@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class AssumeRoleWithSAMLResult extends AmazonWebServiceResult<ResponseMetadata> implements Serializable, Cloneable
Contains the response to a successful AssumeRoleWithSAML request, including temporary AWS credentials that can be used to make AWS requests.
| Constructor and Description | 
|---|
| AssumeRoleWithSAMLResult() | 
| Modifier and Type | Method and Description | 
|---|---|
| AssumeRoleWithSAMLResult | clone() | 
| boolean | equals(Object obj) | 
| AssumedRoleUser | getAssumedRoleUser()
 The identifiers for the temporary security credentials that the operation returns. | 
| String | getAudience()
 The value of the  Recipientattribute of theSubjectConfirmationDataelement of the SAML
 assertion. | 
| Credentials | getCredentials()
 The temporary security credentials, which include an access key ID, a secret access key, and a security (or
 session) token. | 
| String | getIssuer()
 The value of the  Issuerelement of the SAML assertion. | 
| String | getNameQualifier()
 A hash value based on the concatenation of the following: | 
| Integer | getPackedPolicySize()
 A percentage value that indicates the packed size of the session policies and session tags combined passed in the
 request. | 
| String | getSourceIdentity()
 The value in the  SourceIdentityattribute in the SAML assertion. | 
| String | getSubject()
 The value of the  NameIDelement in theSubjectelement of the SAML assertion. | 
| String | getSubjectType()
 The format of the name ID, as defined by the  Formatattribute in theNameIDelement of
 the SAML assertion. | 
| int | hashCode() | 
| void | setAssumedRoleUser(AssumedRoleUser assumedRoleUser)
 The identifiers for the temporary security credentials that the operation returns. | 
| void | setAudience(String audience)
 The value of the  Recipientattribute of theSubjectConfirmationDataelement of the SAML
 assertion. | 
| void | setCredentials(Credentials credentials)
 The temporary security credentials, which include an access key ID, a secret access key, and a security (or
 session) token. | 
| void | setIssuer(String issuer)
 The value of the  Issuerelement of the SAML assertion. | 
| void | setNameQualifier(String nameQualifier)
 A hash value based on the concatenation of the following: | 
| void | setPackedPolicySize(Integer packedPolicySize)
 A percentage value that indicates the packed size of the session policies and session tags combined passed in the
 request. | 
| void | setSourceIdentity(String sourceIdentity)
 The value in the  SourceIdentityattribute in the SAML assertion. | 
| void | setSubject(String subject)
 The value of the  NameIDelement in theSubjectelement of the SAML assertion. | 
| void | setSubjectType(String subjectType)
 The format of the name ID, as defined by the  Formatattribute in theNameIDelement of
 the SAML assertion. | 
| String | toString()Returns a string representation of this object. | 
| AssumeRoleWithSAMLResult | withAssumedRoleUser(AssumedRoleUser assumedRoleUser)
 The identifiers for the temporary security credentials that the operation returns. | 
| AssumeRoleWithSAMLResult | withAudience(String audience)
 The value of the  Recipientattribute of theSubjectConfirmationDataelement of the SAML
 assertion. | 
| AssumeRoleWithSAMLResult | withCredentials(Credentials credentials)
 The temporary security credentials, which include an access key ID, a secret access key, and a security (or
 session) token. | 
| AssumeRoleWithSAMLResult | withIssuer(String issuer)
 The value of the  Issuerelement of the SAML assertion. | 
| AssumeRoleWithSAMLResult | withNameQualifier(String nameQualifier)
 A hash value based on the concatenation of the following: | 
| AssumeRoleWithSAMLResult | withPackedPolicySize(Integer packedPolicySize)
 A percentage value that indicates the packed size of the session policies and session tags combined passed in the
 request. | 
| AssumeRoleWithSAMLResult | withSourceIdentity(String sourceIdentity)
 The value in the  SourceIdentityattribute in the SAML assertion. | 
| AssumeRoleWithSAMLResult | withSubject(String subject)
 The value of the  NameIDelement in theSubjectelement of the SAML assertion. | 
| AssumeRoleWithSAMLResult | withSubjectType(String subjectType)
 The format of the name ID, as defined by the  Formatattribute in theNameIDelement of
 the SAML assertion. | 
getSdkHttpMetadata, getSdkResponseMetadata, setSdkHttpMetadata, setSdkResponseMetadatapublic void setCredentials(Credentials credentials)
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
credentials - The temporary security credentials, which include an access key ID, a secret access key, and a security
        (or session) token. The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
public Credentials getCredentials()
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
public AssumeRoleWithSAMLResult withCredentials(Credentials credentials)
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
credentials - The temporary security credentials, which include an access key ID, a secret access key, and a security
        (or session) token. The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
public void setAssumedRoleUser(AssumedRoleUser assumedRoleUser)
The identifiers for the temporary security credentials that the operation returns.
assumedRoleUser - The identifiers for the temporary security credentials that the operation returns.public AssumedRoleUser getAssumedRoleUser()
The identifiers for the temporary security credentials that the operation returns.
public AssumeRoleWithSAMLResult withAssumedRoleUser(AssumedRoleUser assumedRoleUser)
The identifiers for the temporary security credentials that the operation returns.
assumedRoleUser - The identifiers for the temporary security credentials that the operation returns.public void setPackedPolicySize(Integer packedPolicySize)
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
packedPolicySize - A percentage value that indicates the packed size of the session policies and session tags combined passed
        in the request. The request fails if the packed size is greater than 100 percent, which means the policies
        and tags exceeded the allowed space.public Integer getPackedPolicySize()
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
public AssumeRoleWithSAMLResult withPackedPolicySize(Integer packedPolicySize)
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
packedPolicySize - A percentage value that indicates the packed size of the session policies and session tags combined passed
        in the request. The request fails if the packed size is greater than 100 percent, which means the policies
        and tags exceeded the allowed space.public void setSubject(String subject)
 The value of the NameID element in the Subject element of the SAML assertion.
 
