Struct aws_sdk_cognitoidentity::input::GetOpenIdTokenForDeveloperIdentityInput [−][src]
#[non_exhaustive]pub struct GetOpenIdTokenForDeveloperIdentityInput {
pub identity_pool_id: Option<String>,
pub identity_id: Option<String>,
pub logins: Option<HashMap<String, String>>,
pub principal_tags: Option<HashMap<String, String>>,
pub token_duration: Option<i64>,
}Expand description
Input to the GetOpenIdTokenForDeveloperIdentity action.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.identity_pool_id: Option<String>An identity pool ID in the format REGION:GUID.
identity_id: Option<String>A unique identifier in the format REGION:GUID.
logins: Option<HashMap<String, String>>A set of optional name-value pairs that map provider names to provider tokens. Each
name-value pair represents a user from a public provider or developer provider. If the user
is from a developer provider, the name-value pair will follow the syntax
"developer_provider_name": "developer_user_identifier". The developer
provider is the "domain" by which Cognito will refer to your users; you provided this
domain while creating/updating the identity pool. The developer user identifier is an
identifier from your backend that uniquely identifies a user. When you create an identity
pool, you can specify the supported logins.
Use this operation to configure attribute mappings for custom providers.
token_duration: Option<i64>The expiration time of the token, in seconds. You can specify a custom expiration time for the token so that you can cache it. If you don't provide an expiration time, the token is valid for 15 minutes. You can exchange the token with Amazon STS for temporary AWS credentials, which are valid for a maximum of one hour. The maximum token duration you can set is 24 hours. You should take care in setting the expiration time for a token, as there are significant security implications: an attacker could use a leaked token to access your AWS resources for the token's duration.
Please provide for a small grace period, usually no more than 5 minutes, to account for clock skew.
Implementations
pub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<GetOpenIdTokenForDeveloperIdentity, AwsErrorRetryPolicy>, BuildError>
pub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<GetOpenIdTokenForDeveloperIdentity, AwsErrorRetryPolicy>, BuildError>
Consumes the builder and constructs an Operation<GetOpenIdTokenForDeveloperIdentity>
Creates a new builder-style object to manufacture GetOpenIdTokenForDeveloperIdentityInput
An identity pool ID in the format REGION:GUID.
A unique identifier in the format REGION:GUID.
A set of optional name-value pairs that map provider names to provider tokens. Each
name-value pair represents a user from a public provider or developer provider. If the user
is from a developer provider, the name-value pair will follow the syntax
"developer_provider_name": "developer_user_identifier". The developer
provider is the "domain" by which Cognito will refer to your users; you provided this
domain while creating/updating the identity pool. The developer user identifier is an
identifier from your backend that uniquely identifies a user. When you create an identity
pool, you can specify the supported logins.
Use this operation to configure attribute mappings for custom providers.
The expiration time of the token, in seconds. You can specify a custom expiration time for the token so that you can cache it. If you don't provide an expiration time, the token is valid for 15 minutes. You can exchange the token with Amazon STS for temporary AWS credentials, which are valid for a maximum of one hour. The maximum token duration you can set is 24 hours. You should take care in setting the expiration time for a token, as there are significant security implications: an attacker could use a leaked token to access your AWS resources for the token's duration.
Please provide for a small grace period, usually no more than 5 minutes, to account for clock skew.
Trait Implementations
This method tests for self and other values to be equal, and is used
by ==. Read more
This method tests for !=.
Auto Trait Implementations
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber to this type, returning a
WithDispatch wrapper. Read more
Attaches the current default Subscriber to this type, returning a
WithDispatch wrapper. Read more