Class: Aws::CognitoIdentityProvider::Client
- Inherits:
-
Seahorse::Client::Base
- Object
- Seahorse::Client::Base
- Aws::CognitoIdentityProvider::Client
- Includes:
- Aws::ClientStubs
- Defined in:
- lib/aws-sdk-cognitoidentityprovider/client.rb
Overview
An API client for CognitoIdentityProvider. To construct a client, you need to configure a ‘:region` and `:credentials`.
client = Aws::CognitoIdentityProvider::Client.new(
region: region_name,
credentials: credentials,
# ...
)
For details on configuring region and credentials see the [developer guide](/sdk-for-ruby/v3/developer-guide/setup-config.html).
See #initialize for a full list of supported configuration options.
Class Attribute Summary collapse
- .identifier ⇒ Object readonly private
API Operations collapse
-
#add_custom_attributes(params = {}) ⇒ Struct
Adds additional user attributes to the user pool schema.
-
#admin_add_user_to_group(params = {}) ⇒ Struct
Adds a user to a group.
-
#admin_confirm_sign_up(params = {}) ⇒ Struct
Confirms user sign-up as an administrator.
-
#admin_create_user(params = {}) ⇒ Types::AdminCreateUserResponse
Creates a new user in the specified user pool.
-
#admin_delete_user(params = {}) ⇒ Struct
Deletes a user profile in your user pool.
-
#admin_delete_user_attributes(params = {}) ⇒ Struct
Deletes attribute values from a user.
-
#admin_disable_provider_for_user(params = {}) ⇒ Struct
Prevents the user from signing in with the specified external (SAML or social) identity provider (IdP).
-
#admin_disable_user(params = {}) ⇒ Struct
Deactivates a user profile and revokes all access tokens for the user.
-
#admin_enable_user(params = {}) ⇒ Struct
Activates sign-in for a user profile that previously had sign-in access disabled.
-
#admin_forget_device(params = {}) ⇒ Struct
Forgets, or deletes, a remembered device from a user’s profile.
-
#admin_get_device(params = {}) ⇒ Types::AdminGetDeviceResponse
Given the device key, returns details for a user’s device.
-
#admin_get_user(params = {}) ⇒ Types::AdminGetUserResponse
Given a username, returns details about a user profile in a user pool.
-
#admin_initiate_auth(params = {}) ⇒ Types::AdminInitiateAuthResponse
Starts sign-in for applications with a server-side component, for example a traditional web application.
-
#admin_link_provider_for_user(params = {}) ⇒ Struct
Links an existing user account in a user pool, or ‘DestinationUser`, to an identity from an external IdP, or `SourceUser`, based on a specified attribute name and value from the external IdP.
-
#admin_list_devices(params = {}) ⇒ Types::AdminListDevicesResponse
Lists a user’s registered devices.
-
#admin_list_groups_for_user(params = {}) ⇒ Types::AdminListGroupsForUserResponse
Lists the groups that a user belongs to.
-
#admin_list_user_auth_events(params = {}) ⇒ Types::AdminListUserAuthEventsResponse
Requests a history of user activity and any risks detected as part of Amazon Cognito threat protection.
-
#admin_remove_user_from_group(params = {}) ⇒ Struct
Given a username and a group name, removes them from the group.
-
#admin_reset_user_password(params = {}) ⇒ Struct
Resets the specified user’s password in a user pool.
-
#admin_respond_to_auth_challenge(params = {}) ⇒ Types::AdminRespondToAuthChallengeResponse
Some API operations in a user pool generate a challenge, like a prompt for an MFA code, for device authentication that bypasses MFA, or for a custom authentication challenge.
-
#admin_set_user_mfa_preference(params = {}) ⇒ Struct
Sets the user’s multi-factor authentication (MFA) preference, including which MFA options are activated, and if any are preferred.
-
#admin_set_user_password(params = {}) ⇒ Struct
Sets the specified user’s password in a user pool.
-
#admin_set_user_settings(params = {}) ⇒ Struct
*This action is no longer supported.* You can use it to configure only SMS MFA.
-
#admin_update_auth_event_feedback(params = {}) ⇒ Struct
Provides the feedback for an authentication event generated by threat protection features.
-
#admin_update_device_status(params = {}) ⇒ Struct
Updates the status of a user’s device so that it is marked as remembered or not remembered for the purpose of device authentication.
-
#admin_update_user_attributes(params = {}) ⇒ Struct
Updates the specified user’s attributes.
-
#admin_user_global_sign_out(params = {}) ⇒ Struct
Invalidates the identity, access, and refresh tokens that Amazon Cognito issued to a user.
-
#associate_software_token(params = {}) ⇒ Types::AssociateSoftwareTokenResponse
Begins setup of time-based one-time password (TOTP) multi-factor authentication (MFA) for a user, with a unique private key that Amazon Cognito generates and returns in the API response.
-
#change_password(params = {}) ⇒ Struct
Changes the password for the currently signed-in user.
-
#complete_web_authn_registration(params = {}) ⇒ Struct
Completes registration of a passkey authenticator for the currently signed-in user.
-
#confirm_device(params = {}) ⇒ Types::ConfirmDeviceResponse
Confirms a device that a user wants to remember.
-
#confirm_forgot_password(params = {}) ⇒ Struct
This public API operation accepts a confirmation code that Amazon Cognito sent to a user and accepts a new password for that user.
-
#confirm_sign_up(params = {}) ⇒ Types::ConfirmSignUpResponse
Confirms the account of a new user.
-
#create_group(params = {}) ⇒ Types::CreateGroupResponse
Creates a new group in the specified user pool.
-
#create_identity_provider(params = {}) ⇒ Types::CreateIdentityProviderResponse
Adds a configuration and trust relationship between a third-party identity provider (IdP) and a user pool.
-
#create_managed_login_branding(params = {}) ⇒ Types::CreateManagedLoginBrandingResponse
Creates a new set of branding settings for a user pool style and associates it with an app client.
-
#create_resource_server(params = {}) ⇒ Types::CreateResourceServerResponse
Creates a new OAuth2.0 resource server and defines custom scopes within it.
-
#create_user_import_job(params = {}) ⇒ Types::CreateUserImportJobResponse
Creates a user import job.
-
#create_user_pool(params = {}) ⇒ Types::CreateUserPoolResponse
Creates a new Amazon Cognito user pool.
-
#create_user_pool_client(params = {}) ⇒ Types::CreateUserPoolClientResponse
Creates an app client in a user pool.
-
#create_user_pool_domain(params = {}) ⇒ Types::CreateUserPoolDomainResponse
A user pool domain hosts managed login, an authorization server and web server for authentication in your application.
-
#delete_group(params = {}) ⇒ Struct
Deletes a group from the specified user pool.
-
#delete_identity_provider(params = {}) ⇒ Struct
Deletes a user pool identity provider (IdP).
-
#delete_managed_login_branding(params = {}) ⇒ Struct
Deletes a managed login branding style.
-
#delete_resource_server(params = {}) ⇒ Struct
Deletes a resource server.
-
#delete_user(params = {}) ⇒ Struct
Deletes the profile of the currently signed-in user.
-
#delete_user_attributes(params = {}) ⇒ Struct
Deletes attributes from the currently signed-in user.
-
#delete_user_pool(params = {}) ⇒ Struct
Deletes a user pool.
-
#delete_user_pool_client(params = {}) ⇒ Struct
Deletes a user pool app client.
-
#delete_user_pool_domain(params = {}) ⇒ Struct
Given a user pool ID and domain identifier, deletes a user pool domain.
-
#delete_web_authn_credential(params = {}) ⇒ Struct
Deletes a registered passkey, or WebAuthn, authenticator for the currently signed-in user.
-
#describe_identity_provider(params = {}) ⇒ Types::DescribeIdentityProviderResponse
Given a user pool ID and identity provider (IdP) name, returns details about the IdP.
-
#describe_managed_login_branding(params = {}) ⇒ Types::DescribeManagedLoginBrandingResponse
Given the ID of a managed login branding style, returns detailed information about the style.
-
#describe_managed_login_branding_by_client(params = {}) ⇒ Types::DescribeManagedLoginBrandingByClientResponse
Given the ID of a user pool app client, returns detailed information about the style assigned to the app client.
-
#describe_resource_server(params = {}) ⇒ Types::DescribeResourceServerResponse
Describes a resource server.
-
#describe_risk_configuration(params = {}) ⇒ Types::DescribeRiskConfigurationResponse
Given an app client or user pool ID where threat protection is configured, describes the risk configuration.
-
#describe_user_import_job(params = {}) ⇒ Types::DescribeUserImportJobResponse
Describes a user import job.
-
#describe_user_pool(params = {}) ⇒ Types::DescribeUserPoolResponse
Given a user pool ID, returns configuration information.
-
#describe_user_pool_client(params = {}) ⇒ Types::DescribeUserPoolClientResponse
Given an app client ID, returns configuration information.
-
#describe_user_pool_domain(params = {}) ⇒ Types::DescribeUserPoolDomainResponse
Given a user pool domain name, returns information about the domain configuration.
-
#forget_device(params = {}) ⇒ Struct
Given a device key, deletes a remembered device as the currently signed-in user.
-
#forgot_password(params = {}) ⇒ Types::ForgotPasswordResponse
Sends a password-reset confirmation code for the currently signed-in user.
-
#get_csv_header(params = {}) ⇒ Types::GetCSVHeaderResponse
Given a user pool ID, generates a comma-separated value (CSV) list populated with available user attributes in the user pool.
-
#get_device(params = {}) ⇒ Types::GetDeviceResponse
Given a device key, returns information about a remembered device for the current user.
-
#get_group(params = {}) ⇒ Types::GetGroupResponse
Given a user pool ID and a group name, returns information about the user group.
-
#get_identity_provider_by_identifier(params = {}) ⇒ Types::GetIdentityProviderByIdentifierResponse
Given the identifier of an identity provider (IdP), for example ‘examplecorp`, returns information about the user pool configuration for that IdP.
-
#get_log_delivery_configuration(params = {}) ⇒ Types::GetLogDeliveryConfigurationResponse
Given a user pool ID, returns the logging configuration.
