@@ -187,6 +187,11 @@ import {
187
187
GetApplicationGrantCommandInput,
188
188
GetApplicationGrantCommandOutput,
189
189
} from "./commands/GetApplicationGrantCommand";
190
+
import {
191
+
GetApplicationSessionConfigurationCommand,
192
+
GetApplicationSessionConfigurationCommandInput,
193
+
GetApplicationSessionConfigurationCommandOutput,
194
+
} from "./commands/GetApplicationSessionConfigurationCommand";
190
195
import {
191
196
GetInlinePolicyForPermissionSetCommand,
192
197
GetInlinePolicyForPermissionSetCommandInput,
@@ -322,6 +327,11 @@ import {
322
327
PutApplicationGrantCommandInput,
323
328
PutApplicationGrantCommandOutput,
324
329
} from "./commands/PutApplicationGrantCommand";
330
+
import {
331
+
PutApplicationSessionConfigurationCommand,
332
+
PutApplicationSessionConfigurationCommandInput,
333
+
PutApplicationSessionConfigurationCommandOutput,
334
+
} from "./commands/PutApplicationSessionConfigurationCommand";
325
335
import {
326
336
PutInlinePolicyToPermissionSetCommand,
327
337
PutInlinePolicyToPermissionSetCommandInput,
@@ -403,6 +413,7 @@ const commands = {
403
413
GetApplicationAssignmentConfigurationCommand,
404
414
GetApplicationAuthenticationMethodCommand,
405
415
GetApplicationGrantCommand,
416
+
GetApplicationSessionConfigurationCommand,
406
417
GetInlinePolicyForPermissionSetCommand,
407
418
GetPermissionsBoundaryForPermissionSetCommand,
408
419
ListAccountAssignmentCreationStatusCommand,
@@ -430,6 +441,7 @@ const commands = {
430
441
PutApplicationAssignmentConfigurationCommand,
431
442
PutApplicationAuthenticationMethodCommand,
432
443
PutApplicationGrantCommand,
444
+
PutApplicationSessionConfigurationCommand,
433
445
PutInlinePolicyToPermissionSetCommand,
434
446
PutPermissionsBoundaryToPermissionSetCommand,
435
447
TagResourceCommand,
@@ -1066,6 +1078,23 @@ export interface SSOAdmin {
1066
1078
cb: (err: any, data?: GetApplicationGrantCommandOutput) => void
1067
1079
): void;
1068
1080
1081
+
/**
1082
+
* @see {@link GetApplicationSessionConfigurationCommand}
1083
+
*/
1084
+
getApplicationSessionConfiguration(
1085
+
args: GetApplicationSessionConfigurationCommandInput,
1086
+
options?: __HttpHandlerOptions
1087
+
): Promise<GetApplicationSessionConfigurationCommandOutput>;
1088
+
getApplicationSessionConfiguration(
1089
+
args: GetApplicationSessionConfigurationCommandInput,
1090
+
cb: (err: any, data?: GetApplicationSessionConfigurationCommandOutput) => void
1091
+
): void;
1092
+
getApplicationSessionConfiguration(
1093
+
args: GetApplicationSessionConfigurationCommandInput,
1094
+
options: __HttpHandlerOptions,
1095
+
cb: (err: any, data?: GetApplicationSessionConfigurationCommandOutput) => void
1096
+
): void;
1097
+
1069
1098
/**
1070
1099
* @see {@link GetInlinePolicyForPermissionSetCommand}
1071
1100
*/
@@ -1521,6 +1550,23 @@ export interface SSOAdmin {
1521
1550
cb: (err: any, data?: PutApplicationGrantCommandOutput) => void
1522
1551
): void;
1523
1552
1553
+
/**
1554
+
* @see {@link PutApplicationSessionConfigurationCommand}
1555
+
*/
1556
+
putApplicationSessionConfiguration(
1557
+
args: PutApplicationSessionConfigurationCommandInput,
1558
+
options?: __HttpHandlerOptions
1559
+
): Promise<PutApplicationSessionConfigurationCommandOutput>;
1560
+
putApplicationSessionConfiguration(
1561
+
args: PutApplicationSessionConfigurationCommandInput,
1562
+
cb: (err: any, data?: PutApplicationSessionConfigurationCommandOutput) => void
1563
+
): void;
1564
+
putApplicationSessionConfiguration(
1565
+
args: PutApplicationSessionConfigurationCommandInput,
1566
+
options: __HttpHandlerOptions,
1567
+
cb: (err: any, data?: PutApplicationSessionConfigurationCommandOutput) => void
1568
+
): void;
1569
+
1524
1570
/**
1525
1571
* @see {@link PutInlinePolicyToPermissionSetCommand}
1526
1572
*/
@@ -1661,38 +1707,7 @@ export interface SSOAdmin {
1661
1707
}
1662
1708
1663
1709
/**
1664
-
* <p>IAM Identity Center is the Amazon Web Services solution for connecting your workforce users to Amazon Web Services managed
