lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.92.0 vs lib/aws-sdk-iam/client.rb in aws-sdk-iam-1.93.0

- old
+ new

@@ -1324,14 +1324,14 @@ # access Amazon Web Services. # # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity # providers (IdPs) through our library of trusted root certificate # authorities (CAs) instead of using a certificate thumbprint to verify - # your IdP server certificate. These OIDC IdPs include Auth0, GitHub, - # Google, and those that use an Amazon S3 bucket to host a JSON Web Key - # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in - # your configuration, but is no longer used for validation. + # your IdP server certificate. In these cases, your legacy thumbprint + # remains in your configuration, but is no longer used for validation. + # These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that + # use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. # # </note> # # <note markdown="1"> The trust for the OIDC provider is derived from the IAM provider that # this operation creates. Therefore, it is best to limit access to the @@ -12487,14 +12487,14 @@ # certificate thumbprint is updated. # # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity # providers (IdPs) through our library of trusted root certificate # authorities (CAs) instead of using a certificate thumbprint to verify - # your IdP server certificate. These OIDC IdPs include Auth0, GitHub, - # Google, and those that use an Amazon S3 bucket to host a JSON Web Key - # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in - # your configuration, but is no longer used for validation. + # your IdP server certificate. In these cases, your legacy thumbprint + # remains in your configuration, but is no longer used for validation. + # These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that + # use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. # # </note> # # <note markdown="1"> Trust for the OIDC provider is derived from the provider certificate # and is validated by the thumbprint. Therefore, it is best to limit @@ -13465,10 +13465,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-iam' - context[:gem_version] = '1.92.0' + context[:gem_version] = '1.93.0' Seahorse::Client::Request.new(handlers, context) end # Polls an API operation until a resource enters a desired state. #