|
30 | 30 | ],
|
31 | 31 | "documentation":"<p>Attaches one or more LF-tags to an existing resource.</p>"
|
32 | 32 | },
|
| 33 | + "AssumeDecoratedRoleWithSAML":{ |
| 34 | + "name":"AssumeDecoratedRoleWithSAML", |
| 35 | + "http":{ |
| 36 | + "method":"POST", |
| 37 | + "requestUri":"/AssumeDecoratedRoleWithSAML" |
| 38 | + }, |
| 39 | + "input":{"shape":"AssumeDecoratedRoleWithSAMLRequest"}, |
| 40 | + "output":{"shape":"AssumeDecoratedRoleWithSAMLResponse"}, |
| 41 | + "errors":[ |
| 42 | + {"shape":"InvalidInputException"}, |
| 43 | + {"shape":"InternalServiceException"}, |
| 44 | + {"shape":"OperationTimeoutException"}, |
| 45 | + {"shape":"EntityNotFoundException"}, |
| 46 | + {"shape":"AccessDeniedException"} |
| 47 | + ], |
| 48 | + "documentation":"<p>Allows a caller to assume an IAM role decorated as the SAML user specified in the SAML assertion included in the request. This decoration allows Lake Formation to enforce access policies against the SAML users and groups. This API operation requires SAML federation setup in the caller’s account as it can only be called with valid SAML assertions. Lake Formation does not scope down the permission of the assumed role. All permissions attached to the role via the SAML federation setup will be included in the role session. </p> <p> This decorated role is expected to access data in Amazon S3 by getting temporary access from Lake Formation which is authorized via the virtual API <code>GetDataAccess</code>. Therefore, all SAML roles that can be assumed via <code>AssumeDecoratedRoleWithSAML</code> must at a minimum include <code>lakeformation:GetDataAccess</code> in their role policies. A typical IAM policy attached to such a role would look as follows: </p>" |
| 49 | + }, |
33 | 50 | "BatchGrantPermissions":{
|
34 | 51 | "name":"BatchGrantPermissions",
|
35 | 52 | "http":{
|
|
164 | 181 | {"shape":"OperationTimeoutException"},
|
165 | 182 | {"shape":"AccessDeniedException"}
|
166 | 183 | ],
|
167 |
| - "documentation":"<p>Deletes the specified LF-tag key name. If the attribute key does not exist or the LF-tag does not exist, then the operation will not do anything. If the attribute key exists, then the operation checks if any resources are tagged with this attribute key, if yes, the API throws a 400 Exception with the message \"Delete not allowed\" as the LF-tag key is still attached with resources. You can consider untagging resources with this LF-tag key.</p>" |
| 184 | + "documentation":"<p>Deletes the specified LF-tag given a key name. If the input parameter tag key was not found, then the operation will throw an exception. When you delete an LF-tag, the <code>LFTagPolicy</code> attached to the LF-tag becomes invalid. If the deleted LF-tag was still assigned to any resource, the tag policy attach to the deleted LF-tag will no longer be applied to the resource.</p>" |
168 | 185 | },
|
169 | 186 | "DeleteObjectsOnCancel":{
|
170 | 187 | "name":"DeleteObjectsOnCancel",
|
|
856 | 873 | "documentation":"<p>A resource to be created or added already exists.</p>",
|
857 | 874 | "exception":true
|
858 | 875 | },
|
| 876 | + "AssumeDecoratedRoleWithSAMLRequest":{ |
| 877 | + "type":"structure", |
| 878 | + "required":[ |
| 879 | + "SAMLAssertion", |
