public class AssumeRoleWithSAMLResult
extends java.lang.Object
implements java.io.Serializable
Contains the response to a successful AssumeRoleWithSAML request, including temporary Amazon Web Services credentials that can be used to make Amazon Web Services requests.
Constructor and Description |
---|
AssumeRoleWithSAMLResult() |
Modifier and Type | Method and Description |
---|---|
boolean |
equals(java.lang.Object obj) |
AssumedRoleUser |
getAssumedRoleUser()
The identifiers for the temporary security credentials that the operation
returns.
|
java.lang.String |
getAudience()
The value of the
Recipient attribute of the
SubjectConfirmationData element of the SAML assertion. |
Credentials |
getCredentials()
The temporary security credentials, which include an access key ID, a
secret access key, and a security (or session) token.
|
java.lang.String |
getIssuer()
The value of the
Issuer element of the SAML assertion. |
java.lang.String |
getNameQualifier()
A hash value based on the concatenation of the following:
|
java.lang.Integer |
getPackedPolicySize()
A percentage value that indicates the packed size of the session policies
and session tags combined passed in the request.
|
java.lang.String |
getSourceIdentity()
The value in the
SourceIdentity attribute in the SAML
assertion. |
java.lang.String |
getSubject()
The value of the
NameID element in the Subject
element of the SAML assertion. |
java.lang.String |
getSubjectType()
The format of the name ID, as defined by the
Format
attribute in the NameID element of the SAML assertion. |
int |
hashCode() |
void |
setAssumedRoleUser(AssumedRoleUser assumedRoleUser)
The identifiers for the temporary security credentials that the operation
returns.
|
void |
setAudience(java.lang.String audience)
The value of the
Recipient attribute of the
SubjectConfirmationData element of the SAML assertion. |
void |
setCredentials(Credentials credentials)
The temporary security credentials, which include an access key ID, a
secret access key, and a security (or session) token.
|
void |
setIssuer(java.lang.String issuer)
The value of the
Issuer element of the SAML assertion. |
void |
setNameQualifier(java.lang.String nameQualifier)
A hash value based on the concatenation of the following:
|
void |
setPackedPolicySize(java.lang.Integer packedPolicySize)
A percentage value that indicates the packed size of the session policies
and session tags combined passed in the request.
|
void |
setSourceIdentity(java.lang.String sourceIdentity)
The value in the
SourceIdentity attribute in the SAML
assertion. |
void |
setSubject(java.lang.String subject)
The value of the
NameID element in the Subject
element of the SAML assertion. |
void |
setSubjectType(java.lang.String subjectType)
The format of the name ID, as defined by the
Format
attribute in the NameID element of the SAML assertion. |
java.lang.String |
toString()
Returns a string representation of this object; useful for testing and
debugging.
|
AssumeRoleWithSAMLResult |
withAssumedRoleUser(AssumedRoleUser assumedRoleUser)
The identifiers for the temporary security credentials that the operation
returns.
|
AssumeRoleWithSAMLResult |
withAudience(java.lang.String audience)
The value of the
Recipient attribute of the
SubjectConfirmationData element of the SAML assertion. |
AssumeRoleWithSAMLResult |
withCredentials(Credentials credentials)
The temporary security credentials, which include an access key ID, a
secret access key, and a security (or session) token.
|
AssumeRoleWithSAMLResult |
withIssuer(java.lang.String issuer)
The value of the
Issuer element of the SAML assertion. |
AssumeRoleWithSAMLResult |
withNameQualifier(java.lang.String nameQualifier)
A hash value based on the concatenation of the following:
|
AssumeRoleWithSAMLResult |
withPackedPolicySize(java.lang.Integer packedPolicySize)
A percentage value that indicates the packed size of the session policies
and session tags combined passed in the request.
