#[non_exhaustive]pub struct EnableMfaDeviceInput {
pub user_name: Option<String>,
pub serial_number: Option<String>,
pub authentication_code1: Option<String>,
pub authentication_code2: Option<String>,
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.user_name: Option<String>
The name of the IAM user for whom you want to enable the MFA device.
This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-
serial_number: Option<String>
The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.
This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-
authentication_code1: Option<String>
An authentication code emitted by the device.
The format for this parameter is a string of six digits.
Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can resync the device.
authentication_code2: Option<String>
A subsequent authentication code emitted by the device.
The format for this parameter is a string of six digits.
Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can resync the device.
Implementations§
source§impl EnableMfaDeviceInput
impl EnableMfaDeviceInput
sourcepub fn user_name(&self) -> Option<&str>
pub fn user_name(&self) -> Option<&str>
The name of the IAM user for whom you want to enable the MFA device.
This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-
sourcepub fn serial_number(&self) -> Option<&str>
pub fn serial_number(&self) -> Option<&str>
The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.
This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-
sourcepub fn authentication_code1(&self) -> Option<&str>
pub fn authentication_code1(&self) -> Option<&str>
An authentication code emitted by the device.
The format for this parameter is a string of six digits.
Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can resync the device.
sourcepub fn authentication_code2(&self) -> Option<&str>
pub fn authentication_code2(&self) -> Option<&str>
A subsequent authentication code emitted by the device.
The format for this parameter is a string of six digits.
Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can resync the device.
source§impl EnableMfaDeviceInput
impl EnableMfaDeviceInput
sourcepub fn builder() -> EnableMfaDeviceInputBuilder
pub fn builder() -> EnableMfaDeviceInputBuilder
Creates a new builder-style object to manufacture EnableMfaDeviceInput
.
Trait Implementations§
source§impl Clone for EnableMfaDeviceInput
impl Clone for EnableMfaDeviceInput
source§fn clone(&self) -> EnableMfaDeviceInput
fn clone(&self) -> EnableMfaDeviceInput
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for EnableMfaDeviceInput
impl Debug for EnableMfaDeviceInput
source§impl PartialEq for EnableMfaDeviceInput
impl PartialEq for EnableMfaDeviceInput
source§fn eq(&self, other: &EnableMfaDeviceInput) -> bool
fn eq(&self, other: &EnableMfaDeviceInput) -> bool
self
and other
values to be equal, and is used
by ==
.