@@ -30,9 +30,16 @@ final class AssumeRoleRequest extends Input
3030 * subsequent cross-account API requests that use the temporary security credentials will expose the role session name
3131 * to the external account in their CloudTrail logs.
3232 *
33+ * For security purposes, administrators can view this field in CloudTrail logs [^1] to help identify who performed an
34+ * action in Amazon Web Services. Your administrator might require that you specify your user name as the session name
35+ * when you assume the role. For more information, see `sts:RoleSessionName` [^2].
36+ *
3337 * The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
3438 * characters with no spaces. You can also include underscores or any of the following characters: =,.@-
3539 *
40+ * [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
41+ * [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
42+ *
3643 * @required
3744 *
3845 * @var string|null
@@ -83,7 +90,10 @@ final class AssumeRoleRequest extends Input
8390 * > plaintext meets the other requirements. The `PackedPolicySize` response element indicates by percentage how close
8491 * > the policies and tags for your request are to the upper size limit.
8592 *
93+ * For more information about role session permissions, see Session policies [^2].
94+ *
8695 * [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
96+ * [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
8797 *
8898 * @var string|null
8999 */
@@ -101,7 +111,7 @@ final class AssumeRoleRequest extends Input
101111 * the `DurationSeconds` parameter. You can specify a parameter value of up to 43200 seconds (12 hours), depending on
102112 * the maximum session duration setting for your role. However, if you assume a role using role chaining and provide a
103113 * `DurationSeconds` parameter value greater than one hour, the operation fails. To learn how to view the maximum value
104- * for your role, see View the Maximum Session Duration Setting for a Role [^1] in the *IAM User Guide* .
114+ * for your role, see Update the maximum session duration for a role [^1].
105115 *
106116 * By default, the value is set to `3600` seconds.
107117 *
@@ -110,7 +120,7 @@ final class AssumeRoleRequest extends Input
110120 * > parameter that specifies the maximum length of the console session. For more information, see Creating a URL that
111121 * > Enables Federated Users to Access the Amazon Web Services Management Console [^2] in the *IAM User Guide*.
112122 *
113- * [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use .html#id_roles_use_view-role-max- session
123+ * [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings .html#id_roles_update- session-duration
114124 * [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
115125 *
116126 * @var int|null
@@ -156,8 +166,7 @@ final class AssumeRoleRequest extends Input
156166 * corresponding key and value passes to subsequent sessions in a role chain. For more information, see Chaining Roles
157167 * with Session Tags [^1] in the *IAM User Guide*.
158168 *
159- * This parameter is optional. When you set session tags as transitive, the session policy and session tags packed
160- * binary limit is not affected.
169+ * This parameter is optional. The transitive status of a session tag does not impact its packed binary size.
161170 *
162171 * If you choose not to specify a transitive tag key, then no tags are passed from this session to any subsequent
163172 * sessions.
@@ -211,19 +220,22 @@ final class AssumeRoleRequest extends Input
211220 private $ tokenCode ;
212221
213222 /**
214- * The source identity specified by the principal that is calling the `AssumeRole` operation.
223+ * The source identity specified by the principal that is calling the `AssumeRole` operation. The source identity value
224+ * persists across chained role [^1] sessions.
215225 *
216226 * You can require users to specify a source identity when they assume a role. You do this by using the
217- * `sts:SourceIdentity` condition key in a role trust policy. You can use source identity information in CloudTrail logs
218- * to determine who took actions with a role. You can use the `aws:SourceIdentity` condition key to further control
227+ * `sts:SourceIdentity` [^2] condition key in a role trust policy. You can use source identity information in CloudTrail
228+ * logs to determine who took actions with a role. You can use the `aws:SourceIdentity` condition key to further control
219229 * access to Amazon Web Services resources based on the value of source identity. For more information about using
220- * source identity, see Monitor and control actions taken with assumed roles [^1 ] in the *IAM User Guide*.
230+ * source identity, see Monitor and control actions taken with assumed roles [^3 ] in the *IAM User Guide*.
221231 *
222232 * The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
223233 * characters with no spaces. You can also include underscores or any of the following characters: =,.@-. You cannot use
224234 * a value that begins with the text `aws:`. This prefix is reserved for Amazon Web Services internal use.
225235 *
226- * [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
236+ * [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
237+ * [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity
238+ * [^3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
227239 *
228240 * @var string|null
229241 */
0 commit comments