subject - The value of the NameID element in the Subject element of the SAML assertion.public String getSubject()
 The value of the NameID element in the Subject element of the SAML assertion.
 
NameID element in the Subject element of the SAML assertion.public AssumeRoleWithSAMLResult withSubject(String subject)
 The value of the NameID element in the Subject element of the SAML assertion.
 
subject - The value of the NameID element in the Subject element of the SAML assertion.public void setSubjectType(String subjectType)
 The format of the name ID, as defined by the Format attribute in the NameID element of
 the SAML assertion. Typical examples of the format are transient or persistent.
 
 If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
 For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is returned as
 transient. If the format includes any other prefix, the format is returned with no modifications.
 
subjectType - The format of the name ID, as defined by the Format attribute in the NameID
        element of the SAML assertion. Typical examples of the format are transient or
        persistent. 
        
        If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is
        removed. For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is returned as
        transient. If the format includes any other prefix, the format is returned with no
        modifications.
public String getSubjectType()
 The format of the name ID, as defined by the Format attribute in the NameID element of
 the SAML assertion. Typical examples of the format are transient or persistent.
 
 If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
 For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is returned as
 transient. If the format includes any other prefix, the format is returned with no modifications.
 
Format attribute in the NameID
         element of the SAML assertion. Typical examples of the format are transient or
         persistent. 
         
         If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is
         removed. For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is returned as
         transient. If the format includes any other prefix, the format is returned with no
         modifications.
public AssumeRoleWithSAMLResult withSubjectType(String subjectType)
 The format of the name ID, as defined by the Format attribute in the NameID element of
 the SAML assertion. Typical examples of the format are transient or persistent.
 
 If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
 For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is returned as
 transient. If the format includes any other prefix, the format is returned with no modifications.
 
subjectType - The format of the name ID, as defined by the Format attribute in the NameID
        element of the SAML assertion. Typical examples of the format are transient or
        persistent. 
        
        If the format includes the prefix urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is
        removed. For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is returned as
        transient. If the format includes any other prefix, the format is returned with no
        modifications.
public void setIssuer(String issuer)
 The value of the Issuer element of the SAML assertion.
 
issuer - The value of the Issuer element of the SAML assertion.public String getIssuer()
 The value of the Issuer element of the SAML assertion.
 
Issuer element of the SAML assertion.public AssumeRoleWithSAMLResult withIssuer(String issuer)
 The value of the Issuer element of the SAML assertion.
 
issuer - The value of the Issuer element of the SAML assertion.public void setAudience(String audience)
 The value of the Recipient attribute of the SubjectConfirmationData element of the SAML
 assertion.
 
audience - The value of the Recipient attribute of the SubjectConfirmationData element of
        the SAML assertion.public String getAudience()
 The value of the Recipient attribute of the SubjectConfirmationData element of the SAML
 assertion.
 
Recipient attribute of the SubjectConfirmationData element of
         the SAML assertion.public AssumeRoleWithSAMLResult withAudience(String audience)
 The value of the Recipient attribute of the SubjectConfirmationData element of the SAML
 assertion.
 
audience - The value of the Recipient attribute of the SubjectConfirmationData element of
        the SAML assertion.public void setNameQualifier(String nameQualifier)
A hash value based on the concatenation of the following:
 The Issuer response value.
 
The AWS account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
 The combination of NameQualifier and Subject can be used to uniquely identify a
 federated user.
 
The following pseudocode shows how the hash value is calculated:
 BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
 
nameQualifier - A hash value based on the concatenation of the following:
        
        The Issuer response value.
        
The AWS account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
        The combination of NameQualifier and Subject can be used to uniquely identify a
        federated user.
        
The following pseudocode shows how the hash value is calculated:
        BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
public String getNameQualifier()
A hash value based on the concatenation of the following:
 The Issuer response value.
 
The AWS account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
 The combination of NameQualifier and Subject can be used to uniquely identify a
 federated user.
 
The following pseudocode shows how the hash value is calculated:
 BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
 
         The Issuer response value.
         
