|
39 | 39 | * <p> |
40 | 40 | * <fullname>AWS Security Token Service</fullname> |
41 | 41 | * <p> |
42 | | - * The AWS Security Token Service (STS) is a web service that enables you to |
43 | | - * request temporary, limited-privilege credentials for AWS Identity and Access |
44 | | - * Management (IAM) users or for users that you authenticate (federated users). |
45 | | - * This guide provides descriptions of the STS API. For more detailed |
46 | | - * information about using this service, go to <a href= |
| 42 | + * AWS Security Token Service (STS) enables you to request temporary, |
| 43 | + * limited-privilege credentials for AWS Identity and Access Management (IAM) |
| 44 | + * users or for users that you authenticate (federated users). This guide |
| 45 | + * provides descriptions of the STS API. For more information about using this |
| 46 | + * service, see <a href= |
47 | 47 | * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html" |
48 | 48 | * >Temporary Security Credentials</a>. |
49 | 49 | * </p> |
50 | | - * <p> |
51 | | - * For information about setting up signatures and authorization through the |
52 | | - * API, go to <a href= |
53 | | - * "https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html" |
54 | | - * >Signing AWS API Requests</a> in the <i>AWS General Reference</i>. For |
55 | | - * general information about the Query API, go to <a href= |
56 | | - * "https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html" |
57 | | - * >Making Query Requests</a> in <i>Using IAM</i>. For information about using |
58 | | - * security tokens with other AWS products, go to <a href= |
59 | | - * "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-services-that-work-with-iam.html" |
60 | | - * >AWS Services That Work with IAM</a> in the <i>IAM User Guide</i>. |
61 | | - * </p> |
62 | | - * <p> |
63 | | - * If you're new to AWS and need additional technical information about a |
64 | | - * specific AWS product, you can find the product's technical documentation at |
65 | | - * <a href="http://aws.amazon.com/documentation/">http://aws.amazon.com/ |
66 | | - * documentation/</a>. |
67 | | - * </p> |
68 | | - * <p> |
69 | | - * <b>Endpoints</b> |
70 | | - * </p> |
71 | | - * <p> |
72 | | - * By default, AWS Security Token Service (STS) is available as a global |
73 | | - * service, and all AWS STS requests go to a single endpoint at |
74 | | - * <code>https://sts.amazonaws.com</code>. Global requests map to the US East |
75 | | - * (N. Virginia) region. AWS recommends using Regional AWS STS endpoints instead |
76 | | - * of the global endpoint to reduce latency, build in redundancy, and increase |
77 | | - * session token validity. For more information, see <a href= |
78 | | - * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html" |
79 | | - * >Managing AWS STS in an AWS Region</a> in the <i>IAM User Guide</i>. |
80 | | - * </p> |
81 | | - * <p> |
82 | | - * Most AWS Regions are enabled for operations in all AWS services by default. |
83 | | - * Those Regions are automatically activated for use with AWS STS. Some Regions, |
84 | | - * such as Asia Pacific (Hong Kong), must be manually enabled. To learn more |
85 | | - * about enabling and disabling AWS Regions, see <a |
86 | | - * href="https://docs.aws.amazon.com/general/latest/gr/rande-manage.html" |
87 | | - * >Managing AWS Regions</a> in the <i>AWS General Reference</i>. When you |
88 | | - * enable these AWS Regions, they are automatically activated for use with AWS |
89 | | - * STS. You cannot activate the STS endpoint for a Region that is disabled. |
90 | | - * Tokens that are valid in all AWS Regions are longer than tokens that are |
91 | | - * valid in Regions that are enabled by default. Changing this setting might |
92 | | - * affect existing systems where you temporarily store tokens. For more |
93 | | - * information, see <a href= |
94 | | - * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-manage-tokens" |
95 | | - * >Managing Global Endpoint Session Tokens</a> in the <i>IAM User Guide</i>. |
96 | | - * </p> |
97 | | - * <p> |
98 | | - * After you activate a Region for use with AWS STS, you can direct AWS STS API |
99 | | - * calls to that Region. AWS STS recommends that you provide both the Region and |
100 | | - * endpoint when you make calls to a Regional endpoint. You can provide the |
