|
254 | 254 | "output":{"shape":"AdminInitiateAuthResponse"},
|
255 | 255 | "errors":[
|
256 | 256 | {"shape":"ResourceNotFoundException"},
|
| 257 | + {"shape":"UnsupportedOperationException"}, |
257 | 258 | {"shape":"InvalidParameterException"},
|
258 | 259 | {"shape":"NotAuthorizedException"},
|
259 | 260 | {"shape":"TooManyRequestsException"},
|
|
855 | 856 | {"shape":"NotAuthorizedException"},
|
856 | 857 | {"shape":"ScopeDoesNotExistException"},
|
857 | 858 | {"shape":"InvalidOAuthFlowException"},
|
858 |
| - {"shape":"InternalErrorException"} |
| 859 | + {"shape":"InternalErrorException"}, |
| 860 | + {"shape":"FeatureUnavailableInTierException"} |
859 | 861 | ],
|
860 | 862 | "documentation":"<p>Creates an app client in a user pool. This operation sets basic and advanced configuration options.</p> <p>Unlike app clients created in the console, Amazon Cognito doesn't automatically assign a branding style to app clients that you configure with this API operation. Managed login and classic hosted UI pages aren't available for your client until after you apply a branding style.</p> <important> <p>If you don't provide a value for an attribute, Amazon Cognito sets it to its default value.</p> </important> <note> <p>Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.</p> <p class=\"title\"> <b>Learn more</b> </p> <ul> <li> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html\">Signing Amazon Web Services API Requests</a> </p> </li> <li> <p> <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html\">Using the Amazon Cognito user pools API and user pool endpoints</a> </p> </li> </ul> </note>"
|
861 | 863 | },
|
|
870 | 872 | "errors":[
|
871 | 873 | {"shape":"InvalidParameterException"},
|
872 | 874 | {"shape":"NotAuthorizedException"},
|
| 875 | + {"shape":"ConcurrentModificationException"}, |
873 | 876 | {"shape":"ResourceNotFoundException"},
|
874 | 877 | {"shape":"LimitExceededException"},
|
875 | 878 | {"shape":"InternalErrorException"},
|
|
1034 | 1037 | "errors":[
|
1035 | 1038 | {"shape":"NotAuthorizedException"},
|
1036 | 1039 | {"shape":"InvalidParameterException"},
|
| 1040 | + {"shape":"ConcurrentModificationException"}, |
1037 | 1041 | {"shape":"ResourceNotFoundException"},
|
1038 | 1042 | {"shape":"InternalErrorException"}
|
1039 | 1043 | ],
|
|
1371 | 1375 | ],
|
1372 | 1376 | "documentation":"<p>Given a user pool ID, returns the signing certificate for SAML 2.0 federation.</p> <p>Issued certificates are valid for 10 years from the date of issue. Amazon Cognito issues and assigns a new signing certificate annually. This renewal process returns a new value in the response to <code>GetSigningCertificate</code>, but doesn't invalidate the original certificate.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-signing\">Signing SAML requests</a>.</p> <note> <p>Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.</p> <p class=\"title\"> <b>Learn more</b> </p> <ul> <li> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html\">Signing Amazon Web Services API Requests</a> </p> </li> <li> <p> <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html\">Using the Amazon Cognito user pools API and user pool endpoints</a> </p> </li> </ul> </note>"
|
1373 | 1377 | },
|
| 1378 | + "GetTokensFromRefreshToken":{ |
| 1379 | + "name":"GetTokensFromRefreshToken", |
| 1380 | + "http":{ |
| 1381 | + "method":"POST", |
| 1382 | + "requestUri":"/" |
| 1383 | + }, |
| 1384 | + "input":{"shape":"GetTokensFromRefreshTokenRequest"}, |
| 1385 | + "output":{"shape":"GetTokensFromRefreshTokenResponse"}, |
| 1386 | + "errors":[ |
| 1387 | + {"shape":"ResourceNotFoundException"}, |
| 1388 | + {"shape":"InvalidParameterException"}, |
| 1389 | + {"shape":"NotAuthorizedException"}, |
| 1390 | + {"shape":"TooManyRequestsException"}, |
| 1391 | + {"shape":"UserNotFoundException"}, |
| 1392 | + {"shape":"UnexpectedLambdaException"}, |
| 1393 | + {"shape":"UserLambdaValidationException"}, |
