awscli 1.37.4__py3-none-any.whl → 1.37.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of awscli might be problematic. Click here for more details.
- awscli/__init__.py +1 -1
- awscli/examples/cloudtrail/create-subscription.rst +29 -26
- awscli/examples/cloudtrail/create-trail.rst +13 -11
- awscli/examples/cloudtrail/describe-trails.rst +30 -29
- awscli/examples/cloudtrail/put-event-selectors.rst +8 -8
- awscli/examples/cloudtrail/update-subscription.rst +25 -22
- awscli/examples/cloudtrail/update-trail.rst +12 -10
- awscli/examples/codebuild/create-report-group.rst +2 -2
- awscli/examples/datapipeline/get-pipeline-definition.rst +1 -1
- awscli/examples/ds-data/add-group-member.rst +12 -0
- awscli/examples/ds-data/create-group.rst +17 -0
- awscli/examples/ds-data/create-user.rst +17 -0
- awscli/examples/ds-data/delete-group.rst +11 -0
- awscli/examples/ds-data/delete-user.rst +11 -0
- awscli/examples/ds-data/describe-group.rst +21 -0
- awscli/examples/ds-data/describe-user.rst +21 -0
- awscli/examples/ds-data/disable-directory-data-access.rst +10 -0
- awscli/examples/ds-data/disable-user.rst +11 -0
- awscli/examples/ds-data/enable-directory-data-access.rst +10 -0
- awscli/examples/ds-data/list-group-members.rst +29 -0
- awscli/examples/ds-data/list-groups-for-member.rst +25 -0
- awscli/examples/ds-data/list-groups.rst +503 -0
- awscli/examples/ds-data/list-users.rst +57 -0
- awscli/examples/ds-data/remove-group-member.rst +12 -0
- awscli/examples/ds-data/reset-user-password.rst +12 -0
- awscli/examples/ds-data/search-groups.rst +25 -0
- awscli/examples/ds-data/search-users.rst +24 -0
- awscli/examples/ds-data/update-group.rst +13 -0
- awscli/examples/ds-data/update-user.rst +13 -0
- awscli/examples/ec2/describe-capacity-reservations.rst +46 -31
- awscli/examples/ec2/describe-instance-image-metadata.rst +186 -0
- awscli/examples/ec2/describe-spot-datafeed-subscription.rst +1 -1
- awscli/examples/ec2/register-image.rst +32 -32
- awscli/examples/ecr-public/get-registry-catalog-data.rst +14 -0
- awscli/examples/ecr-public/get-repository-catalog-data.rst +29 -0
- awscli/examples/ecr-public/list-tags-for-resource.rst +28 -0
- awscli/examples/ecr-public/put-registry-catalog-data.rst +15 -0
- awscli/examples/ecr-public/put-repository-catalog-data.rst +5 -4
- awscli/examples/ecr-public/tag-resource.rst +21 -0
- awscli/examples/ecr-public/untag-resource.rst +12 -0
- awscli/examples/ecs/describe-service-deployments.rst +54 -0
- awscli/examples/ecs/describe-service-revisions.rst +60 -0
- awscli/examples/ecs/list-service-deployments.rst +25 -0
- awscli/examples/ivs-realtime/create-storage-configuration.rst +20 -20
- awscli/examples/ivs-realtime/get-storage-configuration.rst +20 -20
- awscli/examples/ivs-realtime/list-storage-configurations.rst +29 -29
- awscli/examples/kendra/create-data-source.rst +23 -23
- awscli/examples/kendra/describe-data-source.rst +83 -83
- awscli/examples/kendra/update-data-source.rst +18 -18
- awscli/examples/macie2/describe-buckets.rst +13 -11
- awscli/examples/oam/create-link.rst +24 -0
- awscli/examples/oam/create-sink.rst +17 -0
- awscli/examples/oam/delete-link.rst +10 -0
- awscli/examples/oam/delete-sink.rst +10 -0
- awscli/examples/oam/get-link.rst +22 -0
- awscli/examples/oam/get-sink-policy.rst +16 -0
- awscli/examples/oam/get-sink.rst +17 -0
- awscli/examples/oam/list-attached-links.rst +23 -0
- awscli/examples/oam/list-links.rst +21 -0
- awscli/examples/oam/list-sinks.rst +19 -0
- awscli/examples/oam/list-tags-for-resource.rst +16 -0
- awscli/examples/oam/put-sink-policy.rst +17 -0
- awscli/examples/oam/tag-resource.rst +11 -0
- awscli/examples/oam/untag-resource.rst +11 -0
- awscli/examples/oam/update-link.rst +24 -0
- awscli/examples/polly/get-speech-synthesis-task.rst +23 -23