101 | | - * Region alone for manually enabled Regions, such as Asia Pacific (Hong Kong). |
102 | | - * In this case, the calls are directed to the STS Regional endpoint. However, |
103 | | - * if you provide the Region alone for Regions enabled by default, the calls are |
104 | | - * directed to the global endpoint of <code>https://sts.amazonaws.com</code>. |
105 | | - * </p> |
106 | | - * <p> |
107 | | - * To view the list of AWS STS endpoints and whether they are active by default, |
108 | | - * see <a href= |
109 | | - * "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#id_credentials_temp_enable-regions_writing_code" |
110 | | - * >Writing Code to Use AWS STS Regions</a> in the <i>IAM User Guide</i>. |
111 | | - * </p> |
112 | | - * <p> |
113 | | - * <b>Recording API requests</b> |
114 | | - * </p> |
115 | | - * <p> |
116 | | - * STS supports AWS CloudTrail, which is a service that records AWS calls for |
117 | | - * your AWS account and delivers log files to an Amazon S3 bucket. By using |
118 | | - * information collected by CloudTrail, you can determine what requests were |
119 | | - * successfully made to STS, who made the request, when it was made, and so on. |
120 | | - * </p> |
121 | | - * <p> |
122 | | - * If you activate AWS STS endpoints in Regions other than the default global |
123 | | - * endpoint, then you must also turn on CloudTrail logging in those Regions. |
124 | | - * This is necessary to record any AWS STS API calls that are made in those |
125 | | - * Regions. For more information, see <a href= |
126 | | - * "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/aggregating_logs_regions_turn_on_ct.html" |
127 | | - * >Turning On CloudTrail in Additional Regions</a> in the <i>AWS CloudTrail |
128 | | - * User Guide</i>. |
129 | | - * </p> |
130 | | - * <p> |
131 | | - * AWS Security Token Service (STS) is a global service with a single endpoint |
132 | | - * at <code>https://sts.amazonaws.com</code>. Calls to this endpoint are logged |
133 | | - * as calls to a global service. However, because this endpoint is physically |
134 | | - * located in the US East (N. Virginia) Region, your logs list |
135 | | - * <code>us-east-1</code> as the event Region. CloudTrail does not write these |
136 | | - * logs to the US East (Ohio) Region unless you choose to include global service |
137 | | - * logs in that Region. CloudTrail writes calls to all Regional endpoints to |
138 | | - * their respective Regions. For example, calls to sts.us-east-2.amazonaws.com |
139 | | - * are published to the US East (Ohio) Region and calls to |
140 | | - * sts.eu-central-1.amazonaws.com are published to the EU (Frankfurt) Region. |
141 | | - * </p> |
142 | | - * <p> |
143 | | - * To learn more about CloudTrail, including how to turn it on and find your log |
144 | | - * files, see the <a href= |
145 | | - * "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/what_is_cloud_trail_top_level.html" |
146 | | - * >AWS CloudTrail User Guide</a>. |
147 | | - * </p> |
148 | 50 | */ |
149 | 51 | public class AWSSecurityTokenServiceClient extends AmazonWebServiceClient implements |
150 | 52 | AWSSecurityTokenService { |
@@ -642,6 +544,7 @@ private static ClientConfiguration adjustClientConfiguration(ClientConfiguration |
642 | 544 | * @throws MalformedPolicyDocumentException |
643 | 545 | * @throws PackedPolicyTooLargeException |
644 | 546 | * @throws RegionDisabledException |
| 547 | + * @throws ExpiredTokenException |
645 | 548 | * @throws AmazonClientException If any internal errors are encountered |
646 | 549 | * inside the client while attempting to make the request or |
647 | 550 | * handle the response. For example if a network connection is |
@@ -1073,8 +976,8 @@ public AssumeRoleWithSAMLResult assumeRoleWithSAML( |
1073 | 976 | * <li> |
1074 | 977 | * <p> |
1075 | 978 | * <a href= |
1076 | | - * "https://web-identity-federation-playground.s3.amazonaws.com/index.html"> |
1077 | | - * Web Identity Federation Playground</a>. Walk through the process of |
| 979 | + * "https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/" |
| 980 | + * > Web Identity Federation Playground</a>. Walk through the process of |
1078 | 981 | * authenticating through Login with Amazon, Facebook, or Google, getting |
1079 | 982 | * temporary security credentials, and then using those credentials to make |
1080 | 983 | * a request to AWS. |
|
0 commit comments