From 8f5691c86bf2fe266df08268be71919b605bd464 Mon Sep 17 00:00:00 2001
From: awstools Makes a series of decisions about multiple authorization requests for one token. The
+ * principal in this request comes from an external identity source in the form of an identity or
+ * access token, formatted as a JSON
+ * web token (JWT). The information in the parameters can also define
+ * additional context that Verified Permissions can include in the evaluations. The request is evaluated against all policies in the specified policy store that match the
+ * entities that you provide in the entities declaration and in the token. The result of
+ * the decisions is a series of The The The request failed because it references a resource that doesn't exist. You don't have sufficient access to perform this action. The request failed because of an internal error. Try your request again later The request failed because it exceeded a throttling quota. The request failed because one or more input parameters don't satisfy their constraint
+ * requirements. The output is provided as a list of fields and a reason for each field that
+ * isn't valid. The possible reasons include the following:
+ * UnrecognizedEntityType
+ * The policy includes an entity type that isn't found in the schema.
+ * UnrecognizedActionId
+ * The policy includes an action id that isn't found in the schema.
+ * InvalidActionApplication
+ * The policy includes an action that, according to the schema, doesn't support
+ * the specified principal and resource.
+ * UnexpectedType
+ * The policy included an operand that isn't a valid type for the specified
+ * operation.
+ * IncompatibleTypes
+ * The types of elements included in a
+ * MissingAttribute
+ * The policy attempts to access a record or entity attribute that isn't
+ * specified in the schema. Test for the existence of the attribute first before
+ * attempting to access its value. For more information, see the has (presence of attribute test) operator in the
+ * Cedar Policy Language Guide.
+ * UnsafeOptionalAttributeAccess
+ * The policy attempts to access a record or entity attribute that is optional
+ * and isn't guaranteed to be present. Test for the existence of the attribute
+ * first before attempting to access its value. For more information, see the
+ * has (presence of attribute test) operator in the
+ * Cedar Policy Language Guide.
+ * ImpossiblePolicy
+ * Cedar has determined that a policy condition always evaluates to false. If
+ * the policy is always false, it can never apply to any query, and so it can never
+ * affect an authorization decision.
+ * WrongNumberArguments
+ * The policy references an extension type with the wrong number of
+ * arguments.
+ * FunctionArgumentValidationError
+ * Cedar couldn't parse the argument passed to an extension type. For example,
+ * a string that is to be parsed as an IPv4 address can contain only digits and the
+ * period character. Base exception class for all service exceptions from VerifiedPermissions service.
+BatchIsAuthorizedWithToken
+
+
+[Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/verifiedpermissions/command/BatchIsAuthorizedWithTokenCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-verifiedpermissions/Interface/BatchIsAuthorizedWithTokenCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-verifiedpermissions/Interface/BatchIsAuthorizedWithTokenCommandOutput/)
+
diff --git a/clients/client-verifiedpermissions/src/VerifiedPermissions.ts b/clients/client-verifiedpermissions/src/VerifiedPermissions.ts
index f52de02d64624..5d2a9cf881a59 100644
--- a/clients/client-verifiedpermissions/src/VerifiedPermissions.ts
+++ b/clients/client-verifiedpermissions/src/VerifiedPermissions.ts
@@ -7,6 +7,11 @@ import {
BatchIsAuthorizedCommandInput,
BatchIsAuthorizedCommandOutput,
} from "./commands/BatchIsAuthorizedCommand";
+import {
+ BatchIsAuthorizedWithTokenCommand,
+ BatchIsAuthorizedWithTokenCommandInput,
+ BatchIsAuthorizedWithTokenCommandOutput,
+} from "./commands/BatchIsAuthorizedWithTokenCommand";
import {
CreateIdentitySourceCommand,
CreateIdentitySourceCommandInput,
@@ -119,6 +124,7 @@ import { VerifiedPermissionsClient, VerifiedPermissionsClientConfig } from "./Ve
const commands = {
BatchIsAuthorizedCommand,
+ BatchIsAuthorizedWithTokenCommand,
CreateIdentitySourceCommand,
CreatePolicyCommand,
CreatePolicyStoreCommand,
@@ -163,6 +169,23 @@ export interface VerifiedPermissions {
cb: (err: any, data?: BatchIsAuthorizedCommandOutput) => void
): void;
+ /**
+ * @see {@link BatchIsAuthorizedWithTokenCommand}
+ */
+ batchIsAuthorizedWithToken(
+ args: BatchIsAuthorizedWithTokenCommandInput,
+ options?: __HttpHandlerOptions
+ ): Promise
Allow
or Deny
responses, along
+ * with the IDs of the policies that produced each decision.entities
of a BatchIsAuthorizedWithToken
API request can
+ * contain up to 100 resources and up to 99 user groups. The requests
of a
+ * BatchIsAuthorizedWithToken
API request can contain up to 30
+ * requests.BatchIsAuthorizedWithToken
operation doesn't have its own
+ * IAM permission. To authorize this operation for Amazon Web Services principals, include the
+ * permission verifiedpermissions:IsAuthorizedWithToken
in their IAM
+ * policies.