- awscli/examples/polly/list-speech-synthesis-tasks.rst +25 -25
- awscli/examples/polly/start-speech-synthesis-task.rst +27 -27
- awscli/examples/qldb/describe-journal-s3-export.rst +1 -1
- awscli/examples/qldb/export-journal-to-s3.rst +1 -1
- awscli/examples/qldb/list-journal-s3-exports-for-ledger.rst +1 -1
- awscli/examples/qldb/list-journal-s3-exports.rst +2 -2
- awscli/examples/s3api/put-bucket-acl.rst +1 -1
- awscli/examples/s3api/put-bucket-cors.rst +1 -1
- awscli/examples/s3api/put-bucket-logging.rst +10 -10
- awscli/examples/s3api/put-bucket-policy.rst +5 -5
- awscli/examples/s3api/put-object-acl.rst +1 -1
- awscli/examples/synthetics/associate-resource.rst +11 -0
- awscli/examples/synthetics/create-canary.rst +48 -0
- awscli/examples/synthetics/create-group.rst +21 -0
- awscli/examples/synthetics/delete-canary.rst +10 -0
- awscli/examples/synthetics/delete-group.rst +10 -0
- awscli/examples/synthetics/describe-canaries-last-run.rst +31 -0
- awscli/examples/synthetics/describe-canaries.rst +48 -0
- awscli/examples/synthetics/describe-runtime-versions.rst +74 -0
- awscli/examples/synthetics/disassociate-resource.rst +11 -0
- awscli/examples/synthetics/get-canary-runs.rst +29 -0
- awscli/examples/synthetics/get-canary.rst +47 -0
- awscli/examples/synthetics/get-group.rst +21 -0
- awscli/examples/synthetics/list-associated-groups.rst +20 -0
- awscli/examples/synthetics/list-group-resources.rst +16 -0
- awscli/examples/synthetics/list-groups.rst +19 -0
- awscli/examples/synthetics/list-tags-for-resource.rst +31 -0
- awscli/examples/synthetics/start-canary.rst +10 -0
- awscli/examples/synthetics/stop-canary.rst +10 -0
- awscli/examples/synthetics/tag-resource.rst +21 -0
- awscli/examples/synthetics/untag-resource.rst +21 -0
- awscli/examples/synthetics/update-canary.rst +11 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/METADATA +2 -2
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/RECORD +108 -42
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws.cmd +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_completer +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/LICENSE.txt +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/WHEEL +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,503 @@
|
|
|
1
|
+
**To list a directory's groups**
|
|
2
|
+
|
|
3
|
+
The following ``list-groups`` example lists groups in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data list-groups \
|
|
6
|
+
--directory-id d-1234567890
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"Groups": [
|
|
12
|
+
{
|
|
13
|
+
"GroupScope": "BuiltinLocal",
|
|
14
|
+
"GroupType": "Security",
|
|
15
|
+
"SAMAccountName": "Administrators",
|
|
16
|
+
"SID": "S-1-2-33-441"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"GroupScope": "BuiltinLocal",
|
|
20
|
+
"GroupType": "Security",
|
|
21
|
+
"SAMAccountName": "Users",
|
|
22
|
+
"SID": "S-1-2-33-442"
|
|
23
|
+
},
|
|
24
|
+
{
|
|
25
|
+
"GroupScope": "BuiltinLocal",
|
|
26
|
+
"GroupType": "Security",
|
|
27
|
+
"SAMAccountName": "Guests",
|
|
28
|
+
"SID": "S-1-2-33-443"
|
|
29
|
+
},
|
|
30
|
+
{
|
|
31
|
+
"GroupScope": "BuiltinLocal",
|
|
32
|
+
"GroupType": "Security",
|
|
33
|
+
"SAMAccountName": "Print Operators",
|
|
34
|
+
"SID": "S-1-2-33-444"
|
|
35
|
+
},
|
|
36
|
+
{
|
|
37
|
+
"GroupScope": "BuiltinLocal",
|
|
38
|
+
"GroupType": "Security",
|
|
39
|
+
"SAMAccountName": "Backup Operators",
|
|
40
|
+
"SID": "S-1-2-33-445"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"GroupScope": "BuiltinLocal",
|
|
44
|
+
"GroupType": "Security",
|
|
45
|
+
"SAMAccountName": "Replicator",
|
|
46
|
+
"SID": "S-1-2-33-446"
|
|
47
|
+
},
|
|
48
|
+
{
|
|
49
|
+
"GroupScope": "BuiltinLocal",
|
|
50
|
+
"GroupType": "Security",
|
|
51
|
+
"SAMAccountName": "Remote Desktop Users",
