Struct rusoto_sts::AssumeRoleWithSAMLResponse [−][src]
pub struct AssumeRoleWithSAMLResponse { pub assumed_role_user: Option<AssumedRoleUser>, pub audience: Option<String>, pub credentials: Option<Credentials>, pub issuer: Option<String>, pub name_qualifier: Option<String>, pub packed_policy_size: Option<i64>, pub subject: Option<String>, pub subject_type: Option<String>, }
Contains the response to a successful AssumeRoleWithSAML request, including temporary AWS credentials that can be used to make AWS requests.
Fields
assumed_role_user: Option<AssumedRoleUser>
The identifiers for the temporary security credentials that the operation returns.
audience: Option<String>
The value of the Recipient
attribute of the SubjectConfirmationData
element of the SAML assertion.
credentials: Option<Credentials>
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
Note: The size of the security token that STS APIs return is not fixed. We strongly recommend that you make no assumptions about the maximum size. As of this writing, the typical size is less than 4096 bytes, but that can vary. Also, future updates to AWS might require larger sizes.
issuer: Option<String>
The value of the Issuer
element of the SAML assertion.
name_qualifier: Option<String>
A hash value based on the concatenation of the Issuer
response value, the AWS account ID, and the friendly name (the last part of the ARN) of the SAML provider in IAM. The combination of NameQualifier
and Subject
can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
packed_policy_size: Option<i64>
A percentage value that indicates the size of the policy in packed form. The service rejects any policy with a packed size greater than 100 percent, which means the policy exceeded the allowed space.
subject: Option<String>
The value of the NameID
element in the Subject
element of the SAML assertion.
subject_type: Option<String>
The format of the name ID, as defined by the Format
attribute in the NameID
element of the SAML assertion. Typical examples of the format are transient
or persistent
.
If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format
, that prefix is removed. For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is returned as transient
. If the format includes any other prefix, the format is returned with no modifications.
Trait Implementations
impl Default for AssumeRoleWithSAMLResponse
[src]
impl Default for AssumeRoleWithSAMLResponse
fn default() -> AssumeRoleWithSAMLResponse
[src]
fn default() -> AssumeRoleWithSAMLResponse
Returns the "default value" for a type. Read more
impl Debug for AssumeRoleWithSAMLResponse
[src]
impl Debug for AssumeRoleWithSAMLResponse
fn fmt(&self, f: &mut Formatter) -> Result
[src]
fn fmt(&self, f: &mut Formatter) -> Result
Formats the value using the given formatter. Read more
impl Clone for AssumeRoleWithSAMLResponse
[src]
impl Clone for AssumeRoleWithSAMLResponse
fn clone(&self) -> AssumeRoleWithSAMLResponse
[src]
fn clone(&self) -> AssumeRoleWithSAMLResponse
Returns a copy of the value. Read more
fn clone_from(&mut self, source: &Self)
1.0.0[src]
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
impl PartialEq for AssumeRoleWithSAMLResponse
[src]
impl PartialEq for AssumeRoleWithSAMLResponse
fn eq(&self, other: &AssumeRoleWithSAMLResponse) -> bool
[src]
fn eq(&self, other: &AssumeRoleWithSAMLResponse) -> bool
This method tests for self
and other
values to be equal, and is used by ==
. Read more
fn ne(&self, other: &AssumeRoleWithSAMLResponse) -> bool
[src]
fn ne(&self, other: &AssumeRoleWithSAMLResponse) -> bool
This method tests for !=
.
Auto Trait Implementations
impl Send for AssumeRoleWithSAMLResponse
impl Send for AssumeRoleWithSAMLResponse
impl Sync for AssumeRoleWithSAMLResponse
impl Sync for AssumeRoleWithSAMLResponse