| 880 | + "RoleArn", |
| 881 | + "PrincipalArn" |
| 882 | + ], |
| 883 | + "members":{ |
| 884 | + "SAMLAssertion":{ |
| 885 | + "shape":"SAMLAssertionString", |
| 886 | + "documentation":"<p>A SAML assertion consisting of an assertion statement for the user who needs temporary credentials. This must match the SAML assertion that was issued to IAM. This must be Base64 encoded.</p>" |
| 887 | + }, |
| 888 | + "RoleArn":{ |
| 889 | + "shape":"IAMRoleArn", |
| 890 | + "documentation":"<p>The role that represents an IAM principal whose scope down policy allows it to call credential vending APIs such as <code>GetTemporaryTableCredentials</code>. The caller must also have iam:PassRole permission on this role. </p>" |
| 891 | + }, |
| 892 | + "PrincipalArn":{ |
| 893 | + "shape":"IAMSAMLProviderArn", |
| 894 | + "documentation":"<p>The Amazon Resource Name (ARN) of the SAML provider in IAM that describes the IdP.</p>" |
| 895 | + }, |
| 896 | + "DurationSeconds":{ |
| 897 | + "shape":"CredentialTimeoutDurationSecondInteger", |
| 898 | + "documentation":"<p>The time period, between 900 and 43,200 seconds, for the timeout of the temporary credentials.</p>" |
| 899 | + } |
| 900 | + } |
| 901 | + }, |
| 902 | + "AssumeDecoratedRoleWithSAMLResponse":{ |
| 903 | + "type":"structure", |
| 904 | + "members":{ |
| 905 | + "AccessKeyId":{ |
| 906 | + "shape":"AccessKeyIdString", |
| 907 | + "documentation":"<p>The access key ID for the temporary credentials. (The access key consists of an access key ID and a secret key).</p>" |
| 908 | + }, |
| 909 | + "SecretAccessKey":{ |
| 910 | + "shape":"SecretAccessKeyString", |
| 911 | + "documentation":"<p>The secret key for the temporary credentials. (The access key consists of an access key ID and a secret key).</p>" |
| 912 | + }, |
| 913 | + "SessionToken":{ |
| 914 | + "shape":"SessionTokenString", |
| 915 | + "documentation":"<p>The session token for the temporary credentials.</p>" |
| 916 | + }, |
| 917 | + "Expiration":{ |
| 918 | + "shape":"ExpirationTimestamp", |
| 919 | + "documentation":"<p>The date and time when the temporary credentials expire.</p>" |
| 920 | + } |
| 921 | + } |
| 922 | + }, |
859 | 923 | "AuditContext":{
|
860 | 924 | "type":"structure",
|
861 | 925 | "members":{
|
|
1203 | 1267 | "DataLakePrincipalList":{
|
1204 | 1268 | "type":"list",
|
1205 | 1269 | "member":{"shape":"DataLakePrincipal"},
|
1206 |
| - "max":10, |
| 1270 | + "max":30, |
1207 | 1271 | "min":0
|
1208 | 1272 | },
|
1209 | 1273 | "DataLakePrincipalString":{
|
|
2060 | 2124 | "type":"string",
|
2061 | 2125 | "pattern":"arn:aws:iam::[0-9]*:role/.*"
|
2062 | 2126 | },
|
| 2127 | + "IAMSAMLProviderArn":{ |
| 2128 | + "type":"string", |
| 2129 | + "pattern":"arn:aws:iam::[0-9]*:saml-provider/.*" |
| 2130 | + }, |
2063 | 2131 | "Identifier":{
|
2064 | 2132 | "type":"string",
|
2065 | 2133 | "max":255,
|
|
2915 | 2983 | },
|
2916 | 2984 | "documentation":"<p>A PartiQL predicate.</p>"
|
2917 | 2985 | },
|
| 2986 | + "SAMLAssertionString":{ |
| 2987 | + "type":"string", |
| 2988 | + "max":100000, |
| 2989 | + "min":4 |
| 2990 | + }, |
2918 | 2991 | "SearchDatabasesByLFTagsRequest":{
|
2919 | 2992 | "type":"structure",
|
2920 | 2993 | "required":["Expression"],
|
|
0 commit comments