@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class UpdateUserPoolClientRequest extends AmazonWebServiceRequest implements Serializable, Cloneable
Represents the request to update the user pool client.
NOOP
Constructor and Description |
---|
UpdateUserPoolClientRequest() |
Modifier and Type | Method and Description |
---|---|
UpdateUserPoolClientRequest |
clone() |
boolean |
equals(Object obj) |
Integer |
getAccessTokenValidity()
The time limit, after which the access token is no longer valid and cannot be used.
|
List<String> |
getAllowedOAuthFlows()
The allowed OAuth flows.
|
Boolean |
getAllowedOAuthFlowsUserPoolClient()
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
|
List<String> |
getAllowedOAuthScopes()
The allowed OAuth scopes.
|
AnalyticsConfigurationType |
getAnalyticsConfiguration()
The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
|
List<String> |
getCallbackURLs()
A list of allowed redirect (callback) URLs for the identity providers.
|
String |
getClientId()
The ID of the client associated with the user pool.
|
String |
getClientName()
The client name from the update user pool client request.
|
String |
getDefaultRedirectURI()
The default redirect URI.
|
List<String> |
getExplicitAuthFlows()
The authentication flows that are supported by the user pool clients.
|
Integer |
getIdTokenValidity()
The time limit, after which the ID token is no longer valid and cannot be used.
|
List<String> |
getLogoutURLs()
A list of allowed logout URLs for the identity providers.
|
String |
getPreventUserExistenceErrors()
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool.
|
List<String> |
getReadAttributes()
The read-only attributes of the user pool.
|
Integer |
getRefreshTokenValidity()
The time limit, in days, after which the refresh token is no longer valid and cannot be used.
|
List<String> |
getSupportedIdentityProviders()
A list of provider names for the identity providers that are supported on this client.
|
TokenValidityUnitsType |
getTokenValidityUnits()
The units in which the validity times are represented in.
|
String |
getUserPoolId()
The user pool ID for the user pool where you want to update the user pool client.
|
List<String> |
getWriteAttributes()
The writeable attributes of the user pool.
|
int |
hashCode() |
Boolean |
isAllowedOAuthFlowsUserPoolClient()
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
|
void |
setAccessTokenValidity(Integer accessTokenValidity)
The time limit, after which the access token is no longer valid and cannot be used.
|
void |
setAllowedOAuthFlows(Collection<String> allowedOAuthFlows)
The allowed OAuth flows.
|
void |
setAllowedOAuthFlowsUserPoolClient(Boolean allowedOAuthFlowsUserPoolClient)
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
|
void |
setAllowedOAuthScopes(Collection<String> allowedOAuthScopes)
The allowed OAuth scopes.
|
void |
setAnalyticsConfiguration(AnalyticsConfigurationType analyticsConfiguration)
The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
|
void |
setCallbackURLs(Collection<String> callbackURLs)
A list of allowed redirect (callback) URLs for the identity providers.
|
void |
setClientId(String clientId)
The ID of the client associated with the user pool.
|
void |
setClientName(String clientName)
The client name from the update user pool client request.
|
void |
setDefaultRedirectURI(String defaultRedirectURI)
The default redirect URI.
|
void |
setExplicitAuthFlows(Collection<String> explicitAuthFlows)
The authentication flows that are supported by the user pool clients.
|
void |
setIdTokenValidity(Integer idTokenValidity)
The time limit, after which the ID token is no longer valid and cannot be used.
|
void |
setLogoutURLs(Collection<String> logoutURLs)
A list of allowed logout URLs for the identity providers.
|
void |
setPreventUserExistenceErrors(String preventUserExistenceErrors)
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool.
|
void |
setReadAttributes(Collection<String> readAttributes)
The read-only attributes of the user pool.
|
void |
setRefreshTokenValidity(Integer refreshTokenValidity)
The time limit, in days, after which the refresh token is no longer valid and cannot be used.
|
void |
setSupportedIdentityProviders(Collection<String> supportedIdentityProviders)
A list of provider names for the identity providers that are supported on this client.
|
void |
setTokenValidityUnits(TokenValidityUnitsType tokenValidityUnits)
The units in which the validity times are represented in.