The AWS account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
         The combination of NameQualifier and Subject can be used to uniquely identify a
         federated user.
         
The following pseudocode shows how the hash value is calculated:
         BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
public AssumeRoleWithSAMLResult withNameQualifier(String nameQualifier)
A hash value based on the concatenation of the following:
 The Issuer response value.
 
The AWS account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
 The combination of NameQualifier and Subject can be used to uniquely identify a
 federated user.
 
The following pseudocode shows how the hash value is calculated:
 BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
 
nameQualifier - A hash value based on the concatenation of the following:
        
        The Issuer response value.
        
The AWS account ID.
The friendly name (the last part of the ARN) of the SAML provider in IAM.
        The combination of NameQualifier and Subject can be used to uniquely identify a
        federated user.
        
The following pseudocode shows how the hash value is calculated:
        BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
public void setSourceIdentity(String sourceIdentity)
 The value in the SourceIdentity attribute in the SAML assertion.
 
 You can require users to set a source identity value when they assume a role. You do this by using the
 sts:SourceIdentity condition key in a role trust policy. That way, actions that are taken with the
 role are associated with that user. After the source identity is set, the value cannot be changed. It is present
 in the request for all actions that are taken by the role and persists across chained role sessions. You can configure your SAML identity provider to use an attribute associated with
 your users, like user name or email, as the source identity when calling AssumeRoleWithSAML. You do
 this by adding an attribute to the SAML assertion. For more information about using source identity, see Monitor
 and control actions taken with assumed roles in the IAM User Guide.
 
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
sourceIdentity - The value in the SourceIdentity attribute in the SAML assertion. 
        
        You can require users to set a source identity value when they assume a role. You do this by using the
        sts:SourceIdentity condition key in a role trust policy. That way, actions that are taken
        with the role are associated with that user. After the source identity is set, the value cannot be
        changed. It is present in the request for all actions that are taken by the role and persists across 
        chained role sessions. You can configure your SAML identity provider to use an attribute associated
        with your users, like user name or email, as the source identity when calling
        AssumeRoleWithSAML. You do this by adding an attribute to the SAML assertion. For more
        information about using source identity, see Monitor and control actions taken with assumed roles in the IAM User Guide.
        
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
public String getSourceIdentity()
 The value in the SourceIdentity attribute in the SAML assertion.
 
 You can require users to set a source identity value when they assume a role. You do this by using the
 sts:SourceIdentity condition key in a role trust policy. That way, actions that are taken with the
 role are associated with that user. After the source identity is set, the value cannot be changed. It is present
 in the request for all actions that are taken by the role and persists across chained role sessions. You can configure your SAML identity provider to use an attribute associated with
 your users, like user name or email, as the source identity when calling AssumeRoleWithSAML. You do
 this by adding an attribute to the SAML assertion. For more information about using source identity, see Monitor
 and control actions taken with assumed roles in the IAM User Guide.
 
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
SourceIdentity attribute in the SAML assertion. 
         
         You can require users to set a source identity value when they assume a role. You do this by using the
         sts:SourceIdentity condition key in a role trust policy. That way, actions that are taken
         with the role are associated with that user. After the source identity is set, the value cannot be
         changed. It is present in the request for all actions that are taken by the role and persists across chained role sessions. You can configure your SAML identity provider to use an attribute associated
         with your users, like user name or email, as the source identity when calling
         AssumeRoleWithSAML. You do this by adding an attribute to the SAML assertion. For more
         information about using source identity, see Monitor and control actions taken with assumed roles in the IAM User Guide.
         
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
public AssumeRoleWithSAMLResult withSourceIdentity(String sourceIdentity)
 The value in the SourceIdentity attribute in the SAML assertion.
 
 You can require users to set a source identity value when they assume a role. You do this by using the
 sts:SourceIdentity condition key in a role trust policy. That way, actions that are taken with the
 role are associated with that user. After the source identity is set, the value cannot be changed. It is present
 in the request for all actions that are taken by the role and persists across chained role sessions. You can configure your SAML identity provider to use an attribute associated with
 your users, like user name or email, as the source identity when calling AssumeRoleWithSAML. You do
 this by adding an attribute to the SAML assertion. For more information about using source identity, see Monitor
 and control actions taken with assumed roles in the IAM User Guide.
 
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
sourceIdentity - The value in the SourceIdentity attribute in the SAML assertion. 
        
        You can require users to set a source identity value when they assume a role. You do this by using the
        sts:SourceIdentity condition key in a role trust policy. That way, actions that are taken
        with the role are associated with that user. After the source identity is set, the value cannot be
        changed. It is present in the request for all actions that are taken by the role and persists across 
        chained role sessions. You can configure your SAML identity provider to use an attribute associated
        with your users, like user name or email, as the source identity when calling
        AssumeRoleWithSAML. You do this by adding an attribute to the SAML assertion. For more
        information about using source identity, see Monitor and control actions taken with assumed roles in the IAM User Guide.
        
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
public String toString()
toString in class ObjectObject.toString()public AssumeRoleWithSAMLResult clone()