Skip to content

Commit a1c5c2e

Browse files
author
AWS
committed
AWS SSO OIDC Update: This release includes exception definition and documentation updates.
1 parent a44ccbf commit a1c5c2e

File tree

2 files changed

+35
-7
lines changed

2 files changed

+35
-7
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS SSO OIDC",
4+
"contributor": "",
5+
"description": "This release includes exception definition and documentation updates."
6+
}

services/ssooidc/src/main/resources/codegen-resources/service-2.json

Lines changed: 29 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262
{"shape":"InternalServerException"},
6363
{"shape":"InvalidRequestRegionException"}
6464
],
65-
"documentation":"<p>Creates and returns access and refresh tokens for clients and applications that are authenticated using IAM entities. The access token can be used to fetch short-lived credentials for the assigned Amazon Web Services accounts or to access application APIs using <code>bearer</code> authentication.</p>"
65+
"documentation":"<p>Creates and returns access and refresh tokens for authorized client applications that are authenticated using any IAM entity, such as a service role or user. These tokens might contain defined scopes that specify permissions such as <code>read:profile</code> or <code>write:data</code>. Through downscoping, you can use the scopes parameter to request tokens with reduced permissions compared to the original client application's permissions or, if applicable, the refresh token's scopes. The access token can be used to fetch short-lived credentials for the assigned Amazon Web Services accounts or to access application APIs using <code>bearer</code> authentication.</p> <note> <p>This API is used with Signature Version 4. For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_sigv.html\">Amazon Web Services Signature Version 4 for API Requests</a>.</p> </note>"
6666
},
6767
"RegisterClient":{
6868
"name":"RegisterClient",
@@ -78,7 +78,8 @@
7878
{"shape":"InvalidClientMetadataException"},
7979
{"shape":"InternalServerException"},
8080
{"shape":"InvalidRedirectUriException"},
81-
{"shape":"UnsupportedGrantTypeException"}
81+
{"shape":"UnsupportedGrantTypeException"},
82+
{"shape":"SlowDownException"}
8283
],
8384
"documentation":"<p>Registers a public client with IAM Identity Center. This allows clients to perform authorization using the authorization code grant with Proof Key for Code Exchange (PKCE) or the device code grant.</p>",
8485
"authtype":"none",
@@ -112,6 +113,10 @@
112113
"shape":"Error",
113114
"documentation":"<p>Single error code. For this exception the value will be <code>access_denied</code>.</p>"
114115
},
116+
"reason":{
117+
"shape":"AccessDeniedExceptionReason",
118+
"documentation":"<p>A string that uniquely identifies a reason for the error.</p>"
119+
},
115120
"error_description":{
116121
"shape":"ErrorDescription",
117122
"documentation":"<p>Human-readable text providing additional information, used to assist the client developer in understanding the error that occurred.</p>"
@@ -121,6 +126,10 @@
121126
"error":{"httpStatusCode":400},
122127
"exception":true
123128
},
129+
"AccessDeniedExceptionReason":{
130+
"type":"string",
131+
"enum":["KMS_AccessDeniedException"]
132+
},
124133
"AccessToken":{
125134
"type":"string",
126135
"sensitive":true
@@ -152,10 +161,10 @@
152161
"members":{
153162
"identityContext":{
154163
"shape":"IdentityContext",
155-
"documentation":"<p>STS context assertion that carries a user identifier to the Amazon Web Services service that it calls and can be used to obtain an identity-enhanced IAM role session. This value corresponds to the <code>sts:identity_context</code> claim in the ID token.</p>"
164+
"documentation":"<p>The trusted context assertion is signed and encrypted by STS. It provides access to <code>sts:identity_context</code> claim in the <code>idToken</code> without JWT parsing</p> <p>Identity context comprises information that Amazon Web Services services use to make authorization decisions when they receive requests.</p>"
156165
}
157166
},
158-
"documentation":"<p>This structure contains Amazon Web Services-specific parameter extensions for the token endpoint responses and includes the identity context.</p>"
167+
"documentation":"<p>This structure contains Amazon Web Services-specific parameter extensions and the <a href=\"https://docs.aws.amazon.com/singlesignon/latest/userguide/trustedidentitypropagation-overview.html\">identity context</a>.</p>"
159168
},
160169
"ClientId":{"type":"string"},
161170
"ClientName":{"type":"string"},
@@ -202,7 +211,7 @@
202211
},
203212
"scope":{
204213
"shape":"Scopes",
205-
"documentation":"<p>The list of scopes for which authorization is requested. The access token that is issued is limited to the scopes that are granted. If this value is not specified, IAM Identity Center authorizes all scopes that are configured for the client during the call to <a>RegisterClient</a>.</p>"
214+
"documentation":"<p>The list of scopes for which authorization is requested. This parameter has no effect; the access token will always include all scopes configured during client registration.</p>"
206215
},
207216
"redirectUri":{
208217
"shape":"URI",
@@ -325,7 +334,7 @@
325334
},
326335
"awsAdditionalDetails":{
327336
"shape":"AwsAdditionalDetails",
328-
"documentation":"<p>A structure containing information from the <code>idToken</code>. Only the <code>identityContext</code> is in it, which is a value extracted from the <code>idToken</code>. This provides direct access to identity information without requiring JWT parsing.</p>"
337+
"documentation":"<p>A structure containing information from IAM Identity Center managed user and group information.</p>"
329338
}
330339
}
331340
},
@@ -448,6 +457,10 @@
448457
"shape":"Error",
449458
"documentation":"<p>Single error code. For this exception the value will be <code>invalid_request</code>.</p>"