|
void |
setUserPoolId(String userPoolId)
The user pool ID for the user pool where you want to update the user pool client.
|
void |
setWriteAttributes(Collection<String> writeAttributes)
The writeable attributes of the user pool.
|
String |
toString()
Returns a string representation of this object.
|
UpdateUserPoolClientRequest |
withAccessTokenValidity(Integer accessTokenValidity)
The time limit, after which the access token is no longer valid and cannot be used.
|
UpdateUserPoolClientRequest |
withAllowedOAuthFlows(Collection<String> allowedOAuthFlows)
The allowed OAuth flows.
|
UpdateUserPoolClientRequest |
withAllowedOAuthFlows(OAuthFlowType... allowedOAuthFlows)
The allowed OAuth flows.
|
UpdateUserPoolClientRequest |
withAllowedOAuthFlows(String... allowedOAuthFlows)
The allowed OAuth flows.
|
UpdateUserPoolClientRequest |
withAllowedOAuthFlowsUserPoolClient(Boolean allowedOAuthFlowsUserPoolClient)
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
|
UpdateUserPoolClientRequest |
withAllowedOAuthScopes(Collection<String> allowedOAuthScopes)
The allowed OAuth scopes.
|
UpdateUserPoolClientRequest |
withAllowedOAuthScopes(String... allowedOAuthScopes)
The allowed OAuth scopes.
|
UpdateUserPoolClientRequest |
withAnalyticsConfiguration(AnalyticsConfigurationType analyticsConfiguration)
The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
|
UpdateUserPoolClientRequest |
withCallbackURLs(Collection<String> callbackURLs)
A list of allowed redirect (callback) URLs for the identity providers.
|
UpdateUserPoolClientRequest |
withCallbackURLs(String... callbackURLs)
A list of allowed redirect (callback) URLs for the identity providers.
|
UpdateUserPoolClientRequest |
withClientId(String clientId)
The ID of the client associated with the user pool.
|
UpdateUserPoolClientRequest |
withClientName(String clientName)
The client name from the update user pool client request.
|
UpdateUserPoolClientRequest |
withDefaultRedirectURI(String defaultRedirectURI)
The default redirect URI.
|
UpdateUserPoolClientRequest |
withExplicitAuthFlows(Collection<String> explicitAuthFlows)
The authentication flows that are supported by the user pool clients.
|
UpdateUserPoolClientRequest |
withExplicitAuthFlows(ExplicitAuthFlowsType... explicitAuthFlows)
The authentication flows that are supported by the user pool clients.
|
UpdateUserPoolClientRequest |
withExplicitAuthFlows(String... explicitAuthFlows)
The authentication flows that are supported by the user pool clients.
|
UpdateUserPoolClientRequest |
withIdTokenValidity(Integer idTokenValidity)
The time limit, after which the ID token is no longer valid and cannot be used.
|
UpdateUserPoolClientRequest |
withLogoutURLs(Collection<String> logoutURLs)
A list of allowed logout URLs for the identity providers.
|
UpdateUserPoolClientRequest |
withLogoutURLs(String... logoutURLs)
A list of allowed logout URLs for the identity providers.
|
UpdateUserPoolClientRequest |
withPreventUserExistenceErrors(PreventUserExistenceErrorTypes preventUserExistenceErrors)
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool.
|
UpdateUserPoolClientRequest |
withPreventUserExistenceErrors(String preventUserExistenceErrors)
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool.
|
UpdateUserPoolClientRequest |
withReadAttributes(Collection<String> readAttributes)
The read-only attributes of the user pool.
|
UpdateUserPoolClientRequest |
withReadAttributes(String... readAttributes)
The read-only attributes of the user pool.
|
UpdateUserPoolClientRequest |
withRefreshTokenValidity(Integer refreshTokenValidity)
The time limit, in days, after which the refresh token is no longer valid and cannot be used.
|
UpdateUserPoolClientRequest |
withSupportedIdentityProviders(Collection<String> supportedIdentityProviders)
A list of provider names for the identity providers that are supported on this client.
|
UpdateUserPoolClientRequest |
withSupportedIdentityProviders(String... supportedIdentityProviders)
A list of provider names for the identity providers that are supported on this client.