+ *
+ *
+ * @throws {@link VerifiedPermissionsServiceException}
+ * set
, or the types of
+ * expressions used in an if...then...else
clause aren't compatible in
+ * this context.Allow
or Deny
, along with a list of the policies that
* resulted in the decision.
If you specify the identityToken
parameter, then this operation
- * derives the principal from that token. You must not also include that principal in
- * the entities
parameter or the operation fails and reports a conflict
- * between the two entity sources.
If you provide only an accessToken
, then you can include the entity
- * as part of the entities
parameter to provide additional
- * attributes.
At this time, Verified Permissions accepts tokens from only Amazon Cognito.
*Verified Permissions validates each token that is specified in a request by checking its expiration * date and its signature.
diff --git a/clients/client-verifiedpermissions/src/commands/index.ts b/clients/client-verifiedpermissions/src/commands/index.ts index 00b932898432f..2014a892d3abb 100644 --- a/clients/client-verifiedpermissions/src/commands/index.ts +++ b/clients/client-verifiedpermissions/src/commands/index.ts @@ -1,5 +1,6 @@ // smithy-typescript generated code export * from "./BatchIsAuthorizedCommand"; +export * from "./BatchIsAuthorizedWithTokenCommand"; export * from "./CreateIdentitySourceCommand"; export * from "./CreatePolicyCommand"; export * from "./CreatePolicyStoreCommand"; diff --git a/clients/client-verifiedpermissions/src/models/models_0.ts b/clients/client-verifiedpermissions/src/models/models_0.ts index 5028281cf8343..1ea04d63c695b 100644 --- a/clients/client-verifiedpermissions/src/models/models_0.ts +++ b/clients/client-verifiedpermissions/src/models/models_0.ts @@ -358,8 +358,8 @@ export class ValidationException extends __BaseException { } /** - *The type of entity that a policy store maps to groups from an Amazon Cognito user - * pool identity source.
+ *A list of user groups and entities from an Amazon Cognito user pool identity + * source.
*This data type is part of a CognitoUserPoolConfiguration structure and is a request parameter in CreateIdentitySource.
* @public */ @@ -373,8 +373,8 @@ export interface CognitoGroupConfiguration { } /** - *The type of entity that a policy store maps to groups from an Amazon Cognito user - * pool identity source.
+ *A list of user groups and entities from an Amazon Cognito user pool identity + * source.
*This data type is part of an CognitoUserPoolConfigurationDetail structure and is a response parameter to * GetIdentitySource.
* @public @@ -389,8 +389,8 @@ export interface CognitoGroupConfigurationDetail { } /** - *The type of entity that a policy store maps to groups from an Amazon Cognito user - * pool identity source.
+ *A list of user groups and entities from an Amazon Cognito user pool identity + * source.
*This data type is part of an CognitoUserPoolConfigurationItem structure and is a response parameter to * ListIdentitySources.
* @public @@ -410,7 +410,7 @@ export interface CognitoGroupConfigurationItem { *This data type is used as a field that is part of an Configuration structure that is * used as a parameter to CreateIdentitySource.
*Example:"CognitoUserPoolConfiguration":\{"UserPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","ClientIds":
- * ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": \{"groupEntityType": "MyCorp::Group"\}\}
+ * ["a1b2c3d4e5f6g7h8i9j0kalbmc"]\}
*
The type of entity that a policy store maps to groups from an Amazon Cognito user - * pool identity source.
