github.com/aavshr/aws-sdk-go@v1.41.3/models/apis/iam/2010-05-08/examples-1.json (about) 1 { 2 "version": "1.0", 3 "examples": { 4 "AddClientIDToOpenIDConnectProvider": [ 5 { 6 "input": { 7 "ClientID": "my-application-ID", 8 "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com" 9 }, 10 "comments": { 11 "input": { 12 }, 13 "output": { 14 } 15 }, 16 "description": "The following add-client-id-to-open-id-connect-provider command adds the client ID my-application-ID to the OIDC provider named server.example.com:", 17 "id": "028e91f4-e2a6-4d59-9e3b-4965a3fb19be", 18 "title": "To add a client ID (audience) to an Open-ID Connect (OIDC) provider" 19 } 20 ], 21 "AddRoleToInstanceProfile": [ 22 { 23 "input": { 24 "InstanceProfileName": "Webserver", 25 "RoleName": "S3Access" 26 }, 27 "comments": { 28 "input": { 29 }, 30 "output": { 31 } 32 }, 33 "description": "The following command adds the role named S3Access to the instance profile named Webserver:", 34 "id": "c107fac3-edb6-4827-8a71-8863ec91c81f", 35 "title": "To add a role to an instance profile" 36 } 37 ], 38 "AddUserToGroup": [ 39 { 40 "input": { 41 "GroupName": "Admins", 42 "UserName": "Bob" 43 }, 44 "comments": { 45 "input": { 46 }, 47 "output": { 48 } 49 }, 50 "description": "The following command adds an IAM user named Bob to the IAM group named Admins:", 51 "id": "619c7e6b-09f8-4036-857b-51a6ea5027ca", 52 "title": "To add a user to an IAM group" 53 } 54 ], 55 "AttachGroupPolicy": [ 56 { 57 "input": { 58 "GroupName": "Finance", 59 "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess" 60 }, 61 "comments": { 62 "input": { 63 }, 64 "output": { 65 } 66 }, 67 "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM group named Finance.", 68 "id": "87551489-86f0-45db-9889-759936778f2b", 69 "title": "To attach a managed policy to an IAM group" 70 } 71 ], 72 "AttachRolePolicy": [ 73 { 74 "input": { 75 "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess", 76 "RoleName": "ReadOnlyRole" 77 }, 78 "comments": { 79 "input": { 80 }, 81 "output": { 82 } 83 }, 84 "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM role named ReadOnlyRole.", 85 "id": "3e1b8c7c-99c8-4fc4-a20c-131fe3f22c7e", 86 "title": "To attach a managed policy to an IAM role" 87 } 88 ], 89 "AttachUserPolicy": [ 90 { 91 "input": { 92 "PolicyArn": "arn:aws:iam::aws:policy/AdministratorAccess", 93 "UserName": "Alice" 94 }, 95 "comments": { 96 "input": { 97 }, 98 "output": { 99 } 100 }, 101 "description": "The following command attaches the AWS managed policy named AdministratorAccess to the IAM user named Alice.", 102 "id": "1372ebd8-9475-4b1a-a479-23b6fd4b8b3e", 103 "title": "To attach a managed policy to an IAM user" 104 } 105 ], 106 "ChangePassword": [ 107 { 108 "input": { 109 "NewPassword": "]35d/{pB9Fo9wJ", 110 "OldPassword": "3s0K_;xh4~8XXI" 111 }, 112 "comments": { 113 "input": { 114 }, 115 "output": { 116 } 117 }, 118 "description": "The following command changes the password for the current IAM user.", 119 "id": "3a80c66f-bffb-46df-947c-1e8fa583b470", 120 "title": "To change the password for your IAM user" 121 } 122 ], 123 "CreateAccessKey": [ 124 { 125 "input": { 126 "UserName": "Bob" 127 }, 128 "output": { 129 "AccessKey": { 130 "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", 131 "CreateDate": "2015-03-09T18:39:23.411Z", 132 "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY", 133 "Status": "Active", 134 "UserName": "Bob" 135 } 136 }, 137 "comments": { 138 "input": { 139 }, 140 "output": { 141 } 142 }, 143 "description": "The following command creates an access key (access key ID and secret access key) for the IAM user named Bob.", 144 "id": "1fbb3211-4cf2-41db-8c20-ba58d9f5802d", 145 "title": "To create an access key for an IAM user" 146 } 147 ], 148 "CreateAccountAlias": [ 149 { 150 "input": { 151 "AccountAlias": "examplecorp" 152 }, 153 "comments": { 154 "input": { 155 }, 156 "output": { 157 } 158 }, 159 "description": "The following command associates the alias examplecorp to your AWS account.", 160 "id": "5adaf6fb-94fc-4ca2-b825-2fbc2062add1", 161 "title": "To create an account alias" 162 } 163 ], 164 "CreateGroup": [ 165 { 166 "input": { 167 "GroupName": "Admins" 168 }, 169 "output": { 170 "Group": { 171 "Arn": "arn:aws:iam::123456789012:group/Admins", 172 "CreateDate": "2015-03-09T20:30:24.940Z", 173 "GroupId": "AIDGPMS9RO4H3FEXAMPLE", 174 "GroupName": "Admins", 175 "Path": "/" 176 } 177 }, 178 "comments": { 179 "input": { 180 }, 181 "output": { 182 } 183 }, 184 "description": "The following command creates an IAM group named Admins.", 185 "id": "d5da2a90-5e69-4ef7-8ae8-4c33dc21fd21", 186 "title": "To create an IAM group" 187 } 188 ], 189 "CreateInstanceProfile": [ 190 { 191 "input": { 192 "InstanceProfileName": "Webserver" 193 }, 194 "output": { 195 "InstanceProfile": { 196 "Arn": "arn:aws:iam::123456789012:instance-profile/Webserver", 197 "CreateDate": "2015-03-09T20:33:19.626Z", 198 "InstanceProfileId": "AIPAJMBYC7DLSPEXAMPLE", 199 "InstanceProfileName": "Webserver", 200 "Path": "/", 201 "Roles": [ 202 203 ] 204 } 205 }, 206 "comments": { 207 "input": { 208 }, 209 "output": { 210 } 211 }, 212 "description": "The following command creates an instance profile named Webserver that is ready to have a role attached and then be associated with an EC2 instance.", 213 "id": "5d84e6ae-5921-4e39-8454-10232cd9ff9a", 214 "title": "To create an instance profile" 215 } 216 ], 217 "CreateLoginProfile": [ 218 { 219 "input": { 220 "Password": "h]6EszR}vJ*m", 221 "PasswordResetRequired": true, 222 "UserName": "Bob" 223 }, 224 "output": { 225 "LoginProfile": { 226 "CreateDate": "2015-03-10T20:55:40.274Z", 227 "PasswordResetRequired": true, 228 "UserName": "Bob" 229 } 230 }, 231 "comments": { 232 "input": { 233 }, 234 "output": { 235 } 236 }, 237 "description": "The following command changes IAM user Bob's password and sets the flag that required Bob to change the password the next time he signs in.", 238 "id": "c63795bc-3444-40b3-89df-83c474ef88be", 239 "title": "To create an instance profile" 240 } 241 ], 242 "CreateOpenIDConnectProvider": [ 243 { 244 "input": { 245 "ClientIDList": [ 246 "my-application-id" 247 ], 248 "ThumbprintList": [ 249 "3768084dfb3d2b68b7897bf5f565da8efEXAMPLE" 250 ], 251 "Url": "https://server.example.com" 252 }, 253 "output": { 254 "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com" 255 }, 256 "comments": { 257 "input": { 258 }, 259 "output": { 260 } 261 }, 262 "description": "The following example defines a new OIDC provider in IAM with a client ID of my-application-id and pointing at the server with a URL of https://server.example.com.", 263 "id": "4e4a6bff-cc97-4406-922e-0ab4a82cdb63", 264 "title": "To create an instance profile" 265 } 266 ], 267 "CreateRole": [ 268 { 