|
UpdateUserPoolClientRequest |
withTokenValidityUnits(TokenValidityUnitsType tokenValidityUnits)
The units in which the validity times are represented in.
|
UpdateUserPoolClientRequest |
withUserPoolId(String userPoolId)
The user pool ID for the user pool where you want to update the user pool client.
|
UpdateUserPoolClientRequest |
withWriteAttributes(Collection<String> writeAttributes)
The writeable attributes of the user pool.
|
UpdateUserPoolClientRequest |
withWriteAttributes(String... writeAttributes)
The writeable attributes of the user pool.
|
addHandlerContext, copyBaseTo, getCloneRoot, getCloneSource, getCustomQueryParameters, getCustomRequestHeaders, getGeneralProgressListener, getHandlerContext, getReadLimit, getRequestClientOptions, getRequestCredentials, getRequestCredentialsProvider, getRequestMetricCollector, getSdkClientExecutionTimeout, getSdkRequestTimeout, putCustomQueryParameter, putCustomRequestHeader, setGeneralProgressListener, setRequestCredentials, setRequestCredentialsProvider, setRequestMetricCollector, setSdkClientExecutionTimeout, setSdkRequestTimeout, withGeneralProgressListener, withRequestCredentialsProvider, withRequestMetricCollector, withSdkClientExecutionTimeout, withSdkRequestTimeout
public void setUserPoolId(String userPoolId)
The user pool ID for the user pool where you want to update the user pool client.
userPoolId
- The user pool ID for the user pool where you want to update the user pool client.public String getUserPoolId()
The user pool ID for the user pool where you want to update the user pool client.
public UpdateUserPoolClientRequest withUserPoolId(String userPoolId)
The user pool ID for the user pool where you want to update the user pool client.
userPoolId
- The user pool ID for the user pool where you want to update the user pool client.public void setClientId(String clientId)
The ID of the client associated with the user pool.
clientId
- The ID of the client associated with the user pool.public String getClientId()
The ID of the client associated with the user pool.
public UpdateUserPoolClientRequest withClientId(String clientId)
The ID of the client associated with the user pool.
clientId
- The ID of the client associated with the user pool.public void setClientName(String clientName)
The client name from the update user pool client request.
clientName
- The client name from the update user pool client request.public String getClientName()
The client name from the update user pool client request.
public UpdateUserPoolClientRequest withClientName(String clientName)
The client name from the update user pool client request.
clientName
- The client name from the update user pool client request.public void setRefreshTokenValidity(Integer refreshTokenValidity)
The time limit, in days, after which the refresh token is no longer valid and cannot be used.
refreshTokenValidity
- The time limit, in days, after which the refresh token is no longer valid and cannot be used.public Integer getRefreshTokenValidity()
The time limit, in days, after which the refresh token is no longer valid and cannot be used.
public UpdateUserPoolClientRequest withRefreshTokenValidity(Integer refreshTokenValidity)
The time limit, in days, after which the refresh token is no longer valid and cannot be used.
refreshTokenValidity
- The time limit, in days, after which the refresh token is no longer valid and cannot be used.public void setAccessTokenValidity(Integer accessTokenValidity)
The time limit, after which the access token is no longer valid and cannot be used.
accessTokenValidity
- The time limit, after which the access token is no longer valid and cannot be used.public Integer getAccessTokenValidity()
The time limit, after which the access token is no longer valid and cannot be used.
public UpdateUserPoolClientRequest withAccessTokenValidity(Integer accessTokenValidity)
The time limit, after which the access token is no longer valid and cannot be used.
accessTokenValidity
- The time limit, after which the access token is no longer valid and cannot be used.public void setIdTokenValidity(Integer idTokenValidity)
The time limit, after which the ID token is no longer valid and cannot be used.
idTokenValidity
- The time limit, after which the ID token is no longer valid and cannot be used.public Integer getIdTokenValidity()
The time limit, after which the ID token is no longer valid and cannot be used.
public UpdateUserPoolClientRequest withIdTokenValidity(Integer idTokenValidity)
The time limit, after which the ID token is no longer valid and cannot be used.
idTokenValidity
- The time limit, after which the ID token is no longer valid and cannot be used.public void setTokenValidityUnits(TokenValidityUnitsType tokenValidityUnits)
The units in which the validity times are represented in. Default for RefreshToken is days, and default for ID and access tokens are hours.
