Struct rusoto_sts::AssumeRoleWithSAMLResponse
[−]
[src]
pub struct AssumeRoleWithSAMLResponse { pub assumed_role_user: Option<AssumedRoleUser>, pub audience: Option<Audience>, pub credentials: Option<Credentials>, pub issuer: Option<Issuer>, pub name_qualifier: Option<NameQualifier>, pub packed_policy_size: Option<NonNegativeIntegerType>, pub subject: Option<Subject>, pub subject_type: Option<SubjectType>, }
Contains the response to a successful AssumeRoleWithSAML request, including temporary AWS credentials that can be used to make AWS requests.
Fields
assumed_role_user: Option<AssumedRoleUser>
The identifiers for the temporary security credentials that the operation returns.
audience: Option<Audience>
The value of the Recipient
attribute of the SubjectConfirmationData
element of the SAML assertion.
credentials: Option<Credentials>
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
Note: The size of the security token that STS APIs return is not fixed. We strongly recommend that you make no assumptions about the maximum size. As of this writing, the typical size is less than 4096 bytes, but that can vary. Also, future updates to AWS might require larger sizes.
issuer: Option<Issuer>
The value of the Issuer
element of the SAML assertion.
name_qualifier: Option<NameQualifier>
A hash value based on the concatenation of the Issuer
response value, the AWS account ID, and the friendly name (the last part of the ARN) of the SAML provider in IAM. The combination of NameQualifier
and Subject
can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
packed_policy_size: Option<NonNegativeIntegerType>
A percentage value that indicates the size of the policy in packed form. The service rejects any policy with a packed size greater than 100 percent, which means the policy exceeded the allowed space.
subject: Option<Subject>
The value of the NameID
element in the Subject
element of the SAML assertion.
subject_type: Option<SubjectType>
The format of the name ID, as defined by the Format
attribute in the NameID
element of the SAML assertion. Typical examples of the format are transient
or persistent
.
If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format
, that prefix is removed. For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is returned as transient
. If the format includes any other prefix, the format is returned with no modifications.
Trait Implementations
impl Default for AssumeRoleWithSAMLResponse
[src]
fn default() -> AssumeRoleWithSAMLResponse
Returns the "default value" for a type. Read more
impl Debug for AssumeRoleWithSAMLResponse
[src]
impl Clone for AssumeRoleWithSAMLResponse
[src]
fn clone(&self) -> AssumeRoleWithSAMLResponse
Returns a copy of the value. Read more
fn clone_from(&mut self, source: &Self)
1.0.0
Performs copy-assignment from source
. Read more