269 "input": { 270 "AssumeRolePolicyDocument": "<Stringified-JSON>", 271 "Path": "/", 272 "RoleName": "Test-Role" 273 }, 274 "output": { 275 "Role": { 276 "Arn": "arn:aws:iam::123456789012:role/Test-Role", 277 "AssumeRolePolicyDocument": "<URL-encoded-JSON>", 278 "CreateDate": "2013-06-07T20:43:32.821Z", 279 "Path": "/", 280 "RoleId": "AKIAIOSFODNN7EXAMPLE", 281 "RoleName": "Test-Role" 282 } 283 }, 284 "comments": { 285 "input": { 286 }, 287 "output": { 288 } 289 }, 290 "description": "The following command creates a role named Test-Role and attaches a trust policy that you must convert from JSON to a string. Upon success, the response includes the same policy as a URL-encoded JSON string.", 291 "id": "eaaa4b5f-51f1-4f73-b0d3-30127040eff8", 292 "title": "To create an IAM role" 293 } 294 ], 295 "CreateUser": [ 296 { 297 "input": { 298 "UserName": "Bob" 299 }, 300 "output": { 301 "User": { 302 "Arn": "arn:aws:iam::123456789012:user/Bob", 303 "CreateDate": "2013-06-08T03:20:41.270Z", 304 "Path": "/", 305 "UserId": "AKIAIOSFODNN7EXAMPLE", 306 "UserName": "Bob" 307 } 308 }, 309 "comments": { 310 "input": { 311 }, 312 "output": { 313 } 314 }, 315 "description": "The following create-user command creates an IAM user named Bob in the current account.", 316 "id": "eb15f90b-e5f5-4af8-a594-e4e82b181a62", 317 "title": "To create an IAM user" 318 } 319 ], 320 "DeleteAccessKey": [ 321 { 322 "input": { 323 "AccessKeyId": "AKIDPMS9RO4H3FEXAMPLE", 324 "UserName": "Bob" 325 }, 326 "comments": { 327 "input": { 328 }, 329 "output": { 330 } 331 }, 332 "description": "The following command deletes one access key (access key ID and secret access key) assigned to the IAM user named Bob.", 333 "id": "61a785a7-d30a-415a-ae18-ab9236e56871", 334 "title": "To delete an access key for an IAM user" 335 } 336 ], 337 "DeleteAccountAlias": [ 338 { 339 "input": { 340 "AccountAlias": "mycompany" 341 }, 342 "comments": { 343 "input": { 344 }, 345 "output": { 346 } 347 }, 348 "description": "The following command removes the alias mycompany from the current AWS account:", 349 "id": "7abeca65-04a8-4500-a890-47f1092bf766", 350 "title": "To delete an account alias" 351 } 352 ], 353 "DeleteAccountPasswordPolicy": [ 354 { 355 "comments": { 356 "input": { 357 }, 358 "output": { 359 } 360 }, 361 "description": "The following command removes the password policy from the current AWS account:", 362 "id": "9ddf755e-495c-49bc-ae3b-ea6cc9b8ebcf", 363 "title": "To delete the current account password policy" 364 } 365 ], 366 "DeleteGroupPolicy": [ 367 { 368 "input": { 369 "GroupName": "Admins", 370 "PolicyName": "ExamplePolicy" 371 }, 372 "comments": { 373 "input": { 374 }, 375 "output": { 376 } 377 }, 378 "description": "The following command deletes the policy named ExamplePolicy from the group named Admins:", 379 "id": "e683f2bd-98a4-4fe0-bb66-33169c692d4a", 380 "title": "To delete a policy from an IAM group" 381 } 382 ], 383 "DeleteInstanceProfile": [ 384 { 385 "input": { 386 "InstanceProfileName": "ExampleInstanceProfile" 387 }, 388 "comments": { 389 "input": { 390 }, 391 "output": { 392 } 393 }, 394 "description": "The following command deletes the instance profile named ExampleInstanceProfile", 395 "id": "12d74fb8-3433-49db-8171-a1fc764e354d", 396 "title": "To delete an instance profile" 397 } 398 ], 399 "DeleteLoginProfile": [ 400 { 401 "input": { 402 "UserName": "Bob" 