|
AssumeRoleWithSAMLResult |
withSourceIdentity(java.lang.String sourceIdentity)
The value in the
SourceIdentity attribute in the SAML
assertion. |
AssumeRoleWithSAMLResult |
withSubject(java.lang.String subject)
The value of the
NameID element in the Subject
element of the SAML assertion. |
AssumeRoleWithSAMLResult |
withSubjectType(java.lang.String subjectType)
The format of the name ID, as defined by the
Format
attribute in the NameID element of the SAML assertion. |
public Credentials getCredentials()
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
public void setCredentials(Credentials credentials)
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
credentials
- The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
public AssumeRoleWithSAMLResult withCredentials(Credentials credentials)
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
Returns a reference to this object so that method calls can be chained together.
credentials
- The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
public AssumedRoleUser getAssumedRoleUser()
The identifiers for the temporary security credentials that the operation returns.
The identifiers for the temporary security credentials that the operation returns.
public void setAssumedRoleUser(AssumedRoleUser assumedRoleUser)
The identifiers for the temporary security credentials that the operation returns.
assumedRoleUser
- The identifiers for the temporary security credentials that the operation returns.
public AssumeRoleWithSAMLResult withAssumedRoleUser(AssumedRoleUser assumedRoleUser)
The identifiers for the temporary security credentials that the operation returns.
Returns a reference to this object so that method calls can be chained together.
assumedRoleUser
- The identifiers for the temporary security credentials that the operation returns.
public java.lang.Integer getPackedPolicySize()
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
Constraints:
Range: 0 -
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
public void setPackedPolicySize(java.lang.Integer packedPolicySize)
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
Constraints:
Range: 0 -
packedPolicySize
- A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
public AssumeRoleWithSAMLResult withPackedPolicySize(java.lang.Integer packedPolicySize)
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
Returns a reference to this object so that method calls can be chained together.
Constraints:
Range: 0 -
packedPolicySize
- A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
public java.lang.String getSubject()
The value of the NameID
element in the Subject
element of the SAML assertion.
The value of the NameID
element in the
Subject
element of the SAML assertion.
public void setSubject(java.lang.String subject)
The value of the NameID
element in the Subject
element of the SAML assertion.
subject
-
The value of the NameID
element in the
Subject
element of the SAML assertion.
public AssumeRoleWithSAMLResult withSubject(java.lang.String subject)
The value of the NameID
element in the Subject
element of the SAML assertion.
Returns a reference to this object so that method calls can be chained together.
subject
-
The value of the NameID
element in the
Subject
element of the SAML assertion.
public java.lang.String getSubjectType()
The format of the name ID, as defined by the Format
attribute in the NameID
element of the SAML assertion.
Typical examples of the format are transient
or
persistent
.
If the format includes the prefix
urn:oasis:names:tc:SAML:2.0:nameid-format
, that prefix is
removed. For example,
urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is
returned as transient
. If the format includes any other
prefix, the format is returned with no modifications.
The format of the name ID, as defined by the Format
attribute in the NameID
element of the SAML
assertion. Typical examples of the format are
transient
or persistent
.
If the format includes the prefix
urn:oasis:names:tc:SAML:2.0:nameid-format
, that
prefix is removed. For example,
urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is returned as transient
. If the format includes any
other prefix, the format is returned with no modifications.
public void setSubjectType(java.lang.String subjectType)
The format of the name ID, as defined by the Format
attribute in the NameID
element of the SAML assertion.
Typical examples of the format are transient
or
persistent
.
If the format includes the prefix
urn:oasis:names:tc:SAML:2.0:nameid-format
, that prefix is
removed. For example,
urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is
returned as transient
. If the format includes any other
prefix, the format is returned with no modifications.
subjectType
-
The format of the name ID, as defined by the
Format
attribute in the NameID
element of the SAML assertion. Typical examples of the format
are transient
or persistent
.
If the format includes the prefix
urn:oasis:names:tc:SAML:2.0:nameid-format
, that
prefix is removed. For example,
urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is returned as transient
. If the format includes
any other prefix, the format is returned with no
modifications.
public AssumeRoleWithSAMLResult withSubjectType(java.lang.String subjectType)
The format of the name ID, as defined by the Format
attribute in the NameID
element of the SAML assertion.