tokenValidityUnits
- The units in which the validity times are represented in. Default for RefreshToken is days, and default
for ID and access tokens are hours.public TokenValidityUnitsType getTokenValidityUnits()
The units in which the validity times are represented in. Default for RefreshToken is days, and default for ID and access tokens are hours.
public UpdateUserPoolClientRequest withTokenValidityUnits(TokenValidityUnitsType tokenValidityUnits)
The units in which the validity times are represented in. Default for RefreshToken is days, and default for ID and access tokens are hours.
tokenValidityUnits
- The units in which the validity times are represented in. Default for RefreshToken is days, and default
for ID and access tokens are hours.public List<String> getReadAttributes()
The read-only attributes of the user pool.
public void setReadAttributes(Collection<String> readAttributes)
The read-only attributes of the user pool.
readAttributes
- The read-only attributes of the user pool.public UpdateUserPoolClientRequest withReadAttributes(String... readAttributes)
The read-only attributes of the user pool.
NOTE: This method appends the values to the existing list (if any). Use
setReadAttributes(java.util.Collection)
or withReadAttributes(java.util.Collection)
if you want
to override the existing values.
readAttributes
- The read-only attributes of the user pool.public UpdateUserPoolClientRequest withReadAttributes(Collection<String> readAttributes)
The read-only attributes of the user pool.
readAttributes
- The read-only attributes of the user pool.public List<String> getWriteAttributes()
The writeable attributes of the user pool.
public void setWriteAttributes(Collection<String> writeAttributes)
The writeable attributes of the user pool.
writeAttributes
- The writeable attributes of the user pool.public UpdateUserPoolClientRequest withWriteAttributes(String... writeAttributes)
The writeable attributes of the user pool.
NOTE: This method appends the values to the existing list (if any). Use
setWriteAttributes(java.util.Collection)
or withWriteAttributes(java.util.Collection)
if you
want to override the existing values.
writeAttributes
- The writeable attributes of the user pool.public UpdateUserPoolClientRequest withWriteAttributes(Collection<String> writeAttributes)
The writeable attributes of the user pool.
writeAttributes
- The writeable attributes of the user pool.public List<String> getExplicitAuthFlows()
The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note that values with
ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting. With
this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote
Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito receives
the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note
that values with ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting.
With this authentication flow, Cognito receives the password in the request instead of using the SRP
(Secure Remote Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito
receives the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
ExplicitAuthFlowsType
public void setExplicitAuthFlows(Collection<String> explicitAuthFlows)
The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note that values with
ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting. With
this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote
Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito receives
the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
explicitAuthFlows
- The authentication flows that are supported by the user pool clients. Flow names without the
ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note
that values with ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting.
With this authentication flow, Cognito receives the password in the request instead of using the SRP
(Secure Remote Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito
receives the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
ExplicitAuthFlowsType
public UpdateUserPoolClientRequest withExplicitAuthFlows(String... explicitAuthFlows)
The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note that values with
ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting. With
this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote
Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito receives
the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
NOTE: This method appends the values to the existing list (if any). Use
setExplicitAuthFlows(java.util.Collection)
or withExplicitAuthFlows(java.util.Collection)
if
you want to override the existing values.
explicitAuthFlows
- The authentication flows that are supported by the user pool clients. Flow names without the
ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note
that values with ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting.
With this authentication flow, Cognito receives the password in the request instead of using the SRP
(Secure Remote Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito
receives the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
ExplicitAuthFlowsType
public UpdateUserPoolClientRequest withExplicitAuthFlows(Collection<String> explicitAuthFlows)
The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note that values with
ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting. With
this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote
Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito receives
the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
explicitAuthFlows
- The authentication flows that are supported by the user pool clients. Flow names without the
ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note
that values with ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting.