+ *The configuration of the user groups from an Amazon Cognito user pool identity + * source.
* @public */ groupConfiguration?: CognitoGroupConfiguration; @@ -448,7 +448,7 @@ export interface CognitoUserPoolConfiguration { *This data type is used as a field that is part of an ConfigurationDetail structure that is * part of the response to GetIdentitySource.
*Example:"CognitoUserPoolConfiguration":\{"UserPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","ClientIds":
- * ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": \{"groupEntityType": "MyCorp::Group"\}\}
+ * ["a1b2c3d4e5f6g7h8i9j0kalbmc"]\}
*
The type of entity that a policy store maps to groups from an Amazon Cognito user - * pool identity source.
+ *The configuration of the user groups from an Amazon Cognito user pool identity + * source.
* @public */ groupConfiguration?: CognitoGroupConfigurationDetail; @@ -496,7 +496,7 @@ export interface CognitoUserPoolConfigurationDetail { *This data type is used as a field that is part of the ConfigurationItem structure that is * part of the response to ListIdentitySources.
*Example:"CognitoUserPoolConfiguration":\{"UserPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","ClientIds":
- * ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": \{"groupEntityType": "MyCorp::Group"\}\}
+ * ["a1b2c3d4e5f6g7h8i9j0kalbmc"]\}
*
The type of entity that a policy store maps to groups from an Amazon Cognito user - * pool identity source.
+ *The configuration of the user groups from an Amazon Cognito user pool identity + * source.
* @public */ groupConfiguration?: CognitoGroupConfigurationItem; @@ -543,7 +543,7 @@ export interface CognitoUserPoolConfigurationItem { *At this time, the only valid member of this structure is a Amazon Cognito user pool * configuration.
- *Specifies a userPoolArn
, a groupConfiguration
, and a
+ *
You must specify a userPoolArn
, and optionally, a
* ClientId
.
This data type is used as a request parameter for the CreateIdentitySource @@ -607,8 +607,7 @@ export type ConfigurationDetail = export namespace ConfigurationDetail { /** *
Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of - * authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool, - * the policy store entity that you want to assign to user groups, + * authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool * and one or more application client IDs.
*Example:
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of
- * authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool,
- * the policy store entity that you want to assign to user groups,
+ * authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool
* and one or more application client IDs. Example:
* The user group entities from an Amazon Cognito user pool identity
+ * A list of user groups and entities from an Amazon Cognito user pool identity
* source. An authorization request that you include in a Specifies the requested action to be authorized. For example,
+ * Specifies the resource that you want an authorization decision for. For example,
+ * Specifies additional context that can be used to make more granular authorization
+ * decisions. The decision, based on policy evaluation, from an individual authorization request in
* a The decision, based on policy evaluation, from an individual authorization request in a
+ * The authorization request that initiated the decision. An authorization decision that indicates if the authorization request should be allowed
+ * or denied. The list of determining policies used to make the authorization decision. For example,
+ * if there are two matching policies, where one is a forbid and the other is a permit, then
+ * the forbid policy will be the determining policy. In the case of multiple matching permit
+ * policies then there would be multiple determining policies. In the case that no policies
+ * match, and hence the response is DENY, there would be no determining policies. Errors that occurred while making an authorization decision. For example, a policy might
+ * reference an entity or attribute that doesn't exist in the request. Contains the list of entities to be considered during an authorization request. This
* includes all principals, resources, and actions required to successfully evaluate the
@@ -3517,6 +3580,24 @@ export interface BatchIsAuthorizedOutput {
results: BatchIsAuthorizedOutputItem[] | undefined;
}
+/**
+ * @public
+ */
+export interface BatchIsAuthorizedWithTokenOutput {
+ /**
+ * The identifier of the principal in the ID or access token. A series of Specifies the list of resources and their associated attributes that Verified Permissions can examine
* when evaluating the policies. You can include only resource and action entities in this parameter; you can't
- * include principals. You can't include principals in this parameter, only resource and action entities.
