lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.56.0 vs lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.57.0
- old
+ new
@@ -1248,10 +1248,20 @@
# IdP uses
#
# You get all of this information from the OIDC IdP that you want to use
# to access Amazon Web Services.
#
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
+ # providers (IdPs) through our library of trusted certificate
+ # authorities (CAs) instead of using a certificate thumbprint to verify
+ # your IdP server certificate. These OIDC IdPs include Google, and those
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
+ # endpoint. In these cases, your legacy thumbprint remains in your
+ # configuration, but is no longer used for validation.
+ #
+ # </note>
+ #
# <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that
# this operation creates. Therefore, it is best to limit access to the
# CreateOpenIDConnectProvider operation to highly privileged users.
#
# </note>
@@ -12165,22 +12175,32 @@
#
# The list that you pass with this operation completely replaces the
# existing list of thumbprints. (The lists are not merged.)
#
# Typically, you need to update a thumbprint only when the identity
- # provider's certificate changes, which occurs rarely. However, if the
+ # provider certificate changes, which occurs rarely. However, if the
# provider's certificate *does* change, any attempt to assume an IAM
# role that specifies the OIDC provider as a principal fails until the
# certificate thumbprint is updated.
#
- # <note markdown="1"> Trust for the OIDC provider is derived from the provider's
- # certificate and is validated by the thumbprint. Therefore, it is best
- # to limit access to the `UpdateOpenIDConnectProviderThumbprint`
- # operation to highly privileged users.
+ # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
+ # providers (IdPs) through our library of trusted certificate
+ # authorities (CAs) instead of using a certificate thumbprint to verify
+ # your IdP server certificate. These OIDC IdPs include Google, and those
+ # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
+ # endpoint. In these cases, your legacy thumbprint remains in your
+ # configuration, but is no longer used for validation.
#
# </note>
#
+ # <note markdown="1"> Trust for the OIDC provider is derived from the provider certificate
+ # and is validated by the thumbprint. Therefore, it is best to limit
+ # access to the `UpdateOpenIDConnectProviderThumbprint` operation to
+ # highly privileged users.
+ #
+ # </note>
+ #
# @option params [required, String] :open_id_connect_provider_arn
# The Amazon Resource Name (ARN) of the IAM OIDC provider resource
# object for which you want to update the thumbprint. You can get a list
# of OIDC provider ARNs by using the ListOpenIDConnectProviders
# operation.
@@ -13138,10 +13158,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-iam'
- context[:gem_version] = '1.56.0'
+ context[:gem_version] = '1.57.0'
Seahorse::Client::Request.new(handlers, context)
end
# Polls an API operation until a resource enters a desired state.
#