-
#get_signing_certificate(params = {}) ⇒ Types::GetSigningCertificateResponse
Given a user pool ID, returns the signing certificate for SAML 2.0 federation.
-
#get_ui_customization(params = {}) ⇒ Types::GetUICustomizationResponse
Given a user pool ID or app client, returns information about classic hosted UI branding that you applied, if any.
-
#get_user(params = {}) ⇒ Types::GetUserResponse
Gets user attributes and and MFA settings for the currently signed-in user.
-
#get_user_attribute_verification_code(params = {}) ⇒ Types::GetUserAttributeVerificationCodeResponse
Given an attribute name, sends a user attribute verification code for the specified attribute name to the currently signed-in user.
-
#get_user_auth_factors(params = {}) ⇒ Types::GetUserAuthFactorsResponse
Lists the authentication options for the currently signed-in user.
-
#get_user_pool_mfa_config(params = {}) ⇒ Types::GetUserPoolMfaConfigResponse
Given a user pool ID, returns configuration for sign-in with WebAuthn authenticators and for multi-factor authentication (MFA).
-
#global_sign_out(params = {}) ⇒ Struct
Invalidates the identity, access, and refresh tokens that Amazon Cognito issued to a user.
-
#initiate_auth(params = {}) ⇒ Types::InitiateAuthResponse
Declares an authentication flow and initiates sign-in for a user in the Amazon Cognito user directory.
-
#list_devices(params = {}) ⇒ Types::ListDevicesResponse
Lists the devices that Amazon Cognito has registered to the currently signed-in user.
-
#list_groups(params = {}) ⇒ Types::ListGroupsResponse
Given a user pool ID, returns user pool groups and their details.
-
#list_identity_providers(params = {}) ⇒ Types::ListIdentityProvidersResponse
Given a user pool ID, returns information about configured identity providers (IdPs).
-
#list_resource_servers(params = {}) ⇒ Types::ListResourceServersResponse
Given a user pool ID, returns all resource servers and their details.
-
#list_tags_for_resource(params = {}) ⇒ Types::ListTagsForResourceResponse
Lists the tags that are assigned to an Amazon Cognito user pool.
-
#list_user_import_jobs(params = {}) ⇒ Types::ListUserImportJobsResponse
Given a user pool ID, returns user import jobs and their details.
-
#list_user_pool_clients(params = {}) ⇒ Types::ListUserPoolClientsResponse
Given a user pool ID, lists app clients.
-
#list_user_pools(params = {}) ⇒ Types::ListUserPoolsResponse
Lists user pools and their details in the current Amazon Web Services account.
-
#list_users(params = {}) ⇒ Types::ListUsersResponse
Given a user pool ID, returns a list of users and their basic details in a user pool.
-
#list_users_in_group(params = {}) ⇒ Types::ListUsersInGroupResponse
Given a user pool ID and a group name, returns a list of users in the group.
-
#list_web_authn_credentials(params = {}) ⇒ Types::ListWebAuthnCredentialsResponse
Generates a list of the currently signed-in user’s registered passkey, or WebAuthn, credentials.
-
#resend_confirmation_code(params = {}) ⇒ Types::ResendConfirmationCodeResponse
Resends the code that confirms a new account for a user who has signed up in your user pool.
-
#respond_to_auth_challenge(params = {}) ⇒ Types::RespondToAuthChallengeResponse
Some API operations in a user pool generate a challenge, like a prompt for an MFA code, for device authentication that bypasses MFA, or for a custom authentication challenge.
-
#revoke_token(params = {}) ⇒ Struct
Revokes all of the access tokens generated by, and at the same time as, the specified refresh token.
-
#set_log_delivery_configuration(params = {}) ⇒ Types::SetLogDeliveryConfigurationResponse
Sets up or modifies the logging configuration of a user pool.
-
#set_risk_configuration(params = {}) ⇒ Types::SetRiskConfigurationResponse
Configures threat protection for a user pool or app client.
-
#set_ui_customization(params = {}) ⇒ Types::SetUICustomizationResponse
Configures UI branding settings for domains with the hosted UI (classic) branding version.
-
#set_user_mfa_preference(params = {}) ⇒ Struct
Set the user’s multi-factor authentication (MFA) method preference, including which MFA factors are activated and if any are preferred.
-
#set_user_pool_mfa_config(params = {}) ⇒ Types::SetUserPoolMfaConfigResponse
Sets user pool multi-factor authentication (MFA) and passkey configuration.
-
#set_user_settings(params = {}) ⇒ Struct
*This action is no longer supported.* You can use it to configure only SMS MFA.
-
#sign_up(params = {}) ⇒ Types::SignUpResponse
Registers a user with an app client and requests a user name, password, and user attributes in the user pool.
-
#start_user_import_job(params = {}) ⇒ Types::StartUserImportJobResponse
Instructs your user pool to start importing users from a CSV file that contains their usernames and attributes.
-
#start_web_authn_registration(params = {}) ⇒ Types::StartWebAuthnRegistrationResponse
Requests credential creation options from your user pool for the currently signed-in user.
-
#stop_user_import_job(params = {}) ⇒ Types::StopUserImportJobResponse
Instructs your user pool to stop a running job that’s importing users from a CSV file that contains their usernames and attributes.
-
#tag_resource(params = {}) ⇒ Struct
Assigns a set of tags to an Amazon Cognito user pool.
-
#untag_resource(params = {}) ⇒ Struct
Given tag IDs that you previously assigned to a user pool, removes them.
-
#update_auth_event_feedback(params = {}) ⇒ Struct
Provides the feedback for an authentication event generated by threat protection features.
-
#update_device_status(params = {}) ⇒ Struct
Updates the status of a the currently signed-in user’s device so that it is marked as remembered or not remembered for the purpose of device authentication.
-
#update_group(params = {}) ⇒ Types::UpdateGroupResponse
Given the name of a user pool group, updates any of the properties for precedence, IAM role, or description.
-
#update_identity_provider(params = {}) ⇒ Types::UpdateIdentityProviderResponse
Modifies the configuration and trust relationship between a third-party identity provider (IdP) and a user pool.
-
#update_managed_login_branding(params = {}) ⇒ Types::UpdateManagedLoginBrandingResponse
Configures the branding settings for a user pool style.
-
#update_resource_server(params = {}) ⇒ Types::UpdateResourceServerResponse
Updates the name and scopes of a resource server.
-
#update_user_attributes(params = {}) ⇒ Types::UpdateUserAttributesResponse
Updates the currently signed-in user’s attributes.
-
#update_user_pool(params = {}) ⇒ Struct
Updates the configuration of a user pool.
-
#update_user_pool_client(params = {}) ⇒ Types::UpdateUserPoolClientResponse
Given a user pool app client ID, updates the configuration.
-
#update_user_pool_domain(params = {}) ⇒ Types::UpdateUserPoolDomainResponse
A user pool domain hosts managed login, an authorization server and web server for authentication in your application.
-
#verify_software_token(params = {}) ⇒ Types::VerifySoftwareTokenResponse
Registers the current user’s time-based one-time password (TOTP) authenticator with a code generated in their authenticator app from a private key that’s supplied by your user pool.
-
#verify_user_attribute(params = {}) ⇒ Struct
Submits a verification code for a signed-in user who has added or changed a value of an auto-verified attribute.
Class Method Summary collapse
- .errors_module ⇒ Object private
Instance Method Summary collapse
- #build_request(operation_name, params = {}) ⇒ Object private
-
#initialize(options) ⇒ Client
constructor
A new instance of Client.
- #waiter_names ⇒ Object deprecated private Deprecated.
Constructor Details
#initialize(options) ⇒ Client
Returns a new instance of Client.
474 475 476 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 474 def initialize(*args) super end |
Class Attribute Details
.identifier ⇒ Object (readonly)
This method is part of a private API. You should avoid using this method if possible, as it may be removed or be changed in the future.
12898 12899 12900 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12898 def identifier @identifier end |
Class Method Details
.errors_module ⇒ Object
This method is part of a private API. You should avoid using this method if possible, as it may be removed or be changed in the future.
12901 12902 12903 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12901 def errors_module Errors end |
Instance Method Details
#add_custom_attributes(params = {}) ⇒ Struct
Adds additional user attributes to the user pool schema. Custom attributes can be mutable or immutable and have a ‘custom:` or `dev:` prefix. For more information, see [Custom attributes].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-attributes.html#user-pool-settings-custom-attributes [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
576 577 578 579 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 576 def add_custom_attributes(params = {}, = {}) req = build_request(:add_custom_attributes, params) req.send_request() end |
#admin_add_user_to_group(params = {}) ⇒ Struct
Adds a user to a group. A user who is in a group can present a preferred-role claim to an identity pool, and populates a ‘cognito:groups` claim to their access and identity tokens.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
631 632 633 634 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 631 def admin_add_user_to_group(params = {}, = {}) req = build_request(:admin_add_user_to_group, params) req.send_request() end |
#admin_confirm_sign_up(params = {}) ⇒ Struct
Confirms user sign-up as an administrator.
This request sets a user account active in a user pool that [requires confirmation of new user accounts] before they can sign in. You can configure your user pool to not send confirmation codes to new users and instead confirm them with this API operation on the back end.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
To configure your user pool to require administrative confirmation of users, set ‘AllowAdminCreateUserOnly` to `true` in a `CreateUserPool` or `UpdateUserPool` request.
[1]: docs.aws.amazon.com/cognito/latest/developerguide/signing-up-users-in-your-app.html#signing-up-users-in-your-app-and-confirming-them-as-admin [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
729 730 731 732 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 729 def admin_confirm_sign_up(params = {}, = {}) req = build_request(:admin_confirm_sign_up, params) req.send_request() end |
#admin_create_user(params = {}) ⇒ Types::AdminCreateUserResponse
Creates a new user in the specified user pool.
If ‘MessageAction` isn’t set, the default is to send a welcome message via email or phone (SMS).
This message is based on a template that you configured in your call to create or update a user pool. This template includes your custom sign-up instructions and placeholders for user name and temporary password.