With this authentication flow, Cognito receives the password in the request instead of using the SRP
(Secure Remote Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito
receives the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
ExplicitAuthFlowsType
public UpdateUserPoolClientRequest withExplicitAuthFlows(ExplicitAuthFlowsType... explicitAuthFlows)
The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note that values with
ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting. With
this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote
Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito receives
the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
explicitAuthFlows
- The authentication flows that are supported by the user pool clients. Flow names without the
ALLOW_
prefix are deprecated in favor of new names with the ALLOW_
prefix. Note
that values with ALLOW_
prefix cannot be used along with values without ALLOW_
prefix.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user password authentication flow
ADMIN_USER_PASSWORD_AUTH
. This setting replaces the ADMIN_NO_SRP_AUTH
setting.
With this authentication flow, Cognito receives the password in the request instead of using the SRP
(Secure Remote Password protocol) protocol to verify passwords.
ALLOW_CUSTOM_AUTH
: Enable Lambda trigger based authentication.
ALLOW_USER_PASSWORD_AUTH
: Enable user password-based authentication. In this flow, Cognito
receives the password in the request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh tokens.
ExplicitAuthFlowsType
public List<String> getSupportedIdentityProviders()
A list of provider names for the identity providers that are supported on this client.
public void setSupportedIdentityProviders(Collection<String> supportedIdentityProviders)
A list of provider names for the identity providers that are supported on this client.
supportedIdentityProviders
- A list of provider names for the identity providers that are supported on this client.public UpdateUserPoolClientRequest withSupportedIdentityProviders(String... supportedIdentityProviders)
A list of provider names for the identity providers that are supported on this client.
NOTE: This method appends the values to the existing list (if any). Use
setSupportedIdentityProviders(java.util.Collection)
or
withSupportedIdentityProviders(java.util.Collection)
if you want to override the existing values.
supportedIdentityProviders
- A list of provider names for the identity providers that are supported on this client.public UpdateUserPoolClientRequest withSupportedIdentityProviders(Collection<String> supportedIdentityProviders)
A list of provider names for the identity providers that are supported on this client.
supportedIdentityProviders
- A list of provider names for the identity providers that are supported on this client.public List<String> getCallbackURLs()
A list of allowed redirect (callback) URLs for the identity providers.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
public void setCallbackURLs(Collection<String> callbackURLs)
A list of allowed redirect (callback) URLs for the identity providers.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
callbackURLs
- A list of allowed redirect (callback) URLs for the identity providers.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
public UpdateUserPoolClientRequest withCallbackURLs(String... callbackURLs)
A list of allowed redirect (callback) URLs for the identity providers.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
NOTE: This method appends the values to the existing list (if any). Use
setCallbackURLs(java.util.Collection)
or withCallbackURLs(java.util.Collection)
if you want to
override the existing values.
callbackURLs
- A list of allowed redirect (callback) URLs for the identity providers.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
public UpdateUserPoolClientRequest withCallbackURLs(Collection<String> callbackURLs)
A list of allowed redirect (callback) URLs for the identity providers.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
callbackURLs
- A list of allowed redirect (callback) URLs for the identity providers.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
public List<String> getLogoutURLs()
A list of allowed logout URLs for the identity providers.
public void setLogoutURLs(Collection<String> logoutURLs)
A list of allowed logout URLs for the identity providers.
logoutURLs
- A list of allowed logout URLs for the identity providers.public UpdateUserPoolClientRequest withLogoutURLs(String... logoutURLs)
A list of allowed logout URLs for the identity providers.
NOTE: This method appends the values to the existing list (if any). Use
setLogoutURLs(java.util.Collection)
or withLogoutURLs(java.util.Collection)
if you want to
override the existing values.
logoutURLs
- A list of allowed logout URLs for the identity providers.public UpdateUserPoolClientRequest withLogoutURLs(Collection<String> logoutURLs)
A list of allowed logout URLs for the identity providers.
logoutURLs
- A list of allowed logout URLs for the identity providers.public void setDefaultRedirectURI(String defaultRedirectURI)
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
defaultRedirectURI
- The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
public String getDefaultRedirectURI()
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
public UpdateUserPoolClientRequest withDefaultRedirectURI(String defaultRedirectURI)
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
defaultRedirectURI
- The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a fragment component.
See OAuth 2.0 - Redirection Endpoint.
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
App callback URLs such as myapp://example are also supported.
public List<String> getAllowedOAuthFlows()
The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the response.