|
|
52
|
+
"SID": "S-1-2-33-447"
|
|
53
|
+
},
|
|
54
|
+
{
|
|
55
|
+
"GroupScope": "BuiltinLocal",
|
|
56
|
+
"GroupType": "Security",
|
|
57
|
+
"SAMAccountName": "Network Configuration Operators",
|
|
58
|
+
"SID": "S-1-2-33-448"
|
|
59
|
+
},
|
|
60
|
+
{
|
|
61
|
+
"GroupScope": "BuiltinLocal",
|
|
62
|
+
"GroupType": "Security",
|
|
63
|
+
"SAMAccountName": "Performance Monitor Users",
|
|
64
|
+
"SID": "S-1-2-33-449"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"GroupScope": "BuiltinLocal",
|
|
68
|
+
"GroupType": "Security",
|
|
69
|
+
"SAMAccountName": "Performance Log Users",
|
|
70
|
+
"SID": "S-1-2-33-450"
|
|
71
|
+
},
|
|
72
|
+
{
|
|
73
|
+
"GroupScope": "BuiltinLocal",
|
|
74
|
+
"GroupType": "Security",
|
|
75
|
+
"SAMAccountName": "Distributed COM Users",
|
|
76
|
+
"SID": "S-1-2-33-451"
|
|
77
|
+
},
|
|
78
|
+
{
|
|
79
|
+
"GroupScope": "BuiltinLocal",
|
|
80
|
+
"GroupType": "Security",
|
|
81
|
+
"SAMAccountName": "IIS_IUSRS",
|
|
82
|
+
"SID": "S-1-2-33-452"
|
|
83
|
+
},
|
|
84
|
+
{
|
|
85
|
+
"GroupScope": "BuiltinLocal",
|
|
86
|
+
"GroupType": "Security",
|
|
87
|
+
"SAMAccountName": "Cryptographic Operators",
|
|
88
|
+
"SID": "S-1-2-33-453"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"GroupScope": "BuiltinLocal",
|
|
92
|
+
"GroupType": "Security",
|
|
93
|
+
"SAMAccountName": "Event Log Readers",
|
|
94
|
+
"SID": "S-1-2-33-454"
|
|
95
|
+
},
|
|
96
|
+
{
|
|
97
|
+
"GroupScope": "BuiltinLocal",
|
|
98
|
+
"GroupType": "Security",
|
|
99
|
+
"SAMAccountName": "Certificate Service DCOM Access",
|
|
100
|
+
"SID": "S-1-2-33-456"
|
|
101
|
+
},
|
|
102
|
+
{
|
|
103
|
+
"GroupScope": "BuiltinLocal",
|
|
104
|
+
"GroupType": "Security",
|
|
105
|
+
"SAMAccountName": "RDS Remote Access Servers",
|
|
106
|
+
"SID": "S-1-2-33-457"
|
|
107
|
+
},
|
|
108
|
+
{
|
|
109
|
+
"GroupScope": "BuiltinLocal",
|
|
110
|
+
"GroupType": "Security",
|
|
111
|
+
"SAMAccountName": "RDS Endpoint Servers",
|
|
112
|
+
"SID": "S-1-2-33-458"
|
|
113
|
+
},
|
|
114
|
+
{
|
|
115
|
+
"GroupScope": "BuiltinLocal",
|
|
116
|
+
"GroupType": "Security",
|
|
117
|
+
"SAMAccountName": "RDS Management Servers",
|
|
118
|
+
"SID": "S-1-2-33-459"
|
|
119
|
+
},
|
|
120
|
+
{
|
|
121
|
+
"GroupScope": "BuiltinLocal",
|
|
122
|
+
"GroupType": "Security",
|
|
123
|
+
"SAMAccountName": "Hyper-V Administrators",
|
|
124
|
+
"SID": "S-1-2-33-460"
|
|
125
|
+
},
|
|
126
|
+
{
|
|
127
|
+
"GroupScope": "BuiltinLocal",
|
|
128
|
+
"GroupType": "Security",
|
|
129
|
+
"SAMAccountName": "Access Control Assistance Operators",
|
|
130
|
+
"SID": "S-1-2-33-461"
|
|
131
|
+
},
|
|
132
|
+
{
|
|
133
|
+
"GroupScope": "BuiltinLocal",
|
|
134
|
+
"GroupType": "Security",
|
|
135
|
+
"SAMAccountName": "Remote Management Users",
|
|
136
|
+
"SID": "S-1-2-33-462"
|
|
137
|
+
},
|
|
138
|
+
{
|
|
139
|
+
"GroupScope": "BuiltinLocal",
|
|
140
|
+
"GroupType": "Security",
|
|
141
|
+
"SAMAccountName": "Storage Replica Administrators",
|
|
142
|
+
"SID": "S-1-2-33-463"
|
|
143
|
+
},
|
|
144
|
+
{
|
|
145
|
+
"GroupScope": "Global",
|
|
146
|
+
"GroupType": "Security",
|
|
147
|
+
"SAMAccountName": "Domain Computers",
|
|
148
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-789"
|
|
149
|
+
},
|
|
150
|
+
{
|
|
151
|
+
"GroupScope": "Global",
|
|
152
|
+
"GroupType": "Security",
|
|
153
|
+
"SAMAccountName": "Domain Controllers",
|
|
154
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-790"
|
|
155
|
+
},
|
|
156
|
+
{
|
|
157
|
+
"GroupScope": "Universal",
|
|
158
|
+
"GroupType": "Security",
|
|
159
|
+
"SAMAccountName": "Schema Admins",
|
|
160
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-791"
|
|
161
|
+
},
|
|
162
|
+
{
|
|
163
|
+
"GroupScope": "Universal",
|
|
164
|
+
"GroupType": "Security",