Alternatively, you can call ‘AdminCreateUser` with `SUPPRESS` for the `MessageAction` parameter, and Amazon Cognito won’t send any email.
In either case, if the user has a password, they will be in the ‘FORCE_CHANGE_PASSWORD` state until they sign in and set their password. Your invitation message template must have the `####` password placeholder if your users have passwords. If your template doesn’t have this placeholder, Amazon Cognito doesn’t deliver the invitation message. In this case, you must update your message template and resend the password with a new ‘AdminCreateUser` request with a `MessageAction` value of `RESEND`.
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][3]
- Using the Amazon Cognito user pools API and user pool endpoints][4
</note>
[1]: console.aws.amazon.com/pinpoint/home/ [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html [3]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1067 1068 1069 1070 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1067 def admin_create_user(params = {}, = {}) req = build_request(:admin_create_user, params) req.send_request() end |
#admin_delete_user(params = {}) ⇒ Struct
Deletes a user profile in your user pool.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1115 1116 1117 1118 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1115 def admin_delete_user(params = {}, = {}) req = build_request(:admin_delete_user, params) req.send_request() end |
#admin_delete_user_attributes(params = {}) ⇒ Struct
Deletes attribute values from a user. This operation doesn’t affect tokens for existing user sessions. The next ID token that the user receives will no longer have the deleted attributes.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1173 1174 1175 1176 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1173 def admin_delete_user_attributes(params = {}, = {}) req = build_request(:admin_delete_user_attributes, params) req.send_request() end |
#admin_disable_provider_for_user(params = {}) ⇒ Struct
Prevents the user from signing in with the specified external (SAML or social) identity provider (IdP). If the user that you want to deactivate is a Amazon Cognito user pools native username + password user, they can’t use their password to sign in. If the user to deactivate is a linked external IdP user, any link between that user and an existing user is removed. When the external user signs in again, and the user is no longer attached to the previously linked ‘DestinationUser`, the user must create a new user account.
The value of ‘ProviderName` must match the name of a user pool IdP.
To deactivate a local user, set ‘ProviderName` to `Cognito` and the `ProviderAttributeName` to `Cognito_Subject`. The `ProviderAttributeValue` must be user’s local username.
The ‘ProviderAttributeName` must always be `Cognito_Subject` for social IdPs. The `ProviderAttributeValue` must always be the exact subject that was used when the user was originally linked as a source user.
For de-linking a SAML identity, there are two scenarios. If the linked identity has not yet been used to sign in, the ‘ProviderAttributeName` and `ProviderAttributeValue` must be the same values that were used for the `SourceUser` when the identities were originally linked using ` AdminLinkProviderForUser` call. This is also true if the linking was done with `ProviderAttributeName` set to `Cognito_Subject`. If the user has already signed in, the `ProviderAttributeName` must be `Cognito_Subject` and `ProviderAttributeValue` must be the `NameID` from their SAML assertion.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1250 1251 1252 1253 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1250 def admin_disable_provider_for_user(params = {}, = {}) req = build_request(:admin_disable_provider_for_user, params) req.send_request() end |
#admin_disable_user(params = {}) ⇒ Struct
Deactivates a user profile and revokes all access tokens for the user. A deactivated user can’t sign in, but still appears in the responses to ‘ListUsers` API requests.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1300 1301 1302 1303 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1300 def admin_disable_user(params = {}, = {}) req = build_request(:admin_disable_user, params) req.send_request() end |
#admin_enable_user(params = {}) ⇒ Struct
Activates sign-in for a user profile that previously had sign-in access disabled.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1350 1351 1352 1353 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1350 def admin_enable_user(params = {}, = {}) req = build_request(:admin_enable_user, params) req.send_request() end |
#admin_forget_device(params = {}) ⇒ Struct
Forgets, or deletes, a remembered device from a user’s profile. After you forget the device, the user can no longer complete device authentication with that device and when applicable, must submit MFA codes again. For more information, see [Working with devices].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1406 1407 1408 1409 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1406 def admin_forget_device(params = {}, = {}) req = build_request(:admin_forget_device, params) req.send_request() end |
#admin_get_device(params = {}) ⇒ Types::AdminGetDeviceResponse
Given the device key, returns details for a user’s device. For more information, see [Working with devices].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1472 1473 1474 1475 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1472 def admin_get_device(params = {}, = {}) req = build_request(:admin_get_device, params) req.send_request() end |
#admin_get_user(params = {}) ⇒ Types::AdminGetUserResponse
Given a username, returns details about a user profile in a user pool. You can specify alias attributes in the ‘Username` request parameter.
This operation contributes to your monthly active user (MAU) count for the purpose of billing.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1552 1553 1554 1555 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1552 def admin_get_user(params = {}, = {}) req = build_request(:admin_get_user, params) req.send_request() end |
#admin_initiate_auth(params = {}) ⇒ Types::AdminInitiateAuthResponse
Starts sign-in for applications with a server-side component, for example a traditional web application. This operation specifies the authentication flow that you’d like to begin. The authentication flow that you specify must be supported in your app client configuration. For more information about authentication flows, see [Authentication flows].
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][4]
- Using the Amazon Cognito user pools API and user pool endpoints][5
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-authentication-flow-methods.html [2]: console.aws.amazon.com/pinpoint/home/ [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html [4]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [5]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1842 1843 1844 1845 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1842 def admin_initiate_auth(params = {}, = {}) req = build_request(:admin_initiate_auth, params) req.send_request() end |
#admin_link_provider_for_user(params = {}) ⇒ Struct
Links an existing user account in a user pool, or ‘DestinationUser`, to an identity from an external IdP, or `SourceUser`, based on a specified attribute name and value from the external IdP.
This operation connects a local user profile with a user identity who hasn’t yet signed in from their third-party IdP. When the user signs in with their IdP, they get access-control configuration from the local user profile. Linked local users can also sign in with SDK-based API operations like ‘InitiateAuth` after they sign in at least once through their IdP. For more information, see [Linking federated users].
<note markdown=“1”> The maximum number of federated identities linked to a user is five.
</note>
Because this API allows a user with an external federated identity to sign in as a local user, it is critical that it only be used with external IdPs and linked attributes that you trust.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation-consolidate-users.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
1963 1964 1965 1966 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 1963 def admin_link_provider_for_user(params = {}, = {}) req = build_request(:admin_link_provider_for_user, params) req.send_request() end |
#admin_list_devices(params = {}) ⇒ Types::AdminListDevicesResponse
Lists a user’s registered devices. Remembered devices are used in authentication services where you offer a “Remember me” option for users who you want to permit to sign in without MFA from a trusted device. Users can bypass MFA while your application performs device SRP authentication on the back end. For more information, see [Working with devices].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
2046 2047 2048 2049 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 2046 def admin_list_devices(params = {}, = {}) req = build_request(:admin_list_devices, params) req.send_request() end |
#admin_list_groups_for_user(params = {}) ⇒ Types::AdminListGroupsForUserResponse
Lists the groups that a user belongs to. User pool groups are identifiers that you can reference from the contents of ID and access tokens, and set preferred IAM roles for identity-pool authentication. For more information, see [Adding groups to a user pool].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
2129 2130 2131 2132 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 2129 def admin_list_groups_for_user(params = {}, = {}) req = build_request(:admin_list_groups_for_user, params) req.send_request() end |
#admin_list_user_auth_events(params = {}) ⇒ Types::AdminListUserAuthEventsResponse
Requests a history of user activity and any risks detected as part of Amazon Cognito threat protection. For more information, see [Viewing user event history].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-adaptive-authentication.html#user-pool-settings-adaptive-authentication-event-user-history [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
2224 2225 2226 2227 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 2224 def admin_list_user_auth_events(params = {}, = {}) req = build_request(:admin_list_user_auth_events, params) req.send_request() end |
#admin_remove_user_from_group(params = {}) ⇒ Struct
Given a username and a group name, removes them from the group. User pool groups are identifiers that you can reference from the contents of ID and access tokens, and set preferred IAM roles for identity-pool authentication. For more information, see [Adding groups to a user pool].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
2283 2284 2285 2286 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 2283 def admin_remove_user_from_group(params = {}, = {}) req = build_request(:admin_remove_user_from_group, params) req.send_request() end |
#admin_reset_user_password(params = {}) ⇒ Struct
Resets the specified user’s password in a user pool. This operation doesn’t change the user’s password, but sends a password-reset code.
To use this API operation, your user pool must have self-service account recovery configured.
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][3]
- Using the Amazon Cognito user pools API and user pool endpoints][4
</note>
[1]: console.aws.amazon.com/pinpoint/home/ [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html [3]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
2397 2398 2399 2400 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 2397 def admin_reset_user_password(params = {}, = {}) req = build_request(:admin_reset_user_password, params) req.send_request() end |
#admin_respond_to_auth_challenge(params = {}) ⇒ Types::AdminRespondToAuthChallengeResponse
Some API operations in a user pool generate a challenge, like a prompt for an MFA code, for device authentication that bypasses MFA, or for a custom authentication challenge. An ‘AdminRespondToAuthChallenge` API request provides the answer to that challenge, like a code or a secure remote password (SRP). The parameters of a response to an authentication challenge vary with the type of challenge.
For more information about custom authentication challenges, see [Custom authentication challenge Lambda triggers].
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][4]
- Using the Amazon Cognito user pools API and user pool endpoints][5
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-lambda-challenge.html [2]: console.aws.amazon.com/pinpoint/home/ [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html [4]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [5]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
2833 2834 2835 2836 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 2833 def admin_respond_to_auth_challenge(params = {}, = {}) req = build_request(:admin_respond_to_auth_challenge, params) req.send_request() end |
#admin_set_user_mfa_preference(params = {}) ⇒ Struct
Sets the user’s multi-factor authentication (MFA) preference, including which MFA options are activated, and if any are preferred. Only one factor can be set as preferred. The preferred MFA factor will be used to authenticate a user if multiple factors are activated. If multiple options are activated and no preference is set, a challenge to choose an MFA option will be returned during sign-in.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
2919 2920 2921 2922 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 2919 def admin_set_user_mfa_preference(params = {}, = {}) req = build_request(:admin_set_user_mfa_preference, params) req.send_request() end |
#admin_set_user_password(params = {}) ⇒ Struct
Sets the specified user’s password in a user pool. This operation administratively sets a temporary or permanent password for a user. With this operation, you can bypass self-service password changes and permit immediate sign-in with the password that you set. To do this, set ‘Permanent` to `true`.