+ * This parameter can't include any entities of a type that matches the user or group
+ * entity types that you defined in your identity source. The Specifies the ID of the policy store. Policies in this policy store will be used to make an
+ * authorization decision for the input. Specifies an identity (ID) token for the principal that you want to authorize in each
+ * request. This token is provided to you by the identity provider (IdP) associated with
+ * the specified identity source. You must specify either an Must be an ID token. Verified Permissions returns an error if the Specifies an access token for the principal that you want to authorize in each
+ * request. This token is provided to you by the identity provider (IdP) associated with
+ * the specified identity source. You must specify either an Must be an access token. Verified Permissions returns an error if the Specifies the list of resources and their associated attributes that Verified Permissions can examine
+ * when evaluating the policies. You can't include principals in this parameter, only resource and action entities.
+ * This parameter can't include any entities of a type that matches the user or group
+ * entity types that you defined in your identity source. The For action entities, you can include only their An array of up to 30 requests that you want Verified Permissions to evaluate. Makes a series of decisions about multiple authorization requests for one token. The\n principal in this request comes from an external identity source in the form of an identity or\n access token, formatted as a JSON\n web token (JWT). The information in the parameters can also define\n additional context that Verified Permissions can include in the evaluations. The request is evaluated against all policies in the specified policy store that match the\n entities that you provide in the entities declaration and in the token. The result of\n the decisions is a series of The The Specifies the ID of the policy store. Policies in this policy store will be used to make an\n authorization decision for the input. Specifies an identity (ID) token for the principal that you want to authorize in each\n request. This token is provided to you by the identity provider (IdP) associated with\n the specified identity source. You must specify either an Must be an ID token. Verified Permissions returns an error if the Specifies an access token for the principal that you want to authorize in each\n request. This token is provided to you by the identity provider (IdP) associated with\n the specified identity source. You must specify either an Must be an access token. Verified Permissions returns an error if the Specifies the list of resources and their associated attributes that Verified Permissions can examine\n when evaluating the policies. You can't include principals in this parameter, only resource and action entities.\n This parameter can't include any entities of a type that matches the user or group\n entity types that you defined in your identity source. The For action entities, you can include only their An array of up to 30 requests that you want Verified Permissions to evaluate. Specifies the requested action to be authorized. For example,\n Specifies the resource that you want an authorization decision for. For example,\n Specifies additional context that can be used to make more granular authorization\n decisions. An authorization request that you include in a The identifier of the principal in the ID or access token. A series of The authorization request that initiated the decision. An authorization decision that indicates if the authorization request should be allowed\n or denied. The list of determining policies used to make the authorization decision. For example,\n if there are two matching policies, where one is a forbid and the other is a permit, then\n the forbid policy will be the determining policy. In the case of multiple matching permit\n policies then there would be multiple determining policies. In the case that no policies\n match, and hence the response is DENY, there would be no determining policies. Errors that occurred while making an authorization decision. For example, a policy might\n reference an entity or attribute that doesn't exist in the request. The decision, based on policy evaluation, from an individual authorization request in a\n The type of entity that a policy store maps to groups from an Amazon Cognito user \n pool identity source. This data type is part of a CognitoUserPoolConfiguration structure and is a request parameter in CreateIdentitySource. A list of user groups and entities from an Amazon Cognito user pool identity\n source. This data type is part of a CognitoUserPoolConfiguration structure and is a request parameter in CreateIdentitySource. The type of entity that a policy store maps to groups from an Amazon Cognito user \n pool identity source. This data type is part of an CognitoUserPoolConfigurationDetail structure and is a response parameter to\n GetIdentitySource. A list of user groups and entities from an Amazon Cognito user pool identity\n source. This data type is part of an CognitoUserPoolConfigurationDetail structure and is a response parameter to\n GetIdentitySource. The type of entity that a policy store maps to groups from an Amazon Cognito user \n pool identity source. This data type is part of an CognitoUserPoolConfigurationItem structure and is a response parameter to\n ListIdentitySources. A list of user groups and entities from an Amazon Cognito user pool identity\n source. This data type is part of an CognitoUserPoolConfigurationItem structure and is a response parameter to\n ListIdentitySources. The type of entity that a policy store maps to groups from an Amazon Cognito user \n pool identity source. The configuration of the user groups from an Amazon Cognito user pool identity\n source. The configuration for an identity source that represents a connection to an Amazon Cognito user pool used\n as an identity provider for Verified Permissions. This data type is used as a field that is part of an Configuration structure