String assumedRoleId
 Constraints:
 Length: 2 - 96
 Pattern: [\w+=,.@:-]*
String arn
 Constraints:
 Length: 20 - 2048
String roleArn
 Constraints:
 Length: 20 - 2048
String roleSessionName
Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
 Constraints:
 Length: 2 - 32
 Pattern: [\w+=,.@-]*
String policy
This parameter is optional. If you
 pass a policy, the temporary security credentials that are returned by
 the operation have the permissions that are allowed by both (the
 intersection of) the access policy of the role that is being assumed,
 and the policy that you pass. This gives you a way to further
 restrict the permissions for the resulting temporary security
 credentials. You cannot use the passed policy to grant permissions
 that are in excess of those allowed by the access policy of the role
 that is being assumed. For more information, see Permissions
 for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
 in Using Temporary Security Credentials. 
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
 Constraints:
 Range: 900 - 3600
String externalId
 Constraints:
 Length: 2 - 96
 Pattern: [\w+=,.@:-]*
String serialNumber
AssumeRole call. Specify this
 value if the trust policy of the role being assumed includes a
 condition that requires MFA authentication. The value is either the
 serial number for a hardware device (such as
 GAHT12345678) or an Amazon Resource Name (ARN) for a
 virtual device (such as
 arn:aws:iam::123456789012:mfa/user).
 
 Constraints:
 Length: 9 - 256
 Pattern: [\w+=/:,.@-]*
String tokenCode
TokenCode value is missing or expired, the
 AssumeRole call returns an "access denied" error.
 
 Constraints:
 Length: 6 - 6
 Pattern: [\d]*
Credentials credentials
AssumedRoleUser assumedRoleUser
RoleSessionName that
 you specified when you called AssumeRole.Integer packedPolicySize
 Constraints:
 Range: 0 - 
String roleArn
 Constraints:
 Length: 20 - 2048
String principalArn
 Constraints:
 Length: 20 - 2048
String sAMLAssertion
For more information, see Configuring a Relying Party and Adding Claims in the Using IAM guide.
 Constraints:
 Length: 4 - 50000
String policy
The policy parameter is optional. If
 you pass a policy, the temporary security credentials that are
 returned by the operation have the permissions that are allowed by
 both the access policy of the role that is being assumed,
 and the policy that you pass. This gives you a way to
 further restrict the permissions for the resulting temporary security
 credentials. You cannot use the passed policy to grant permissions
 that are in excess of those allowed by the access policy of the role
 that is being assumed. For more information, see Permissions
 for AssumeRoleWithSAML in Using Temporary Security
 Credentials. 
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
SessionNotOnOrAfter
 value. The actual expiration time is whichever value is shorter.
 
 Constraints:
 Range: 900 - 129600
Credentials credentials
AssumedRoleUser assumedRoleUser
Integer packedPolicySize
 Constraints:
 Range: 0 - 
String subject
NameID element in the
 Subject element of the SAML assertion.String subjectType
Format
 attribute in the NameID element of the SAML assertion.
 Typical examples of the format are transient or
 persistent.  If the format includes the prefix
 urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is
 removed. For example,
 urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
 returned as transient. If the format includes any other
 prefix, the format is returned with no modifications.
String issuer
Issuer element of the SAML assertion.String audience
Recipient attribute of the
 SubjectConfirmationData element of the SAML assertion.String nameQualifier
Issuer
 response value, the AWS account ID, and the friendly name (the last
 part of the ARN) of the SAML provider in IAM. The combination of
 NameQualifier and Subject can be used to
 uniquely identify a federated user. The following pseudocode shows how the hash value is calculated:
 BASE64 ( SHA1 (
 "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )
String roleArn
 Constraints:
 Length: 20 - 2048
String roleSessionName
AssumedRoleUser response element.
 
 Constraints:
 Length: 2 - 32
 Pattern: [\w+=,.@-]*
String webIdentityToken
AssumeRoleWithWebIdentity call.
 
