sts-2011-06-15 library

Classes

AssumedRoleUser
The identifiers for the temporary security credentials that the operation returns.
AssumeRoleResponse
Contains the response to a successful AssumeRole request, including temporary AWS credentials that can be used to make AWS requests.
AssumeRoleWithSAMLResponse
Contains the response to a successful AssumeRoleWithSAML request, including temporary AWS credentials that can be used to make AWS requests.
AssumeRoleWithWebIdentityResponse
Contains the response to a successful AssumeRoleWithWebIdentity request, including temporary AWS credentials that can be used to make AWS requests.
AwsClientCredentials
AWS credentials.
Credentials
AWS credentials for API authentication.
DecodeAuthorizationMessageResponse
A document that contains additional information about the authorization status of a request from an encoded message that is returned in response to an AWS request.
FederatedUser
Identifiers for the federated user that is associated with the credentials.
GetAccessKeyInfoResponse
GetCallerIdentityResponse
Contains the response to a successful GetCallerIdentity request, including information about the entity making the request.
GetFederationTokenResponse
Contains the response to a successful GetFederationToken request, including temporary AWS credentials that can be used to make AWS requests.
GetSessionTokenResponse
Contains the response to a successful GetSessionToken request, including temporary AWS credentials that can be used to make AWS requests.
PolicyDescriptorType
A reference to the IAM managed policy that is passed as a session policy for a role session or a federated user session.
STS
AWS Security Token Service (STS) enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users). This guide provides descriptions of the STS API. For more information about using this service, see Temporary Security Credentials.
Tag
You can pass custom key-value pair attributes when you assume a role or federate a user. These are called session tags. You can then use the session tags to control access to resources. For more information, see Tagging AWS STS Sessions in the IAM User Guide.