| 1394 | + {"shape":"InvalidLambdaResponseException"}, |
| 1395 | + {"shape":"ForbiddenException"}, |
| 1396 | + {"shape":"RefreshTokenReuseException"}, |
| 1397 | + {"shape":"InternalErrorException"} |
| 1398 | + ], |
| 1399 | + "documentation":"<p>Given a refresh token, issues new ID, access, and optionally refresh tokens for the user who owns the submitted token. This operation issues a new refresh token and invalidates the original refresh token after an optional grace period when refresh token rotation is enabled. If refresh token rotation is disabled, issues new ID and access tokens only.</p>" |
| 1400 | + }, |
1374 | 1401 | "GetUICustomization":{
|
1375 | 1402 | "name":"GetUICustomization",
|
1376 | 1403 | "http":{
|
|
1513 | 1540 | "input":{"shape":"InitiateAuthRequest"},
|
1514 | 1541 | "output":{"shape":"InitiateAuthResponse"},
|
1515 | 1542 | "errors":[
|
| 1543 | + {"shape":"UnsupportedOperationException"}, |
1516 | 1544 | {"shape":"ResourceNotFoundException"},
|
1517 | 1545 | {"shape":"InvalidParameterException"},
|
1518 | 1546 | {"shape":"NotAuthorizedException"},
|
|
2247 | 2275 | {"shape":"NotAuthorizedException"},
|
2248 | 2276 | {"shape":"ScopeDoesNotExistException"},
|
2249 | 2277 | {"shape":"InvalidOAuthFlowException"},
|
2250 |
| - {"shape":"InternalErrorException"} |
| 2278 | + {"shape":"InternalErrorException"}, |
| 2279 | + {"shape":"FeatureUnavailableInTierException"} |
2251 | 2280 | ],
|
2252 | 2281 | "documentation":"<p>Given a user pool app client ID, updates the configuration. To avoid setting parameters to Amazon Cognito defaults, construct this API request to pass the existing configuration of your app client, modified to include the changes that you want to make.</p> <important> <p>If you don't provide a value for an attribute, Amazon Cognito sets it to its default value.</p> </important> <p>Unlike app clients created in the console, Amazon Cognito doesn't automatically assign a branding style to app clients that you configure with this API operation. Managed login and classic hosted UI pages aren't available for your client until after you apply a branding style.</p> <note> <p>Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.</p> <p class=\"title\"> <b>Learn more</b> </p> <ul> <li> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html\">Signing Amazon Web Services API Requests</a> </p> </li> <li> <p> <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html\">Using the Amazon Cognito user pools API and user pool endpoints</a> </p> </li> </ul> </note>"
|
2253 | 2282 | },
|
|
2262 | 2291 | "errors":[
|
2263 | 2292 | {"shape":"InvalidParameterException"},
|
2264 | 2293 | {"shape":"NotAuthorizedException"},
|
| 2294 | + {"shape":"ConcurrentModificationException"}, |
2265 | 2295 | {"shape":"ResourceNotFoundException"},
|
2266 | 2296 | {"shape":"TooManyRequestsException"},
|
2267 | 2297 | {"shape":"InternalErrorException"},
|
|
4446 | 4476 | "AuthSessionValidity":{
|
4447 | 4477 | "shape":"AuthSessionValidityType",
|
4448 | 4478 | "documentation":"<p>Amazon Cognito creates a session token for each API request in an authentication flow. <code>AuthSessionValidity</code> is the duration, in minutes, of that session token. Your user pool native user must respond to each authentication challenge before the session expires.</p>"
|
| 4479 | + }, |
| 4480 | + "RefreshTokenRotation":{ |
| 4481 | + "shape":"RefreshTokenRotationType", |
| 4482 | + "documentation":"<p>The configuration of your app client for refresh token rotation. When enabled, your app client issues new ID, access, and refresh tokens when users renew their sessions with refresh tokens. When disabled, token refresh issues only ID and access tokens.</p>" |
4449 | 4483 | }
|
4450 | 4484 | },
|
4451 | 4485 | "documentation":"<p>Represents the request to create a user pool client.</p>"
|
|
5542 | 5576 | "ALLOW_USER_AUTH"
|
5543 | 5577 | ]
|
