lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.92.0 vs lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.93.0
- old
+ new
@@ -1324,14 +1324,14 @@
# access Amazon Web Services.
#
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
# providers (IdPs) through our library of trusted root certificate
# authorities (CAs) instead of using a certificate thumbprint to verify
- # your IdP server certificate. These OIDC IdPs include Auth0, GitHub,
- # Google, and those that use an Amazon S3 bucket to host a JSON Web Key
- # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in
- # your configuration, but is no longer used for validation.
+ # your IdP server certificate. In these cases, your legacy thumbprint
+ # remains in your configuration, but is no longer used for validation.
+ # These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that
+ # use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint.
#
# </note>
#
# <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that
# this operation creates. Therefore, it is best to limit access to the
@@ -12487,14 +12487,14 @@
# certificate thumbprint is updated.
#
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
# providers (IdPs) through our library of trusted root certificate
# authorities (CAs) instead of using a certificate thumbprint to verify
- # your IdP server certificate. These OIDC IdPs include Auth0, GitHub,
- # Google, and those that use an Amazon S3 bucket to host a JSON Web Key
- # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in
- # your configuration, but is no longer used for validation.
+ # your IdP server certificate. In these cases, your legacy thumbprint
+ # remains in your configuration, but is no longer used for validation.
+ # These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that
+ # use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint.
#
# </note>
#
# <note markdown="1"> Trust for the OIDC provider is derived from the provider certificate
# and is validated by the thumbprint. Therefore, it is best to limit
@@ -13465,10 +13465,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-iam'
- context[:gem_version] = '1.92.0'
+ context[:gem_version] = '1.93.0'
Seahorse::Client::Request.new(handlers, context)
end
# Polls an API operation until a resource enters a desired state.
#