pub struct Builder { /* private fields */ }Expand description
A builder for UpdateAccountPasswordPolicyInput.
Implementations§
source§impl Builder
impl Builder
sourcepub fn minimum_password_length(self, input: i32) -> Self
pub fn minimum_password_length(self, input: i32) -> Self
The minimum number of characters allowed in an IAM user password.
If you do not specify a value for this parameter, then the operation uses the default value of 6.
sourcepub fn set_minimum_password_length(self, input: Option<i32>) -> Self
pub fn set_minimum_password_length(self, input: Option<i32>) -> Self
The minimum number of characters allowed in an IAM user password.
If you do not specify a value for this parameter, then the operation uses the default value of 6.
sourcepub fn require_symbols(self, input: bool) -> Self
pub fn require_symbols(self, input: bool) -> Self
Specifies whether IAM user passwords must contain at least one of the following non-alphanumeric characters:
! @ # $ % ^ & * ( ) _ + - = [ ] { } | '
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one symbol character.
sourcepub fn set_require_symbols(self, input: Option<bool>) -> Self
pub fn set_require_symbols(self, input: Option<bool>) -> Self
Specifies whether IAM user passwords must contain at least one of the following non-alphanumeric characters:
! @ # $ % ^ & * ( ) _ + - = [ ] { } | '
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one symbol character.
sourcepub fn require_numbers(self, input: bool) -> Self
pub fn require_numbers(self, input: bool) -> Self
Specifies whether IAM user passwords must contain at least one numeric character (0 to 9).
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one numeric character.
sourcepub fn set_require_numbers(self, input: Option<bool>) -> Self
pub fn set_require_numbers(self, input: Option<bool>) -> Self
Specifies whether IAM user passwords must contain at least one numeric character (0 to 9).
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one numeric character.
sourcepub fn require_uppercase_characters(self, input: bool) -> Self
pub fn require_uppercase_characters(self, input: bool) -> Self
Specifies whether IAM user passwords must contain at least one uppercase character from the ISO basic Latin alphabet (A to Z).
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one uppercase character.
sourcepub fn set_require_uppercase_characters(self, input: Option<bool>) -> Self
pub fn set_require_uppercase_characters(self, input: Option<bool>) -> Self
Specifies whether IAM user passwords must contain at least one uppercase character from the ISO basic Latin alphabet (A to Z).
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one uppercase character.
sourcepub fn require_lowercase_characters(self, input: bool) -> Self
pub fn require_lowercase_characters(self, input: bool) -> Self
Specifies whether IAM user passwords must contain at least one lowercase character from the ISO basic Latin alphabet (a to z).
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one lowercase character.
sourcepub fn set_require_lowercase_characters(self, input: Option<bool>) -> Self
pub fn set_require_lowercase_characters(self, input: Option<bool>) -> Self
Specifies whether IAM user passwords must contain at least one lowercase character from the ISO basic Latin alphabet (a to z).
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one lowercase character.
sourcepub fn allow_users_to_change_password(self, input: bool) -> Self
pub fn allow_users_to_change_password(self, input: bool) -> Self
Allows all IAM users in your account to use the Amazon Web Services Management Console to change their own passwords. For more information, see Permitting IAM users to change their own passwords in the IAM User Guide.
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that IAM users in the account do not automatically have permissions to change their own password.
sourcepub fn set_allow_users_to_change_password(self, input: Option<bool>) -> Self
pub fn set_allow_users_to_change_password(self, input: Option<bool>) -> Self
Allows all IAM users in your account to use the Amazon Web Services Management Console to change their own passwords. For more information, see Permitting IAM users to change their own passwords in the IAM User Guide.
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that IAM users in the account do not automatically have permissions to change their own password.
sourcepub fn max_password_age(self, input: i32) -> Self
pub fn max_password_age(self, input: i32) -> Self
The number of days that an IAM user password is valid.
If you do not specify a value for this parameter, then the operation uses the default value of 0. The result is that IAM user passwords never expire.
sourcepub fn set_max_password_age(self, input: Option<i32>) -> Self
pub fn set_max_password_age(self, input: Option<i32>) -> Self
The number of days that an IAM user password is valid.
If you do not specify a value for this parameter, then the operation uses the default value of 0. The result is that IAM user passwords never expire.
sourcepub fn password_reuse_prevention(self, input: i32) -> Self
pub fn password_reuse_prevention(self, input: i32) -> Self
Specifies the number of previous passwords that IAM users are prevented from reusing.
If you do not specify a value for this parameter, then the operation uses the default value of 0. The result is that IAM users are not prevented from reusing previous passwords.
sourcepub fn set_password_reuse_prevention(self, input: Option<i32>) -> Self
pub fn set_password_reuse_prevention(self, input: Option<i32>) -> Self
Specifies the number of previous passwords that IAM users are prevented from reusing.
If you do not specify a value for this parameter, then the operation uses the default value of 0. The result is that IAM users are not prevented from reusing previous passwords.
sourcepub fn hard_expiry(self, input: bool) -> Self
pub fn hard_expiry(self, input: bool) -> Self
Prevents IAM users who are accessing the account via the Amazon Web Services Management Console from setting a new console password after their password has expired. The IAM user cannot access the console until an administrator resets the password.
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that IAM users can change their passwords after they expire and continue to sign in as the user.
In the Amazon Web Services Management Console, the custom password policy option Allow users to change their own password gives IAM users permissions to iam:ChangePassword for only their user and to the iam:GetAccountPasswordPolicy action. This option does not attach a permissions policy to each user, rather the permissions are applied at the account-level for all users by IAM. IAM users with iam:ChangePassword permission and active access keys can reset their own expired console password using the CLI or API.
sourcepub fn set_hard_expiry(self, input: Option<bool>) -> Self
pub fn set_hard_expiry(self, input: Option<bool>) -> Self
Prevents IAM users who are accessing the account via the Amazon Web Services Management Console from setting a new console password after their password has expired. The IAM user cannot access the console until an administrator resets the password.
If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that IAM users can change their passwords after they expire and continue to sign in as the user.
In the Amazon Web Services Management Console, the custom password policy option Allow users to change their own password gives IAM users permissions to iam:ChangePassword for only their user and to the iam:GetAccountPasswordPolicy action. This option does not attach a permissions policy to each user, rather the permissions are applied at the account-level for all users by IAM. IAM users with iam:ChangePassword permission and active access keys can reset their own expired console password using the CLI or API.
sourcepub fn build(self) -> Result<UpdateAccountPasswordPolicyInput, BuildError>
pub fn build(self) -> Result<UpdateAccountPasswordPolicyInput, BuildError>
Consumes the builder and constructs a UpdateAccountPasswordPolicyInput.