|
|
165
|
+
"SAMAccountName": "Enterprise Admins",
|
|
166
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-792"
|
|
167
|
+
},
|
|
168
|
+
{
|
|
169
|
+
"GroupScope": "DomainLocal",
|
|
170
|
+
"GroupType": "Security",
|
|
171
|
+
"SAMAccountName": "Cert Publishers",
|
|
172
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-793"
|
|
173
|
+
},
|
|
174
|
+
{
|
|
175
|
+
"GroupScope": "Global",
|
|
176
|
+
"GroupType": "Security",
|
|
177
|
+
"SAMAccountName": "Domain Admins",
|
|
178
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-794"
|
|
179
|
+
},
|
|
180
|
+
{
|
|
181
|
+
"GroupScope": "Global",
|
|
182
|
+
"GroupType": "Security",
|
|
183
|
+
"SAMAccountName": "Domain Users",
|
|
184
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-795"
|
|
185
|
+
},
|
|
186
|
+
{
|
|
187
|
+
"GroupScope": "Global",
|
|
188
|
+
"GroupType": "Security",
|
|
189
|
+
"SAMAccountName": "Domain Guests",
|
|
190
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-796"
|
|
191
|
+
},
|
|
192
|
+
{
|
|
193
|
+
"GroupScope": "Global",
|
|
194
|
+
"GroupType": "Security",
|
|
195
|
+
"SAMAccountName": "Group Policy Creator Owners",
|
|
196
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-797"
|
|
197
|
+
},
|
|
198
|
+
{
|
|
199
|
+
"GroupScope": "DomainLocal",
|
|
200
|
+
"GroupType": "Security",
|
|
201
|
+
"SAMAccountName": "RAS and IAS Servers",
|
|
202
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-798"
|
|
203
|
+
},
|
|
204
|
+
{
|
|
205
|
+
"GroupScope": "BuiltinLocal",
|
|
206
|
+
"GroupType": "Security",
|
|
207
|
+
"SAMAccountName": "Server Operators",
|
|
208
|
+
"SID": "S-1-2-33-464"
|
|
209
|
+
},
|
|
210
|
+
{
|
|
211
|
+
"GroupScope": "BuiltinLocal",
|
|
212
|
+
"GroupType": "Security",
|
|
213
|
+
"SAMAccountName": "Account Operators",
|
|
214
|
+
"SID": "S-1-2-33-465"
|
|
215
|
+
},
|
|
216
|
+
{
|
|
217
|
+
"GroupScope": "BuiltinLocal",
|
|
218
|
+
"GroupType": "Security",
|
|
219
|
+
"SAMAccountName": "Pre-Windows 2000 Compatible Access",
|
|
220
|
+
"SID": "S-1-2-33-466"
|
|
221
|
+
},
|
|
222
|
+
{
|
|
223
|
+
"GroupScope": "BuiltinLocal",
|
|
224
|
+
"GroupType": "Security",
|
|
225
|
+
"SAMAccountName": "Incoming Forest Trust Builders",
|
|
226
|
+
"SID": "S-1-2-33-467"
|
|
227
|
+
},
|
|
228
|
+
{
|
|
229
|
+
"GroupScope": "BuiltinLocal",
|
|
230
|
+
"GroupType": "Security",
|
|
231
|
+
"SAMAccountName": "Windows Authorization Access Group",
|
|
232
|
+
"SID": "S-1-2-33-468"
|
|
233
|
+
},
|
|
234
|
+
{
|
|
235
|
+
"GroupScope": "BuiltinLocal",
|
|
236
|
+
"GroupType": "Security",
|
|
237
|
+
"SAMAccountName": "Terminal Server License Servers",
|
|
238
|
+
"SID": "S-1-2-33-469"
|
|
239
|
+
},
|
|
240
|
+
{
|
|
241
|
+
"GroupScope": "DomainLocal",
|
|
242
|
+
"GroupType": "Security",
|
|
243
|
+
"SAMAccountName": "Allowed RODC Password Replication Group",
|
|
244
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-798"
|
|
245
|
+
},
|
|
246
|
+
{
|
|
247
|
+
"GroupScope": "DomainLocal",
|
|
248
|
+
"GroupType": "Security",
|
|
249
|
+
"SAMAccountName": "Denied RODC Password Replication Group",
|
|
250
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-799"
|
|
251
|
+
},
|
|
252
|
+
{
|
|
253
|
+
"GroupScope": "Global",
|
|
254
|
+
"GroupType": "Security",
|
|
255
|
+
"SAMAccountName": "Read-only Domain Controllers",
|
|
256
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-800"
|
|
257
|
+
},
|
|
258
|
+
{
|
|
259
|
+
"GroupScope": "Universal",
|
|
260
|
+
"GroupType": "Security",
|
|
261
|
+
"SAMAccountName": "Enterprise Read-only Domain Controllers",
|
|
262
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-801"
|
|
263
|
+
},
|
|
264
|
+
{
|
|
265
|
+
"GroupScope": "Global",
|
|
266
|
+
"GroupType": "Security",
|
|
267
|
+
"SAMAccountName": "Cloneable Domain Controllers",
