String assumedRoleId
 Constraints:
 Length: 2 - 96
 Pattern: [\w+=,.@:-]*
String arn
 Constraints:
 Length: 20 - 2048
String roleArn
 Constraints:
 Length: 20 - 2048
String roleSessionName
AssumedRoleUser.
 
 Constraints:
 Length: 2 - 32
 Pattern: [\w+=,.@-]*
String policy
The policy parameter is optional. If you pass a policy, the temporary security credentials that are returned by the operation have the permissions that are allowed by both the access policy of the role that is being assumed, and the policy that you pass. This gives you a way to further restrict the permissions for the resulting temporary security credentials. You cannot use the passed policy to grant permissions that are in excess of those allowed by the access policy of the role that is being assumed. For more information, see Permissions for AssumeRole in Using Temporary Security Credentials.
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
 Constraints:
 Range: 900 - 3600
String externalId
 Constraints:
 Length: 2 - 96
 Pattern: [\w+=,.@:-]*
String serialNumber
AssumeRole call. Specify this
 value if the trust policy of the role being assumed includes a
 condition that requires MFA authentication. The value is either the
 serial number for a hardware device (such as
 GAHT12345678) or an Amazon Resource Name (ARN) for a
 virtual device (such as
 arn:aws:iam::123456789012:mfa/user).
 
 Constraints:
 Length: 9 - 256
 Pattern: [\w+=/:,.@-]*
String tokenCode
TokenCode value is missing or expired, the
 AssumeRole call returns an "access denied" error.
 
 Constraints:
 Length: 6 - 6
 Pattern: [\d]*
Credentials credentials
AssumedRoleUser assumedRoleUser
RoleSessionName that
 you specified when you called AssumeRole.Integer packedPolicySize
 Constraints:
 Range: 0 - 
String roleArn
 Constraints:
 Length: 20 - 2048
String principalArn
 Constraints:
 Length: 20 - 2048
String sAMLAssertion
For more information, see Configuring a Relying Party and Adding Claims in the Using IAM guide.
 Constraints:
 Length: 4 - 50000
String policy
The policy parameter is optional. If
 you pass a policy, the temporary security credentials that are
 returned by the operation have the permissions that are allowed by
 both the access policy of the role that is being assumed,
 and the policy that you pass. This gives you a way to
 further restrict the permissions for the resulting temporary security
 credentials. You cannot use the passed policy to grant permissions
 that are in excess of those allowed by the access policy of the role
 that is being assumed. For more information, see Permissions
 for AssumeRoleWithSAML in Using Temporary Security
 Credentials. 
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
NotOnOrAfter value.
 The actual expiration time is whichever value is shorter. 
 Constraints:
 Range: 900 - 129600
Credentials credentials
AssumedRoleUser assumedRoleUser
Integer packedPolicySize
 Constraints:
 Range: 0 - 
String subject
String subjectType
String issuer
String audience
String nameQualifier
String roleArn
 Constraints:
 Length: 20 - 2048
String roleSessionName
AssumedRoleUser response element.
 
 Constraints:
 Length: 2 - 32
 Pattern: [\w+=,.@-]*
String webIdentityToken
AssumeRoleWithWebIdentity call.
 
 Constraints:
 Length: 4 - 2048
String providerId
accounts.google.com. Do not include URL schemes and port
 numbers. Currently, www.amazon.com and
 graph.facebook.com are supported.
 
 Constraints:
 Length: 4 - 2048
String policy
The policy parameter is optional. If you pass a policy, the temporary security credentials that are returned by the operation have the permissions that are allowed by both the access policy of the role that is being assumed, and the policy that you pass. This gives you a way to further restrict the permissions for the resulting temporary security credentials. You cannot use the passed policy to grant permissions that are in excess of those allowed by the access policy of the role that is being assumed. For more information, see Permissions for AssumeRoleWithWebIdentity in Using Temporary Security Credentials.
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
 Constraints:
 Range: 900 - 129600
Credentials credentials
String subjectFromWebIdentityToken
WebIdentityToken
 that was submitted with the AssumeRoleWithWebIdentity
 call. The identifier is typically unique to the user and the
 application that acquired the WebIdentityToken (pairwise
 identifier). If an OpenID Connect ID token was submitted in the
 WebIdentityToken, this value is returned by the identity
 provider as the token's sub (Subject) claim.
 
 Constraints:
 Length: 6 - 255
AssumedRoleUser assumedRoleUser
RoleSessionName that
 you specified when you called AssumeRole.Integer packedPolicySize
 Constraints:
 Range: 0 - 
String provider
iss
 field. For OAuth 2.0 Access Tokens, this contains the value of the
 ProviderId parameter that was passed in the
 AssumeRoleWithWebIdentity request.String audience
String accessKeyId
 Constraints:
 Length: 16 - 32
 Pattern: [\w]*
String secretAccessKey
String sessionToken
Date expiration
String encodedMessage
 Constraints:
 Length: 1 - 10240
String decodedMessage
DecodeAuthorizationMessage.String federatedUserId
 Constraints:
 Length: 2 - 96
 Pattern: [\w+=,.@\:-]*
String arn
 Constraints:
 Length: 20 - 2048
String name
Bob). For
 example, you can reference the federated user name in a resource-based
 policy, such as in an Amazon S3 bucket policy.
 
 Constraints:
 Length: 2 - 32
 Pattern: [\w+=,.@-]*
String policy
GetFederationToken call and evaluated along with the
 policy or policies that are attached to the IAM user whose credentials
 are used to call GetFederationToken. The passed policy is
 used to scope down the permissions that are available to the IAM user,
 by allowing only a subset of the permissions that are granted to the
 IAM user. The passed policy cannot grant more permissions than those
 granted to the IAM user. The final permissions for the federated user
 are the most restrictive set based on the intersection of the passed
 policy and the IAM user policy. If you do not pass a policy, the resulting temporary security credentials have no effective permissions. The only exception is when the temporary security credentials are used to access a resource that has a resource-based policy that specifically allows the federated user to access the resource.
For more information about how permissions work, see Permissions for GetFederationToken in Using Temporary Security Credentials.
 Constraints:
 Length: 1 - 2048
 Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
Integer durationSeconds
 Constraints:
 Range: 900 - 129600
Credentials credentials
FederatedUser federatedUser
arn:aws:sts::123456789012:federated-user/Bob or
 123456789012:Bob). You can use the federated user's ARN
 in your resource-based policies, such as an Amazon S3 bucket policy.Integer packedPolicySize
 Constraints:
 Range: 0 - 
Integer durationSeconds
 Constraints:
 Range: 900 - 129600
String serialNumber
GetSessionToken call.
 Specify this value if the IAM user has a policy that requires MFA
 authentication. The value is either the serial number for a hardware
 device (such as GAHT12345678) or an Amazon Resource Name
 (ARN) for a virtual device (such as
 arn:aws:iam::123456789012:mfa/user). You can find the
 device for an IAM user by going to the AWS Management Console and
 viewing the user's security credentials.
 
 Constraints:
 Length: 9 - 256
 Pattern: [\w+=/:,.@-]*
String tokenCode
 Constraints:
 Length: 6 - 6
 Pattern: [\d]*
Credentials credentials
Copyright © 2015. All rights reserved.