@@ -1412,8 +1412,15 @@ namespace Model
1412
1412
* href="http://openid.net/connect/">OpenID Connect (OIDC)</a>.</p> <p>The OIDC
1413
1413
* provider that you create with this operation can be used as a principal in a
1414
1414
* role's trust policy. Such a policy establishes a trust relationship between AWS
1415
- * and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify
1416
- * the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1415
+ * and the OIDC provider.</p> <p>If you are using an OIDC identity provider from
1416
+ * Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM
1417
+ * identity provider. These OIDC identity providers are already built-in to AWS and
1418
+ * are available for your use. Instead, you can move directly to creating new roles
1419
+ * using your identity provider. To learn more, see <a
1420
+ * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html">Creating
1421
+ * a role for web identity or OpenID connect federation</a> in the <i>IAM User
1422
+ * Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the
1423
+ * following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1417
1424
* trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that
1418
1425
* identify the application or applications that are allowed to authenticate using
1419
1426
* the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server
@@ -1433,8 +1440,15 @@ namespace Model
1433
1440
* href="http://openid.net/connect/">OpenID Connect (OIDC)</a>.</p> <p>The OIDC
1434
1441
* provider that you create with this operation can be used as a principal in a
1435
1442
* role's trust policy. Such a policy establishes a trust relationship between AWS
1436
- * and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify
1437
- * the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1443
+ * and the OIDC provider.</p> <p>If you are using an OIDC identity provider from
1444
+ * Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM
1445
+ * identity provider. These OIDC identity providers are already built-in to AWS and
1446
+ * are available for your use. Instead, you can move directly to creating new roles
1447
+ * using your identity provider. To learn more, see <a
1448
+ * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html">Creating
1449
+ * a role for web identity or OpenID connect federation</a> in the <i>IAM User
1450
+ * Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the
1451
+ * following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1438
1452
* trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that
1439
1453
* identify the application or applications that are allowed to authenticate using
1440
1454
* the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server
@@ -1456,8 +1470,15 @@ namespace Model
1456
1470
* href="http://openid.net/connect/">OpenID Connect (OIDC)</a>.</p> <p>The OIDC
1457
1471
* provider that you create with this operation can be used as a principal in a
1458
1472
* role's trust policy. Such a policy establishes a trust relationship between AWS
1459
- * and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify
1460
- * the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1473
+ * and the OIDC provider.</p> <p>If you are using an OIDC identity provider from
1474
+ * Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM
1475
+ * identity provider. These OIDC identity providers are already built-in to AWS and
1476
+ * are available for your use. Instead, you can move directly to creating new roles
1477
+ * using your identity provider. To learn more, see <a
1478
+ * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html">Creating
1479
+ * a role for web identity or OpenID connect federation</a> in the <i>IAM User
1480
+ * Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the
1481
+ * following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1461
1482
* trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that
1462
1483
* identify the application or applications that are allowed to authenticate using
1463
1484
* the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server
0 commit comments