You can also set a new temporary password in this request, send it to a user, and require them to choose a new password on their next sign-in. To do this, set ‘Permanent` to `false`.
If the password is temporary, the user’s ‘Status` becomes `FORCE_CHANGE_PASSWORD`. When the user next tries to sign in, the `InitiateAuth` or `AdminInitiateAuth` response includes the `NEW_PASSWORD_REQUIRED` challenge. If the user doesn’t sign in before the temporary password expires, they can no longer sign in and you must repeat this operation to set a temporary or permanent password for them.
After the user sets a new password, or if you set a permanent password, their status becomes ‘Confirmed`.
‘AdminSetUserPassword` can set a password for the user profile that Amazon Cognito creates for third-party federated users. When you set a password, the federated user’s status changes from ‘EXTERNAL_PROVIDER` to `CONFIRMED`. A user in this state can sign in as a federated user, and initiate authentication flows in the API like a linked native user. They can also modify their password and attributes in token-authenticated API requests like `ChangePassword` and `UpdateUserAttributes`. As a best security practice and to keep users in sync with your external IdP, don’t set passwords on federated user profiles. To set up a federated user for native sign-in with a linked native user, refer to [Linking federated users to an existing user profile].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation-consolidate-users.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3013 3014 3015 3016 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3013 def admin_set_user_password(params = {}, = {}) req = build_request(:admin_set_user_password, params) req.send_request() end |
#admin_set_user_settings(params = {}) ⇒ Struct
*This action is no longer supported.* You can use it to configure only SMS MFA. You can’t use it to configure time-based one-time password (TOTP) software token MFA.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3074 3075 3076 3077 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3074 def admin_set_user_settings(params = {}, = {}) req = build_request(:admin_set_user_settings, params) req.send_request() end |
#admin_update_auth_event_feedback(params = {}) ⇒ Struct
Provides the feedback for an authentication event generated by threat protection features. Your response indicates that you think that the event either was from a valid user or was an unwanted authentication attempt. This feedback improves the risk evaluation decision for the user pool as part of Amazon Cognito threat protection. To activate this setting, your user pool must be on the [ Plus tier].
To train the threat-protection model to recognize trusted and untrusted sign-in characteristics, configure threat protection in audit-only mode and provide a mechanism for users or administrators to submit feedback. Your feedback can tell Amazon Cognito that a risk rating was assigned at a level you don’t agree with.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3149 3150 3151 3152 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3149 def admin_update_auth_event_feedback(params = {}, = {}) req = build_request(:admin_update_auth_event_feedback, params) req.send_request() end |
#admin_update_device_status(params = {}) ⇒ Struct
Updates the status of a user’s device so that it is marked as remembered or not remembered for the purpose of device authentication. Device authentication is a “remember me” mechanism that silently completes sign-in from trusted devices with a device key instead of a user-provided MFA code. This operation changes the status of a device without deleting it, so you can enable it again later. For more information about device authentication, see [Working with devices].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3216 3217 3218 3219 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3216 def admin_update_device_status(params = {}, = {}) req = build_request(:admin_update_device_status, params) req.send_request() end |
#admin_update_user_attributes(params = {}) ⇒ Struct
Updates the specified user’s attributes. To delete an attribute from your user, submit the attribute in your API request with a blank value.
For custom attributes, you must add a ‘custom:` prefix to the attribute name, for example `custom:department`.
This operation can set a user’s email address or phone number as verified and permit immediate sign-in in user pools that require verification of these attributes. To do this, set the ‘email_verified` or `phone_number_verified` attribute to `true`.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [3]: console.aws.amazon.com/pinpoint/home/ [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
3365 3366 3367 3368 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3365 def admin_update_user_attributes(params = {}, = {}) req = build_request(:admin_update_user_attributes, params) req.send_request() end |
#admin_user_global_sign_out(params = {}) ⇒ Struct
Invalidates the identity, access, and refresh tokens that Amazon Cognito issued to a user. Call this operation with your administrative credentials when your user signs out of your app. This results in the following behavior.
-
Amazon Cognito no longer accepts token-authorized user operations that you authorize with a signed-out user’s access tokens. For more information, see [Using the Amazon Cognito user pools API and user pool endpoints].
Amazon Cognito returns an ‘Access Token has been revoked` error when your app attempts to authorize a user pools API request with a revoked access token that contains the scope `aws.cognito.signin.user.admin`.
-
Amazon Cognito no longer accepts a signed-out user’s ID token in a
- GetId ][2
-
request to an identity pool with ‘ServerSideTokenCheck`
enabled for its user pool IdP configuration in [CognitoIdentityProvider].
-
Amazon Cognito no longer accepts a signed-out user’s refresh tokens in refresh requests.
Other requests might be valid until your user’s token expires. This operation doesn’t clear the [managed login] session cookie. To clear the session for a user who signed in with managed login or the classic hosted UI, direct their browser session to the [logout endpoint].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][6]
- Using the Amazon Cognito user pools API and user pool endpoints][1
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [2]: docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetId.html [3]: docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_CognitoIdentityProvider.html [4]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html [5]: docs.aws.amazon.com/cognito/latest/developerguide/logout-endpoint.html [6]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html
3444 3445 3446 3447 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3444 def admin_user_global_sign_out(params = {}, = {}) req = build_request(:admin_user_global_sign_out, params) req.send_request() end |
#associate_software_token(params = {}) ⇒ Types::AssociateSoftwareTokenResponse
Begins setup of time-based one-time password (TOTP) multi-factor authentication (MFA) for a user, with a unique private key that Amazon Cognito generates and returns in the API response. You can authorize an ‘AssociateSoftwareToken` request with either the user’s access token, or a session string from a challenge response that you received from Amazon Cognito.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3506 3507 3508 3509 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3506 def associate_software_token(params = {}, = {}) req = build_request(:associate_software_token, params) req.send_request() end |
#build_request(operation_name, params = {}) ⇒ Object
This method is part of a private API. You should avoid using this method if possible, as it may be removed or be changed in the future.
12871 12872 12873 12874 12875 12876 12877 12878 12879 12880 12881 12882 12883 12884 12885 12886 12887 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12871 def build_request(operation_name, params = {}) handlers = @handlers.for(operation_name) tracer = config.telemetry_provider.tracer_provider.tracer( Aws::Telemetry.module_to_tracer_name('Aws::CognitoIdentityProvider') ) context = Seahorse::Client::RequestContext.new( operation_name: operation_name, operation: config.api.operation(operation_name), client: self, params: params, config: config, tracer: tracer ) context[:gem_name] = 'aws-sdk-cognitoidentityprovider' context[:gem_version] = '1.117.0' Seahorse::Client::Request.new(handlers, context) end |
#change_password(params = {}) ⇒ Struct
Changes the password for the currently signed-in user.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3556 3557 3558 3559 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3556 def change_password(params = {}, = {}) req = build_request(:change_password, params) req.send_request() end |
#complete_web_authn_registration(params = {}) ⇒ Struct
Completes registration of a passkey authenticator for the currently signed-in user.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
3599 3600 3601 3602 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3599 def complete_web_authn_registration(params = {}, = {}) req = build_request(:complete_web_authn_registration, params) req.send_request() end |
#confirm_device(params = {}) ⇒ Types::ConfirmDeviceResponse
Confirms a device that a user wants to remember. A remembered device is a “Remember me on this device” option for user pools that perform authentication with the device key of a trusted device in the back end, instead of a user-provided MFA code. For more information about device authentication, see [Working with user devices in your user pool].
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3667 3668 3669 3670 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3667 def confirm_device(params = {}, = {}) req = build_request(:confirm_device, params) req.send_request() end |
#confirm_forgot_password(params = {}) ⇒ Struct
This public API operation accepts a confirmation code that Amazon Cognito sent to a user and accepts a new password for that user.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3800 3801 3802 3803 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3800 def confirm_forgot_password(params = {}, = {}) req = build_request(:confirm_forgot_password, params) req.send_request() end |
#confirm_sign_up(params = {}) ⇒ Types::ConfirmSignUpResponse
Confirms the account of a new user. This public API operation submits a code that Amazon Cognito sent to your user when they signed up in your user pool. After your user enters their code, they confirm ownership of the email address or phone number that they provided, and their user account becomes active. Depending on your user pool configuration, your users will receive their confirmation code in an email or SMS message.
Local users who signed up in your user pool are the only type of user who can confirm sign-up with a code. Users who federate through an external identity provider (IdP) have already been confirmed by their IdP.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
3971 3972 3973 3974 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 3971 def confirm_sign_up(params = {}, = {}) req = build_request(:confirm_sign_up, params) req.send_request() end |
#create_group(params = {}) ⇒ Types::CreateGroupResponse
Creates a new group in the specified user pool. For more information about user pool groups, see [Adding groups to a user pool].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
4064 4065 4066 4067 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 4064 def create_group(params = {}, = {}) req = build_request(:create_group, params) req.send_request() end |
#create_identity_provider(params = {}) ⇒ Types::CreateIdentityProviderResponse
Adds a configuration and trust relationship between a third-party identity provider (IdP) and a user pool. Amazon Cognito accepts sign-in with third-party identity providers through managed login and OIDC relying-party libraries. For more information, see [Third-party IdP sign-in].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
4285 4286 4287 4288 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 4285 def create_identity_provider(params = {}, = {}) req = build_request(:create_identity_provider, params) req.send_request() end |
#create_managed_login_branding(params = {}) ⇒ Types::CreateManagedLoginBrandingResponse
Creates a new set of branding settings for a user pool style and associates it with an app client. This operation is the programmatic option for the creation of a new style in the branding designer.
