Skip to content

Commit 9be7f32

Browse files
author
aws-sdk-cpp-automation
committed
Customers can now use resource-based policies to control access to their Lex V2 bots. This release adds APIs to attach and manage permissions for a bot or a bot alias. For details, see: https://docs.aws.amazon.com/lexv2/latest/dg/security_iam_service-with-iam.html
Documentation updates for AWS Identity and Access Management (IAM). Add ARN based Row Level Security support to CreateDataSet/UpdateDataSet APIs. Added new API to stop a solution version creation that is pending or in progress for Amazon Personalize
1 parent 3d05686 commit 9be7f32

File tree

45 files changed

+4599
-42
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+4599
-42
lines changed

aws-cpp-sdk-core/include/aws/core/VersionConfig.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* SPDX-License-Identifier: Apache-2.0.
44
*/
55

6-
#define AWS_SDK_VERSION_STRING "1.9.23"
6+
#define AWS_SDK_VERSION_STRING "1.9.24"
77
#define AWS_SDK_VERSION_MAJOR 1
88
#define AWS_SDK_VERSION_MINOR 9
9-
#define AWS_SDK_VERSION_PATCH 23
9+
#define AWS_SDK_VERSION_PATCH 24

aws-cpp-sdk-iam/include/aws/iam/IAMClient.h

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1412,8 +1412,15 @@ namespace Model
14121412
* href="http://openid.net/connect/">OpenID Connect (OIDC)</a>.</p> <p>The OIDC
14131413
* provider that you create with this operation can be used as a principal in a
14141414
* role's trust policy. Such a policy establishes a trust relationship between AWS
1415-
* and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify
1416-
* the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1415+
* and the OIDC provider.</p> <p>If you are using an OIDC identity provider from
1416+
* Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM
1417+
* identity provider. These OIDC identity providers are already built-in to AWS and
1418+
* are available for your use. Instead, you can move directly to creating new roles
1419+
* using your identity provider. To learn more, see <a
1420+
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html">Creating
1421+
* a role for web identity or OpenID connect federation</a> in the <i>IAM User
1422+
* Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the
1423+
* following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
14171424
* trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that
14181425
* identify the application or applications that are allowed to authenticate using
14191426
* the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server
@@ -1433,8 +1440,15 @@ namespace Model
14331440
* href="http://openid.net/connect/">OpenID Connect (OIDC)</a>.</p> <p>The OIDC
14341441
* provider that you create with this operation can be used as a principal in a
14351442
* role's trust policy. Such a policy establishes a trust relationship between AWS
1436-
* and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify
1437-
* the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1443+
* and the OIDC provider.</p> <p>If you are using an OIDC identity provider from
1444+
* Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM
1445+
* identity provider. These OIDC identity providers are already built-in to AWS and
1446+
* are available for your use. Instead, you can move directly to creating new roles
1447+
* using your identity provider. To learn more, see <a
1448+
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html">Creating
1449+
* a role for web identity or OpenID connect federation</a> in the <i>IAM User
1450+
* Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the
1451+
* following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
14381452
* trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that
14391453
* identify the application or applications that are allowed to authenticate using
14401454
* the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server
@@ -1456,8 +1470,15 @@ namespace Model
14561470
* href="http://openid.net/connect/">OpenID Connect (OIDC)</a>.</p> <p>The OIDC
14571471
* provider that you create with this operation can be used as a principal in a
14581472
* role's trust policy. Such a policy establishes a trust relationship between AWS
1459-
* and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify
1460-
* the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
1473+
* and the OIDC provider.</p> <p>If you are using an OIDC identity provider from
1474+
* Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM
1475+
* identity provider. These OIDC identity providers are already built-in to AWS and
1476+
* are available for your use. Instead, you can move directly to creating new roles
1477+
* using your identity provider. To learn more, see <a
1478+
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html">Creating
1479+
* a role for web identity or OpenID connect federation</a> in the <i>IAM User
1480+
* Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the
1481+
* following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to
14611482
* trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that
14621483
* identify the application or applications that are allowed to authenticate using
14631484
* the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server

0 commit comments

Comments
 (0)