",
262
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-801"
263
+ },
264
+ {
265
+ "GroupScope": "Global",
266
+ "GroupType": "Security",
267
+ "SAMAccountName": "Cloneable Domain Controllers",
268
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-802"
269
+ },
270
+ {
271
+ "GroupScope": "Global",
272
+ "GroupType": "Security",
273
+ "SAMAccountName": "Protected Users",
274
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-803"
275
+ },
276
+ {
277
+ "GroupScope": "Global",
278
+ "GroupType": "Security",
279
+ "SAMAccountName": "Key Admins",
280
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-804"
281
+ },
282
+ {
283
+ "GroupScope": "Universal",
284
+ "GroupType": "Security",
285
+ "SAMAccountName": "Enterprise Key Admins",
286
+ "SID": "S-1-2-34-56789123456-7891012345-6789123486-805"
287
+ },
288
+ {
289
+ "GroupScope": "DomainLocal",
290
+ "GroupType": "Security",
291
+ "SAMAccountName": "DnsAdmins",
292
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
293
+ },
294
+ {
295
+ "GroupScope": "Global",
296
+ "GroupType": "Security",
297
+ "SAMAccountName": "DnsUpdateProxy",
298
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
299
+ },
300
+ {
301
+ "GroupScope": "DomainLocal",
302
+ "GroupType": "Security",
303
+ "SAMAccountName": "Admins",
304
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4569"
305
+ },
306
+ {
307
+ "GroupScope": "DomainLocal",
308
+ "GroupType": "Security",
309
+ "SAMAccountName": "AWSAdministrators",
310
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4570"
311
+ },
312
+ {
313
+ "GroupScope": "DomainLocal",
314
+ "GroupType": "Security",
315
+ "SAMAccountName": "AWS Object Management Service Accounts",
316
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4571"
317
+ },
318
+ {
319
+ "GroupScope": "DomainLocal",
320
+ "GroupType": "Security",
321
+ "SAMAccountName": "AWS Private CA Connector for AD Delegated Group",
322
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4572"
323
+ },
324
+ {
325
+ "GroupScope": "DomainLocal",
326
+ "GroupType": "Security",
327
+ "SAMAccountName": "AWS Application and Service Delegated Group",
328
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4573"
329
+ },
330
+ {
331
+ "GroupScope": "DomainLocal",
332
+ "GroupType": "Security",
333
+ "SAMAccountName": "AWS Delegated Administrators",
334
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4574"
335
+ },
336
+ {
337
+ "GroupScope": "DomainLocal",
338
+ "GroupType": "Security",
339
+ "SAMAccountName": "AWS Delegated FSx Administrators",
340
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4575"
341
+ },
342
+ {
343
+ "GroupScope": "DomainLocal",
344
+ "GroupType": "Security",
345
+ "SAMAccountName": "AWS Delegated Account Operators",
346
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4576"
347
+ },
348
+ {
349
+ "GroupScope": "DomainLocal",
350
+ "GroupType": "Security",
351
+ "SAMAccountName": "AWS Delegated Active Directory Based Activation Administrators",
352
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4577"
353
+ },
354
+ {
355
+ "GroupScope": "DomainLocal",
356
+ "GroupType": "Security",
357
+ "SAMAccountName": "AWS Delegated Allowed to Authenticate Objects",
358
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4578"
359
+ },
360
+ {
361
+ "GroupScope": "DomainLocal",
362
+ "GroupType": "Security",
363
+ "SAMAccountName": "AWS Delegated Allowed to Authenticate to Domain Controllers",
364
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4579"
365
+ },
366
+ {
367
+ "GroupScope": "DomainLocal",
368
+ "GroupType": "Security",
369
+ "SAMAccountName": "AWS Delegated Deleted Object Lifetime Administrators",
370
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4580"
371
+ },
372
+ {
373
+ "GroupScope": "DomainLocal",
374
+ "GroupType": "Security",
375
+ "SAMAccountName": "AWS Delegated Distributed File System Administrators",
376
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4581"
377
+ },
378
+ {
379
+ "GroupScope": "DomainLocal",
380
+ "GroupType": "Security",
381
+ "SAMAccountName": "AWS Delegated Dynamic Host Configuration Protocol Administrators",
382
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4582"
383
+ },
384
+ {
385
+ "GroupScope": "DomainLocal",