that is\n used as a parameter to CreateIdentitySource. Example: The configuration for an identity source that represents a connection to an Amazon Cognito user pool used\n as an identity provider for Verified Permissions. This data type is used as a field that is part of an Configuration structure that is\n used as a parameter to CreateIdentitySource. Example: The type of entity that a policy store maps to groups from an Amazon Cognito user \n pool identity source. The configuration of the user groups from an Amazon Cognito user pool identity\n source. The configuration for an identity source that represents a connection to an Amazon Cognito user pool used\n as an identity provider for Verified Permissions. This data type is used as a field that is part of an ConfigurationDetail structure that is\n part of the response to GetIdentitySource. Example: The configuration for an identity source that represents a connection to an Amazon Cognito user pool used\n as an identity provider for Verified Permissions. This data type is used as a field that is part of an ConfigurationDetail structure that is\n part of the response to GetIdentitySource. Example: The type of entity that a policy store maps to groups from an Amazon Cognito user \n pool identity source. The configuration of the user groups from an Amazon Cognito user pool identity\n source. The configuration for an identity source that represents a connection to an Amazon Cognito user pool used\n as an identity provider for Verified Permissions. This data type is used as a field that is part of the ConfigurationItem structure that is\n part of the response to ListIdentitySources. Example: The configuration for an identity source that represents a connection to an Amazon Cognito user pool used\n as an identity provider for Verified Permissions. This data type is used as a field that is part of the ConfigurationItem structure that is\n part of the response to ListIdentitySources. Example: Contains configuration information used when creating a new identity source. At this time, the only valid member of this structure is a Amazon Cognito user pool\n configuration. Specifies a This data type is used as a request parameter for the CreateIdentitySource\n operation. Contains configuration information used when creating a new identity source. At this time, the only valid member of this structure is a Amazon Cognito user pool\n configuration. You must specify a This data type is used as a request parameter for the CreateIdentitySource\n operation. Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of\n authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool,\n the policy store entity that you want to assign to user groups,\n and one or more application client IDs. Example:\n Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of\n authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool\n and one or more application client IDs. Example:\n Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of\n authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool,\n the policy store entity that you want to assign to user groups,\n and one or more application client IDs. Example:\n Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of\n authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool\n and one or more application client IDs. Example:\n Makes an authorization decision about a service request described in the parameters.\n The principal in this request comes from an external identity source in the form of an identity\n token formatted as a JSON web\n token (JWT). The information in the parameters can also define additional\n context that Verified Permissions can include in the evaluation. The request is evaluated against all\n matching policies in the specified policy store. The result of the decision is either\n If you specify the If you provide only an At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration\n date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. Makes an authorization decision about a service request described in the parameters.\n The principal in this request comes from an external identity source in the form of an identity\n token formatted as a JSON web\n token (JWT). The information in the parameters can also define additional\n context that Verified Permissions can include in the evaluation. The request is evaluated against all\n matching policies in the specified policy store. The result of the decision is either\n At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration\n date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. Specifies the list of resources and their associated attributes that Verified Permissions can examine\n when evaluating the policies. You can include only resource and action entities in this parameter; you can't\n include principals. The For action entities, you can include only their Specifies the list of resources and their associated attributes that Verified Permissions can examine\n when evaluating the policies. You can't include principals in this parameter, only resource and action entities.\n This parameter can't include any entities of a type that matches the user or group\n entity types that you defined in your identity source. The For action entities, you can include only their The user group entities from an Amazon Cognito user pool identity\n source. A list of user groups and entities from an Amazon Cognito user pool identity\n source."configuration":\{"cognitoUserPoolConfiguration":\{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds":
@@ -655,8 +654,7 @@ export type ConfigurationItem = ConfigurationItem.CognitoUserPoolConfigurationMe
export namespace ConfigurationItem {
/**
*
"configuration":\{"cognitoUserPoolConfiguration":\{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds":
@@ -2068,7 +2066,7 @@ export interface ListIdentitySourcesOutput {
}
/**
- *
BatchIsAuthorizedWithToken
+ * API request.PhotoFlash::ReadPhoto
.PhotoFlash::Photo
.BatchIsAuthorized
API request.BatchIsAuthorizedWithToken
API request.Allow
or Deny
decisions for each request, and
+ * the policies that produced them.