Typical examples of the format are transient
or
persistent
.
If the format includes the prefix
urn:oasis:names:tc:SAML:2.0:nameid-format
, that prefix is
removed. For example,
urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is
returned as transient
. If the format includes any other
prefix, the format is returned with no modifications.
Returns a reference to this object so that method calls can be chained together.
subjectType
-
The format of the name ID, as defined by the
Format
attribute in the NameID
element of the SAML assertion. Typical examples of the format
are transient
or persistent
.
If the format includes the prefix
urn:oasis:names:tc:SAML:2.0:nameid-format
, that
prefix is removed. For example,
urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is returned as transient
. If the format includes
any other prefix, the format is returned with no
modifications.
public java.lang.String getIssuer()
The value of the Issuer
element of the SAML assertion.
The value of the Issuer
element of the SAML
assertion.
public void setIssuer(java.lang.String issuer)
The value of the Issuer
element of the SAML assertion.
issuer
-
The value of the Issuer
element of the SAML
assertion.
public AssumeRoleWithSAMLResult withIssuer(java.lang.String issuer)
The value of the Issuer
element of the SAML assertion.
Returns a reference to this object so that method calls can be chained together.
issuer
-
The value of the Issuer
element of the SAML
assertion.
public java.lang.String getAudience()
The value of the Recipient
attribute of the
SubjectConfirmationData
element of the SAML assertion.
The value of the Recipient
attribute of the
SubjectConfirmationData
element of the SAML
assertion.
public void setAudience(java.lang.String audience)
The value of the Recipient
attribute of the
SubjectConfirmationData
element of the SAML assertion.
audience
-
The value of the Recipient
attribute of the
SubjectConfirmationData
element of the SAML
assertion.
public AssumeRoleWithSAMLResult withAudience(java.lang.String audience)
The value of the Recipient
attribute of the
SubjectConfirmationData
element of the SAML assertion.
Returns a reference to this object so that method calls can be chained together.
audience
-
The value of the Recipient
attribute of the
SubjectConfirmationData
element of the SAML
assertion.
public java.lang.String getNameQualifier()
A hash value based on the concatenation of the following:
The Issuer
response value.
The Amazon Web Services account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
The combination of NameQualifier
and Subject
can be used to uniquely identify a user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
A hash value based on the concatenation of the following:
The Issuer
response value.
The Amazon Web Services account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
The combination of NameQualifier
and
Subject
can be used to uniquely identify a user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
public void setNameQualifier(java.lang.String nameQualifier)
A hash value based on the concatenation of the following:
The Issuer
response value.
The Amazon Web Services account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
The combination of NameQualifier
and Subject
can be used to uniquely identify a user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
nameQualifier
- A hash value based on the concatenation of the following:
The Issuer
response value.
The Amazon Web Services account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
The combination of NameQualifier
and
Subject
can be used to uniquely identify a user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
public AssumeRoleWithSAMLResult withNameQualifier(java.lang.String nameQualifier)
A hash value based on the concatenation of the following:
The Issuer
response value.
The Amazon Web Services account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
The combination of NameQualifier
and Subject
can be used to uniquely identify a user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
Returns a reference to this object so that method calls can be chained together.
nameQualifier
- A hash value based on the concatenation of the following:
The Issuer
response value.
The Amazon Web Services account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
The combination of NameQualifier
and
Subject
can be used to uniquely identify a user.
The following pseudocode shows how the hash value is calculated:
BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
public java.lang.String getSourceIdentity()
The value in the SourceIdentity
attribute in the SAML
assertion.
You can require users to set a source identity value when they assume a
role. You do this by using the sts:SourceIdentity
condition
key in a role trust policy. That way, actions that are taken with the
role are associated with that user. After the source identity is set, the
value cannot be changed. It is present in the request for all actions
that are taken by the role and persists across chained role sessions. You can configure your SAML identity provider
to use an attribute associated with your users, like user name or email,
as the source identity when calling AssumeRoleWithSAML
. You
do this by adding an attribute to the SAML assertion. For more
information about using source identity, see Monitor and control actions taken with assumed roles in the IAM
User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
Constraints:
Length: 2 - 64
Pattern: [\w+=,.@-]*
The value in the SourceIdentity
attribute in the
SAML assertion.
