awscli 1.38.8__py3-none-any.whl → 1.38.9__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of awscli might be problematic. Click here for more details.

Files changed (46) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/examples/codecommit/get-merge-commit.rst +1 -2
  3. awscli/examples/cognito-idp/get-identity-provider-by-identifier.rst +35 -0
  4. awscli/examples/cognito-idp/get-log-delivery-configuration.rst +32 -0
  5. awscli/examples/cognito-idp/get-signing-certificate.rst +14 -13
  6. awscli/examples/cognito-idp/get-ui-customization.rst +22 -19
  7. awscli/examples/cognito-idp/get-user-attribute-verification-code.rst +19 -0
  8. awscli/examples/cognito-idp/get-user-auth-factors.rst +20 -0
  9. awscli/examples/cognito-idp/get-user-pool-mfa-config.rst +33 -0
  10. awscli/examples/cognito-idp/get-user.rst +56 -0
  11. awscli/examples/cognito-idp/global-sign-out.rst +10 -0
  12. awscli/examples/cognito-idp/initiate-auth.rst +27 -0
  13. awscli/examples/cognito-idp/list-devices.rst +23 -25
  14. awscli/examples/cognito-idp/list-groups.rst +32 -0
  15. awscli/examples/cognito-idp/list-identity-providers.rst +29 -0
  16. awscli/examples/cognito-idp/list-resource-servers.rst +43 -0
  17. awscli/examples/cognito-idp/list-tags-for-resource.rst +17 -0
  18. awscli/examples/cognito-idp/list-user-import-jobs.rst +61 -57
  19. awscli/examples/cognito-idp/list-user-pool-clients.rst +32 -0
  20. awscli/examples/cognito-idp/list-user-pools.rst +48 -22
  21. awscli/examples/cognito-idp/list-users.rst +98 -35
  22. awscli/examples/cognito-idp/list-web-authn-credentials.rst +22 -0
  23. awscli/examples/cognito-idp/respond-to-auth-challenge.rst +78 -27
  24. awscli/examples/cognito-idp/revoke-token.rst +11 -0
  25. awscli/examples/cognito-idp/set-log-delivery-configuration.rst +33 -0
  26. awscli/examples/cognito-idp/set-risk-configuration.rst +136 -23
  27. awscli/examples/cognito-idp/set-ui-customization.rst +45 -18
  28. awscli/examples/cognito-idp/set-user-mfa-preference.rst +6 -5
  29. awscli/examples/cognito-idp/set-user-pool-mfa-config.rst +38 -0
  30. awscli/examples/cognito-idp/start-user-import-job.rst +27 -29
  31. awscli/examples/cognito-idp/start-web-authn-registration.rst +47 -0
  32. awscli/examples/cognito-idp/stop-user-import-job.rst +29 -31
  33. awscli/examples/ecs/create-cluster.rst +46 -42
  34. awscli/examples/ecs/put-account-setting.rst +8 -5
  35. awscli/examples/ecs/update-cluster-settings.rst +6 -6
  36. awscli/examples/ecs/update-service.rst +235 -7
  37. {awscli-1.38.8.dist-info → awscli-1.38.9.dist-info}/METADATA +2 -2
  38. {awscli-1.38.8.dist-info → awscli-1.38.9.dist-info}/RECORD +46 -28
  39. {awscli-1.38.8.data → awscli-1.38.9.data}/scripts/aws +0 -0
  40. {awscli-1.38.8.data → awscli-1.38.9.data}/scripts/aws.cmd +0 -0
  41. {awscli-1.38.8.data → awscli-1.38.9.data}/scripts/aws_bash_completer +0 -0
  42. {awscli-1.38.8.data → awscli-1.38.9.data}/scripts/aws_completer +0 -0
  43. {awscli-1.38.8.data → awscli-1.38.9.data}/scripts/aws_zsh_completer.sh +0 -0
  44. {awscli-1.38.8.dist-info → awscli-1.38.9.dist-info}/LICENSE.txt +0 -0
  45. {awscli-1.38.8.dist-info → awscli-1.38.9.dist-info}/WHEEL +0 -0
  46. {awscli-1.38.8.dist-info → awscli-1.38.9.dist-info}/top_level.txt +0 -0
awscli/__init__.py CHANGED
@@ -18,7 +18,7 @@ A Universal Command Line Environment for Amazon Web Services.