*
- * IsAuthorizedWithToken
operation takes principal
@@ -3640,7 +3722,7 @@ export interface IsAuthorizedWithTokenInput {
* and EntityType
. accessToken
, an
+ * identityToken
, or both.token_use
claim in the
+ * submitted token isn't id
.accessToken
, an
+ * identityToken
, or both.token_use
claim in
+ * the submitted token isn't access
.
+ *
+ * BatchIsAuthorizedWithToken
operation takes principal
+ * attributes from
+ * only
+ *
+ * the identityToken
or accessToken
passed to the
+ * operation.Identifier
+ * and EntityType
. Allow
or Deny
responses, along\n with the IDs of the policies that produced each decision.entities
of a BatchIsAuthorizedWithToken
API request can\n contain up to 100 resources and up to 99 user groups. The requests
of a\n BatchIsAuthorizedWithToken
API request can contain up to 30\n requests.BatchIsAuthorizedWithToken
operation doesn't have its own\n IAM permission. To authorize this operation for Amazon Web Services principals, include the\n permission verifiedpermissions:IsAuthorizedWithToken
in their IAM\n policies.accessToken
, an\n identityToken
, or both.token_use
claim in the\n submitted token isn't id
.accessToken
, an\n identityToken
, or both.token_use
claim in\n the submitted token isn't access
.\n
\n BatchIsAuthorizedWithToken
operation takes principal\n attributes from \n only\n \n the identityToken
or accessToken
passed to the\n operation.Identifier
\n and EntityType
. PhotoFlash::ReadPhoto
.PhotoFlash::Photo
.BatchIsAuthorizedWithToken
\n API request.Allow
or Deny
decisions for each request, and\n the policies that produced them.BatchIsAuthorizedWithToken
API request.\"CognitoUserPoolConfiguration\":{\"UserPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"ClientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"],\"groupConfiguration\": {\"groupEntityType\": \"MyCorp::Group\"}}
\n \"CognitoUserPoolConfiguration\":{\"UserPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"ClientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"]}
\n \"CognitoUserPoolConfiguration\":{\"UserPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"ClientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"],\"groupConfiguration\": {\"groupEntityType\": \"MyCorp::Group\"}}
\n \"CognitoUserPoolConfiguration\":{\"UserPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"ClientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"]}
\n \"CognitoUserPoolConfiguration\":{\"UserPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"ClientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"],\"groupConfiguration\": {\"groupEntityType\": \"MyCorp::Group\"}}
\n \"CognitoUserPoolConfiguration\":{\"UserPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"ClientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"]}
\n userPoolArn
, a groupConfiguration
, and a\n ClientId
.userPoolArn
, and optionally, a\n ClientId
.\"configuration\":{\"cognitoUserPoolConfiguration\":{\"userPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"clientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"],\"groupConfiguration\": {\"groupEntityType\": \"MyCorp::Group\"}}}
\n \"configuration\":{\"cognitoUserPoolConfiguration\":{\"userPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"clientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"],\"groupConfiguration\": {\"groupEntityType\": \"MyCorp::Group\"}}}
\n \"configuration\":{\"cognitoUserPoolConfiguration\":{\"userPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"clientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"],\"groupConfiguration\": {\"groupEntityType\": \"MyCorp::Group\"}}}
\n \"configuration\":{\"cognitoUserPoolConfiguration\":{\"userPoolArn\":\"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5\",\"clientIds\":\n [\"a1b2c3d4e5f6g7h8i9j0kalbmc\"],\"groupConfiguration\": {\"groupEntityType\": \"MyCorp::Group\"}}}
\n Allow
or Deny
, along with a list of the policies that\n resulted in the decision.identityToken
parameter, then this operation\n derives the principal from that token. You must not also include that principal in\n the entities
parameter or the operation fails and reports a conflict\n between the two entity sources.accessToken
, then you can include the entity\n as part of the entities
parameter to provide additional\n attributes.Allow
or Deny
, along with a list of the policies that\n resulted in the decision.\n
\n IsAuthorizedWithToken
operation takes principal\n attributes from \n only\n \n the identityToken
or accessToken
passed to the\n operation.Identifier
\n and EntityType
. \n
\n IsAuthorizedWithToken
operation takes principal\n attributes from \n only\n \n the identityToken
or accessToken
passed to the\n operation.Identifier
\n and EntityType
.