Provides values for UI customization in a ‘Settings` JSON object and image files in an `Assets` array. To send the JSON object `Document` type parameter in `Settings`, you might need to update to the most recent version of your Amazon Web Services SDK. To create a new style with default settings, set `UseCognitoProvidedValues` to `true` and don’t provide values for any other options.
This operation has a 2-megabyte request-size limit and include the CSS settings and image assets for your app client. Your branding settings might exceed 2MB in size. Amazon Cognito doesn’t require that you pass all parameters in one request and preserves existing style settings that you don’t specify. If your request is larger than 2MB, separate it into multiple requests, each with a size smaller than the limit.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
4397 4398 4399 4400 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 4397 def create_managed_login_branding(params = {}, = {}) req = build_request(:create_managed_login_branding, params) req.send_request() end |
#create_resource_server(params = {}) ⇒ Types::CreateResourceServerResponse
Creates a new OAuth2.0 resource server and defines custom scopes within it. Resource servers are associated with custom scopes and machine-to-machine (M2M) authorization. For more information, see [Access control with resource servers].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-define-resource-servers.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
4479 4480 4481 4482 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 4479 def create_resource_server(params = {}, = {}) req = build_request(:create_resource_server, params) req.send_request() end |
#create_user_import_job(params = {}) ⇒ Types::CreateUserImportJobResponse
Creates a user import job. You can import users into user pools from a comma-separated values (CSV) file without adding Amazon Cognito MAU costs to your Amazon Web Services bill.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
4549 4550 4551 4552 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 4549 def create_user_import_job(params = {}, = {}) req = build_request(:create_user_import_job, params) req.send_request() end |
#create_user_pool(params = {}) ⇒ Types::CreateUserPoolResponse
Creates a new Amazon Cognito user pool. This operation sets basic and advanced configuration options.
If you don’t provide a value for an attribute, Amazon Cognito sets it to its default value.
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][3]
- Using the Amazon Cognito user pools API and user pool endpoints][4
</note>
[1]: console.aws.amazon.com/pinpoint/home/ [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html [3]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
5504 5505 5506 5507 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 5504 def create_user_pool(params = {}, = {}) req = build_request(:create_user_pool, params) req.send_request() end |
#create_user_pool_client(params = {}) ⇒ Types::CreateUserPoolClientResponse
Creates an app client in a user pool. This operation sets basic and advanced configuration options.
Unlike app clients created in the console, Amazon Cognito doesn’t automatically assign a branding style to app clients that you configure with this API operation. Managed login and classic hosted UI pages aren’t available for your client until after you apply a branding style.
If you don’t provide a value for an attribute, Amazon Cognito sets it to its default value.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6104 6105 6106 6107 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6104 def create_user_pool_client(params = {}, = {}) req = build_request(:create_user_pool_client, params) req.send_request() end |
#create_user_pool_domain(params = {}) ⇒ Types::CreateUserPoolDomainResponse
A user pool domain hosts managed login, an authorization server and web server for authentication in your application. This operation creates a new user pool prefix domain or custom domain and sets the managed login branding version. Set the branding version to ‘1` for hosted UI (classic) or `2` for managed login. When you choose a custom domain, you must provide an SSL certificate in the US East (N. Virginia) Amazon Web Services Region in your request.
Your prefix domain might take up to one minute to take effect. Your custom domain is online within five minutes, but it can take up to one hour to distribute your SSL certificate.
For more information about adding a custom domain to your user pool, see [Configuring a user pool domain].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-add-custom-domain.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6210 6211 6212 6213 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6210 def create_user_pool_domain(params = {}, = {}) req = build_request(:create_user_pool_domain, params) req.send_request() end |
#delete_group(params = {}) ⇒ Struct
Deletes a group from the specified user pool. When you delete a group, that group no longer contributes to users’ ‘cognito:preferred_group` or `cognito:groups` claims, and no longer influence access-control decision that are based on group membership. For more information about user pool groups, see [Adding groups to a user pool].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6259 6260 6261 6262 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6259 def delete_group(params = {}, = {}) req = build_request(:delete_group, params) req.send_request() end |
#delete_identity_provider(params = {}) ⇒ Struct
Deletes a user pool identity provider (IdP). After you delete an IdP, users can no longer sign in to your user pool through that IdP. For more information about user pool IdPs, see [Third-party IdP sign-in].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6308 6309 6310 6311 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6308 def delete_identity_provider(params = {}, = {}) req = build_request(:delete_identity_provider, params) req.send_request() end |
#delete_managed_login_branding(params = {}) ⇒ Struct
Deletes a managed login branding style. When you delete a style, you delete the branding association for an app client. When an app client doesn’t have a style assigned, your managed login pages for that app client are nonfunctional until you create a new style or switch the domain branding version.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6357 6358 6359 6360 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6357 def delete_managed_login_branding(params = {}, = {}) req = build_request(:delete_managed_login_branding, params) req.send_request() end |
#delete_resource_server(params = {}) ⇒ Struct
Deletes a resource server. After you delete a resource server, users can no longer generate access tokens with scopes that are associate with that resource server.
Resource servers are associated with custom scopes and machine-to-machine (M2M) authorization. For more information, see [Access control with resource servers].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-define-resource-servers.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6408 6409 6410 6411 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6408 def delete_resource_server(params = {}, = {}) req = build_request(:delete_resource_server, params) req.send_request() end |
#delete_user(params = {}) ⇒ Struct
Deletes the profile of the currently signed-in user. A deleted user profile can no longer be used to sign in and can’t be restored.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6449 6450 6451 6452 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6449 def delete_user(params = {}, = {}) req = build_request(:delete_user, params) req.send_request() end |
#delete_user_attributes(params = {}) ⇒ Struct
Deletes attributes from the currently signed-in user. For example, your application can submit a request to this operation when a user wants to remove their ‘birthdate` attribute value.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6499 6500 6501 6502 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6499 def delete_user_attributes(params = {}, = {}) req = build_request(:delete_user_attributes, params) req.send_request() end |
#delete_user_pool(params = {}) ⇒ Struct
Deletes a user pool. After you delete a user pool, users can no longer sign in to any associated applications.
When you delete a user pool, it’s no longer visible or operational in your Amazon Web Services account. Amazon Cognito retains deleted user pools in an inactive state for 14 days, then begins a cleanup process that fully removes them from Amazon Web Services systems. In case of accidental deletion, contact Amazon Web Services Support within 14 days for restoration assistance.
Amazon Cognito begins full deletion of all resources from deleted user pools after 14 days. In the case of large user pools, the cleanup process might take significant additional time before all user data is permanently deleted.
6534 6535 6536 6537 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6534 def delete_user_pool(params = {}, = {}) req = build_request(:delete_user_pool, params) req.send_request() end |
#delete_user_pool_client(params = {}) ⇒ Struct
Deletes a user pool app client. After you delete an app client, users can no longer sign in to the associated application.
6561 6562 6563 6564 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6561 def delete_user_pool_client(params = {}, = {}) req = build_request(:delete_user_pool_client, params) req.send_request() end |
#delete_user_pool_domain(params = {}) ⇒ Struct
Given a user pool ID and domain identifier, deletes a user pool domain. After you delete a user pool domain, your managed login pages and authorization server are no longer available.
6591 6592 6593 6594 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6591 def delete_user_pool_domain(params = {}, = {}) req = build_request(:delete_user_pool_domain, params) req.send_request() end |
#delete_web_authn_credential(params = {}) ⇒ Struct
Deletes a registered passkey, or WebAuthn, authenticator for the currently signed-in user.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
6636 6637 6638 6639 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6636 def delete_web_authn_credential(params = {}, = {}) req = build_request(:delete_web_authn_credential, params) req.send_request() end |
#describe_identity_provider(params = {}) ⇒ Types::DescribeIdentityProviderResponse
Given a user pool ID and identity provider (IdP) name, returns details about the IdP.
6679 6680 6681 6682 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6679 def describe_identity_provider(params = {}, = {}) req = build_request(:describe_identity_provider, params) req.send_request() end |
#describe_managed_login_branding(params = {}) ⇒ Types::DescribeManagedLoginBrandingResponse
Given the ID of a managed login branding style, returns detailed information about the style.
6731 6732 6733 6734 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6731 def describe_managed_login_branding(params = {}, = {}) req = build_request(:describe_managed_login_branding, params) req.send_request() end |
#describe_managed_login_branding_by_client(params = {}) ⇒ Types::DescribeManagedLoginBrandingByClientResponse
Given the ID of a user pool app client, returns detailed information about the style assigned to the app client.
6783 6784 6785 6786 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6783 def describe_managed_login_branding_by_client(params = {}, = {}) req = build_request(:describe_managed_login_branding_by_client, params) req.send_request() end |
#describe_resource_server(params = {}) ⇒ Types::DescribeResourceServerResponse
Describes a resource server. For more information about resource servers, see [Access control with resource servers].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-define-resource-servers.html
6832 6833 6834 6835 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6832 def describe_resource_server(params = {}, = {}) req = build_request(:describe_resource_server, params) req.send_request() end |
#describe_risk_configuration(params = {}) ⇒ Types::DescribeRiskConfigurationResponse
Given an app client or user pool ID where threat protection is configured, describes the risk configuration. This operation returns details about adaptive authentication, compromised credentials, and IP-address allow- and denylists. For more information about threat protection, see [Threat protection].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-threat-protection.html
6907 6908 6909 6910 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6907 def describe_risk_configuration(params = {}, = {}) req = build_request(:describe_risk_configuration, params) req.send_request() end |
#describe_user_import_job(params = {}) ⇒ Types::DescribeUserImportJobResponse
Describes a user import job. For more information about user CSV import, see [Importing users from a CSV file].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-using-import-tool.html
6956 6957 6958 6959 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 6956 def describe_user_import_job(params = {}, = {}) req = build_request(:describe_user_import_job, params) req.send_request() end |
#describe_user_pool(params = {}) ⇒ Types::DescribeUserPoolResponse
Given a user pool ID, returns configuration information. This operation is useful when you want to inspect an existing user pool and programmatically replicate the configuration to another user pool.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7094 7095 7096 7097 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7094 def describe_user_pool(params = {}, = {}) req = build_request(:describe_user_pool, params) req.send_request() end |
#describe_user_pool_client(params = {}) ⇒ Types::DescribeUserPoolClientResponse
Given an app client ID, returns configuration information. This operation is useful when you want to inspect an existing app client and programmatically replicate the configuration to another app client. For more information about app clients, see [App clients].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-client-apps.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7187 7188 7189 7190 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7187 def describe_user_pool_client(params = {}, = {}) req = build_request(:describe_user_pool_client, params) req.send_request() end |
#describe_user_pool_domain(params = {}) ⇒ Types::DescribeUserPoolDomainResponse
Given a user pool domain name, returns information about the domain configuration.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7244 7245 7246 7247 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7244 def describe_user_pool_domain(params = {}, = {}) req = build_request(:describe_user_pool_domain, params) req.send_request() end |
#forget_device(params = {}) ⇒ Struct
Given a device key, deletes a remembered device as the currently signed-in user. For more information about device authentication, see [Working with user devices in your user pool].