You can require users to set a source identity value when they
assume a role. You do this by using the
sts:SourceIdentity
condition key in a role trust
policy. That way, actions that are taken with the role are
associated with that user. After the source identity is set, the
value cannot be changed. It is present in the request for all
actions that are taken by the role and persists across chained role sessions. You can configure your SAML identity
provider to use an attribute associated with your users, like
user name or email, as the source identity when calling
AssumeRoleWithSAML
. You do this by adding an
attribute to the SAML assertion. For more information about using
source identity, see Monitor and control actions taken with assumed roles in the
IAM User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
public void setSourceIdentity(java.lang.String sourceIdentity)
The value in the SourceIdentity
attribute in the SAML
assertion.
You can require users to set a source identity value when they assume a
role. You do this by using the sts:SourceIdentity
condition
key in a role trust policy. That way, actions that are taken with the
role are associated with that user. After the source identity is set, the
value cannot be changed. It is present in the request for all actions
that are taken by the role and persists across chained role sessions. You can configure your SAML identity provider
to use an attribute associated with your users, like user name or email,
as the source identity when calling AssumeRoleWithSAML
. You
do this by adding an attribute to the SAML assertion. For more
information about using source identity, see Monitor and control actions taken with assumed roles in the IAM
User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
Constraints:
Length: 2 - 64
Pattern: [\w+=,.@-]*
sourceIdentity
-
The value in the SourceIdentity
attribute in the
SAML assertion.
You can require users to set a source identity value when they
assume a role. You do this by using the
sts:SourceIdentity
condition key in a role trust
policy. That way, actions that are taken with the role are
associated with that user. After the source identity is set,
the value cannot be changed. It is present in the request for
all actions that are taken by the role and persists across chained role sessions. You can configure your SAML
identity provider to use an attribute associated with your
users, like user name or email, as the source identity when
calling AssumeRoleWithSAML
. You do this by adding
an attribute to the SAML assertion. For more information about
using source identity, see Monitor and control actions taken with assumed roles in
the IAM User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
public AssumeRoleWithSAMLResult withSourceIdentity(java.lang.String sourceIdentity)
The value in the SourceIdentity
attribute in the SAML
assertion.
You can require users to set a source identity value when they assume a
role. You do this by using the sts:SourceIdentity
condition
key in a role trust policy. That way, actions that are taken with the
role are associated with that user. After the source identity is set, the
value cannot be changed. It is present in the request for all actions
that are taken by the role and persists across chained role sessions. You can configure your SAML identity provider
to use an attribute associated with your users, like user name or email,
as the source identity when calling AssumeRoleWithSAML
. You
do this by adding an attribute to the SAML assertion. For more
information about using source identity, see Monitor and control actions taken with assumed roles in the IAM
User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
Returns a reference to this object so that method calls can be chained together.
Constraints:
Length: 2 - 64
Pattern: [\w+=,.@-]*
sourceIdentity
-
The value in the SourceIdentity
attribute in the
SAML assertion.
You can require users to set a source identity value when they
assume a role. You do this by using the
sts:SourceIdentity
condition key in a role trust
policy. That way, actions that are taken with the role are
associated with that user. After the source identity is set,
the value cannot be changed. It is present in the request for
all actions that are taken by the role and persists across chained role sessions. You can configure your SAML
identity provider to use an attribute associated with your
users, like user name or email, as the source identity when
calling AssumeRoleWithSAML
. You do this by adding
an attribute to the SAML assertion. For more information about
using source identity, see Monitor and control actions taken with assumed roles in
the IAM User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
public java.lang.String toString()
toString
in class java.lang.Object
Object.toString()
public int hashCode()
hashCode
in class java.lang.Object
public boolean equals(java.lang.Object obj)
equals
in class java.lang.Object