|
47 | 47 | {"shape":"EntityNotFoundException"}, |
48 | 48 | {"shape":"AccessDeniedException"} |
49 | 49 | ], |
50 | | - "documentation":"<p>Allows a caller to assume an IAM role decorated as the SAML user specified in the SAML assertion included in the request. This decoration allows Lake Formation to enforce access policies against the SAML users and groups. This API operation requires SAML federation setup in the caller’s account as it can only be called with valid SAML assertions. Lake Formation does not scope down the permission of the assumed role. All permissions attached to the role via the SAML federation setup will be included in the role session. </p> <p> This decorated role is expected to access data in Amazon S3 by getting temporary access from Lake Formation which is authorized via the virtual API <code>GetDataAccess</code>. Therefore, all SAML roles that can be assumed via <code>AssumeDecoratedRoleWithSAML</code> must at a minimum include <code>lakeformation:GetDataAccess</code> in their role policies. A typical IAM policy attached to such a role would look as follows: </p>" |
| 50 | + "documentation":"<p>Allows a caller to assume an IAM role decorated as the SAML user specified in the SAML assertion included in the request. This decoration allows Lake Formation to enforce access policies against the SAML users and groups. This API operation requires SAML federation setup in the caller’s account as it can only be called with valid SAML assertions. Lake Formation does not scope down the permission of the assumed role. All permissions attached to the role via the SAML federation setup will be included in the role session. </p> <p> This decorated role is expected to access data in Amazon S3 by getting temporary access from Lake Formation which is authorized via the virtual API <code>GetDataAccess</code>. Therefore, all SAML roles that can be assumed via <code>AssumeDecoratedRoleWithSAML</code> must at a minimum include <code>lakeformation:GetDataAccess</code> in their role policies. A typical IAM policy attached to such a role would include the following actions: </p> <ul> <li> <p>glue:*Database*</p> </li> <li> <p>glue:*Table*</p> </li> <li> <p>glue:*Partition*</p> </li> <li> <p>glue:*UserDefinedFunction*</p> </li> <li> <p>lakeformation:GetDataAccess</p> </li> </ul>" |
51 | 51 | }, |
52 | 52 | "BatchGrantPermissions":{ |
53 | 53 | "name":"BatchGrantPermissions", |
|
238 | 238 | {"shape":"OperationTimeoutException"}, |
239 | 239 | {"shape":"AccessDeniedException"} |
240 | 240 | ], |
241 | | - "documentation":"<p>Deletes the specified LF-tag given a key name. If the input parameter tag key was not found, then the operation will throw an exception. When you delete an LF-tag, the <code>LFTagPolicy</code> attached to the LF-tag becomes invalid. If the deleted LF-tag was still assigned to any resource, the tag policy attach to the deleted LF-tag will no longer be applied to the resource.</p>" |
| 241 | + "documentation":"<p> Deletes an LF-tag by its key name. The operation fails if the specified tag key doesn't exist. When you delete an LF-Tag: </p> <ul> <li> <p>The associated LF-Tag policy becomes invalid.</p> </li> <li> <p> Resources that had this tag assigned will no longer have the tag policy applied to them.</p> </li> </ul>" |
242 | 242 | }, |
243 | 243 | "DeleteLFTagExpression":{ |
244 | 244 | "name":"DeleteLFTagExpression", |
|
736 | 736 | {"shape":"OperationTimeoutException"}, |
737 | 737 | {"shape":"InternalServiceException"} |
738 | 738 | ], |
739 | | - "documentation":"<p>Returns a list of the principal permissions on the resource, filtered by the permissions of the caller. For example, if you are granted an ALTER permission, you are able to see only the principal permissions for ALTER.</p> <p>This operation returns only those permissions that have been explicitly granted.</p> <p>For information about permissions, see <a href=\"https://docs.aws.amazon.com/lake-formation/latest/dg/security-data-access.html\">Security and Access Control to Metadata and Data</a>.</p>" |