18
18
 
19
19
  import os
20
20
 
21
- __version__ = '1.38.8'
21
+ __version__ = '1.38.9'
22
22
 
23
23
  #
24
24
  # Get our data path to be added to botocore's search path
@@ -1,11 +1,10 @@
1
1
  **To get detailed information about a merge commit**
2
2
 
3
- The following ``get-merge-commit`` example displays details about a merge commit for the source branch named ``bugfix-bug1234`` with a destination branch named ``main`` using the THREE_WAY_MERGE strategy in a repository named ``MyDemoRepo``. ::
3
+ The following ``get-merge-commit`` example displays details about a merge commit for the source branch named ``bugfix-bug1234`` with a destination branch named ``main`` in a repository named ``MyDemoRepo``. ::
4
4
 
5
5
  aws codecommit get-merge-commit \
6
6
  --source-commit-specifier bugfix-bug1234 \
7
7
  --destination-commit-specifier main \
8
- --merge-option THREE_WAY_MERGE \
9
8
  --repository-name MyDemoRepo
10
9
 
11
10
  Output::
@@ -0,0 +1,35 @@
1
+ **To get the configuration of an identity provider from the IdP identifier**
2
+
3
+ The following ``get-identity-provider-by-identifier`` example returns the configuration of the identity provider with the identifier ``mysso``. ::
4
+
5
+ aws cognito-idp get-identity-provider-by-identifier \
6
+ --user-pool-id us-west-2_EXAMPLE \
7
+ --idp-identifier mysso
8
+
9
+ Output::
10
+
11
+ {
12
+ "IdentityProvider": {
13
+ "UserPoolId": "us-west-2_EXAMPLE",
14
+ "ProviderName": "MYSAML",
15
+ "ProviderType": "SAML",
16
+ "ProviderDetails": {
17
+ "ActiveEncryptionCertificate": "[Certificate contents]",
18
+ "IDPSignout": "false",
19
+ "MetadataURL": "https://auth.example.com/saml/metadata/",
20
+ "SLORedirectBindingURI": "https://auth.example.com/saml/logout/",
21
+ "SSORedirectBindingURI": "https://auth.example.com/saml/assertion/"
22
+ },
23
+ "AttributeMapping": {
24
+ "email": "email"
25
+ },
26
+ "IdpIdentifiers": [
27
+ "mysso",
28
+ "mysamlsso"
29
+ ],
30
+ "LastModifiedDate": 1705616729.188,
31
+ "CreationDate": 1643734622.919
32
+ }
33
+ }
34
+
35
+ For more information, see `Third-party IdP sign-in <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,32 @@
1
+ **To display the log delivery configuration**
2
+
3
+ The following ``get-log-delivery-configuration`` example displays the log export settings of the requested user pool. ::
4
+
5
+ aws cognito-idp get-log-delivery-configuration \
6
+ --user-pool-id us-west-2_EXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "LogDeliveryConfiguration": {
12
+ "UserPoolId": "us-west-2_EXAMPLE",
13
+ "LogConfigurations": [
14
+ {
15
+ "LogLevel": "INFO",
16
+ "EventSource": "userAuthEvents",
17
+ "FirehoseConfiguration": {
18
+ "StreamArn": "arn:aws:firehose:us-west-2:123456789012:deliverystream/my-test-deliverystream"
19
+ }
20
+ },
21
+ {
22
+ "LogLevel": "ERROR",
23
+ "EventSource": "userNotification",
24
+ "CloudWatchLogsConfiguration": {
25
+ "LogGroupArn": "arn:aws:logs:us-west-2:123456789012:log-group:my-message-delivery-logs"
26
+ }
27
+ }
28
+ ]
29
+ }
30
+ }
31
+
32
+ For more information, see `Exporting user pool logs <https://docs.aws.amazon.com/cognito/latest/developerguide/exporting-quotas-and-usage.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -1,13 +1,14 @@
1
- **To get a signing certificate**
2
-
3
- This example gets a signing certificate for a user pool.
