Module aws_sdk_ssoadmin::types
source · Expand description
Data structures used by operation inputs/outputs.
Modules
- Builders
- Error types that AWS Single Sign-On Admin can respond with.
Structs
These are IAM Identity Center identity store attributes that you can configure for use in attributes-based access control (ABAC). You can create permissions policies that determine who can access your Amazon Web Services resources based upon the configured attribute values. When you enable ABAC and specify
AccessControlAttributes
, IAM Identity Center passes the attribute values of the authenticated user into IAM for use in policy evaluation.The value used for mapping a specified attribute to an identity source. For more information, see Attribute mappings in the IAM Identity Center User Guide.
The assignment that indicates a principal's limited access to a specified Amazon Web Services account with a specified permission set.
A structure that describes an assignment of an Amazon Web Services account to a principal and the permissions that principal has in the account.
The status of the creation or deletion operation of an assignment that a principal needs to access an account.
Provides information about the
AccountAssignment
creation request.A structure that describes an application that uses IAM Identity Center for access management.
A structure that describes an assignment of a principal to an application.
A structure that describes an application to which a principal is assigned.
A structure that describes a provider that can be used to connect an Amazon Web Services managed application or customer managed application to IAM Identity Center.
A structure that stores the details of the Amazon Web Services managed policy.
A structure that describes an authentication method and its type.
A structure that defines configuration settings for an application that supports the OAuth 2.0 Authorization Code Grant.
A structure that describes a trusted token issuer and associates it with a set of authorized audiences.
Specifies the name and path of a customer managed policy. You must have an IAM policy that matches the name and path in each Amazon Web Services account where you want to deploy your permission set.
A structure that describes how the portal represents an application provider.
A structure that defines a single grant and its configuration.
A structure that describes details for authentication that uses IAM.
Specifies the attributes to add to your attribute-based access control (ABAC) configuration.
Provides information about the IAM Identity Center instance.
A structure that defines configuration settings for an application that supports the JWT Bearer Token Authorization Grant.
A structure that describes a filter for account assignments.
A structure that describes a filter for application assignments.
A structure that describes a filter for applications.
A structure that describes configuration settings for a trusted token issuer that supports OpenID Connect (OIDC) and JSON Web Tokens (JWTs).
A structure that describes updated configuration settings for a trusted token issuer that supports OpenID Connect (OIDC) and JSON Web Tokens (JWTs).
Filters the operation status list based on the passed attribute value.
An entity that contains IAM policies.
A structure that is used to provide the status of the provisioning operation for a specified permission set.
Provides information about the permission set provisioning status.
Specifies the configuration of the Amazon Web Services managed or customer managed policy that you want to set as a permissions boundary. Specify either
CustomerManagedPolicyReference
to use the name and path of a customer managed policy, orManagedPolicyArn
to use the ARN of an Amazon Web Services managed policy. A permissions boundary represents the maximum permissions that any policy can grant your role. For more information, see Permissions boundaries for IAM entities in the IAM User Guide.A structure that describes the options for the access portal associated with an application.
A structure that defines configuration settings for an application that supports the OAuth 2.0 Refresh Token Grant.
A structure that describes the configuration of a resource server.
A structure that describes details for an IAM Identity Center access scope that is associated with a resource server.
A structure that describes an IAM Identity Center access scope and its authorized targets.
A structure that describes the sign-in options for an application portal.
A set of key-value pairs that are used to manage the resource. Tags can only be applied to permission sets and cannot be applied to corresponding roles that IAM Identity Center creates in Amazon Web Services accounts.
A structure that defines configuration settings for an application that supports the OAuth 2.0 Token Exchange Grant.
A structure that describes a trusted token issuer.
A structure that describes the options for the access portal associated with an application that can be updated.
Enums
- When writing a match expression against
ApplicationStatus
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
ApplicationVisibility
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. A structure that describes an authentication method that can be used by an application.
- When writing a match expression against
AuthenticationMethodType
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
FederationProtocol
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. The Grant union represents the set of possible configuration options for the selected grant type. Exactly one member of the union must be specified, and must match the grant type selected.
- When writing a match expression against
GrantType
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
InstanceAccessControlAttributeConfigurationStatus
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
InstanceStatus
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
JwksRetrievalOption
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
PrincipalType
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
ProvisionTargetType
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
ProvisioningStatus
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
SignInOrigin
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
StatusValues
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. - When writing a match expression against
TargetType
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. A structure that describes the configuration of a trusted token issuer. The structure and available settings are determined by the type of the trusted token issuer.
- When writing a match expression against
TrustedTokenIssuerType
, it is important to ensure your code is forward-compatible. That is, if a match arm handles a case for a feature that is supported by the service but has not been represented as an enum variant in a current version of SDK, your code should continue to work when you upgrade SDK to a future version in which the enum does include a variant for that feature. A structure that contains details to be updated for a trusted token issuer configuration. The structure and settings that you can include depend on the type of the trusted token issuer being updated.