5544 | 5578 | },
|
| 5579 | + "FeatureType":{ |
| 5580 | + "type":"string", |
| 5581 | + "enum":[ |
| 5582 | + "ENABLED", |
| 5583 | + "DISABLED" |
| 5584 | + ] |
| 5585 | + }, |
5545 | 5586 | "FeatureUnavailableInTierException":{
|
5546 | 5587 | "type":"structure",
|
5547 | 5588 | "members":{
|
|
5783 | 5824 | },
|
5784 | 5825 | "documentation":"<p>Response from Amazon Cognito for a signing certificate request.</p>"
|
5785 | 5826 | },
|
| 5827 | + "GetTokensFromRefreshTokenRequest":{ |
| 5828 | + "type":"structure", |
| 5829 | + "required":[ |
| 5830 | + "RefreshToken", |
| 5831 | + "ClientId" |
| 5832 | + ], |
| 5833 | + "members":{ |
| 5834 | + "RefreshToken":{ |
| 5835 | + "shape":"TokenModelType", |
| 5836 | + "documentation":"<p>A valid refresh token that can authorize the request for new tokens. When refresh token rotation is active in the requested app client, this token is invalidated after the request is complete.</p>" |
| 5837 | + }, |
| 5838 | + "ClientId":{ |
| 5839 | + "shape":"ClientIdType", |
| 5840 | + "documentation":"<p>The app client that issued the refresh token to the user who wants to request new tokens.</p>" |
| 5841 | + }, |
| 5842 | + "ClientSecret":{ |
| 5843 | + "shape":"ClientSecretType", |
| 5844 | + "documentation":"<p>The client secret of the requested app client, if the client has a secret.</p>" |
| 5845 | + }, |
| 5846 | + "DeviceKey":{ |
| 5847 | + "shape":"DeviceKeyType", |
| 5848 | + "documentation":"<p>When you enable device remembering, Amazon Cognito issues a device key that you can use for device authentication that bypasses multi-factor authentication (MFA). To implement <code>GetTokensFromRefreshToken</code> in a user pool with device remembering, you must capture the device key from the initial authentication request. If your application doesn't provide the key of a registered device, Amazon Cognito issues a new one. You must provide the confirmed device key in this request if device remembering is enabled in your user pool.</p> <p>For more information about device remembering, see <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html\">Working with devices</a>.</p>" |
| 5849 | + }, |
| 5850 | + "ClientMetadata":{ |
| 5851 | + "shape":"ClientMetadataType", |
| 5852 | + "documentation":"<p>A map of custom key-value pairs that you can provide as input for certain custom workflows that this action triggers.</p> <p>You create custom workflows by assigning Lambda functions to user pool triggers. When you use the <code>GetTokensFromRefreshToken</code> API action, Amazon Cognito invokes the Lambda function the pre token generation trigger.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-identity-pools-working-with-aws-lambda-triggers.html\"> Using Lambda triggers</a> in the <i>Amazon Cognito Developer Guide</i>.</p> <note> <p>When you use the <code>ClientMetadata</code> parameter, note that Amazon Cognito won't do the following:</p> <ul> <li> <p>Store the <code>ClientMetadata</code> value. This data is available only to Lambda triggers that are assigned to a user pool to support custom workflows. If your user pool configuration doesn't include triggers, the <code>ClientMetadata</code> parameter serves no purpose.</p> </li> <li> <p>Validate the <code>ClientMetadata</code> value.</p> </li> <li> <p>Encrypt the <code>ClientMetadata</code> value. Don't send sensitive information in this parameter.</p> </li> </ul> </note>" |
| 5853 | + } |
| 5854 | + } |
| 5855 | + }, |
| 5856 | + "GetTokensFromRefreshTokenResponse":{ |
| 5857 | + "type":"structure", |
| 5858 | + "members":{ |
| 5859 | + "AuthenticationResult":{"shape":"AuthenticationResultType"} |
| 5860 | + } |
| 5861 | + }, |
5786 | 5862 | "GetUICustomizationRequest":{
|
5787 | 5863 | "type":"structure",
|
5788 | 5864 | "required":["UserPoolId"],
|
|
7246 | 7322 | "min":1,
|
7247 | 7323 | "pattern":"[\\p{L}\\p{M}\\p{S}\\p{N}\\p{P}]+"
|
7248 | 7324 | },
|