4
-
5
- Command::
6
-
7
- aws cognito-idp get-signing-certificate --user-pool-id us-west-2_aaaaaaaaa
8
-
9
- Output::
10
-
11
- {
12
- "Certificate": "CERTIFICATE_DATA"
13
- }
1
+ **To display the SAML signing certificate**
2
+
3
+ The following ``get-signing-certificate`` example displays the SAML 2.0 signing certificate for the request user pool. ::
4
+
5
+ aws cognito-idp get-signing-certificate \
6
+ --user-pool-id us-west-2_EXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "Certificate": "[Certificate content]"
12
+ }
13
+
14
+ For more information, see `SAML signing and encryption <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -1,19 +1,22 @@
1
- **To get UI customization information**
2
-
3
- This example gets UI customization information for a user pool.
4
-
5
- Command::
6
-
7
- aws cognito-idp get-ui-customization --user-pool-id us-west-2_aaaaaaaaa
8
-
9
- Output::
10
-
11
- {
12
- "UICustomization": {
13
- "UserPoolId": "us-west-2_aaaaaaaaa",
14
- "ClientId": "ALL",
15
- "ImageUrl": "https://aaaaaaaaaaaaa.cloudfront.net/us-west-2_aaaaaaaaa/ALL/20190128231240/assets/images/image.jpg",
16
- "CSS": ".logo-customizable {\n\tmax-width: 60%;\n\tmax-height: 30%;\n}\n.banner-customizable {\n\tpadding: 25px 0px 25px 10px;\n\tbackground-color: lightgray;\n}\n.label-customizable {\n\tfont-weight: 300;\n}\n.textDescription-customizable {\n\tpadding-top: 10px;\n\tpadding-bottom: 10px;\n\tdisplay: block;\n\tfont-size: 16px;\n}\n.idpDescription-customizable {\n\tpadding-top: 10px;\n\tpadding-bottom: 10px;\n\tdisplay: block;\n\tfont-size: 16px;\n}\n.legalText-customizable {\n\tcolor: #747474;\n\tfont-size: 11px;\n}\n.submitButton-customizable {\n\tfont-size: 14px;\n\tfont-weight: bold;\n\tmargin: 20px 0px 10px 0px;\n\theight: 40px;\n\twidth: 100%;\n\tcolor: #fff;\n\tbackground-color: #337ab7;\n}\n.submitButton-customizable:hover {\n\tcolor: #fff;\n\tbackground-color: #286090;\n}\n.errorMessage-customizable {\n\tpadding: 5px;\n\tfont-size: 14px;\n\twidth: 100%;\n\tbackground: #F5F5F5;\n\tborder: 2px solid #D64958;\n\tcolor: #D64958;\n}\n.inputField-customizable {\n\twidth: 100%;\n\theight: 34px;\n\tcolor: #555;\n\tbackground-color: #fff;\n\tborder: 1px solid #ccc;\n}\n.inputField-customizable:focus {\n\tborder-color: #66afe9;\n\toutline: 0;\n}\n.idpButton-customizable {\n\theight: 40px;\n\twidth: 100%;\n\ttext-align: center;\n\tmargin-bottom: 15px;\n\tcolor: #fff;\n\tbackground-color: #5bc0de;\n\tborder-color: #46b8da;\n}\n.idpButton-customizable:hover {\n\tcolor: #fff;\n\tbackground-color: #31b0d5;\n}\n.socialButton-customizable {\n\theight: 40px;\n\ttext-align: left;\n\twidth: 100%;\n\tmargin-bottom: 15px;\n}\n.redirect-customizable {\n\ttext-align: center;\n}\n.passwordCheck-notValid-customizable {\n\tcolor: #DF3312;\n}\n.passwordCheck-valid-customizable {\n\tcolor: #19BF00;\n}\n.background-customizable {\n\tbackground-color: #faf;\n}\n",
17
- "CSSVersion": "20190128231240"
18
- }
19
- }
1
+ **To display the classic hosted UI customization settings for an app client**
2
+
3
+ The following ``get-ui-customization`` example displays the classic hosted UI customization settings for an app client that doesn't inherit settings from the user pool. ::
4
+
5
+ aws cognito-idp get-ui-customization \
6
+ --user-pool-id us-west-2_EXAMPLE \
7