|
|
268
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-802"
|
|
269
|
+
},
|
|
270
|
+
{
|
|
271
|
+
"GroupScope": "Global",
|
|
272
|
+
"GroupType": "Security",
|
|
273
|
+
"SAMAccountName": "Protected Users",
|
|
274
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-803"
|
|
275
|
+
},
|
|
276
|
+
{
|
|
277
|
+
"GroupScope": "Global",
|
|
278
|
+
"GroupType": "Security",
|
|
279
|
+
"SAMAccountName": "Key Admins",
|
|
280
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-804"
|
|
281
|
+
},
|
|
282
|
+
{
|
|
283
|
+
"GroupScope": "Universal",
|
|
284
|
+
"GroupType": "Security",
|
|
285
|
+
"SAMAccountName": "Enterprise Key Admins",
|
|
286
|
+
"SID": "S-1-2-34-56789123456-7891012345-6789123486-805"
|
|
287
|
+
},
|
|
288
|
+
{
|
|
289
|
+
"GroupScope": "DomainLocal",
|
|
290
|
+
"GroupType": "Security",
|
|
291
|
+
"SAMAccountName": "DnsAdmins",
|
|
292
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
|
|
293
|
+
},
|
|
294
|
+
{
|
|
295
|
+
"GroupScope": "Global",
|
|
296
|
+
"GroupType": "Security",
|
|
297
|
+
"SAMAccountName": "DnsUpdateProxy",
|
|
298
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
|
|
299
|
+
},
|
|
300
|
+
{
|
|
301
|
+
"GroupScope": "DomainLocal",
|
|
302
|
+
"GroupType": "Security",
|
|
303
|
+
"SAMAccountName": "Admins",
|
|
304
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4569"
|
|
305
|
+
},
|
|
306
|
+
{
|
|
307
|
+
"GroupScope": "DomainLocal",
|
|
308
|
+
"GroupType": "Security",
|
|
309
|
+
"SAMAccountName": "AWSAdministrators",
|
|
310
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4570"
|
|
311
|
+
},
|
|
312
|
+
{
|
|
313
|
+
"GroupScope": "DomainLocal",
|
|
314
|
+
"GroupType": "Security",
|
|
315
|
+
"SAMAccountName": "AWS Object Management Service Accounts",
|
|
316
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4571"
|
|
317
|
+
},
|
|
318
|
+
{
|
|
319
|
+
"GroupScope": "DomainLocal",
|
|
320
|
+
"GroupType": "Security",
|
|
321
|
+
"SAMAccountName": "AWS Private CA Connector for AD Delegated Group",
|
|
322
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4572"
|
|
323
|
+
},
|
|
324
|
+
{
|
|
325
|
+
"GroupScope": "DomainLocal",
|
|
326
|
+
"GroupType": "Security",
|
|
327
|
+
"SAMAccountName": "AWS Application and Service Delegated Group",
|
|
328
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4573"
|
|
329
|
+
},
|
|
330
|
+
{
|
|
331
|
+
"GroupScope": "DomainLocal",
|
|
332
|
+
"GroupType": "Security",
|
|
333
|
+
"SAMAccountName": "AWS Delegated Administrators",
|
|
334
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4574"
|
|
335
|
+
},
|
|
336
|
+
{
|
|
337
|
+
"GroupScope": "DomainLocal",
|
|
338
|
+
"GroupType": "Security",
|
|
339
|
+
"SAMAccountName": "AWS Delegated FSx Administrators",
|
|
340
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4575"
|
|
341
|
+
},
|
|
342
|
+
{
|
|
343
|
+
"GroupScope": "DomainLocal",
|
|
344
|
+
"GroupType": "Security",
|
|
345
|
+
"SAMAccountName": "AWS Delegated Account Operators",
|
|
346
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4576"
|
|
347
|
+
},
|
|
348
|
+
{
|
|
349
|
+
"GroupScope": "DomainLocal",
|
|
350
|
+
"GroupType": "Security",
|
|
351
|
+
"SAMAccountName": "AWS Delegated Active Directory Based Activation Administrators",
|
|
352
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4577"
|
|
353
|
+
},
|
|
354
|
+
{
|
|
355
|
+
"GroupScope": "DomainLocal",
|
|
356
|
+
"GroupType": "Security",
|
|
357
|
+
"SAMAccountName": "AWS Delegated Allowed to Authenticate Objects",
|
|
358
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4578"
|
|
359
|
+
},
|
|
360
|
+
{
|
|
361
|
+
"GroupScope": "DomainLocal",
|
|
362
|
+
"GroupType": "Security",
|
|
363
|
+
"SAMAccountName": "AWS Delegated Allowed to Authenticate to Domain Controllers",
