2020/**
2121 * <p>
2222 * Contains the response to a successful <a>AssumeRole</a> request, including
23- * temporary AWS credentials that can be used to make AWS requests.
23+ * temporary Amazon Web Services credentials that can be used to make Amazon Web
24+ * Services requests.
2425 * </p>
2526 */
2627public class AssumeRoleResult implements Serializable {
@@ -73,10 +74,10 @@ public class AssumeRoleResult implements Serializable {
7374 * You can require users to specify a source identity when they assume a
7475 * role. You do this by using the <code>sts:SourceIdentity</code> condition
7576 * key in a role trust policy. You can use source identity information in
76- * AWS CloudTrail logs to determine who took actions with a role. You can
77- * use the <code>aws:SourceIdentity</code> condition key to further control
78- * access to AWS resources based on the value of source identity. For more
79- * information about using source identity, see <a href=
77+ * CloudTrail logs to determine who took actions with a role. You can use
78+ * the <code>aws:SourceIdentity</code> condition key to further control
79+ * access to Amazon Web Services resources based on the value of source
80+ * identity. For more information about using source identity, see <a href=
8081 * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
8182 * >Monitor and control actions taken with assumed roles</a> in the <i>IAM
8283 * User Guide</i>.
@@ -350,10 +351,10 @@ public AssumeRoleResult withPackedPolicySize(Integer packedPolicySize) {
350351 * You can require users to specify a source identity when they assume a
351352 * role. You do this by using the <code>sts:SourceIdentity</code> condition
352353 * key in a role trust policy. You can use source identity information in
353- * AWS CloudTrail logs to determine who took actions with a role. You can
354- * use the <code>aws:SourceIdentity</code> condition key to further control
355- * access to AWS resources based on the value of source identity. For more
356- * information about using source identity, see <a href=
354+ * CloudTrail logs to determine who took actions with a role. You can use
355+ * the <code>aws:SourceIdentity</code> condition key to further control
356+ * access to Amazon Web Services resources based on the value of source
357+ * identity. For more information about using source identity, see <a href=
357358 * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
358359 * >Monitor and control actions taken with assumed roles</a> in the <i>IAM
359360 * User Guide</i>.
@@ -377,11 +378,12 @@ public AssumeRoleResult withPackedPolicySize(Integer packedPolicySize) {
377378 * You can require users to specify a source identity when they
378379 * assume a role. You do this by using the
379380 * <code>sts:SourceIdentity</code> condition key in a role trust
380- * policy. You can use source identity information in AWS CloudTrail
381+ * policy. You can use source identity information in CloudTrail
381382 * logs to determine who took actions with a role. You can use the
382383 * <code>aws:SourceIdentity</code> condition key to further control
383- * access to AWS resources based on the value of source identity.
384- * For more information about using source identity, see <a href=
384+ * access to Amazon Web Services resources based on the value of
385+ * source identity. For more information about using source
386+ * identity, see <a href=
385387 * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
386388 * >Monitor and control actions taken with assumed roles</a> in the
387389 * <i>IAM User Guide</i>.
@@ -406,10 +408,10 @@ public String getSourceIdentity() {
406408 * You can require users to specify a source identity when they assume a
407409 * role. You do this by using the <code>sts:SourceIdentity</code> condition
408410 * key in a role trust policy. You can use source identity information in
409- * AWS CloudTrail logs to determine who took actions with a role. You can
410- * use the <code>aws:SourceIdentity</code> condition key to further control
411- * access to AWS resources based on the value of source identity. For more
412- * information about using source identity, see <a href=
411+ * CloudTrail logs to determine who took actions with a role. You can use
412+ * the <code>aws:SourceIdentity</code> condition key to further control
413+ * access to Amazon Web Services resources based on the value of source
414+ * identity. For more information about using source identity, see <a href=
413415 * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
414416 * >Monitor and control actions taken with assumed roles</a> in the <i>IAM
415417 * User Guide</i>.
@@ -433,12 +435,12 @@ public String getSourceIdentity() {
433435 * You can require users to specify a source identity when they
434436 * assume a role. You do this by using the
435437 * <code>sts:SourceIdentity</code> condition key in a role trust
436- * policy. You can use source identity information in AWS
437- * CloudTrail logs to determine who took actions with a role. You
438- * can use the <code>aws:SourceIdentity</code> condition key to
439- * further control access to AWS resources based on the value of
440- * source identity. For more information about using source
441- * identity, see <a href=
438+ * policy. You can use source identity information in CloudTrail
439+ * logs to determine who took actions with a role. You can use
440+ * the <code>aws:SourceIdentity</code> condition key to further
441+ * control access to Amazon Web Services resources based on the
442+ * value of source identity. For more information about using
443+ * source identity, see <a href=
442444 * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
443445 * >Monitor and control actions taken with assumed roles</a> in
444446 * the <i>IAM User Guide</i>.
@@ -463,10 +465,10 @@ public void setSourceIdentity(String sourceIdentity) {
463465 * You can require users to specify a source identity when they assume a
464466 * role. You do this by using the <code>sts:SourceIdentity</code> condition
465467 * key in a role trust policy. You can use source identity information in
466- * AWS CloudTrail logs to determine who took actions with a role. You can
467- * use the <code>aws:SourceIdentity</code> condition key to further control
468- * access to AWS resources based on the value of source identity. For more
469- * information about using source identity, see <a href=
468+ * CloudTrail logs to determine who took actions with a role. You can use
469+ * the <code>aws:SourceIdentity</code> condition key to further control
470+ * access to Amazon Web Services resources based on the value of source
471+ * identity. For more information about using source identity, see <a href=
470472 * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
471473 * >Monitor and control actions taken with assumed roles</a> in the <i>IAM
472474 * User Guide</i>.
@@ -493,12 +495,12 @@ public void setSourceIdentity(String sourceIdentity) {
493495 * You can require users to specify a source identity when they
494496 * assume a role. You do this by using the
495497 * <code>sts:SourceIdentity</code> condition key in a role trust
496- * policy. You can use source identity information in AWS
497- * CloudTrail logs to determine who took actions with a role. You
498- * can use the <code>aws:SourceIdentity</code> condition key to
499- * further control access to AWS resources based on the value of
500- * source identity. For more information about using source
501- * identity, see <a href=
498+ * policy. You can use source identity information in CloudTrail
499+ * logs to determine who took actions with a role. You can use
500+ * the <code>aws:SourceIdentity</code> condition key to further
501+ * control access to Amazon Web Services resources based on the
502+ * value of source identity. For more information about using
503+ * source identity, see <a href=
502504 * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
503505 * >Monitor and control actions taken with assumed roles</a> in
504506 * the <i>IAM User Guide</i>.
0 commit comments