403 }, 404 "comments": { 405 "input": { 406 }, 407 "output": { 408 } 409 }, 410 "description": "The following command deletes the password for the IAM user named Bob.", 411 "id": "1fe57059-fc73-42e2-b992-517b7d573b5c", 412 "title": "To delete a password for an IAM user" 413 } 414 ], 415 "DeleteRole": [ 416 { 417 "input": { 418 "RoleName": "Test-Role" 419 }, 420 "comments": { 421 "input": { 422 }, 423 "output": { 424 } 425 }, 426 "description": "The following command removes the role named Test-Role.", 427 "id": "053cdf74-9bda-44b8-bdbb-140fd5a32603", 428 "title": "To delete an IAM role" 429 } 430 ], 431 "DeleteRolePolicy": [ 432 { 433 "input": { 434 "PolicyName": "ExamplePolicy", 435 "RoleName": "Test-Role" 436 }, 437 "comments": { 438 "input": { 439 }, 440 "output": { 441 } 442 }, 443 "description": "The following command removes the policy named ExamplePolicy from the role named Test-Role.", 444 "id": "9c667336-fde3-462c-b8f3-950800821e27", 445 "title": "To remove a policy from an IAM role" 446 } 447 ], 448 "DeleteSigningCertificate": [ 449 { 450 "input": { 451 "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE", 452 "UserName": "Anika" 453 }, 454 "comments": { 455 "input": { 456 }, 457 "output": { 458 } 459 }, 460 "description": "The following command deletes the specified signing certificate for the IAM user named Anika.", 461 "id": "e3357586-ba9c-4070-b35b-d1a899b71987", 462 "title": "To delete a signing certificate for an IAM user" 463 } 464 ], 465 "DeleteUser": [ 466 { 467 "input": { 468 "UserName": "Bob" 469 }, 470 "comments": { 471 "input": { 472 }, 473 "output": { 474 } 475 }, 476 "description": "The following command removes the IAM user named Bob from the current account.", 477 "id": "a13dc3f9-59fe-42d9-abbb-fb98b204fdf0", 478 "title": "To delete an IAM user" 479 } 480 ], 481 "DeleteUserPolicy": [ 482 { 483 "input": { 484 "PolicyName": "ExamplePolicy", 485 "UserName": "Juan" 486 }, 487 "comments": { 488 "input": { 489 }, 490 "output": { 491 } 492 }, 493 "description": "The following delete-user-policy command removes the specified policy from the IAM user named Juan:", 494 "id": "34f07ddc-9bc1-4f52-bc59-cd0a3ccd06c8", 495 "title": "To remove a policy from an IAM user" 496 } 497 ], 498 "DeleteVirtualMFADevice": [ 499 { 500 "input": { 501 "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleName" 502 }, 503 "comments": { 504 "input": { 505 }, 506 "output": { 507 } 508 }, 509 "description": "The following delete-virtual-mfa-device command removes the specified MFA device from the current AWS account.", 510 "id": "2933b08b-dbe7-4b89-b8c1-fdf75feea1ee", 511 "title": "To remove a virtual MFA device" 512 } 513 ], 514 "GenerateOrganizationsAccessReport": [ 515 { 516 "input": { 517 "EntityPath": "o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-1a2b3c-k9l8m7n6o5example" 518 }, 519 "output": { 520 "JobId": "examplea-1234-b567-cde8-90fg123abcd4" 521 }, 522 "comments": { 523 "input": { 524 }, 525 "output": { 526 } 527 }, 528 "description": "The following operation generates a report for the organizational unit ou-rge0-awexample", 529 "id": "generateorganizationsaccessreport-ou", 530 "title": "To generate a service last accessed data report for an organizational unit" 531 } 532 ], 533 "GenerateServiceLastAccessedDetails": [ 534 { 535 "input": { 536 "Arn": "arn:aws:iam::123456789012:policy/ExamplePolicy1" 