/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include Contains the response to a successful AssumeRoleWithSAML request,
* including temporary AWS credentials that can be used to make AWS requests.
* See Also:
AWS
* API Reference
The temporary security credentials, which include an access key ID, a secret * access key, and a security (or session) token.
The size of the * security token that STS API operations return is not fixed. We strongly * recommend that you make no assumptions about the maximum size.
*/ inline const Credentials& GetCredentials() const{ return m_credentials; } /** *The temporary security credentials, which include an access key ID, a secret * access key, and a security (or session) token.
The size of the * security token that STS API operations return is not fixed. We strongly * recommend that you make no assumptions about the maximum size.
*/ inline void SetCredentials(const Credentials& value) { m_credentials = value; } /** *The temporary security credentials, which include an access key ID, a secret * access key, and a security (or session) token.
The size of the * security token that STS API operations return is not fixed. We strongly * recommend that you make no assumptions about the maximum size.
*/ inline void SetCredentials(Credentials&& value) { m_credentials = std::move(value); } /** *The temporary security credentials, which include an access key ID, a secret * access key, and a security (or session) token.
The size of the * security token that STS API operations return is not fixed. We strongly * recommend that you make no assumptions about the maximum size.
*/ inline AssumeRoleWithSAMLResult& WithCredentials(const Credentials& value) { SetCredentials(value); return *this;} /** *The temporary security credentials, which include an access key ID, a secret * access key, and a security (or session) token.
The size of the * security token that STS API operations return is not fixed. We strongly * recommend that you make no assumptions about the maximum size.
*/ inline AssumeRoleWithSAMLResult& WithCredentials(Credentials&& value) { SetCredentials(std::move(value)); return *this;} /** *The identifiers for the temporary security credentials that the operation * returns.
*/ inline const AssumedRoleUser& GetAssumedRoleUser() const{ return m_assumedRoleUser; } /** *The identifiers for the temporary security credentials that the operation * returns.
*/ inline void SetAssumedRoleUser(const AssumedRoleUser& value) { m_assumedRoleUser = value; } /** *The identifiers for the temporary security credentials that the operation * returns.
*/ inline void SetAssumedRoleUser(AssumedRoleUser&& value) { m_assumedRoleUser = std::move(value); } /** *The identifiers for the temporary security credentials that the operation * returns.
*/ inline AssumeRoleWithSAMLResult& WithAssumedRoleUser(const AssumedRoleUser& value) { SetAssumedRoleUser(value); return *this;} /** *The identifiers for the temporary security credentials that the operation * returns.
*/ inline AssumeRoleWithSAMLResult& WithAssumedRoleUser(AssumedRoleUser&& value) { SetAssumedRoleUser(std::move(value)); return *this;} /** *A percentage value that indicates the packed size of the session policies and * session tags combined passed in the request. The request fails if the packed * size is greater than 100 percent, which means the policies and tags exceeded the * allowed space.
*/ inline int GetPackedPolicySize() const{ return m_packedPolicySize; } /** *A percentage value that indicates the packed size of the session policies and * session tags combined passed in the request. The request fails if the packed * size is greater than 100 percent, which means the policies and tags exceeded the * allowed space.
*/ inline void SetPackedPolicySize(int value) { m_packedPolicySize = value; } /** *A percentage value that indicates the packed size of the session policies and * session tags combined passed in the request. The request fails if the packed * size is greater than 100 percent, which means the policies and tags exceeded the * allowed space.
*/ inline AssumeRoleWithSAMLResult& WithPackedPolicySize(int value) { SetPackedPolicySize(value); return *this;} /** *The value of the NameID element in the Subject
* element of the SAML assertion.
The value of the NameID element in the Subject
* element of the SAML assertion.
The value of the NameID element in the Subject
* element of the SAML assertion.
The value of the NameID element in the Subject
* element of the SAML assertion.
The value of the NameID element in the Subject
* element of the SAML assertion.
The value of the NameID element in the Subject
* element of the SAML assertion.
The value of the NameID element in the Subject
* element of the SAML assertion.
The format of the name ID, as defined by the Format attribute
* in the NameID element of the SAML assertion. Typical examples of
* the format are transient or persistent.
If
* the format includes the prefix
* urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
* For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
* returned as transient. If the format includes any other prefix, the
* format is returned with no modifications.
