String requestId
String errorCode
AmazonServiceException.ErrorType errorType
AmazonServiceException.ErrorType
String errorMessage
int statusCode
String serviceName
String identityId
Credentials credentials
String identityId
String assumedRoleId
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@:-]*
String arn
Constraints:
Length: 20 - 2048
String roleArn
Constraints:
Length: 20 - 2048
String roleSessionName
AssumedRoleUser
.
Constraints:
Length: 2 - 32
Pattern: [\w+=,.@-]*
String policy
The policy parameter is optional. If you pass a policy, the temporary security credentials that are returned by the operation have the permissions that are allowed by both the access policy of the role that is being assumed, and the policy that you pass. This gives you a way to further restrict the permissions for the resulting temporary security credentials. You cannot use the passed policy to grant permissions that are in excess of those allowed by the access policy of the role that is being assumed. For more information, see Permissions for AssumeRole in Using Temporary Security Credentials.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
Constraints:
Range: 900 - 3600
String externalId
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@:-]*
String serialNumber
AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).
Constraints:
Length: 9 - 256
Pattern: [\w+=/:,.@-]*
String tokenCode
TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.
Constraints:
Length: 6 - 6
Pattern: [\d]*
Credentials credentials
AssumedRoleUser assumedRoleUser
RoleSessionName
that
you specified when you called AssumeRole
.Integer packedPolicySize
Constraints:
Range: 0 -
String roleArn
Constraints:
Length: 20 - 2048
String roleSessionName
AssumedRoleUser
response element.
Constraints:
Length: 2 - 32
Pattern: [\w+=,.@-]*
String webIdentityToken
AssumeRoleWithWebIdentity
call.
Constraints:
Length: 4 - 2048
String providerId
accounts.google.com
. Do not include URL schemes and port
numbers. Currently, www.amazon.com
and
graph.facebook.com
are supported.
Constraints:
Length: 4 - 2048
String policy
The policy parameter is optional. If you pass a policy, the temporary security credentials that are returned by the operation have the permissions that are allowed by both the access policy of the role that is being assumed, and the policy that you pass. This gives you a way to further restrict the permissions for the resulting temporary security credentials. You cannot use the passed policy to grant permissions that are in excess of those allowed by the access policy of the role that is being assumed. For more information, see Permissions for AssumeRoleWithWebIdentity in Using Temporary Security Credentials.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
Constraints:
Range: 900 - 129600
Credentials credentials
String subjectFromWebIdentityToken
WebIdentityToken
that was submitted with the AssumeRoleWithWebIdentity
call. The identifier is typically unique to the user and the
application that acquired the WebIdentityToken
(pairwise
identifier). If an OpenID Connect ID token was submitted in the
WebIdentityToken
, this value is returned by the identity
provider as the token's sub
(Subject) claim.
Constraints:
Length: 6 - 255
AssumedRoleUser assumedRoleUser
RoleSessionName
that
you specified when you called AssumeRole
.Integer packedPolicySize
Constraints:
Range: 0 -
String provider
iss
field. For OAuth 2.0 Access Tokens, this contains the value of the
ProviderId
parameter that was passed in the
AssumeRoleWithWebIdentity
request.String audience
String accessKeyId
Constraints:
Length: 16 - 32
Pattern: [\w]*
String secretAccessKey
String sessionToken
Date expiration
String federatedUserId
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@\:-]*
String arn
Constraints:
Length: 20 - 2048
String name
Bob
). For
example, you can reference the federated user name in a resource-based
policy, such as in an Amazon S3 bucket policy.
Constraints:
Length: 2 - 32
Pattern: [\w+=,.@-]*
String policy
GetFederationToken
call and evaluated along with the
policy or policies that are attached to the IAM user whose credentials
are used to call GetFederationToken
. The passed policy is
used to scope down the permissions that are available to the IAM user,
by allowing only a subset of the permissions that are granted to the
IAM user. The passed policy cannot grant more permissions than those
granted to the IAM user. The final permissions for the federated user
are the most restrictive set based on the intersection of the passed
policy and the IAM user policy. If you do not pass a policy, the resulting temporary security credentials have no effective permissions. The only exception is when the temporary security credentials are used to access a resource that has a resource-based policy that specifically allows the federated user to access the resource.
For more information about how permissions work, see Permissions for GetFederationToken in Using Temporary Security Credentials.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
Constraints:
Range: 900 - 129600
Credentials credentials
FederatedUser federatedUser
arn:aws:sts::123456789012:federated-user/Bob
or
123456789012:Bob
). You can use the federated user's ARN
in your resource-based policies, such as an Amazon S3 bucket policy.Integer packedPolicySize
Constraints:
Range: 0 -
Integer durationSeconds
Constraints:
Range: 900 - 129600
String serialNumber
GetSessionToken
call.
Specify this value if the IAM user has a policy that requires MFA
authentication. The value is either the serial number for a hardware
device (such as GAHT12345678
) or an Amazon Resource Name
(ARN) for a virtual device (such as
arn:aws:iam::123456789012:mfa/user
). You can find the
device for an IAM user by going to the AWS Management Console and
viewing the user's security credentials.
Constraints:
Length: 9 - 256
Pattern: [\w+=/:,.@-]*
String tokenCode
Constraints:
Length: 6 - 6
Pattern: [\d]*
Credentials credentials
Copyright © 2015. All rights reserved.