 Constraints:
 Length: 4 - 2048
String providerId
Specify this value only for OAuth 2.0 access tokens.
 Currently www.amazon.com and
 graph.facebook.com are the only supported identity
 providers for OAuth 2.0 access tokens. Do not include URL schemes and
 port numbers. 
Do not specify this value for OpenID Connect ID tokens.
 Constraints:
 Length: 4 - 2048
String policy
The policy parameter is optional. If
 you pass a policy, the temporary security credentials that are
 returned by the operation have the permissions that are allowed by
 both the access policy of the role that is being assumed,
 and the policy that you pass. This gives you a way to
 further restrict the permissions for the resulting temporary security
 credentials. You cannot use the passed policy to grant permissions
 that are in excess of those allowed by the access policy of the role
 that is being assumed. For more information, see Permissions
 for AssumeRoleWithWebIdentity. 
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
 Constraints:
 Range: 900 - 129600
Credentials credentials
String subjectFromWebIdentityToken
WebIdentityToken
 that was submitted with the AssumeRoleWithWebIdentity
 call. The identifier is typically unique to the user and the
 application that acquired the WebIdentityToken (pairwise
 identifier). For OpenID Connect ID tokens, this field contains the
 value returned by the identity provider as the token's
 sub (Subject) claim.
 
 Constraints:
 Length: 6 - 255
AssumedRoleUser assumedRoleUser
RoleSessionName that
 you specified when you called AssumeRole.Integer packedPolicySize
 Constraints:
 Range: 0 - 
String provider
iss
 field. For OAuth 2.0 access tokens, this contains the value of the
 ProviderId parameter that was passed in the
 AssumeRoleWithWebIdentity request.String audience
String accessKeyId
 Constraints:
 Length: 16 - 32
 Pattern: [\w]*
String secretAccessKey
String sessionToken
Date expiration
String encodedMessage
 Constraints:
 Length: 1 - 10240
String decodedMessage
DecodeAuthorizationMessage.String federatedUserId
 Constraints:
 Length: 2 - 96
 Pattern: [\w+=,.@\:-]*
String arn
 Constraints:
 Length: 20 - 2048
String name
Bob). For
 example, you can reference the federated user name in a resource-based
 policy, such as in an Amazon S3 bucket policy.
 
 Constraints:
 Length: 2 - 32
 Pattern: [\w+=,.@-]*
String policy
GetFederationToken call and evaluated along with the
 policy or policies that are attached to the IAM user whose credentials
 are used to call GetFederationToken. The passed policy is
 used to scope down the permissions that are available to the IAM user,
 by allowing only a subset of the permissions that are granted to the
 IAM user. The passed policy cannot grant more permissions than those
 granted to the IAM user. The final permissions for the federated user
 are the most restrictive set based on the intersection of the passed
 policy and the IAM user policy. If you do not pass a policy, the
 resulting temporary security credentials have no effective
 permissions. The only exception is when the temporary security
 credentials are used to access a resource that has a resource-based
 policy that specifically allows the federated user to access the
 resource. 
For more information about how permissions work, see Permissions for GetFederationToken.
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
 Constraints:
 Range: 900 - 129600
Credentials credentials
FederatedUser federatedUser
arn:aws:sts::123456789012:federated-user/Bob or
 123456789012:Bob). You can use the federated user's ARN
 in your resource-based policies, such as an Amazon S3 bucket policy.Integer packedPolicySize
 Constraints:
 Range: 0 - 
Integer durationSeconds
 Constraints:
 Range: 900 - 129600
String serialNumber
GetSessionToken call.
 Specify this value if the IAM user has a policy that requires MFA
 authentication. The value is either the serial number for a hardware
 device (such as GAHT12345678) or an Amazon Resource Name
 (ARN) for a virtual device (such as
 arn:aws:iam::123456789012:mfa/user). You can find the
 device for an IAM user by going to the AWS Management Console and
 viewing the user's security credentials.
 
 Constraints:
 Length: 9 - 256
 Pattern: [\w+=/:,.@-]*
String tokenCode
 Constraints:
 Length: 6 - 6
 Pattern: [\d]*
Credentials credentials
Copyright © 2015. All rights reserved.