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7292 7293 7294 7295 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7292 def forget_device(params = {}, = {}) req = build_request(:forget_device, params) req.send_request() end |
#forgot_password(params = {}) ⇒ Types::ForgotPasswordResponse
Sends a password-reset confirmation code for the currently signed-in user.
For the ‘Username` parameter, you can use the username or user alias.
If neither a verified phone number nor a verified email exists, Amazon Cognito responds with an ‘InvalidParameterException` error . If your app client has a client secret and you don’t provide a ‘SECRET_HASH` parameter, this API returns `NotAuthorizedException`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [2]: console.aws.amazon.com/pinpoint/home/ [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
7452 7453 7454 7455 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7452 def forgot_password(params = {}, = {}) req = build_request(:forgot_password, params) req.send_request() end |
#get_csv_header(params = {}) ⇒ Types::GetCSVHeaderResponse
Given a user pool ID, generates a comma-separated value (CSV) list populated with available user attributes in the user pool. This list is the header for the CSV file that determines the users in a user import job. Save the content of ‘CSVHeader` in the response as a `.csv` file and populate it with the usernames and attributes of users that you want to import. For more information about CSV user import, see [Importing users from a CSV file].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-using-import-tool.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7508 7509 7510 7511 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7508 def get_csv_header(params = {}, = {}) req = build_request(:get_csv_header, params) req.send_request() end |
#get_device(params = {}) ⇒ Types::GetDeviceResponse
Given a device key, returns information about a remembered device for the current user. For more information about device authentication, see [Working with user devices in your user pool].
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7567 7568 7569 7570 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7567 def get_device(params = {}, = {}) req = build_request(:get_device, params) req.send_request() end |
#get_group(params = {}) ⇒ Types::GetGroupResponse
Given a user pool ID and a group name, returns information about the user group.
For more information about user pool groups, see [Adding groups to a user pool].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7629 7630 7631 7632 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7629 def get_group(params = {}, = {}) req = build_request(:get_group, params) req.send_request() end |
#get_identity_provider_by_identifier(params = {}) ⇒ Types::GetIdentityProviderByIdentifierResponse
Given the identifier of an identity provider (IdP), for example ‘examplecorp`, returns information about the user pool configuration for that IdP. For more information about IdPs, see [Third-party IdP sign-in].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation.html
7682 7683 7684 7685 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7682 def get_identity_provider_by_identifier(params = {}, = {}) req = build_request(:get_identity_provider_by_identifier, params) req.send_request() end |
#get_log_delivery_configuration(params = {}) ⇒ Types::GetLogDeliveryConfigurationResponse
Given a user pool ID, returns the logging configuration. User pools can export message-delivery error and threat-protection activity logs to external Amazon Web Services services. For more information, see [Exporting user pool logs].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/exporting-quotas-and-usage.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7739 7740 7741 7742 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7739 def get_log_delivery_configuration(params = {}, = {}) req = build_request(:get_log_delivery_configuration, params) req.send_request() end |
#get_signing_certificate(params = {}) ⇒ Types::GetSigningCertificateResponse
Given a user pool ID, returns the signing certificate for SAML 2.0 federation.
Issued certificates are valid for 10 years from the date of issue. Amazon Cognito issues and assigns a new signing certificate annually. This renewal process returns a new value in the response to ‘GetSigningCertificate`, but doesn’t invalidate the original certificate.
For more information, see [Signing SAML requests].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-signing [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7796 7797 7798 7799 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7796 def get_signing_certificate(params = {}, = {}) req = build_request(:get_signing_certificate, params) req.send_request() end |
#get_ui_customization(params = {}) ⇒ Types::GetUICustomizationResponse
Given a user pool ID or app client, returns information about classic hosted UI branding that you applied, if any. Returns user-pool level branding information if no app client branding is applied, or if you don’t specify an app client ID. Returns an empty object if you haven’t applied hosted UI branding to either the client or the user pool. For more information, see [Hosted UI (classic) branding].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/hosted-ui-classic-branding.html
7843 7844 7845 7846 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7843 def get_ui_customization(params = {}, = {}) req = build_request(:get_ui_customization, params) req.send_request() end |
#get_user(params = {}) ⇒ Types::GetUserResponse
Gets user attributes and and MFA settings for the currently signed-in user.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
7903 7904 7905 7906 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 7903 def get_user(params = {}, = {}) req = build_request(:get_user, params) req.send_request() end |
#get_user_attribute_verification_code(params = {}) ⇒ Types::GetUserAttributeVerificationCodeResponse
Given an attribute name, sends a user attribute verification code for the specified attribute name to the currently signed-in user.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [2]: console.aws.amazon.com/pinpoint/home/ [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
8020 8021 8022 8023 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8020 def get_user_attribute_verification_code(params = {}, = {}) req = build_request(:get_user_attribute_verification_code, params) req.send_request() end |
#get_user_auth_factors(params = {}) ⇒ Types::GetUserAuthFactorsResponse
Lists the authentication options for the currently signed-in user. Returns the following:
-
The user’s multi-factor authentication (MFA) preferences.
-
The user’s options for choice-based authentication with the ‘USER_AUTH` flow.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
8080 8081 8082 8083 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8080 def get_user_auth_factors(params = {}, = {}) req = build_request(:get_user_auth_factors, params) req.send_request() end |
#get_user_pool_mfa_config(params = {}) ⇒ Types::GetUserPoolMfaConfigResponse
Given a user pool ID, returns configuration for sign-in with WebAuthn authenticators and for multi-factor authentication (MFA). This operation describes the following:
-
The WebAuthn relying party (RP) ID and user-verification settings.
-
The required, optional, or disabled state of MFA for all user pool users.
-
The message templates for email and SMS MFA.
-
The enabled or disabled state of time-based one-time password (TOTP) MFA.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
8152 8153 8154 8155 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8152 def get_user_pool_mfa_config(params = {}, = {}) req = build_request(:get_user_pool_mfa_config, params) req.send_request() end |
#global_sign_out(params = {}) ⇒ Struct
Invalidates the identity, access, and refresh tokens that Amazon Cognito issued to a user. Call this operation when your user signs out of your app. This results in the following behavior.
-
Amazon Cognito no longer accepts token-authorized user operations that you authorize with a signed-out user’s access tokens. For more information, see [Using the Amazon Cognito user pools API and user pool endpoints].
Amazon Cognito returns an ‘Access Token has been revoked` error when your app attempts to authorize a user pools API request with a revoked access token that contains the scope `aws.cognito.signin.user.admin`.
-
Amazon Cognito no longer accepts a signed-out user’s ID token in a
- GetId ][2
-
request to an identity pool with ‘ServerSideTokenCheck`
enabled for its user pool IdP configuration in [CognitoIdentityProvider].
-
Amazon Cognito no longer accepts a signed-out user’s refresh tokens in refresh requests.
Other requests might be valid until your user’s token expires. This operation doesn’t clear the [managed login] session cookie. To clear the session for a user who signed in with managed login or the classic hosted UI, direct their browser session to the [logout endpoint].
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [2]: docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetId.html [3]: docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_CognitoIdentityProvider.html [4]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managed-login.html [5]: docs.aws.amazon.com/cognito/latest/developerguide/logout-endpoint.html
8222 8223 8224 8225 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8222 def global_sign_out(params = {}, = {}) req = build_request(:global_sign_out, params) req.send_request() end |
#initiate_auth(params = {}) ⇒ Types::InitiateAuthResponse
Declares an authentication flow and initiates sign-in for a user in the Amazon Cognito user directory. Amazon Cognito might respond with an additional challenge or an ‘AuthenticationResult` that contains the outcome of a successful authentication. You can’t sign in a user with a federated IdP with ‘InitiateAuth`. For more information, see [Authentication].
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/authentication.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [3]: console.aws.amazon.com/pinpoint/home/ [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
8539 8540 8541 8542 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8539 def initiate_auth(params = {}, = {}) req = build_request(:initiate_auth, params) req.send_request() end |
#list_devices(params = {}) ⇒ Types::ListDevicesResponse
Lists the devices that Amazon Cognito has registered to the currently signed-in user. For more information about device authentication, see [Working with user devices in your user pool].