The format of the name ID, as defined by the Format attribute
* in the NameID element of the SAML assertion. Typical examples of
* the format are transient or persistent.
If
* the format includes the prefix
* urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
* For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
* returned as transient. If the format includes any other prefix, the
* format is returned with no modifications.
The format of the name ID, as defined by the Format attribute
* in the NameID element of the SAML assertion. Typical examples of
* the format are transient or persistent.
If
* the format includes the prefix
* urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
* For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
* returned as transient. If the format includes any other prefix, the
* format is returned with no modifications.
The format of the name ID, as defined by the Format attribute
* in the NameID element of the SAML assertion. Typical examples of
* the format are transient or persistent.
If
* the format includes the prefix
* urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
* For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
* returned as transient. If the format includes any other prefix, the
* format is returned with no modifications.
The format of the name ID, as defined by the Format attribute
* in the NameID element of the SAML assertion. Typical examples of
* the format are transient or persistent.
If
* the format includes the prefix
* urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
* For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
* returned as transient. If the format includes any other prefix, the
* format is returned with no modifications.
The format of the name ID, as defined by the Format attribute
* in the NameID element of the SAML assertion. Typical examples of
* the format are transient or persistent.
If
* the format includes the prefix
* urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
* For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
* returned as transient. If the format includes any other prefix, the
* format is returned with no modifications.
The format of the name ID, as defined by the Format attribute
* in the NameID element of the SAML assertion. Typical examples of
* the format are transient or persistent.
If
* the format includes the prefix
* urn:oasis:names:tc:SAML:2.0:nameid-format, that prefix is removed.
* For example, urn:oasis:names:tc:SAML:2.0:nameid-format:transient is
* returned as transient. If the format includes any other prefix, the
* format is returned with no modifications.
The value of the Issuer element of the SAML assertion.
The value of the Issuer element of the SAML assertion.
The value of the Issuer element of the SAML assertion.
The value of the Issuer element of the SAML assertion.
The value of the Issuer element of the SAML assertion.
The value of the Issuer element of the SAML assertion.
The value of the Issuer element of the SAML assertion.
The value of the Recipient attribute of the
* SubjectConfirmationData element of the SAML assertion.
The value of the Recipient attribute of the
* SubjectConfirmationData element of the SAML assertion.
The value of the Recipient attribute of the
* SubjectConfirmationData element of the SAML assertion.
The value of the Recipient attribute of the
* SubjectConfirmationData element of the SAML assertion.
The value of the Recipient attribute of the
* SubjectConfirmationData element of the SAML assertion.
The value of the Recipient attribute of the
* SubjectConfirmationData element of the SAML assertion.
The value of the Recipient attribute of the
* SubjectConfirmationData element of the SAML assertion.
A hash value based on the concatenation of the Issuer response
* value, the AWS account ID, and the friendly name (the last part of the ARN) of
* the SAML provider in IAM. The combination of NameQualifier and
* Subject can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
* BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP"
* ) )
A hash value based on the concatenation of the Issuer response
* value, the AWS account ID, and the friendly name (the last part of the ARN) of
* the SAML provider in IAM. The combination of NameQualifier and
* Subject can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
* BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP"
* ) )
A hash value based on the concatenation of the Issuer response
* value, the AWS account ID, and the friendly name (the last part of the ARN) of
* the SAML provider in IAM. The combination of NameQualifier and
* Subject can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
* BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP"
* ) )
A hash value based on the concatenation of the Issuer response
* value, the AWS account ID, and the friendly name (the last part of the ARN) of
* the SAML provider in IAM. The combination of NameQualifier and
* Subject can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
* BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP"
* ) )
A hash value based on the concatenation of the Issuer response
* value, the AWS account ID, and the friendly name (the last part of the ARN) of
* the SAML provider in IAM. The combination of NameQualifier and
* Subject can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
* BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP"
* ) )
A hash value based on the concatenation of the Issuer response
* value, the AWS account ID, and the friendly name (the last part of the ARN) of
* the SAML provider in IAM. The combination of NameQualifier and
* Subject can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
* BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP"
* ) )
A hash value based on the concatenation of the Issuer response
* value, the AWS account ID, and the friendly name (the last part of the ARN) of
* the SAML provider in IAM. The combination of NameQualifier and
* Subject can be used to uniquely identify a federated user.
The following pseudocode shows how the hash value is calculated:
* BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP"
* ) )