| 739 | + "documentation":"<p>Returns a list of the principal permissions on the resource, filtered by the permissions of the caller. For example, if you are granted an ALTER permission, you are able to see only the principal permissions for ALTER.</p> <p>This operation returns only those permissions that have been explicitly granted. If both <code>Principal</code> and <code>Resource</code> parameters are provided, the response returns effective permissions rather than the explicitly granted permissions.</p> <p>For information about permissions, see <a href=\"https://docs.aws.amazon.com/lake-formation/latest/dg/security-data-access.html\">Security and Access Control to Metadata and Data</a>.</p>" |
740 | 740 | }, |
741 | 741 | "ListResources":{ |
742 | 742 | "name":"ListResources", |
|
1527 | 1527 | "ShareRecipients":{ |
1528 | 1528 | "shape":"DataLakePrincipalList", |
1529 | 1529 | "documentation":"<p>A list of Amazon Web Services account IDs and/or Amazon Web Services organization/organizational unit ARNs that are allowed to access data managed by Lake Formation. </p> <p>If the <code>ShareRecipients</code> list includes valid values, a resource share is created with the principals you want to have access to the resources.</p> <p>If the <code>ShareRecipients</code> value is null or the list is empty, no resource share is created.</p>" |
| 1530 | + }, |
| 1531 | + "ServiceIntegrations":{ |
| 1532 | + "shape":"ServiceIntegrationList", |
| 1533 | + "documentation":"<p>A list of service integrations for enabling trusted identity propagation with external services such as Redshift.</p>" |
1530 | 1534 | } |
1531 | 1535 | } |
1532 | 1536 | }, |
|
1940 | 1944 | "shape":"DataLakePrincipalList", |
1941 | 1945 | "documentation":"<p>A list of Amazon Web Services account IDs or Amazon Web Services organization/organizational unit ARNs that are allowed to access data managed by Lake Formation. </p> <p>If the <code>ShareRecipients</code> list includes valid values, a resource share is created with the principals you want to have access to the resources as the <code>ShareRecipients</code>.</p> <p>If the <code>ShareRecipients</code> value is null or the list is empty, no resource share is created.</p>" |
1942 | 1946 | }, |
| 1947 | + "ServiceIntegrations":{ |
| 1948 | + "shape":"ServiceIntegrationList", |
| 1949 | + "documentation":"<p>A list of service integrations for enabling trusted identity propagation with external services such as Redshift.</p>" |
| 1950 | + }, |
1943 | 1951 | "ResourceShare":{ |
1944 | 1952 | "shape":"RAMResourceShareArn", |
1945 | 1953 | "documentation":"<p>The Amazon Resource Name (ARN) of the RAM share.</p>" |
|
3109 | 3117 | }, |
3110 | 3118 | "IncludeRelated":{ |
3111 | 3119 | "shape":"TrueFalseString", |
3112 | | - "documentation":"<p>Indicates that related permissions should be included in the results.</p>" |
| 3120 | + "documentation":"<p>Indicates that related permissions should be included in the results when listing permissions on a table resource.</p> <p>Set the field to <code>TRUE</code> to show the cell filters on a table resource. Default is <code>FALSE</code>. The Principal parameter must not be specified when requesting cell filter information.</p>" |
3113 | 3121 | } |
3114 | 3122 | } |
3115 | 3123 | }, |
|
3565 | 3573 | ] |
3566 | 3574 | }, |
3567 | 3575 | "RAMResourceShareArn":{"type":"string"}, |
| 3576 | + "RedshiftConnect":{ |
| 3577 | + "type":"structure", |
| 3578 | + "required":["Authorization"], |
| 3579 | + "members":{ |
| 3580 | + "Authorization":{ |
| 3581 | + "shape":"ServiceAuthorization", |