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
8611 8612 8613 8614 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8611 def list_devices(params = {}, = {}) req = build_request(:list_devices, params) req.send_request() end |
#list_groups(params = {}) ⇒ Types::ListGroupsResponse
Given a user pool ID, returns user pool groups and their details.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
8682 8683 8684 8685 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8682 def list_groups(params = {}, = {}) req = build_request(:list_groups, params) req.send_request() end |
#list_identity_providers(params = {}) ⇒ Types::ListIdentityProvidersResponse
Given a user pool ID, returns information about configured identity providers (IdPs). For more information about IdPs, see [Third-party IdP sign-in].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
8753 8754 8755 8756 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8753 def list_identity_providers(params = {}, = {}) req = build_request(:list_identity_providers, params) req.send_request() end |
#list_resource_servers(params = {}) ⇒ Types::ListResourceServersResponse
Given a user pool ID, returns all resource servers and their details. For more information about resource servers, see [Access control with resource servers].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-define-resource-servers.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
8826 8827 8828 8829 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8826 def list_resource_servers(params = {}, = {}) req = build_request(:list_resource_servers, params) req.send_request() end |
#list_tags_for_resource(params = {}) ⇒ Types::ListTagsForResourceResponse
Lists the tags that are assigned to an Amazon Cognito user pool. For more information, see [Tagging resources].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/tagging.html
8861 8862 8863 8864 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8861 def (params = {}, = {}) req = build_request(:list_tags_for_resource, params) req.send_request() end |
#list_user_import_jobs(params = {}) ⇒ Types::ListUserImportJobsResponse
Given a user pool ID, returns user import jobs and their details. Import jobs are retained in user pool configuration so that you can stage, stop, start, review, and delete them. For more information about user import, see [Importing users from a CSV file].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-using-import-tool.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
8940 8941 8942 8943 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 8940 def list_user_import_jobs(params = {}, = {}) req = build_request(:list_user_import_jobs, params) req.send_request() end |
#list_user_pool_clients(params = {}) ⇒ Types::ListUserPoolClientsResponse
Given a user pool ID, lists app clients. App clients are sets of rules for the access that you want a user pool to grant to one application. For more information, see [App clients].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-client-apps.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
9010 9011 9012 9013 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 9010 def list_user_pool_clients(params = {}, = {}) req = build_request(:list_user_pool_clients, params) req.send_request() end |
#list_user_pools(params = {}) ⇒ Types::ListUserPoolsResponse
Lists user pools and their details in the current Amazon Web Services account.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
9093 9094 9095 9096 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 9093 def list_user_pools(params = {}, = {}) req = build_request(:list_user_pools, params) req.send_request() end |
#list_users(params = {}) ⇒ Types::ListUsersResponse
Given a user pool ID, returns a list of users and their basic details in a user pool.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
9328 9329 9330 9331 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 9328 def list_users(params = {}, = {}) req = build_request(:list_users, params) req.send_request() end |
#list_users_in_group(params = {}) ⇒ Types::ListUsersInGroupResponse
Given a user pool ID and a group name, returns a list of users in the group. For more information about user pool groups, see [Adding groups to a user pool].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
The returned response is a pageable response and is Enumerable. For details on usage see PageableResponse.
9411 9412 9413 9414 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 9411 def list_users_in_group(params = {}, = {}) req = build_request(:list_users_in_group, params) req.send_request() end |
#list_web_authn_credentials(params = {}) ⇒ Types::ListWebAuthnCredentialsResponse
Generates a list of the currently signed-in user’s registered passkey, or WebAuthn, credentials.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
9481 9482 9483 9484 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 9481 def list_web_authn_credentials(params = {}, = {}) req = build_request(:list_web_authn_credentials, params) req.send_request() end |
#resend_confirmation_code(params = {}) ⇒ Types::ResendConfirmationCodeResponse
Resends the code that confirms a new account for a user who has signed up in your user pool. Amazon Cognito sends confirmation codes to the user attribute in the ‘AutoVerifiedAttributes` property of your user pool. When you prompt new users for the confirmation code, include a “Resend code” option that generates a call to this API operation.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [2]: console.aws.amazon.com/pinpoint/home/ [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
9636 9637 9638 9639 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 9636 def resend_confirmation_code(params = {}, = {}) req = build_request(:resend_confirmation_code, params) req.send_request() end |
#respond_to_auth_challenge(params = {}) ⇒ Types::RespondToAuthChallengeResponse
Some API operations in a user pool generate a challenge, like a prompt for an MFA code, for device authentication that bypasses MFA, or for a custom authentication challenge. A ‘RespondToAuthChallenge` API request provides the answer to that challenge, like a code or a secure remote password (SRP). The parameters of a response to an authentication challenge vary with the type of challenge.
For more information about custom authentication challenges, see [Custom authentication challenge Lambda triggers].
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-lambda-challenge.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [3]: console.aws.amazon.com/pinpoint/home/ [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
10043 10044 10045 10046 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10043 def respond_to_auth_challenge(params = {}, = {}) req = build_request(:respond_to_auth_challenge, params) req.send_request() end |
#revoke_token(params = {}) ⇒ Struct
Revokes all of the access tokens generated by, and at the same time as, the specified refresh token. After a token is revoked, you can’t use the revoked token to access Amazon Cognito user APIs, or to authorize access to your resource server.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
10091 10092 10093 10094 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10091 def revoke_token(params = {}, = {}) req = build_request(:revoke_token, params) req.send_request() end |
#set_log_delivery_configuration(params = {}) ⇒ Types::SetLogDeliveryConfigurationResponse
Sets up or modifies the logging configuration of a user pool. User pools can export user notification logs and, when threat protection is active, user-activity logs. For more information, see [Exporting user pool logs](cognito/latest/developerguide/exporting-quotas-and-usage.html).
10147 10148 10149 10150 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10147 def set_log_delivery_configuration(params = {}, = {}) req = build_request(:set_log_delivery_configuration, params) req.send_request() end |
#set_risk_configuration(params = {}) ⇒ Types::SetRiskConfigurationResponse
Configures threat protection for a user pool or app client. Sets configuration for the following.
-
Responses to risks with adaptive authentication
-
Responses to vulnerable passwords with compromised-credentials detection
-
Notifications to users who have had risky activity detected
-
IP-address denylist and allowlist
To set the risk configuration for the user pool to defaults, send this request with only the ‘UserPoolId` parameter. To reset the threat protection settings of an app client to be inherited from the user pool, send `UserPoolId` and `ClientId` parameters only. To change threat protection to audit-only or off, update the value of `UserPoolAddOns` in an `UpdateUserPool` request. To activate this setting, your user pool must be on the [ Plus tier].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html
10300 10301 10302 10303 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10300 def set_risk_configuration(params = {}, = {}) req = build_request(:set_risk_configuration, params) req.send_request() end |
#set_ui_customization(params = {}) ⇒ Types::SetUICustomizationResponse
Configures UI branding settings for domains with the hosted UI (classic) branding version. Your user pool must have a domain. Configure a domain with .
Set the default configuration for all clients with a ‘ClientId` of `ALL`. When the `ClientId` value is an app client ID, the settings you pass in this request apply to that app client and override the default `ALL` configuration.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
10379 10380 10381 10382 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10379 def set_ui_customization(params = {}, = {}) req = build_request(:set_ui_customization, params) req.send_request() end |
#set_user_mfa_preference(params = {}) ⇒ Struct
Set the user’s multi-factor authentication (MFA) method preference, including which MFA factors are activated and if any are preferred. Only one factor can be set as preferred. The preferred MFA factor will be used to authenticate a user if multiple factors are activated. If multiple options are activated and no preference is set, a challenge to choose an MFA option will be returned during sign-in. If an MFA type is activated for a user, the user will be prompted for MFA during all sign-in attempts unless device tracking is turned on and the device has been trusted. If you want MFA to be applied selectively based on the assessed risk level of sign-in attempts, deactivate MFA for users and turn on Adaptive Authentication for the user pool.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
10461 10462 10463 10464 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10461 def set_user_mfa_preference(params = {}, = {}) req = build_request(:set_user_mfa_preference, params) req.send_request() end |
#set_user_pool_mfa_config(params = {}) ⇒ Types::SetUserPoolMfaConfigResponse
Sets user pool multi-factor authentication (MFA) and passkey configuration. For more information about user pool MFA, see [Adding MFA]. For more information about WebAuthn passkeys see [Authentication flows].
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-authentication-flow-methods.html#amazon-cognito-user-pools-authentication-flow-methods-passkey [3]: console.aws.amazon.com/pinpoint/home/ [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
10589 10590 10591 10592 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10589 def set_user_pool_mfa_config(params = {}, = {}) req = build_request(:set_user_pool_mfa_config, params) req.send_request() end |
#set_user_settings(params = {}) ⇒ Struct
*This action is no longer supported.* You can use it to configure only SMS MFA. You can’t use it to configure time-based one-time password (TOTP) software token or email MFA.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
10641 10642 10643 10644 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10641 def set_user_settings(params = {}, = {}) req = build_request(:set_user_settings, params) req.send_request() end |
#sign_up(params = {}) ⇒ Types::SignUpResponse
Registers a user with an app client and requests a user name, password, and user attributes in the user pool.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
You might receive a ‘LimitExceeded` exception in response to this request if you have exceeded a rate quota for email or SMS messages, and if your user pool automatically verifies email addresses or phone numbers. When you get this exception in the response, the user is successfully created and is in an `UNCONFIRMED` state.
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [2]: console.aws.amazon.com/pinpoint/home/ [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
10853 10854 10855 10856 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10853 def sign_up(params = {}, = {}) req = build_request(:sign_up, params) req.send_request() end |
#start_user_import_job(params = {}) ⇒ Types::StartUserImportJobResponse
Instructs your user pool to start importing users from a CSV file that contains their usernames and attributes. For more information about importing users from a CSV file, see [Importing users from a CSV file].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-using-import-tool.html
10904 10905 10906 10907 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10904 def start_user_import_job(params = {}, = {}) req = build_request(:start_user_import_job, params) req.send_request() end |
#start_web_authn_registration(params = {}) ⇒ Types::StartWebAuthnRegistrationResponse
Requests credential creation options from your user pool for the currently signed-in user. Returns information about the user pool, the user profile, and authentication requirements. Users must provide this information in their request to enroll your application with their passkey provider.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
10941 10942 10943 10944 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10941 def start_web_authn_registration(params = {}, = {}) req = build_request(:start_web_authn_registration, params) req.send_request() end |
#stop_user_import_job(params = {}) ⇒ Types::StopUserImportJobResponse
Instructs your user pool to stop a running job that’s importing users from a CSV file that contains their usernames and attributes. For more information about importing users from a CSV file, see [Importing users from a CSV file].
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-using-import-tool.html
10992 10993 10994 10995 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 10992 def stop_user_import_job(params = {}, = {}) req = build_request(:stop_user_import_job, params) req.send_request() end |
#tag_resource(params = {}) ⇒ Struct
Assigns a set of tags to an Amazon Cognito user pool. A tag is a label that you can use to categorize and manage user pools in different ways, such as by purpose, owner, environment, or other criteria.
