{-# OPTIONS_GHC -fno-warn-unused-imports #-} {-# OPTIONS_GHC -fno-warn-duplicate-exports #-} -- Derived from AWS service descriptions, licensed under Apache 2.0. -- | -- Module : Network.AWS.STS -- Copyright : (c) 2013-2015 Brendan Hay -- License : Mozilla Public License, v. 2.0. -- Maintainer : Brendan Hay -- Stability : auto-generated -- Portability : non-portable (GHC extensions) -- -- AWS Security Token Service -- -- The AWS Security Token Service (STS) is a web service that enables you -- to request temporary, limited-privilege credentials for AWS Identity and -- Access Management (IAM) users or for users that you authenticate -- (federated users). This guide provides descriptions of the STS API. For -- more detailed information about using this service, go to -- . -- -- As an alternative to using the API, you can use one of the AWS SDKs, -- which consist of libraries and sample code for various programming -- languages and platforms (Java, Ruby, .NET, iOS, Android, etc.). The SDKs -- provide a convenient way to create programmatic access to STS. For -- example, the SDKs take care of cryptographically signing requests, -- managing errors, and retrying requests automatically. For information -- about the AWS SDKs, including how to download and install them, see the -- . -- -- For information about setting up signatures and authorization through -- the API, go to -- -- in the /AWS General Reference/. For general information about the Query -- API, go to -- -- in /Using IAM/. For information about using security tokens with other -- AWS products, go to -- -- in the /Using IAM/. -- -- If you\'re new to AWS and need additional technical information about a -- specific AWS product, you can find the product\'s technical -- documentation at . -- -- __Endpoints__ -- -- The AWS Security Token Service (STS) has a default endpoint of -- https:\/\/sts.amazonaws.com that maps to the US East (N. Virginia) -- region. Additional regions are available, but must first be activated in -- the AWS Management Console before you can use a different region\'s -- endpoint. For more information about activating a region for STS see -- -- in the /Using IAM/. -- -- For information about STS endpoints, see -- -- in the /AWS General Reference/. -- -- __Recording API requests__ -- -- STS supports AWS CloudTrail, which is a service that records AWS calls -- for your AWS account and delivers log files to an Amazon S3 bucket. By -- using information collected by CloudTrail, you can determine what -- requests were successfully made to STS, who made the request, when it -- was made, and so on. To learn more about CloudTrail, including how to -- turn it on and find your log files, see the -- . -- -- /See:/ module Network.AWS.STS ( -- * Service Configuration sTS -- * Errors -- $errors -- ** MalformedPolicyDocumentException , _MalformedPolicyDocumentException -- ** InvalidAuthorizationMessageException , _InvalidAuthorizationMessageException -- ** PackedPolicyTooLargeException , _PackedPolicyTooLargeException -- ** IdPCommunicationErrorException , _IdPCommunicationErrorException -- ** InvalidIdentityTokenException , _InvalidIdentityTokenException -- ** ExpiredTokenException , _ExpiredTokenException -- ** IdPRejectedClaimException , _IdPRejectedClaimException -- * Waiters -- $waiters -- * Operations -- $operations -- ** AssumeRole , module Network.AWS.STS.AssumeRole -- ** DecodeAuthorizationMessage , module Network.AWS.STS.DecodeAuthorizationMessage -- ** AssumeRoleWithWebIdentity , module Network.AWS.STS.AssumeRoleWithWebIdentity -- ** GetFederationToken , module Network.AWS.STS.GetFederationToken -- ** GetSessionToken , module Network.AWS.STS.GetSessionToken -- ** AssumeRoleWithSAML , module Network.AWS.STS.AssumeRoleWithSAML -- * Types -- ** AssumedRoleUser , AssumedRoleUser , assumedRoleUser , aruAssumedRoleId , aruARN -- ** Credentials , Credentials , credentials , cAccessKeyId , cSecretAccessKey , cSessionToken , cExpiration -- ** FederatedUser , FederatedUser , federatedUser , fuFederatedUserId , fuARN ) where import Network.AWS.STS.AssumeRole import Network.AWS.STS.AssumeRoleWithSAML import Network.AWS.STS.AssumeRoleWithWebIdentity import Network.AWS.STS.DecodeAuthorizationMessage import Network.AWS.STS.GetFederationToken import Network.AWS.STS.GetSessionToken import Network.AWS.STS.Types import Network.AWS.STS.Waiters {- $errors Error matchers are designed for use with the functions provided by . This allows catching (and rethrowing) service specific errors returned by 'STS'. -} {- $operations Some AWS operations return results that are incomplete and require subsequent requests in order to obtain the entire result set. The process of sending subsequent requests to continue where a previous request left off is called pagination. For example, the 'ListObjects' operation of Amazon S3 returns up to 1000 objects at a time, and you must send subsequent requests with the appropriate Marker in order to retrieve the next page of results. Operations that have an 'AWSPager' instance can transparently perform subsequent requests, correctly setting Markers and other request facets to iterate through the entire result set of a truncated API operation. Operations which support this have an additional note in the documentation. Many operations have the ability to filter results on the server side. See the individual operation parameters for details. -} {- $waiters Waiters poll by repeatedly sending a request until some remote success condition configured by the 'Wait' specification is fulfilled. The 'Wait' specification determines how many attempts should be made, in addition to delay and retry strategies. -}