|
|
364
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4579"
|
|
365
|
+
},
|
|
366
|
+
{
|
|
367
|
+
"GroupScope": "DomainLocal",
|
|
368
|
+
"GroupType": "Security",
|
|
369
|
+
"SAMAccountName": "AWS Delegated Deleted Object Lifetime Administrators",
|
|
370
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4580"
|
|
371
|
+
},
|
|
372
|
+
{
|
|
373
|
+
"GroupScope": "DomainLocal",
|
|
374
|
+
"GroupType": "Security",
|
|
375
|
+
"SAMAccountName": "AWS Delegated Distributed File System Administrators",
|
|
376
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4581"
|
|
377
|
+
},
|
|
378
|
+
{
|
|
379
|
+
"GroupScope": "DomainLocal",
|
|
380
|
+
"GroupType": "Security",
|
|
381
|
+
"SAMAccountName": "AWS Delegated Dynamic Host Configuration Protocol Administrators",
|
|
382
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4582"
|
|
383
|
+
},
|
|
384
|
+
{
|
|
385
|
+
"GroupScope": "DomainLocal",
|
|
386
|
+
"GroupType": "Security",
|
|
387
|
+
"SAMAccountName": "AWS Delegated Enterprise Certificate Authority Administrators",
|
|
388
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4583"
|
|
389
|
+
},
|
|
390
|
+
{
|
|
391
|
+
"GroupScope": "DomainLocal",
|
|
392
|
+
"GroupType": "Security",
|
|
393
|
+
"SAMAccountName": "AWS Delegated Fine Grained Password Policy Administrators",
|
|
394
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4584"
|
|
395
|
+
},
|
|
396
|
+
{
|
|
397
|
+
"GroupScope": "DomainLocal",
|
|
398
|
+
"GroupType": "Security",
|
|
399
|
+
"SAMAccountName": "AWS Delegated Group Policy Administrators",
|
|
400
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4585"
|
|
401
|
+
},
|
|
402
|
+
{
|
|
403
|
+
"GroupScope": "DomainLocal",
|
|
404
|
+
"GroupType": "Security",
|
|
405
|
+
"SAMAccountName": "AWS Delegated Managed Service Account Administrators",
|
|
406
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4586"
|
|
407
|
+
},
|
|
408
|
+
{
|
|
409
|
+
"GroupScope": "DomainLocal",
|
|
410
|
+
"GroupType": "Security",
|
|
411
|
+
"SAMAccountName": "AWS Delegated Read Foreign Security Principals",
|
|
412
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4587"
|
|
413
|
+
},
|
|
414
|
+
{
|
|
415
|
+
"GroupScope": "DomainLocal",
|
|
416
|
+
"GroupType": "Security",
|
|
417
|
+
"SAMAccountName": "AWS Delegated Remote Access Service Administrators",
|
|
418
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4588"
|
|
419
|
+
},
|
|
420
|
+
{
|
|
421
|
+
"GroupScope": "DomainLocal",
|
|
422
|
+
"GroupType": "Security",
|
|
423
|
+
"SAMAccountName": "AWS Delegated Replicate Directory Changes Administrators",
|
|
424
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4588"
|
|
425
|
+
},
|
|
426
|
+
{
|
|
427
|
+
"GroupScope": "DomainLocal",
|
|
428
|
+
"GroupType": "Security",
|
|
429
|
+
"SAMAccountName": "AWS Delegated Sites and Services Administrators",
|
|
430
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4589"
|
|
431
|
+
},
|
|
432
|
+
{
|
|
433
|
+
"GroupScope": "DomainLocal",
|
|
434
|
+
"GroupType": "Security",
|
|
435
|
+
"SAMAccountName": "AWS Delegated System Management Administrators",
|
|
436
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4590"
|
|
437
|
+
},
|
|
438
|
+
{
|
|
439
|
+
"GroupScope": "DomainLocal",
|
|
440
|
+
"GroupType": "Security",
|
|
441
|
+
"SAMAccountName": "AWS Delegated Terminal Server Licensing Administrators",
|
|
442
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4591"
|
|
443
|
+
},
|
|
444
|
+
{
|
|
445
|
+
"GroupScope": "DomainLocal",
|
|
446
|
+
"GroupType": "Security",
|
|
447
|
+
"SAMAccountName": "AWS Delegated User Principal Name Suffix Administrators",
|
|
448
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4592"
|
|
449
|
+
},
|
|
450
|
+
{
|
|
451
|
+
"GroupScope": "DomainLocal",
