String requestId
String errorCode
AmazonServiceException.ErrorType errorType
AmazonServiceException.ErrorType
String errorMessage
int statusCode
String serviceName
String accessKeyId
String secretKey
String sessionToken
Date expiration
String identityId
Constraints:
Length: 1 - 55
Pattern: [\w-]+:[0-9a-f-]+
Credentials credentials
String accountId
Constraints:
Length: 1 - 15
Pattern: \d+
String identityPoolId
Constraints:
Length: 1 - 55
Pattern: [\w-]+:[0-9a-f-]+
Map<K,V> logins
The available provider names for Logins
are as
follows:
graph.facebook.com
accounts.google.com
www.amazon.com
api.twitter.com
www.digits.com
Constraints:
Length: 0 - 10
String identityId
Constraints:
Length: 1 - 55
Pattern: [\w-]+:[0-9a-f-]+
String identityId
Constraints:
Length: 1 - 55
Pattern: [\w-]+:[0-9a-f-]+
Map<K,V> logins
Constraints:
Length: 0 - 10
String assumedRoleId
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@:-]*
String arn
Constraints:
Length: 20 - 2048
String roleArn
Constraints:
Length: 20 - 2048
String roleSessionName
Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
Constraints:
Length: 2 - 64
Pattern: [\w+=,.@-]*
String policy
This parameter is optional. If you
pass a policy, the temporary security credentials that are returned by
the operation have the permissions that are allowed by both (the
intersection of) the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to further
restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
in the Using IAM.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
Constraints:
Range: 900 - 3600
String externalId
Constraints:
Length: 2 - 1224
Pattern: [\w+=,.@:\/-]*
String serialNumber
AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).
Constraints:
Length: 9 - 256
Pattern: [\w+=/:,.@-]*
String tokenCode
TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.
Constraints:
Length: 6 - 6
Pattern: [\d]*
Credentials credentials
AssumedRoleUser assumedRoleUser
RoleSessionName
that
you specified when you called AssumeRole
.Integer packedPolicySize
Constraints:
Range: 0 -
String roleArn
Constraints:
Length: 20 - 2048
String roleSessionName
AssumedRoleUser
response element.
Constraints:
Length: 2 - 64
Pattern: [\w+=,.@-]*
String webIdentityToken
AssumeRoleWithWebIdentity
call.
Constraints:
Length: 4 - 2048
String providerId
Specify this value only for OAuth 2.0 access tokens.
Currently www.amazon.com
and
graph.facebook.com
are the only supported identity
providers for OAuth 2.0 access tokens. Do not include URL schemes and
port numbers.
Do not specify this value for OpenID Connect ID tokens.
Constraints:
Length: 4 - 2048
String policy
The policy parameter is optional. If
you pass a policy, the temporary security credentials that are
returned by the operation have the permissions that are allowed by
both the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to
further restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRoleWithWebIdentity in the Using IAM.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
Constraints:
Range: 900 - 3600
Credentials credentials
String subjectFromWebIdentityToken
WebIdentityToken
that was submitted with the AssumeRoleWithWebIdentity
call. The identifier is typically unique to the user and the
application that acquired the WebIdentityToken
(pairwise
identifier). For OpenID Connect ID tokens, this field contains the
value returned by the identity provider as the token's
sub
(Subject) claim.
Constraints:
Length: 6 - 255
AssumedRoleUser assumedRoleUser
RoleSessionName
that
you specified when you called AssumeRole
.Integer packedPolicySize
Constraints:
Range: 0 -
String provider
iss
field. For OAuth 2.0 access tokens, this contains the value of the
ProviderId
parameter that was passed in the
AssumeRoleWithWebIdentity
request.String audience
String accessKeyId
Constraints:
Length: 16 - 32
Pattern: [\w]*
String secretAccessKey
String sessionToken
Date expiration
String federatedUserId
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@\:-]*
String arn
Constraints:
Length: 20 - 2048
String name
Bob
). For
example, you can reference the federated user name in a resource-based
policy, such as in an Amazon S3 bucket policy.
Constraints:
Length: 2 - 32
Pattern: [\w+=,.@-]*
String policy
GetFederationToken
call and evaluated along with the
policy or policies that are attached to the IAM user whose credentials
are used to call GetFederationToken
. The passed policy is
used to scope down the permissions that are available to the IAM user,
by allowing only a subset of the permissions that are granted to the
IAM user. The passed policy cannot grant more permissions than those
granted to the IAM user. The final permissions for the federated user
are the most restrictive set based on the intersection of the passed
policy and the IAM user policy. If you do not pass a policy, the
resulting temporary security credentials have no effective
permissions. The only exception is when the temporary security
credentials are used to access a resource that has a resource-based
policy that specifically allows the federated user to access the
resource.
For more information about how permissions work, see Permissions for GetFederationToken.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
Constraints:
Range: 900 - 129600
Credentials credentials
FederatedUser federatedUser
arn:aws:sts::123456789012:federated-user/Bob
or
123456789012:Bob
). You can use the federated user's ARN
in your resource-based policies, such as an Amazon S3 bucket policy.Integer packedPolicySize
Constraints:
Range: 0 -
Integer durationSeconds
Constraints:
Range: 900 - 129600
String serialNumber
GetSessionToken
call.
Specify this value if the IAM user has a policy that requires MFA
authentication. The value is either the serial number for a hardware
device (such as GAHT12345678
) or an Amazon Resource Name
(ARN) for a virtual device (such as
arn:aws:iam::123456789012:mfa/user
). You can find the
device for an IAM user by going to the AWS Management Console and
viewing the user's security credentials.
Constraints:
Length: 9 - 256
Pattern: [\w+=/:,.@-]*
String tokenCode
Constraints:
Length: 6 - 6
Pattern: [\d]*
Credentials credentials
Copyright © 2015. All rights reserved.