537 }, 538 "output": { 539 "JobId": "examplef-1305-c245-eba4-71fe298bcda7" 540 }, 541 "comments": { 542 "input": { 543 }, 544 "output": { 545 } 546 }, 547 "description": "The following operation generates a report for the policy: ExamplePolicy1", 548 "id": "generateaccessdata-policy-1541695178514", 549 "title": "To generate a service last accessed data report for a policy" 550 } 551 ], 552 "GetAccountPasswordPolicy": [ 553 { 554 "output": { 555 "PasswordPolicy": { 556 "AllowUsersToChangePassword": false, 557 "ExpirePasswords": false, 558 "HardExpiry": false, 559 "MaxPasswordAge": 90, 560 "MinimumPasswordLength": 8, 561 "PasswordReusePrevention": 12, 562 "RequireLowercaseCharacters": false, 563 "RequireNumbers": true, 564 "RequireSymbols": true, 565 "RequireUppercaseCharacters": false 566 } 567 }, 568 "comments": { 569 "input": { 570 }, 571 "output": { 572 } 573 }, 574 "description": "The following command displays details about the password policy for the current AWS account.", 575 "id": "5e4598c7-c425-431f-8af1-19073b3c4a5f", 576 "title": "To see the current account password policy" 577 } 578 ], 579 "GetAccountSummary": [ 580 { 581 "output": { 582 "SummaryMap": { 583 "AccessKeysPerUserQuota": 2, 584 "AccountAccessKeysPresent": 1, 585 "AccountMFAEnabled": 0, 586 "AccountSigningCertificatesPresent": 0, 587 "AttachedPoliciesPerGroupQuota": 10, 588 "AttachedPoliciesPerRoleQuota": 10, 589 "AttachedPoliciesPerUserQuota": 10, 590 "GlobalEndpointTokenVersion": 2, 591 "GroupPolicySizeQuota": 5120, 592 "Groups": 15, 593 "GroupsPerUserQuota": 10, 594 "GroupsQuota": 100, 595 "MFADevices": 6, 596 "MFADevicesInUse": 3, 597 "Policies": 8, 598 "PoliciesQuota": 1000, 599 "PolicySizeQuota": 5120, 600 "PolicyVersionsInUse": 22, 601 "PolicyVersionsInUseQuota": 10000, 602 "ServerCertificates": 1, 603 "ServerCertificatesQuota": 20, 604 "SigningCertificatesPerUserQuota": 2, 605 "UserPolicySizeQuota": 2048, 606 "Users": 27, 607 "UsersQuota": 5000, 608 "VersionsPerPolicyQuota": 5 609 } 610 }, 611 "comments": { 612 "input": { 613 }, 614 "output": { 615 } 616 }, 617 "description": "The following command returns information about the IAM entity quotas and usage in the current AWS account.", 618 "id": "9d8447af-f344-45de-8219-2cebc3cce7f2", 619 "title": "To get information about IAM entity quotas and usage in the current account" 620 } 621 ], 622 "GetInstanceProfile": [ 623 { 624 "input": { 625 "InstanceProfileName": "ExampleInstanceProfile" 626 }, 627 "output": { 628 "InstanceProfile": { 629 "Arn": "arn:aws:iam::336924118301:instance-profile/ExampleInstanceProfile", 630 "CreateDate": "2013-06-12T23:52:02Z", 631 "InstanceProfileId": "AID2MAB8DPLSRHEXAMPLE", 632 "InstanceProfileName": "ExampleInstanceProfile", 633 "Path": "/", 634 "Roles": [ 635 { 636 "Arn": "arn:aws:iam::336924118301:role/Test-Role", 637 "AssumeRolePolicyDocument": "<URL-encoded-JSON>", 638 "CreateDate": "2013-01-09T06:33:26Z", 639 "Path": "/", 640 "RoleId": "AIDGPMS9RO4H3FEXAMPLE", 641 "RoleName": "Test-Role" 642 } 643 ] 644 } 645 }, 646 "comments": { 647 "input": { 648 }, 649 "output": { 650 } 651 }, 652 "description": "The following command gets information about the instance profile named ExampleInstanceProfile.", 653 "id": "463b9ba5-18cc-4608-9ccb-5a7c6b6e5fe7", 654 "title": "To get information about an instance profile" 655 } 656 ], 657 "GetLoginProfile": [ 658 { 659 "input": { 