| 3582 | + "documentation":"<p>The authorization status for Redshift Connect. Valid values are ENABLED or DISABLED.</p>" |
| 3583 | + } |
| 3584 | + }, |
| 3585 | + "documentation":"<p>Configuration for enabling trusted identity propagation with Redshift Connect.</p>" |
| 3586 | + }, |
| 3587 | + "RedshiftScopeUnion":{ |
| 3588 | + "type":"structure", |
| 3589 | + "members":{ |
| 3590 | + "RedshiftConnect":{ |
| 3591 | + "shape":"RedshiftConnect", |
| 3592 | + "documentation":"<p>Configuration for Redshift Connect integration.</p>" |
| 3593 | + } |
| 3594 | + }, |
| 3595 | + "documentation":"<p>A union structure representing different Redshift integration scopes.</p>", |
| 3596 | + "union":true |
| 3597 | + }, |
| 3598 | + "RedshiftServiceIntegrations":{ |
| 3599 | + "type":"list", |
| 3600 | + "member":{"shape":"RedshiftScopeUnion"}, |
| 3601 | + "documentation":"<p>A list of Redshift service integration configurations.</p>" |
| 3602 | + }, |
3568 | 3603 | "RegisterResourceRequest":{ |
3569 | 3604 | "type":"structure", |
3570 | 3605 | "required":["ResourceArn"], |
|
3658 | 3693 | }, |
3659 | 3694 | "LFTag":{ |
3660 | 3695 | "shape":"LFTagKeyResource", |
3661 | | - "documentation":"<p>The LF-tag key and values attached to a resource.</p>" |
| 3696 | + "documentation":"<p>The LF-Tag key and values attached to a resource.</p>" |
3662 | 3697 | }, |
3663 | 3698 | "LFTagPolicy":{ |
3664 | 3699 | "shape":"LFTagPolicyResource", |
|
3888 | 3923 | } |
3889 | 3924 | }, |
3890 | 3925 | "SecretAccessKeyString":{"type":"string"}, |
| 3926 | + "ServiceAuthorization":{ |
| 3927 | + "type":"string", |
| 3928 | + "documentation":"<p>Authorization status for service integrations. Specify a value of <code>ENABLED</code> or <code>DISABLED</code>.</p>", |
| 3929 | + "enum":[ |
| 3930 | + "ENABLED", |
| 3931 | + "DISABLED" |
| 3932 | + ] |
| 3933 | + }, |
| 3934 | + "ServiceIntegrationList":{ |
| 3935 | + "type":"list", |
| 3936 | + "member":{"shape":"ServiceIntegrationUnion"}, |
| 3937 | + "documentation":"<p>A list of service integrations for trusted identity propagation.</p>" |
| 3938 | + }, |
| 3939 | + "ServiceIntegrationUnion":{ |
| 3940 | + "type":"structure", |
| 3941 | + "members":{ |
| 3942 | + "Redshift":{ |
| 3943 | + "shape":"RedshiftServiceIntegrations", |
| 3944 | + "documentation":"<p>Redshift service integration configuration.</p>" |
| 3945 | + } |
| 3946 | + }, |
| 3947 | + "documentation":"<p>A union structure representing different service integration types.</p>", |
| 3948 | + "union":true |
| 3949 | + }, |
3891 | 3950 | "SessionTokenString":{"type":"string"}, |
3892 | 3951 | "StartQueryPlanningRequest":{ |
3893 | 3952 | "type":"structure", |
|
4346 | 4405 | "shape":"DataLakePrincipalList", |
4347 | 4406 | "documentation":"<p>A list of Amazon Web Services account IDs or Amazon Web Services organization/organizational unit ARNs that are allowed to access to access data managed by Lake Formation. </p> <p>If the <code>ShareRecipients</code> list includes valid values, then the resource share is updated with the principals you want to have access to the resources.</p> <p>If the <code>ShareRecipients</code> value is null, both the list of share recipients and the resource share remain unchanged.</p> <p>If the <code>ShareRecipients</code> value is an empty list, then the existing share recipients list will be cleared, and the resource share will be deleted.</p>" |
4348 | 4407 | }, |
| 4408 | + "ServiceIntegrations":{ |
| 4409 | + "shape":"ServiceIntegrationList", |
| 4410 | + "documentation":"<p>A list of service integrations for enabling trusted identity propagation with external services such as Redshift.</p>" |
| 4411 | + }, |
4349 | 4412 | "ApplicationStatus":{ |
4350 | 4413 | "shape":"ApplicationStatus", |
4351 | 4414 | "documentation":"<p>Allows to enable or disable the IAM Identity Center connection.</p>" |
|
0 commit comments