|
|
452
|
+
"GroupType": "Security",
|
|
453
|
+
"SAMAccountName": "AWS Delegated Add Workstations To Domain Users",
|
|
454
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4593"
|
|
455
|
+
},
|
|
456
|
+
{
|
|
457
|
+
"GroupScope": "DomainLocal",
|
|
458
|
+
"GroupType": "Security",
|
|
459
|
+
"SAMAccountName": "AWS Delegated Domain Name System Administrators",
|
|
460
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4594"
|
|
461
|
+
},
|
|
462
|
+
{
|
|
463
|
+
"GroupScope": "DomainLocal",
|
|
464
|
+
"GroupType": "Security",
|
|
465
|
+
"SAMAccountName": "AWS Delegated Kerberos Delegation Administrators",
|
|
466
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4595"
|
|
467
|
+
},
|
|
468
|
+
{
|
|
469
|
+
"GroupScope": "DomainLocal",
|
|
470
|
+
"GroupType": "Security",
|
|
471
|
+
"SAMAccountName": "AWS Delegated Server Administrators",
|
|
472
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4596"
|
|
473
|
+
},
|
|
474
|
+
{
|
|
475
|
+
"GroupScope": "DomainLocal",
|
|
476
|
+
"GroupType": "Security",
|
|
477
|
+
"SAMAccountName": "AWS Delegated MS-NPRC Non-Compliant Devices",
|
|
478
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4597"
|
|
479
|
+
},
|
|
480
|
+
{
|
|
481
|
+
"GroupScope": "Global",
|
|
482
|
+
"GroupType": "Security",
|
|
483
|
+
"SAMAccountName": "Remote Access",
|
|
484
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4598"
|
|
485
|
+
},
|
|
486
|
+
{
|
|
487
|
+
"GroupScope": "Global",
|
|
488
|
+
"GroupType": "Security",
|
|
489
|
+
"SAMAccountName": "Accounting",
|
|
490
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4599"
|
|
491
|
+
},
|
|
492
|
+
{
|
|
493
|
+
"GroupScope": "Global",
|
|
494
|
+
"GroupType": "Distribution",
|
|
495
|
+
"SAMAccountName": "sales",
|
|
496
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
|
|
497
|
+
}
|
|
498
|
+
],
|
|
499
|
+
"DirectoryId": "d-1234567890",
|
|
500
|
+
"Realm": "corp.example.com"
|
|
501
|
+
}
|
|
502
|
+
|
|
503
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,57 @@
|
|
|
1
|
+
**To list a directory's users**
|
|
2
|
+
|
|
3
|
+
The following ``list-users`` example lists users in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data list-users \
|
|
6
|
+
--directory-id d-1234567890
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"Users": [
|
|
12
|
+
{
|
|
13
|
+
"Enabled": true,
|
|
14
|
+
"SAMAccountName": "Administrator",
|
|
15
|
+
"SID": "S-1-2-34-5678910123-4567895012-3456789012-345"
|
|
16
|
+
},
|
|
17
|
+
{
|
|
18
|
+
"Enabled": false,
|
|
19
|
+
"SAMAccountName": "Guest",
|
|
20
|
+
"SID": "S-1-2-34-5678910123-4567895012-3456789012-345"
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"Enabled": false,
|
|
24
|
+
"SAMAccountName": "krbtgt",
|
|
25
|
+
"SID": "S-1-2-34-5678910123-4567895012-3456789012-346"
|
|
26
|
+
},
|
|
27
|
+
{
|
|
28
|
+
"Enabled": true,
|
|
29
|
+
"SAMAccountName": "Admin",
|
|
30
|
+
"SID": "S-1-2-34-5678910123-4567895012-3456789012-347"
|
|
31
|
+
},
|
|
32
|
+
{
|
|
33
|
+
"Enabled": true,
|
|
34
|
+
"SAMAccountName": "Richard Roe",
|
|
35
|
+
"SID": "S-1-2-34-5678910123-4567895012-3456789012-348"
|
|
36
|
+
},
|
|
37
|
+
{
|
|
38
|
+
"Enabled": true,
|
|
39
|
+
"SAMAccountName": "Jane Doe",
|
|
40
|
+
"SID": "S-1-2-34-5678910123-4567895012-3456789012-349"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"Enabled": true,
|
|
44
|
+
"SAMAccountName": "AWS_WGnzYlN6YyY",
|
|
45
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
|
|
46
|
+
},
|
|
47
|
+
{
|
|
48
|
+
"Enabled": true,
|
|
49
|
+
"SAMAccountName": "john.doe",
|
|
50
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
|
|
51
|
+
}
|
|
52
|
+
],
|
|
53
|
+
"DirectoryId": "d-1234567890",
|
|
54
|
+
"Realm": "corp.example.com"
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
