lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.104.0 vs lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.105.0
- old
+ new
@@ -1358,17 +1358,16 @@
# IdP uses
#
# You get all of this information from the OIDC IdP you want to use to
# access Amazon Web Services.
#
- # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
- # providers (IdPs) through our library of trusted root certificate
- # authorities (CAs) instead of using a certificate thumbprint to verify
- # your IdP server certificate. In these cases, your legacy thumbprint
- # remains in your configuration, but is no longer used for validation.
- # These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that
- # use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint.
+ # <note markdown="1"> Amazon Web Services secures communication with OIDC identity providers
+ # (IdPs) using our library of trusted root certificate authorities (CAs)
+ # to verify the JSON Web Key Set (JWKS) endpoint's TLS certificate. If
+ # your OIDC IdP relies on a certificate that is not signed by one of
+ # these trusted CAs, only then we secure communication using the
+ # thumbprints set in the IdP's configuration.
#
# </note>
#
# <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that
# this operation creates. Therefore, it is best to limit access to the
@@ -6471,16 +6470,16 @@
end
# Lists the account alias associated with the Amazon Web Services
# account (Note: you can have only one). For information about using an
# Amazon Web Services account alias, see [Creating, deleting, and
- # listing an Amazon Web Services account alias][1] in the *Amazon Web
- # Services Sign-In User Guide*.
+ # listing an Amazon Web Services account alias][1] in the *IAM User
+ # Guide*.
#
#
#
- # [1]: https://docs.aws.amazon.com/signin/latest/userguide/CreateAccountAlias.html
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/console_account-alias.html#CreateAccountAlias
#
# @option params [String] :marker
# Use this parameter only when paginating results and only after you
# receive a response indicating that the results are truncated. Set it
# to the value of the `Marker` element in the response that you received
@@ -12524,17 +12523,16 @@
# provider certificate changes, which occurs rarely. However, if the
# provider's certificate *does* change, any attempt to assume an IAM
# role that specifies the OIDC provider as a principal fails until the
# certificate thumbprint is updated.
#
- # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
- # providers (IdPs) through our library of trusted root certificate
- # authorities (CAs) instead of using a certificate thumbprint to verify
- # your IdP server certificate. In these cases, your legacy thumbprint
- # remains in your configuration, but is no longer used for validation.
- # These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that
- # use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint.
+ # <note markdown="1"> Amazon Web Services secures communication with OIDC identity providers
+ # (IdPs) using our library of trusted root certificate authorities (CAs)
+ # to verify the JSON Web Key Set (JWKS) endpoint's TLS certificate. If
+ # your OIDC IdP relies on a certificate that is not signed by one of
+ # these trusted CAs, only then we secure communication using the
+ # thumbprints set in the IdP's configuration.
#
# </note>
#
# <note markdown="1"> Trust for the OIDC provider is derived from the provider certificate
# and is validated by the thumbprint. Therefore, it is best to limit
@@ -13510,10 +13508,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-iam'
- context[:gem_version] = '1.104.0'
+ context[:gem_version] = '1.105.0'
Seahorse::Client::Request.new(handlers, context)
end
# Polls an API operation until a resource enters a desired state.
#