+ --client-id 1example23456789
8
+
9
+
10
+ Output::
11
+
12
+ {
13
+ "UICustomization": {
14
+ "UserPoolId": "us-west-2_EXAMPLE",
15
+ "ClientId": "1example23456789",
16
+ "ImageUrl": "https://example.cloudfront.net/us-west-2_EXAMPLE/1example23456789/20250115191928/assets/images/image.jpg",
17
+ "CSS": "\n.logo-customizable {\n max-width: 80%;\n max-height: 30%;\n}\n\n.banner-customizable {\n padding: 25px 0px 25px 0px;\n background-color: lightgray;\n}\n\n.label-customizable {\n font-weight: 400;\n}\n\n.textDescription-customizable {\n padding-top: 100px;\n padding-bottom: 10px;\n display: block;\n font-size: 12px;\n}\n\n.idpDescription-customizable {\n padding-top: 10px;\n padding-bottom: 10px;\n display: block;\n font-size: 16px;\n}\n\n.legalText-customizable {\n color: #747474;\n font-size: 11px;\n}\n\n.submitButton-customizable {\n font-size: 14px;\n font-weight: bold;\n margin: 20px 0px 10px 0px;\n height: 50px;\n width: 100%;\n color: #fff;\n background-color: #337ab7;\n}\n\n.submitButton-customizable:hover {\n color: #fff;\n background-color: #286090;\n}\n\n.errorMessage-customizable {\n padding: 5px;\n font-size: 12px;\n width: 100%;\n background: #F5F5F5;\n border: 2px solid #D64958;\n color: #D64958;\n}\n\n.inputField-customizable {\n width: 100%;\n height: 34px;\n color: #555;\n background-color: #fff;\n border: 1px solid #ccc;\n}\n\n.inputField-customizable:focus {\n border-color: #66afe9;\n outline: 0;\n}\n\n.idpButton-customizable {\n height: 40px;\n width: 100%;\n width: 100%;\n text-align: center;\n margin-bottom: 15px;\n color: #fff;\n background-color: #5bc0de;\n border-color: #46b8da;\n}\n\n.idpButton-customizable:hover {\n color: #fff;\n background-color: #31b0d5;\n}\n\n.socialButton-customizable {\n border-radius: 2px;\n height: 60px;\n margin-bottom: 15px;\n padding: 1px;\n text-align: left;\n width: 100%;\n}\n\n.redirect-customizable {\n text-align: center;\n}\n\n.passwordCheck-notValid-customizable {\n color: #DF3312;\n}\n\n.passwordCheck-valid-customizable {\n color: #19BF00;\n}\n\n.background-customizable {\n background-color: #fff;\n}\n",
18
+ "CSSVersion": "20250115191928"
19
+ }
20
+ }
21
+
22
+ For more information, see `Hosted UI (classic) branding <https://docs.aws.amazon.com/cognito/latest/developerguide/hosted-ui-classic-branding.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,19 @@
1
+ **To send an attribute verification code to the current user**
2
+
3
+ The following ``get-user-attribute-verification-code`` example sends an attribute verification code to the currently signed-in user's email address. ::
4
+
5
+ aws cognito-idp get-user-attribute-verification-code \
6
+ --access-token eyJra456defEXAMPLE \
7
+ --attribute-name email
8
+
9
+ Output::
10
+
11
+ {
12
+ "CodeDeliveryDetails": {
13
+ "Destination": "a***@e***",
14
+ "DeliveryMedium": "EMAIL",
15
+ "AttributeName": "email"
16
+ }
17
+ }
18
+
19
+ For more information, see `Signing up and confirming user accounts <https://docs.aws.amazon.com/cognito/latest/developerguide/signing-up-users-in-your-app.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,20 @@
1
+ **To list the authentication factors available to the current user**
2
+
3
+ The following ``get-user-auth-factors`` example lists the available authentication factors for the currently signed-in user. ::