660 "UserName": "Anika" 661 }, 662 "output": { 663 "LoginProfile": { 664 "CreateDate": "2012-09-21T23:03:39Z", 665 "UserName": "Anika" 666 } 667 }, 668 "comments": { 669 "input": { 670 }, 671 "output": { 672 } 673 }, 674 "description": "The following command gets information about the password for the IAM user named Anika.", 675 "id": "d6b580cc-909f-4925-9caa-d425cbc1ad47", 676 "title": "To get password information for an IAM user" 677 } 678 ], 679 "GetOrganizationsAccessReport": [ 680 { 681 "input": { 682 "JobId": "examplea-1234-b567-cde8-90fg123abcd4" 683 }, 684 "output": { 685 "AccessDetails": [ 686 { 687 "EntityPath": "o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-1a2b3c-k9l8m7n6o5example/111122223333", 688 "LastAuthenticatedTime": "2019-05-25T16:29:52Z", 689 "Region": "us-east-1", 690 "ServiceName": "Amazon DynamoDB", 691 "ServiceNamespace": "dynamodb", 692 "TotalAuthenticatedEntities": 2 693 }, 694 { 695 "EntityPath": "o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-1a2b3c-k9l8m7n6o5example/123456789012", 696 "LastAuthenticatedTime": "2019-06-15T13:12:06Z", 697 "Region": "us-east-1", 698 "ServiceName": "AWS Identity and Access Management", 699 "ServiceNamespace": "iam", 700 "TotalAuthenticatedEntities": 4 701 }, 702 { 703 "ServiceName": "Amazon Simple Storage Service", 704 "ServiceNamespace": "s3", 705 "TotalAuthenticatedEntities": 0 706 } 707 ], 708 "IsTruncated": false, 709 "JobCompletionDate": "2019-06-18T19:47:35.241Z", 710 "JobCreationDate": "2019-06-18T19:47:31.466Z", 711 "JobStatus": "COMPLETED", 712 "NumberOfServicesAccessible": 3, 713 "NumberOfServicesNotAccessed": 1 714 }, 715 "comments": { 716 "input": { 717 }, 718 "output": { 719 } 720 }, 721 "description": "The following operation gets details about the report with the job ID: examplea-1234-b567-cde8-90fg123abcd4", 722 "id": "getorganizationsaccessreport-ou", 723 "title": "To get details from a previously generated organizational unit report" 724 } 725 ], 726 "GetRole": [ 727 { 728 "input": { 729 "RoleName": "Test-Role" 730 }, 731 "output": { 732 "Role": { 733 "Arn": "arn:aws:iam::123456789012:role/Test-Role", 734 "AssumeRolePolicyDocument": "<URL-encoded-JSON>", 735 "CreateDate": "2013-04-18T05:01:58Z", 736 "MaxSessionDuration": 3600, 737 "Path": "/", 738 "RoleId": "AROADBQP57FF2AEXAMPLE", 739 "RoleLastUsed": { 740 "LastUsedDate": "2019-11-18T05:01:58Z", 741 "Region": "us-east-1" 742 }, 743 "RoleName": "Test-Role" 744 } 745 }, 746 "comments": { 747 "input": { 748 }, 749 "output": { 750 } 751 }, 752 "description": "The following command gets information about the role named Test-Role.", 753 "id": "5b7d03a6-340c-472d-aa77-56425950d8b0", 754 "title": "To get information about an IAM role" 755 } 756 ], 757 "GetServiceLastAccessedDetails": [ 758 { 759 "input": { 760 "JobId": "examplef-1305-c245-eba4-71fe298bcda7" 761 }, 762 "output": { 763 "IsTruncated": false, 764 "JobCompletionDate": "2018-10-24T19:47:35.241Z", 765 "JobCreationDate": "2018-10-24T19:47:31.466Z", 766 "JobStatus": "COMPLETED", 767 "ServicesLastAccessed": [ 768 { 769 "LastAuthenticated": "2018-10-24T19:11:00Z", 770 "LastAuthenticatedEntity": "arn:aws:iam::123456789012:user/AWSExampleUser01", 771 "ServiceName": "AWS Identity and Access Management", 772 "ServiceNamespace": "iam", 773 "TotalAuthenticatedEntities": 2 774 }, 775 { 776 "ServiceName": "Amazon Simple Storage Service", 