Each tag consists of a key and value, both of which you define. A key is a general category for more specific values. For example, if you have two versions of a user pool, one for testing and another for production, you might assign an ‘Environment` tag key to both user pools. The value of this key might be `Test` for one user pool, and `Production` for the other.
Tags are useful for cost tracking and access control. You can activate your tags so that they appear on the Billing and Cost Management console, where you can track the costs associated with your user pools. In an Identity and Access Management policy, you can constrain permissions for user pools based on specific tags or tag values.
You can use this action up to 5 times per second, per account. A user pool can have as many as 50 tags.
11039 11040 11041 11042 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11039 def tag_resource(params = {}, = {}) req = build_request(:tag_resource, params) req.send_request() end |
#untag_resource(params = {}) ⇒ Struct
Given tag IDs that you previously assigned to a user pool, removes them.
11067 11068 11069 11070 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11067 def untag_resource(params = {}, = {}) req = build_request(:untag_resource, params) req.send_request() end |
#update_auth_event_feedback(params = {}) ⇒ Struct
Provides the feedback for an authentication event generated by threat protection features. The user’s response indicates that you think that the event either was from a valid user or was an unwanted authentication attempt. This feedback improves the risk evaluation decision for the user pool as part of Amazon Cognito threat protection. To activate this setting, your user pool must be on the [ Plus tier].
This operation requires a ‘FeedbackToken` that Amazon Cognito generates and adds to notification emails when users have potentially suspicious authentication events. Users invoke this operation when they select the link that corresponds to `one-click-link-valid` or `one-click-link-invalid` in your notification template. Because `FeedbackToken` is a required parameter, you can’ make requests to ‘UpdateAuthEventFeedback` without the contents of the notification email message.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
11146 11147 11148 11149 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11146 def update_auth_event_feedback(params = {}, = {}) req = build_request(:update_auth_event_feedback, params) req.send_request() end |
#update_device_status(params = {}) ⇒ Struct
Updates the status of a the currently signed-in user’s device so that it is marked as remembered or not remembered for the purpose of device authentication. Device authentication is a “remember me” mechanism that silently completes sign-in from trusted devices with a device key instead of a user-provided MFA code. This operation changes the status of a device without deleting it, so you can enable it again later. For more information about device authentication, see [Working with devices].
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-device-tracking.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
11204 11205 11206 11207 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11204 def update_device_status(params = {}, = {}) req = build_request(:update_device_status, params) req.send_request() end |
#update_group(params = {}) ⇒ Types::UpdateGroupResponse
Given the name of a user pool group, updates any of the properties for precedence, IAM role, or description. For more information about user pool groups, see [Adding groups to a user pool].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-user-groups.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
11295 11296 11297 11298 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11295 def update_group(params = {}, = {}) req = build_request(:update_group, params) req.send_request() end |
#update_identity_provider(params = {}) ⇒ Types::UpdateIdentityProviderResponse
Modifies the configuration and trust relationship between a third-party identity provider (IdP) and a user pool. Amazon Cognito accepts sign-in with third-party identity providers through managed login and OIDC relying-party libraries. For more information, see [Third-party IdP sign-in].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-identity-federation.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
11510 11511 11512 11513 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11510 def update_identity_provider(params = {}, = {}) req = build_request(:update_identity_provider, params) req.send_request() end |
#update_managed_login_branding(params = {}) ⇒ Types::UpdateManagedLoginBrandingResponse
Configures the branding settings for a user pool style. This operation is the programmatic option for the configuration of a style in the branding designer.
Provides values for UI customization in a ‘Settings` JSON object and image files in an `Assets` array.
This operation has a 2-megabyte request-size limit and include the CSS settings and image assets for your app client. Your branding settings might exceed 2MB in size. Amazon Cognito doesn’t require that you pass all parameters in one request and preserves existing style settings that you don’t specify. If your request is larger than 2MB, separate it into multiple requests, each with a size smaller than the limit.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
11618 11619 11620 11621 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11618 def update_managed_login_branding(params = {}, = {}) req = build_request(:update_managed_login_branding, params) req.send_request() end |
#update_resource_server(params = {}) ⇒ Types::UpdateResourceServerResponse
Updates the name and scopes of a resource server. All other fields are read-only. For more information about resource servers, see [Access control with resource servers].
If you don’t provide a value for an attribute, it is set to the default value.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-define-resource-servers.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
11701 11702 11703 11704 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11701 def update_resource_server(params = {}, = {}) req = build_request(:update_resource_server, params) req.send_request() end |
#update_user_attributes(params = {}) ⇒ Types::UpdateUserAttributesResponse
Updates the currently signed-in user’s attributes. To delete an attribute from the user, submit the attribute in your API request with a blank value.
For custom attributes, you must add a ‘custom:` prefix to the attribute name, for example `custom:department`.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html [2]: console.aws.amazon.com/pinpoint/home/ [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html
11836 11837 11838 11839 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 11836 def update_user_attributes(params = {}, = {}) req = build_request(:update_user_attributes, params) req.send_request() end |
#update_user_pool(params = {}) ⇒ Struct
Updates the configuration of a user pool. To avoid setting parameters to Amazon Cognito defaults, construct this API request to pass the existing configuration of your user pool, modified to include the changes that you want to make.
If you don’t provide a value for an attribute, Amazon Cognito sets it to its default value.
<note markdown=“1”> This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers require you to register an origination phone number before you can send SMS messages to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a phone number with [Amazon Pinpoint]. Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must receive SMS messages might not be able to sign up, activate their accounts, or sign in.
If you have never used SMS text with Amazon Cognito or any
other Amazon Web Services service, Amazon Simple Notification Service might place your account in the SMS sandbox. In <a href=“https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html”>sandbox mode</a> , you can send messages only to verified phone numbers. After you test your app while in the sandbox environment, you can move out of the sandbox and into production. For more information, see [ SMS message settings for Amazon Cognito user pools] in the *Amazon Cognito Developer Guide*.
</note>
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][3]
- Using the Amazon Cognito user pools API and user pool endpoints][4
</note>
[1]: console.aws.amazon.com/pinpoint/home/ [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html [3]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [4]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
12174 12175 12176 12177 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12174 def update_user_pool(params = {}, = {}) req = build_request(:update_user_pool, params) req.send_request() end |
#update_user_pool_client(params = {}) ⇒ Types::UpdateUserPoolClientResponse
Given a user pool app client ID, updates the configuration. To avoid setting parameters to Amazon Cognito defaults, construct this API request to pass the existing configuration of your app client, modified to include the changes that you want to make.
If you don’t provide a value for an attribute, Amazon Cognito sets it to its default value.
Unlike app clients created in the console, Amazon Cognito doesn’t automatically assign a branding style to app clients that you configure with this API operation. Managed login and classic hosted UI pages aren’t available for your client until after you apply a branding style.
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][1]
- Using the Amazon Cognito user pools API and user pool endpoints][2
</note>
[1]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [2]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
12637 12638 12639 12640 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12637 def update_user_pool_client(params = {}, = {}) req = build_request(:update_user_pool_client, params) req.send_request() end |
#update_user_pool_domain(params = {}) ⇒ Types::UpdateUserPoolDomainResponse
A user pool domain hosts managed login, an authorization server and web server for authentication in your application. This operation updates the branding version for user pool domains between ‘1` for hosted UI (classic) and `2` for managed login. It also updates the SSL certificate for user pool custom domains.
Changes to the domain branding version take up to one minute to take effect for a prefix domain and up to five minutes for a custom domain.
This operation doesn’t change the name of your user pool domain. To change your domain, delete it with ‘DeleteUserPoolDomain` and create a new domain with `CreateUserPoolDomain`.
You can pass the ARN of a new Certificate Manager certificate in this request. Typically, ACM certificates automatically renew and you user pool can continue to use the same ARN. But if you generate a new certificate for your custom domain name, replace the original configuration with the new ARN in this request.
ACM certificates for custom domains must be in the US East (N. Virginia) Amazon Web Services Region. After you submit your request, Amazon Cognito requires up to 1 hour to distribute your new certificate to your custom domain.
For more information about adding a custom domain to your user pool, see [Configuring a user pool domain].
<note markdown=“1”> Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
**Learn more**
* [Signing Amazon Web Services API Requests][2]
- Using the Amazon Cognito user pools API and user pool endpoints][3
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-add-custom-domain.html [2]: docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-signing.html [3]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
12745 12746 12747 12748 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12745 def update_user_pool_domain(params = {}, = {}) req = build_request(:update_user_pool_domain, params) req.send_request() end |
#verify_software_token(params = {}) ⇒ Types::VerifySoftwareTokenResponse
Registers the current user’s time-based one-time password (TOTP) authenticator with a code generated in their authenticator app from a private key that’s supplied by your user pool. Marks the user’s software token MFA status as “verified” if successful. The request takes an access token or a session string, but not both.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
12806 12807 12808 12809 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12806 def verify_software_token(params = {}, = {}) req = build_request(:verify_software_token, params) req.send_request() end |
#verify_user_attribute(params = {}) ⇒ Struct
Submits a verification code for a signed-in user who has added or changed a value of an auto-verified attribute. When successful, the user’s attribute becomes verified and the attribute ‘email_verified` or `phone_number_verified` becomes `true`.
If your user pool requires verification before Amazon Cognito updates the attribute value, this operation updates the affected attribute to its pending value.
Authorize this action with a signed-in user’s access token. It must include the scope ‘aws.cognito.signin.user.admin`.
<note markdown=“1”> Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see [Using the Amazon Cognito user pools API and user pool endpoints].
</note>
[1]: docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html
12862 12863 12864 12865 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12862 def verify_user_attribute(params = {}, = {}) req = build_request(:verify_user_attribute, params) req.send_request() end |
#waiter_names ⇒ Object
This method is part of a private API. You should avoid using this method if possible, as it may be removed or be changed in the future.
12891 12892 12893 |
# File 'lib/aws-sdk-cognitoidentityprovider/client.rb', line 12891 def waiter_names [] end |