1665
-
* applications and other Amazon Web Services resources. You can connect your existing identity provider
1666
-
* and synchronize users and groups from your directory, or create and manage your users
1667
-
* directly in IAM Identity Center. You can then use IAM Identity Center for either or both of the following:</p>
1668
-
* <ul>
1669
-
* <li>
1670
-
* <p>User access to applications</p>
1671
-
* </li>
1672
-
* <li>
1673
-
* <p>User access to Amazon Web Services accounts</p>
1674
-
* </li>
1675
-
* </ul>
1676
-
* <p>This guide provides information about single sign-on operations that you can use for access to applications and
1677
-
* Amazon Web Services accounts. For information about IAM Identity Center features, see the
1678
-
* <a href="https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html">IAM Identity Center
1679
-
* User Guide</a>.</p>
1680
-
* <note>
1681
-
* <p>IAM Identity Center uses the <code>sso</code> and <code>identitystore</code> API
1682
-
* namespaces.</p>
1683
-
* </note>
1684
-
* <p>Many API operations for IAM Identity Center rely on identifiers for users and groups, known as
1685
-
* principals. For more information about how to work with principals and principal IDs in
1686
-
* IAM Identity Center, see the <a href="https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/welcome.html">Identity Store API
1687
-
* Reference</a>.</p>
1688
-
* <note>
1689
-
* <p>Amazon Web Services provides SDKs that consist of libraries and sample code for various
1690
-
* programming languages and platforms (Java, Ruby, .Net, iOS, Android, and more). The
1691
-
* SDKs provide a convenient way to create programmatic access to IAM Identity Center and other Amazon Web Services
1692
-
* services. For more information about the Amazon Web Services SDKs, including how to download and
1693
-
* install them, see <a href="http://aws.amazon.com/tools/">Tools for Amazon Web
1694
-
* Services</a>.</p>
1695
-
* </note>
1710
+
* <p>IAM Identity Center is the Amazon Web Services solution for connecting your workforce users to Amazon Web Services managed applications and other Amazon Web Services resources. You can connect your existing identity provider and synchronize users and groups from your directory, or create and manage your users directly in IAM Identity Center. You can then use IAM Identity Center for either or both of the following:</p> <ul> <li> <p>User access to applications</p> </li> <li> <p>User access to Amazon Web Services accounts</p> </li> </ul> <p>This guide provides information about single sign-on operations that you can use for access to applications and Amazon Web Services accounts. For information about IAM Identity Center features, see the <a href="https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html">IAM Identity Center User Guide</a>.</p> <note> <p>IAM Identity Center uses the <code>sso</code> and <code>identitystore</code> API namespaces.</p> </note> <p>Many API operations for IAM Identity Center rely on identifiers for users and groups, known as principals. For more information about how to work with principals and principal IDs in IAM Identity Center, see the <a href="https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/welcome.html">Identity Store API Reference</a>.</p> <note> <p>Amazon Web Services provides SDKs that consist of libraries and sample code for various programming languages and platforms (Java, Ruby, .Net, iOS, Android, and more). The SDKs provide a convenient way to create programmatic access to IAM Identity Center and other Amazon Web Services services. For more information about the Amazon Web Services SDKs, including how to download and install them, see <a href="http://aws.amazon.com/tools/">Tools for Amazon Web Services</a>.</p> </note>
1696
1711
* @public
1697
1712
*/
1698
1713
export class SSOAdmin extends SSOAdminClient implements SSOAdmin {}
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4