4
+
5
+ aws cognito-idp get-user-auth-factors \
6
+ --access-token eyJra456defEXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "Username": "testuser",
12
+ "ConfiguredUserAuthFactors": [
13
+ "PASSWORD",
14
+ "EMAIL_OTP",
15
+ "SMS_OTP",
16
+ "WEB_AUTHN"
17
+ ]
18
+ }
19
+
20
+ For more information, see `Authentication <https://docs.aws.amazon.com/cognito/latest/developerguide/authentication.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,33 @@
1
+ **To display the multi-factor authentication and WebAuthn settings of a user pool**
2
+
3
+ The following ``get-user-pool-mfa-config`` example displays the MFA and WebAuthn configuration of the requested user pool. ::
4
+
5
+ aws cognito-idp get-user-pool-mfa-config \
6
+ --user-pool-id us-west-2_EXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "SmsMfaConfiguration": {
12
+ "SmsAuthenticationMessage": "Your OTP for MFA or sign-in: use {####}.",
13
+ "SmsConfiguration": {
14
+ "SnsCallerArn": "arn:aws:iam::123456789012:role/service-role/my-SMS-Role",
15
+ "ExternalId": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
16
+ "SnsRegion": "us-west-2"
17
+ }
18
+ },
19
+ "SoftwareTokenMfaConfiguration": {
20
+ "Enabled": true
21
+ },
22
+ "EmailMfaConfiguration": {
23
+ "Message": "Your OTP for MFA or sign-in: use {####}",
24
+ "Subject": "OTP test"
25
+ },
26
+ "MfaConfiguration": "OPTIONAL",
27
+ "WebAuthnConfiguration": {
28
+ "RelyingPartyId": "auth.example.com",
29
+ "UserVerification": "preferred"
30
+ }
31
+ }
32
+
33
+ For more information, see `Adding MFA <https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,56 @@
1
+ **To get the details of the current user**
2
+
3
+ The following ``get-user`` example displays the profile of the currently signed-in user. ::
4
+
5
+ aws cognito-idp get-user \
6
+ --access-token eyJra456defEXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "Username": "johndoe",
12
+ "UserAttributes": [
13
+ {
14
+ "Name": "sub",
15
+ "Value": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
16
+ },
17
+ {
18
+ "Name": "identities",
19
+ "Value": "[{\"userId\":\"a1b2c3d4-5678-90ab-cdef-EXAMPLE22222\",\"providerName\":\"SignInWithApple\",\"providerType\":\"SignInWithApple\",\"issuer\":null,\"primary\":false,\"dateCreated\":1701125599632}]"
20
+ },
21
+ {
22
+ "Name": "email_verified",
23
+ "Value": "true"
24
+ },
25
+ {
26
+ "Name": "custom:state",
27
+ "Value": "Maine"
28
+ },
29
+ {
30
+ "Name": "name",
31
+ "Value": "John Doe"
32
+ },
33
+ {
34
+ "Name": "phone_number_verified",
35
+ "Value": "true"
36
+ },
37
+ {
38
+ "Name": "phone_number",
39
+ "Value": "+12065551212"
40
+ },
41
+ {
42
+ "Name": "preferred_username",
43
+ "Value": "jamesdoe"
44
+ },
45
+ {
46
+ "Name": "locale",
47
+ "Value": "EMEA"
48
+ },
49
+ {
50
+ "Name": "email",
51
+ "Value": "jamesdoe@example.com"
52
+ }
53
+ ]
54
+ }
55
+
56
+ For more information, see `Managing users <https://docs.aws.amazon.com/cognito/latest/developerguide/managing-users.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,10 @@
1
+ **To sign out the current user**
2
+
3
+ The following ``global-sign-out`` example signs out the current user. ::
4
+
5
+ aws cognito-idp global-sign-out \
6
+ --access-token eyJra456defEXAMPLE
7
+
8
+ This command produces no output.