| 7325 | + "RefreshTokenReuseException":{ |
| 7326 | + "type":"structure", |
| 7327 | + "members":{ |
| 7328 | + "message":{"shape":"MessageType"} |
| 7329 | + }, |
| 7330 | + "documentation":"<p>This exception is throw when your application requests token refresh with a refresh token that has been invalidated by refresh-token rotation.</p>", |
| 7331 | + "exception":true |
| 7332 | + }, |
| 7333 | + "RefreshTokenRotationType":{ |
| 7334 | + "type":"structure", |
| 7335 | + "required":["Feature"], |
| 7336 | + "members":{ |
| 7337 | + "Feature":{ |
| 7338 | + "shape":"FeatureType", |
| 7339 | + "documentation":"<p>The state of refresh token rotation for the current app client.</p>" |
| 7340 | + }, |
| 7341 | + "RetryGracePeriodSeconds":{ |
| 7342 | + "shape":"RetryGracePeriodSecondsType", |
| 7343 | + "documentation":"<p>When you request a token refresh with <code>GetTokensFromRefreshToken</code>, the original refresh token that you're rotating out can remain valid for a period of time of up to 60 seconds. This allows for client-side retries. When <code>RetryGracePeriodSeconds</code> is <code>0</code>, the grace period is disabled and a successful request immediately invalidates the submitted refresh token.</p>" |
| 7344 | + } |
| 7345 | + }, |
| 7346 | + "documentation":"<p>The configuration of your app client for refresh token rotation. When enabled, your app client issues new ID, access, and refresh tokens when users renew their sessions with refresh tokens. When disabled, token refresh issues only ID and access tokens.</p>" |
| 7347 | + }, |
7249 | 7348 | "RefreshTokenValidityType":{
|
7250 | 7349 | "type":"integer",
|
7251 | 7350 | "max":315360000,
|
|
7454 | 7553 | },
|
7455 | 7554 | "documentation":"<p>The response to respond to the authentication challenge.</p>"
|
7456 | 7555 | },
|
| 7556 | + "RetryGracePeriodSecondsType":{ |
| 7557 | + "type":"integer", |
| 7558 | + "max":60, |
| 7559 | + "min":0 |
| 7560 | + }, |
7457 | 7561 | "RevokeTokenRequest":{
|
7458 | 7562 | "type":"structure",
|
7459 | 7563 | "required":[
|
|
8696 | 8800 | "AuthSessionValidity":{
|
8697 | 8801 | "shape":"AuthSessionValidityType",
|
8698 | 8802 | "documentation":"<p>Amazon Cognito creates a session token for each API request in an authentication flow. <code>AuthSessionValidity</code> is the duration, in minutes, of that session token. Your user pool native user must respond to each authentication challenge before the session expires.</p>"
|
| 8803 | + }, |
| 8804 | + "RefreshTokenRotation":{ |
| 8805 | + "shape":"RefreshTokenRotationType", |
| 8806 | + "documentation":"<p>The configuration of your app client for refresh token rotation. When enabled, your app client issues new ID, access, and refresh tokens when users renew their sessions with refresh tokens. When disabled, token refresh issues only ID and access tokens.</p>" |
8699 | 8807 | }
|
8700 | 8808 | },
|
8701 | 8809 | "documentation":"<p>Represents the request to update the user pool client.</p>"
|
|
9161 | 9269 | "AuthSessionValidity":{
|
9162 | 9270 | "shape":"AuthSessionValidityType",
|
9163 | 9271 | "documentation":"<p>Amazon Cognito creates a session token for each API request in an authentication flow. <code>AuthSessionValidity</code> is the duration, in minutes, of that session token. Your user pool native user must respond to each authentication challenge before the session expires.</p>"
|
| 9272 | + }, |
| 9273 | + "RefreshTokenRotation":{ |
| 9274 | + "shape":"RefreshTokenRotationType", |
| 9275 | + "documentation":"<p>The configuration of your app client for refresh token rotation. When enabled, your app client issues new ID, access, and refresh tokens when users renew their sessions with refresh tokens. When disabled, token refresh issues only ID and access tokens.</p>" |
9164 | 9276 | }
|
9165 | 9277 | },
|
9166 | 9278 | "documentation":"<p>The configuration of a user pool client.</p>"
|
|
0 commit comments