386
+ "GroupType": "Security",
387
+ "SAMAccountName": "AWS Delegated Enterprise Certificate Authority Administrators",
388
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4583"
389
+ },
390
+ {
391
+ "GroupScope": "DomainLocal",
392
+ "GroupType": "Security",
393
+ "SAMAccountName": "AWS Delegated Fine Grained Password Policy Administrators",
394
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4584"
395
+ },
396
+ {
397
+ "GroupScope": "DomainLocal",
398
+ "GroupType": "Security",
399
+ "SAMAccountName": "AWS Delegated Group Policy Administrators",
400
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4585"
401
+ },
402
+ {
403
+ "GroupScope": "DomainLocal",
404
+ "GroupType": "Security",
405
+ "SAMAccountName": "AWS Delegated Managed Service Account Administrators",
406
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4586"
407
+ },
408
+ {
409
+ "GroupScope": "DomainLocal",
410
+ "GroupType": "Security",
411
+ "SAMAccountName": "AWS Delegated Read Foreign Security Principals",
412
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4587"
413
+ },
414
+ {
415
+ "GroupScope": "DomainLocal",
416
+ "GroupType": "Security",
417
+ "SAMAccountName": "AWS Delegated Remote Access Service Administrators",
418
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4588"
419
+ },
420
+ {
421
+ "GroupScope": "DomainLocal",
422
+ "GroupType": "Security",
423
+ "SAMAccountName": "AWS Delegated Replicate Directory Changes Administrators",
424
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4588"
425
+ },
426
+ {
427
+ "GroupScope": "DomainLocal",
428
+ "GroupType": "Security",
429
+ "SAMAccountName": "AWS Delegated Sites and Services Administrators",
430
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4589"
431
+ },
432
+ {
433
+ "GroupScope": "DomainLocal",
434
+ "GroupType": "Security",
435
+ "SAMAccountName": "AWS Delegated System Management Administrators",
436
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4590"
437
+ },
438
+ {
439
+ "GroupScope": "DomainLocal",
440
+ "GroupType": "Security",
441
+ "SAMAccountName": "AWS Delegated Terminal Server Licensing Administrators",
442
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4591"
443
+ },
444
+ {
445
+ "GroupScope": "DomainLocal",
446
+ "GroupType": "Security",
447
+ "SAMAccountName": "AWS Delegated User Principal Name Suffix Administrators",
448
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4592"
449
+ },
450
+ {
451
+ "GroupScope": "DomainLocal",
452
+ "GroupType": "Security",
453
+ "SAMAccountName": "AWS Delegated Add Workstations To Domain Users",
454
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4593"
455
+ },
456
+ {
457
+ "GroupScope": "DomainLocal",
458
+ "GroupType": "Security",
459
+ "SAMAccountName": "AWS Delegated Domain Name System Administrators",
460
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4594"
461
+ },
462
+ {
463
+ "GroupScope": "DomainLocal",
464
+ "GroupType": "Security",
465
+ "SAMAccountName": "AWS Delegated Kerberos Delegation Administrators",
466
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4595"
467
+ },
468
+ {
469
+ "GroupScope": "DomainLocal",
470
+ "GroupType": "Security",
471
+ "SAMAccountName": "AWS Delegated Server Administrators",
472
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4596"
473
+ },
474
+ {
475
+ "GroupScope": "DomainLocal",
476
+ "GroupType": "Security",
477
+ "SAMAccountName": "AWS Delegated MS-NPRC Non-Compliant Devices",
478
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4597"
479
+ },
480
+ {
481
+ "GroupScope": "Global",
482
+ "GroupType": "Security",
483
+ "SAMAccountName": "Remote Access",
484
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4598"
485
+ },
486
+ {
487
+ "GroupScope": "Global",
488
+ "GroupType": "Security",
489
+ "SAMAccountName": "Accounting",
490
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4599"
491
+ },
492
+ {
493
+ "GroupScope": "Global",
494
+ "GroupType": "Distribution",
495
+ "SAMAccountName": "sales",
496
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
497
+ }
498
+ ],
499
+ "DirectoryId": "d-1234567890",
500
+ "Realm": "corp.example.com"
501
+ }
502
+
503
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.