9
+
10
+ For more information, see `Managing users <https://docs.aws.amazon.com/cognito/latest/developerguide/managing-users.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,27 @@
1
+ **To sign in a user**
2
+
3
+ The following ``initiate-auth`` example signs in a user with the basic username-password flow and no additional challenges. ::
4
+
5
+ aws cognito-idp initiate-auth \
6
+ --auth-flow USER_PASSWORD_AUTH \
7
+ --client-id 1example23456789 \
8
+ --analytics-metadata AnalyticsEndpointId=d70b2ba36a8c4dc5a04a0451aEXAMPLE \
9
+ --auth-parameters USERNAME=testuser,PASSWORD=[Password] --user-context-data EncodedData=mycontextdata --client-metadata MyTestKey=MyTestValue
10
+
11
+ Output::
12
+
13
+ {
14
+ "AuthenticationResult": {
15
+ "AccessToken": "eyJra456defEXAMPLE",
16
+ "ExpiresIn": 3600,
17
+ "TokenType": "Bearer",
18
+ "RefreshToken": "eyJra123abcEXAMPLE",
19
+ "IdToken": "eyJra789ghiEXAMPLE",
20
+ "NewDeviceMetadata": {
21
+ "DeviceKey": "us-west-2_a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
22
+ "DeviceGroupKey": "-v7w9UcY6"
23
+ }
24
+ }
25
+ }
26
+
27
+ For more information, see `Authentication <https://docs.aws.amazon.com/cognito/latest/developerguide/authentication.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -1,18 +1,15 @@
1
- **To list devices for a user**
1
+ **To list a user's devices**
2
2
 
3
- The following ``list-devices`` example lists devices for the currently sign-in user. ::
3
+ The following ``list-devices`` example lists the devices that the current user has registered. ::
4
4
 
5
- aws cognito-idp admin-list-devices \
6
- --user-pool-id us-west-2_EXAMPLE \
7
- --access-token eyJra456defEXAMPLE \
8
- --limit 1
5
+ aws cognito-idp list-devices \
6
+ --access-token eyJra456defEXAMPLE
9
7
 
10
8
  Output::
11
9
 
12
10
  {
13
11
  "Devices": [
14
12
  {
15
- "DeviceKey": "us-west-2_a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
16
13
  "DeviceAttributes": [
17
14
  {
18
15
  "Name": "device_status",
@@ -20,34 +17,35 @@ Output::
20
17
  },
21
18
  {
22
19
  "Name": "device_name",
23
- "Value": "MyDevice"
24
- },
25
- {
26
- "Name": "dev:device_arn",
27
- "Value": "arn:aws:cognito-idp:us-west-2:123456789012:owner/diego.us-west-2_EXAMPLE/device/us-west-2_a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
28
- },
29
- {
30
- "Name": "dev:device_owner",
31
- "Value": "diego.us-west-2_EXAMPLE"
20
+ "Value": "Dart-device"
32
21
  },
33
22
  {
34
23
  "Name": "last_ip_used",
35
24
  "Value": "192.0.2.1"
36
- },
25
+ }
26
+ ],
27
+ "DeviceCreateDate": 1715100742.022,
28
+ "DeviceKey": "us-west-2_a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
29
+ "DeviceLastAuthenticatedDate": 1715100742.0,
30
+ "DeviceLastModifiedDate": 1723233651.167
31
+ },
32
+ {
33
+ "DeviceAttributes": [
37
34
  {
38
- "Name": "dev:device_remembered_status",
39
- "Value": "remembered"
35
+ "Name": "device_status",
36
+ "Value": "valid"
40
37
  },
41
38
  {
42
- "Name": "dev:device_sdk",
43
- "Value": "aws-sdk"
39
+ "Name": "last_ip_used",
40
+ "Value": "192.0.2.2"
44
41
  }
45
42
  ],
46
- "DeviceCreateDate": 1715100742.022,
47
- "DeviceLastModifiedDate": 1723233651.167,
48
- "DeviceLastAuthenticatedDate": 1715100742.0
43
+ "DeviceCreateDate": 1726856147.993,
44
+ "DeviceKey": "us-west-2_a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
45
+ "DeviceLastAuthenticatedDate": 1726856147.0,
46
+ "DeviceLastModifiedDate": 1726856147.993
49
47
  }
50
48
  ]
51
49
  }
52
50
 
53
- For more information, see `Working with user devices in your user pool <https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html>`__ in the *Amazon Cognito Developer Guide*.