This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID token,
based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and, optionally,
ID token, based on scopes) from the token endpoint using a combination of client and client_secret.
Set to code
to initiate a code grant flow, which provides an authorization code as the
response. This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID
token, based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and,
optionally, ID token, based on scopes) from the token endpoint using a combination of client and
client_secret.
OAuthFlowType
public void setAllowedOAuthFlows(Collection<String> allowedOAuthFlows)
The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the response.
This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID token,
based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and, optionally,
ID token, based on scopes) from the token endpoint using a combination of client and client_secret.
allowedOAuthFlows
- The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the
response. This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID
token, based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and,
optionally, ID token, based on scopes) from the token endpoint using a combination of client and
client_secret.
OAuthFlowType
public UpdateUserPoolClientRequest withAllowedOAuthFlows(String... allowedOAuthFlows)
The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the response.
This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID token,
based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and, optionally,
ID token, based on scopes) from the token endpoint using a combination of client and client_secret.
NOTE: This method appends the values to the existing list (if any). Use
setAllowedOAuthFlows(java.util.Collection)
or withAllowedOAuthFlows(java.util.Collection)
if
you want to override the existing values.
allowedOAuthFlows
- The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the
response. This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID
token, based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and,
optionally, ID token, based on scopes) from the token endpoint using a combination of client and
client_secret.
OAuthFlowType
public UpdateUserPoolClientRequest withAllowedOAuthFlows(Collection<String> allowedOAuthFlows)
The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the response.
This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID token,
based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and, optionally,
ID token, based on scopes) from the token endpoint using a combination of client and client_secret.
allowedOAuthFlows
- The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the
response. This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID
token, based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and,
optionally, ID token, based on scopes) from the token endpoint using a combination of client and
client_secret.
OAuthFlowType
public UpdateUserPoolClientRequest withAllowedOAuthFlows(OAuthFlowType... allowedOAuthFlows)
The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the response.
This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID token,
based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and, optionally,
ID token, based on scopes) from the token endpoint using a combination of client and client_secret.
allowedOAuthFlows
- The allowed OAuth flows.
Set to code
to initiate a code grant flow, which provides an authorization code as the
response. This code can be exchanged for access tokens with the token endpoint.
Set to implicit
to specify that the client should get the access token (and, optionally, ID
token, based on scopes) directly.
Set to client_credentials
to specify that the client should get the access token (and,
optionally, ID token, based on scopes) from the token endpoint using a combination of client and
client_secret.
OAuthFlowType
public List<String> getAllowedOAuthScopes()
The allowed OAuth scopes. Possible values provided by OAuth are: phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.
phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.public void setAllowedOAuthScopes(Collection<String> allowedOAuthScopes)
The allowed OAuth scopes. Possible values provided by OAuth are: phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.
allowedOAuthScopes
- The allowed OAuth scopes. Possible values provided by OAuth are: phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.public UpdateUserPoolClientRequest withAllowedOAuthScopes(String... allowedOAuthScopes)
The allowed OAuth scopes. Possible values provided by OAuth are: phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.
NOTE: This method appends the values to the existing list (if any). Use
setAllowedOAuthScopes(java.util.Collection)
or withAllowedOAuthScopes(java.util.Collection)
if
you want to override the existing values.
allowedOAuthScopes
- The allowed OAuth scopes. Possible values provided by OAuth are: phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.public UpdateUserPoolClientRequest withAllowedOAuthScopes(Collection<String> allowedOAuthScopes)
The allowed OAuth scopes. Possible values provided by OAuth are: phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.
allowedOAuthScopes
- The allowed OAuth scopes. Possible values provided by OAuth are: phone
, email
,
openid
, and profile
. Possible values provided by AWS are:
aws.cognito.signin.user.admin
. Custom scopes created in Resource Servers are also supported.public void setAllowedOAuthFlowsUserPoolClient(Boolean allowedOAuthFlowsUserPoolClient)
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
allowedOAuthFlowsUserPoolClient
- Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user
pools.public Boolean getAllowedOAuthFlowsUserPoolClient()
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
public UpdateUserPoolClientRequest withAllowedOAuthFlowsUserPoolClient(Boolean allowedOAuthFlowsUserPoolClient)
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
allowedOAuthFlowsUserPoolClient
- Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user
pools.public Boolean isAllowedOAuthFlowsUserPoolClient()
Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
public void setAnalyticsConfiguration(AnalyticsConfigurationType analyticsConfiguration)
The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to Amazon Pinpoint projects within that same region.
analyticsConfiguration
- The Amazon Pinpoint analytics configuration for collecting metrics for this user pool. In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to Amazon Pinpoint projects within that same region.
public AnalyticsConfigurationType getAnalyticsConfiguration()
The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to Amazon Pinpoint projects within that same region.