**To remove a group member from a directory**
|
|
2
|
+
|
|
3
|
+
The following ``remove-group-member`` example removes the specified group member from the specified group in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data remove-group-member \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--group-name 'sales' \
|
|
8
|
+
--member-name 'john.doe'
|
|
9
|
+
|
|
10
|
+
This command produces no output.
|
|
11
|
+
|
|
12
|
+
For more information, see `Adding and removing AWS Managed Microsoft AD members to groups and groups to groups <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_add_remove_user_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
**To reset a user password in a directory**
|
|
2
|
+
|
|
3
|
+
The following ``reset-user-password`` example resets and enables the specified user in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds reset-user-password \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--user-name 'john.doe' \
|
|
8
|
+
--new-password 'password'
|
|
9
|
+
|
|
10
|
+
This command produces no output.
|
|
11
|
+
|
|
12
|
+
For more information, see `Resetting and enabling an AWS Managed Microsoft AD user's password <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_reset_user_pswd.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
**To search for a group in a directory**
|
|
2
|
+
|
|
3
|
+
The following ``search-groups`` example searches for the specified group in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data search-groups \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--search-attributes 'SamAccountName' \
|
|
8
|
+
--search-string 'sales'
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"Groups": [
|
|
14
|
+
{
|
|
15
|
+
"GroupScope": "Global",
|
|
16
|
+
"GroupType": "Distribution",
|
|
17
|
+
"SAMAccountName": "sales",
|
|
18
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
|
|
19
|
+
}
|
|
20
|
+
],
|
|
21
|
+
"DirectoryId": "d-1234567890",
|
|
22
|
+
"Realm": "corp.example.com"
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
**To search for a user in a directory**
|
|
2
|
+
|
|
3
|
+
The following ``search-users`` example searches for the specified user in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data search-users \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--search-attributes 'SamAccountName' \
|
|
8
|
+
--Search-string 'john.doe'
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"Users": [
|
|
14
|
+
{
|
|
15
|
+
"Enabled": true,
|
|
16
|
+
"SAMAccountName": "john.doe",
|
|
17
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
|
|
18
|
+
}
|
|
19
|
+
],
|
|
20
|
+
"DirectoryId": "d-1234567890",
|
|
21
|
+
"Realm": "corp.example.com"
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
**To update a group's attribute in a directory**
|
|
2
|
+
|
|
3
|
+
The following ``update-group`` example updates the specified attribute for the specified group in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data update-group \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'sales' \
|
|
8
|
+
--update-type 'REPLACE' \
|
|
9
|
+
--group-type 'Distribution'
|
|
10
|
+
|
|
11
|
+
This command produces no output.
|
|
12
|
+
|
|
13
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
**To update a user's attribute in a directory**
|
|
2
|
+
|
|
3
|
+
The following ``update-user`` example updates the specified attribute for the specified user in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data update-user \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'john.doe' \
|
|
8
|
+
--update-type 'ADD' \
|
|
9
|
+
--email-address 'example.corp.com'
|
|
10
|
+
|
|
11
|
+
This command produces no output.
|
|
12
|
+
|
|
13
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
|