51
+ For more information, see `Working with devices <https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,32 @@
1
+ **To list the groups in a user pool**
2
+
3
+ The following ``list-groups`` example lists the first two groups in the requested user pool. ::
4
+
5
+ aws cognito-idp list-groups \
6
+ --user-pool-id us-west-2_EXAMPLE \
7
+ --max-items 2
8
+
9
+ Output::
10
+
11
+ {
12
+ "Groups": [
13
+ {
14
+ "CreationDate": 1681760899.633,
15
+ "Description": "My test group",
16
+ "GroupName": "testgroup",
17
+ "LastModifiedDate": 1681760899.633,
18
+ "Precedence": 1,
19
+ "UserPoolId": "us-west-2_EXAMPLE"
20
+ },
21
+ {
22
+ "CreationDate": 1642632749.051,
23
+ "Description": "Autogenerated group for users who sign in using Facebook",
24
+ "GroupName": "us-west-2_EXAMPLE_Facebook",
25
+ "LastModifiedDate": 1642632749.051,
26
+ "UserPoolId": "us-west-2_EXAMPLE"
27
+ }
28
+ ],
29
+ "NextToken": "[Pagination token]"
30
+ }
31
+
32
+ For more information, see `Adding groups to a user pool <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,29 @@
1
+ **To list identity providers**
2
+
3
+ The following ``list-identity-providers`` example lists the first two identity providers in the requested user pool. ::
4
+
5
+ aws cognito-idp list-identity-providers \
6
+ --user-pool-id us-west-2_EXAMPLE \
7
+ --max-items 2
8
+
9
+ Output::
10
+
11
+ {
12
+ "Providers": [
13
+ {
14
+ "CreationDate": 1619477386.504,
15
+ "LastModifiedDate": 1703798328.142,
16
+ "ProviderName": "Azure",
17
+ "ProviderType": "SAML"
18
+ },
19
+ {
20
+ "CreationDate": 1642698776.175,
21
+ "LastModifiedDate": 1642699086.453,
22
+ "ProviderName": "LoginWithAmazon",
23
+ "ProviderType": "LoginWithAmazon"
24
+ }
25
+ ],
26
+ "NextToken": "[Pagination token]"
27
+ }
28
+
29
+ For more information, see `Third-party IdP sign-in <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,43 @@
1
+ **To list resource servers**
2
+
3
+ The following ``list-resource-servers`` example lists the first two resource servers in the requested user pool. ::
4
+
5
+ aws cognito-idp list-resource-servers \
6
+ --user-pool-id us-west-2_EXAMPLE \
7
+ --max-results 2
8
+
9
+ Output::
10
+
11
+ {
12
+ "ResourceServers": [
13
+ {
14
+ "Identifier": "myapi.example.com",
15
+ "Name": "Example API with custom access control scopes",
16
+ "Scopes": [
17
+ {
18
+ "ScopeDescription": "International customers",
19
+ "ScopeName": "international.read"
20
+ },
21
+ {
22
+ "ScopeDescription": "Domestic customers",
23
+ "ScopeName": "domestic.read"
24
+ }
25
+ ],
26
+ "UserPoolId": "us-west-2_EXAMPLE"
27
+ },
28
+ {
29
+ "Identifier": "myapi2.example.com",
30
+ "Name": "Another example API for access control",
31
+ "Scopes": [
32
+ {
33
+ "ScopeDescription": "B2B customers",
34
+ "ScopeName": "b2b.read"
35
+ }
36
+ ],
37
+ "UserPoolId": "us-west-2_EXAMPLE"
38
+ }
39
+ ],
40
+ "NextToken": "[Pagination token]"
41
+ }
42
+
43
+ For more information, see `Access control with resource servers <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-define-resource-servers.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,17 @@
1
+ **To list user pool tags**
2
+
3
+ The following ``list-tags-for-resource`` example lists the tags assigned to the user pool with the requested ARN. ::
4
+
5
+ aws cognito-idp list-tags-for-resource \
6
+ --resource-arn arn:aws:cognito-idp:us-west-2:123456789012:userpool/us-west-2_EXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "Tags": {
12
+ "administrator": "Jie",
13
+ "tenant": "ExampleCorp"
14
+ }
15
+ }
16
+
17
+ For more information, see `Tagging Amazon Cognito resources <https://docs.aws.amazon.com/cognito/latest/developerguide/tagging.html>`__ in the *Amazon Cognito Developer Guide*.