You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/AWSSecurityTokenServiceClient.java
Copy file name to clipboardExpand all lines: aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/AssumeRoleWithSAMLResult.java
+7-10Lines changed: 7 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -125,7 +125,7 @@ public class AssumeRoleWithSAMLResult implements Serializable {
125
125
* </ul>
126
126
* <p>
127
127
* The combination of <code>NameQualifier</code> and <code>Subject</code>
128
-
* can be used to uniquely identify a federated user.
128
+
* can be used to uniquely identify a user.
129
129
* </p>
130
130
* <p>
131
131
* The following pseudocode shows how the hash value is calculated:
@@ -680,7 +680,7 @@ public AssumeRoleWithSAMLResult withAudience(String audience) {
680
680
* </ul>
681
681
* <p>
682
682
* The combination of <code>NameQualifier</code> and <code>Subject</code>
683
-
* can be used to uniquely identify a federated user.
683
+
* can be used to uniquely identify a user.
684
684
* </p>
685
685
* <p>
686
686
* The following pseudocode shows how the hash value is calculated:
@@ -712,8 +712,7 @@ public AssumeRoleWithSAMLResult withAudience(String audience) {
712
712
* </ul>
713
713
* <p>
714
714
* The combination of <code>NameQualifier</code> and
715
-
* <code>Subject</code> can be used to uniquely identify a federated
716
-
* user.
715
+
* <code>Subject</code> can be used to uniquely identify a user.
717
716
* </p>
718
717
* <p>
719
718
* The following pseudocode shows how the hash value is calculated:
@@ -749,7 +748,7 @@ public String getNameQualifier() {
749
748
* </ul>
750
749
* <p>
751
750
* The combination of <code>NameQualifier</code> and <code>Subject</code>
752
-
* can be used to uniquely identify a federated user.
751
+
* can be used to uniquely identify a user.
753
752
* </p>
754
753
* <p>
755
754
* The following pseudocode shows how the hash value is calculated:
@@ -781,8 +780,7 @@ public String getNameQualifier() {
781
780
* </ul>
782
781
* <p>
783
782
* The combination of <code>NameQualifier</code> and
784
-
* <code>Subject</code> can be used to uniquely identify a
785
-
* federated user.
783
+
* <code>Subject</code> can be used to uniquely identify a user.
786
784
* </p>
787
785
* <p>
788
786
* The following pseudocode shows how the hash value is
@@ -819,7 +817,7 @@ public void setNameQualifier(String nameQualifier) {
819
817
* </ul>
820
818
* <p>
821
819
* The combination of <code>NameQualifier</code> and <code>Subject</code>
822
-
* can be used to uniquely identify a federated user.
820
+
* can be used to uniquely identify a user.
823
821
* </p>
824
822
* <p>
825
823
* The following pseudocode shows how the hash value is calculated:
@@ -854,8 +852,7 @@ public void setNameQualifier(String nameQualifier) {
854
852
* </ul>
855
853
* <p>
856
854
* The combination of <code>NameQualifier</code> and
857
-
* <code>Subject</code> can be used to uniquely identify a
858
-
* federated user.
855
+
* <code>Subject</code> can be used to uniquely identify a user.
859
856
* </p>
860
857
* <p>
861
858
* The following pseudocode shows how the hash value is
Copy file name to clipboardExpand all lines: aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/AssumeRoleWithWebIdentityRequest.java
+2-6Lines changed: 2 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -41,12 +41,8 @@
41
41
* </p>
42
42
* <p>
43
43
* To learn more about Amazon Cognito, see <a href=
Copy file name to clipboardExpand all lines: aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/GetCallerIdentityRequest.java
+2-3Lines changed: 2 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -27,11 +27,10 @@
27
27
* <note>
28
28
* <p>
29
29
* No permissions are required to perform this operation. If an administrator
30
-
* adds a policy to your IAM user or role that explicitly denies access to the
30
+
* attaches a policy to your identity that explicitly denies access to the
31
31
* <code>sts:GetCallerIdentity</code> action, you can still perform this
32
32
* operation. Permissions are not required because the same information is
33
-
* returned when an IAM user or role is denied access. To view an example
34
-
* response, see <a href=
33
+
* returned when access is denied. To view an example response, see <a href=
Copy file name to clipboardExpand all lines: aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/GetFederationTokenRequest.java
+46-45Lines changed: 46 additions & 45 deletions
Original file line number
Diff line number
Diff line change
@@ -22,12 +22,14 @@
22
22
/**
23
23
* <p>
24
24
* Returns a set of temporary security credentials (consisting of an access key
25
-
* ID, a secret access key, and a security token) for a federated user. A
26
-
* typical use is in a proxy application that gets temporary security
27
-
* credentials on behalf of distributed applications inside a corporate network.
25
+
* ID, a secret access key, and a security token) for a user. A typical use is
26
+
* in a proxy application that gets temporary security credentials on behalf of
27
+
* distributed applications inside a corporate network.
28
+
* </p>
29
+
* <p>
28
30
* You must call the <code>GetFederationToken</code> operation using the
29
31
* long-term security credentials of an IAM user. As a result, this call is
30
-
* appropriate in contexts where those credentials can be safely stored, usually
32
+
* appropriate in contexts where those credentials can be safeguarded, usually
31
33
* in a server-based application. For a comparison of
32
34
* <code>GetFederationToken</code> with the other API operations that produce
33
35
* temporary credentials, see <a href=
@@ -37,6 +39,15 @@
37
39
* >Comparing the Amazon Web Services STS API operations</a> in the <i>IAM User
38
40
* Guide</i>.
39
41
* </p>
42
+
* <p>
43
+
* Although it is possible to call <code>GetFederationToken</code> using the
44
+
* security credentials of an Amazon Web Services account root user rather than
45
+
* an IAM user that you create for the purpose of a proxy application, we do not
46
+
* recommend it. For more information, see <a href=
0 commit comments