In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to Amazon Pinpoint projects within that same region.
public UpdateUserPoolClientRequest withAnalyticsConfiguration(AnalyticsConfigurationType analyticsConfiguration)
The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to Amazon Pinpoint projects within that same region.
analyticsConfiguration
- The Amazon Pinpoint analytics configuration for collecting metrics for this user pool. In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to Amazon Pinpoint projects within that same region.
public void setPreventUserExistenceErrors(String preventUserExistenceErrors)
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLED
and the user does not exist, authentication returns an error indicating either the username
or password was incorrect, and account confirmation and password recovery return a response indicating a code was
sent to a simulated destination. When set to LEGACY
, those APIs will return a
UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are not
prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
preventUserExistenceErrors
- Use this setting to choose which errors and responses are returned by Cognito APIs during authentication,
account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLED
and the user does not exist, authentication returns an error indicating either the
username or password was incorrect, and account confirmation and password recovery return a response
indicating a code was sent to a simulated destination. When set to LEGACY
, those APIs will
return a UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are
not prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
PreventUserExistenceErrorTypes
public String getPreventUserExistenceErrors()
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLED
and the user does not exist, authentication returns an error indicating either the username
or password was incorrect, and account confirmation and password recovery return a response indicating a code was
sent to a simulated destination. When set to LEGACY
, those APIs will return a
UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are not
prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
ENABLED
and the user does not exist, authentication returns an error indicating either the
username or password was incorrect, and account confirmation and password recovery return a response
indicating a code was sent to a simulated destination. When set to LEGACY
, those APIs will
return a UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are
not prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
PreventUserExistenceErrorTypes
public UpdateUserPoolClientRequest withPreventUserExistenceErrors(String preventUserExistenceErrors)
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLED
and the user does not exist, authentication returns an error indicating either the username
or password was incorrect, and account confirmation and password recovery return a response indicating a code was
sent to a simulated destination. When set to LEGACY
, those APIs will return a
UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are not
prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
preventUserExistenceErrors
- Use this setting to choose which errors and responses are returned by Cognito APIs during authentication,
account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLED
and the user does not exist, authentication returns an error indicating either the
username or password was incorrect, and account confirmation and password recovery return a response
indicating a code was sent to a simulated destination. When set to LEGACY
, those APIs will
return a UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are
not prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
PreventUserExistenceErrorTypes
public UpdateUserPoolClientRequest withPreventUserExistenceErrors(PreventUserExistenceErrorTypes preventUserExistenceErrors)
Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account
confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLED
and the user does not exist, authentication returns an error indicating either the username
or password was incorrect, and account confirmation and password recovery return a response indicating a code was
sent to a simulated destination. When set to LEGACY
, those APIs will return a
UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are not
prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
preventUserExistenceErrors
- Use this setting to choose which errors and responses are returned by Cognito APIs during authentication,
account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLED
and the user does not exist, authentication returns an error indicating either the
username or password was incorrect, and account confirmation and password recovery return a response
indicating a code was sent to a simulated destination. When set to LEGACY
, those APIs will
return a UserNotFoundException
exception if the user does not exist in the user pool.
Valid values include:
ENABLED
- This prevents user existence-related errors.
LEGACY
- This represents the old behavior of Cognito where user existence related errors are
not prevented.
After February 15th 2020, the value of PreventUserExistenceErrors
will default to
ENABLED
for newly created user pool clients if no value is provided.
PreventUserExistenceErrorTypes
public String toString()
toString
in class Object
Object.toString()
public UpdateUserPoolClientRequest clone()
clone
in class AmazonWebServiceRequest
Copyright © 2021. All rights reserved.