450459
},
460+
"reason":{
461+
"shape":"InvalidRequestExceptionReason",
462+
"documentation":"<p>A string that uniquely identifies a reason for the error.</p>"
463+
},
451464
"error_description":{
452465
"shape":"ErrorDescription",
453466
"documentation":"<p>Human-readable text providing additional information, used to assist the client developer in understanding the error that occurred.</p>"
@@ -457,6 +470,15 @@
457470
"error":{"httpStatusCode":400},
458471
"exception":true
459472
},
473+
"InvalidRequestExceptionReason":{
474+
"type":"string",
475+
"enum":[
476+
"KMS_NotFoundException",
477+
"KMS_InvalidKeyUsageException",
478+
"KMS_InvalidStateException",
479+
"KMS_DisabledException"
480+
]
481+
},
460482
"InvalidRequestRegionException":{
461483
"type":"structure",
462484
"members":{
@@ -687,5 +709,5 @@
687709
},
688710
"UserCode":{"type":"string"}
689711
},
690-
"documentation":"<p>IAM Identity Center OpenID Connect (OIDC) is a web service that enables a client (such as CLI or a native application) to register with IAM Identity Center. The service also enables the client to fetch the user’s access token upon successful authentication and authorization with IAM Identity Center.</p> <p> <b>API namespaces</b> </p> <p>IAM Identity Center uses the <code>sso</code> and <code>identitystore</code> API namespaces. IAM Identity Center OpenID Connect uses the <code>sso-oidc</code> namespace.</p> <p> <b>Considerations for using this guide</b> </p> <p>Before you begin using this guide, we recommend that you first review the following important information about how the IAM Identity Center OIDC service works.</p> <ul> <li> <p>The IAM Identity Center OIDC service currently implements only the portions of the OAuth 2.0 Device Authorization Grant standard (<a href=\"https://tools.ietf.org/html/rfc8628\">https://tools.ietf.org/html/rfc8628</a>) that are necessary to enable single sign-on authentication with the CLI. </p> </li> <li> <p>With older versions of the CLI, the service only emits OIDC access tokens, so to obtain a new token, users must explicitly re-authenticate. To access the OIDC flow that supports token refresh and doesn’t require re-authentication, update to the latest CLI version (1.27.10 for CLI V1 and 2.9.0 for CLI V2) with support for OIDC token refresh and configurable IAM Identity Center session durations. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/userguide/configure-user-session.html\">Configure Amazon Web Services access portal session duration </a>. </p> </li> <li> <p>The access tokens provided by this service grant access to all Amazon Web Services account entitlements assigned to an IAM Identity Center user, not just a particular application.</p> </li> <li> <p>The documentation in this guide does not describe the mechanism to convert the access token into Amazon Web Services Auth (“sigv4”) credentials for use with IAM-protected Amazon Web Services service endpoints. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/PortalAPIReference/API_GetRoleCredentials.html\">GetRoleCredentials</a> in the <i>IAM Identity Center Portal API Reference Guide</i>.</p> </li> </ul> <p>For general information about IAM Identity Center, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html\">What is IAM Identity Center?</a> in the <i>IAM Identity Center User Guide</i>.</p>"
712+
"documentation":"<p>IAM Identity Center OpenID Connect (OIDC) is a web service that enables a client (such as CLI or a native application) to register with IAM Identity Center. The service also enables the client to fetch the user’s access token upon successful authentication and authorization with IAM Identity Center.</p> <p> <b>API namespaces</b> </p> <p>IAM Identity Center uses the <code>sso</code> and <code>identitystore</code> API namespaces. IAM Identity Center OpenID Connect uses the <code>sso-oauth</code> namespace.</p> <p> <b>Considerations for using this guide</b> </p> <p>Before you begin using this guide, we recommend that you first review the following important information about how the IAM Identity Center OIDC service works.</p> <ul> <li> <p>The IAM Identity Center OIDC service currently implements only the portions of the OAuth 2.0 Device Authorization Grant standard (<a href=\"https://tools.ietf.org/html/rfc8628\">https://tools.ietf.org/html/rfc8628</a>) that are necessary to enable single sign-on authentication with the CLI. </p> </li> <li> <p>With older versions of the CLI, the service only emits OIDC access tokens, so to obtain a new token, users must explicitly re-authenticate. To access the OIDC flow that supports token refresh and doesn’t require re-authentication, update to the latest CLI version (1.27.10 for CLI V1 and 2.9.0 for CLI V2) with support for OIDC token refresh and configurable IAM Identity Center session durations. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/userguide/configure-user-session.html\">Configure Amazon Web Services access portal session duration </a>. </p> </li> <li> <p>The access tokens provided by this service grant access to all Amazon Web Services account entitlements assigned to an IAM Identity Center user, not just a particular application.</p> </li> <li> <p>The documentation in this guide does not describe the mechanism to convert the access token into Amazon Web Services Auth (“sigv4”) credentials for use with IAM-protected Amazon Web Services service endpoints. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/PortalAPIReference/API_GetRoleCredentials.html\">GetRoleCredentials</a> in the <i>IAM Identity Center Portal API Reference Guide</i>.</p> </li> </ul> <p>For general information about IAM Identity Center, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html\">What is IAM Identity Center?</a> in the <i>IAM Identity Center User Guide</i>.</p>"
691713
}

0 commit comments

Comments
 (0)