777 "ServiceNamespace": "s3", 778 "TotalAuthenticatedEntities": 0 779 } 780 ] 781 }, 782 "comments": { 783 "input": { 784 }, 785 "output": { 786 } 787 }, 788 "description": "The following operation gets details about the report with the job ID: examplef-1305-c245-eba4-71fe298bcda7", 789 "id": "getserviceaccessdetails-policy-1541696298085", 790 "title": "To get details from a previously-generated report" 791 } 792 ], 793 "GetServiceLastAccessedDetailsWithEntities": [ 794 { 795 "input": { 796 "JobId": "examplef-1305-c245-eba4-71fe298bcda7", 797 "ServiceNamespace": "iam" 798 }, 799 "output": { 800 "EntityDetailsList": [ 801 { 802 "EntityInfo": { 803 "Arn": "arn:aws:iam::123456789012:user/AWSExampleUser01", 804 "Id": "AIDAEX2EXAMPLEB6IGCDC", 805 "Name": "AWSExampleUser01", 806 "Path": "/", 807 "Type": "USER" 808 }, 809 "LastAuthenticated": "2018-10-24T19:10:00Z" 810 }, 811 { 812 "EntityInfo": { 813 "Arn": "arn:aws:iam::123456789012:role/AWSExampleRole01", 814 "Id": "AROAEAEXAMPLEIANXSIU4", 815 "Name": "AWSExampleRole01", 816 "Path": "/", 817 "Type": "ROLE" 818 } 819 } 820 ], 821 "IsTruncated": false, 822 "JobCompletionDate": "2018-10-24T19:47:35.241Z", 823 "JobCreationDate": "2018-10-24T19:47:31.466Z", 824 "JobStatus": "COMPLETED" 825 }, 826 "comments": { 827 "input": { 828 }, 829 "output": { 830 } 831 }, 832 "description": "The following operation returns details about the entities that attempted to access the IAM service.", 833 "id": "getserviceaccessdetailsentity-policy-1541697621384", 834 "title": "To get sntity details from a previously-generated report" 835 } 836 ], 837 "GetUser": [ 838 { 839 "input": { 840 "UserName": "Bob" 841 }, 842 "output": { 843 "User": { 844 "Arn": "arn:aws:iam::123456789012:user/Bob", 845 "CreateDate": "2012-09-21T23:03:13Z", 846 "Path": "/", 847 "UserId": "AKIAIOSFODNN7EXAMPLE", 848 "UserName": "Bob" 849 } 850 }, 851 "comments": { 852 "input": { 853 }, 854 "output": { 855 } 856 }, 857 "description": "The following command gets information about the IAM user named Bob.", 858 "id": "ede000a1-9e4c-40db-bd0a-d4f95e41a6ab", 859 "title": "To get information about an IAM user" 860 } 861 ], 862 "ListAccessKeys": [ 863 { 864 "input": { 865 "UserName": "Alice" 866 }, 867 "output": { 868 "AccessKeyMetadata": [ 869 { 870 "AccessKeyId": "AKIA111111111EXAMPLE", 871 "CreateDate": "2016-12-01T22:19:58Z", 872 "Status": "Active", 873 "UserName": "Alice" 874 }, 875 { 876 "AccessKeyId": "AKIA222222222EXAMPLE", 877 "CreateDate": "2016-12-01T22:20:01Z", 878 "Status": "Active", 879 "UserName": "Alice" 880 } 881 ] 882 }, 883 "comments": { 884 "input": { 885 }, 886 "output": { 887 } 888 }, 889 "description": "The following command lists the access keys IDs for the IAM user named Alice.", 890 "id": "15571463-ebea-411a-a021-1c76bd2a3625", 891 "title": "To list the access key IDs for an IAM user" 892 } 893 ], 894 "ListAccountAliases": [ 895 { 896 "input": { 897 }, 898 "output": { 899 "AccountAliases": [ 900 "exmaple-corporation" 901 ] 902 }, 903 "comments": { 904 "input": { 905 }, 906 "output": { 907 } 908 }, 909 "description": "The following command lists the aliases for the current account.", 910 "id": "e27b457a-16f9-4e05-a006-3df7b3472741", 911 "title": "To list account aliases" 912 } 913 ], 914 "ListGroupPolicies": [ 915 { 916 "input": { 917 "GroupName": "Admins" 918 }, 919 "output": { 920 "PolicyNames": [ 921 "AdminRoot", 922 "KeyPolicy" 923 ] 924 }, 925 "comments": { 926 "input": { 927 }, 928 "output": { 929 } 930 }, 931 "description": "The following command lists the names of in-line policies that are embedded in the IAM group named Admins.", 932 "id": "02de5095-2410-4d3a-ac1b-cc40234af68f", 933 "title": "To list the in-line policies for an IAM group" 934 } 935 ], 936 "ListGroups": [ 937 { 938 "input": { 939 }, 940 "output": { 941 "Groups": [ 942 { 943 "Arn": "arn:aws:iam::123456789012:group/Admins", 944 "CreateDate": "2016-12-15T21:40:08.121Z", 945 "GroupId": "AGPA1111111111EXAMPLE", 946 "GroupName": "Admins", 947 "Path": "/division_abc/subdivision_xyz/" 948 }, 949 { 950 "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test", 951 "CreateDate": "2016-11-30T14:10:01.156Z", 952 "GroupId": "AGP22222222222EXAMPLE", 953 "GroupName": "Test", 954 "Path": "/division_abc/subdivision_xyz/product_1234/engineering/" 955 }, 956 { 957 "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers", 958 "CreateDate": "2016-06-12T20:14:52.032Z", 959 "GroupId": "AGPI3333333333EXAMPLE", 960 "GroupName": "Managers", 961 "Path": "/division_abc/subdivision_xyz/product_1234/" 962 } 963 ] 964 }, 965 "comments": { 966 "input": { 967 }, 968 "output": { 969 } 970 }, 971 "description": "The following command lists the IAM groups in the current account:", 972 "id": "b3ab1380-2a21-42fb-8e85-503f65512c66", 973 "title": "To list the IAM groups for the current account" 974 } 975 ], 976 "ListGroupsForUser": [ 977 { 978 "input": { 979 "UserName": "Bob" 980 }, 981 "output": { 982 "Groups": [ 983 { 984 "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test", 985 "CreateDate": "2016-11-30T14:10:01.156Z", 986 "GroupId": "AGP2111111111EXAMPLE", 987 "GroupName": "Test", 988 "Path": "/division_abc/subdivision_xyz/product_1234/engineering/" 989 }, 990 { 991 "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers", 992 "CreateDate": "2016-06-12T20:14:52.032Z", 993 "GroupId": "AGPI222222222SEXAMPLE", 994 "GroupName": "Managers", 995 "Path": "/division_abc/subdivision_xyz/product_1234/" 996 } 997 ] 998 }, 999 "comments": { 1000 "input": { 1001 }, 1002 "output": { 1003 } 1004 }, 1005 "description": "The following command displays the groups that the IAM user named Bob belongs to.", 1006 "id": "278ec2ee-fc28-4136-83fb-433af0ae46a2", 1007 "title": "To list the groups that an IAM user belongs to" 1008 } 1009 ], 1010 "ListPoliciesGrantingServiceAccess": [ 1011 { 1012 "input": { 1013 "Arn": "arn:aws:iam::123456789012:user/ExampleUser01", 1014 "ServiceNamespaces": [ 1015 "iam", 1016 "ec2" 1017 ] 1018 }, 1019 "output": { 1020 "IsTruncated": false, 1021 "PoliciesGrantingServiceAccess": [ 1022 { 1023 "Policies": [ 1024 { 1025 "PolicyArn": "arn:aws:iam::123456789012:policy/ExampleIamPolicy", 1026 "PolicyName": "ExampleIamPolicy", 1027 "PolicyType": "MANAGED" 1028 }, 1029 { 1030 "EntityName": "AWSExampleGroup1", 1031 "EntityType": "GROUP", 1032 "PolicyName": "ExampleGroup1Policy", 1033 "PolicyType": "INLINE" 1034 } 1035 ], 1036 "ServiceNamespace": "iam" 1037 }, 1038 { 1039 "Policies": [ 1040 { 1041 "PolicyArn": "arn:aws:iam::123456789012:policy/ExampleEc2Policy", 1042 "PolicyName": "ExampleEc2Policy", 1043 "PolicyType": "MANAGED" 1044 } 1045 ], 1046 "ServiceNamespace": "ec2" 1047 } 1048 ] 1049 }, 1050 "comments": { 1051 "input": { 1052 }, 1053 "output": { 1054 } 1055 }, 1056 "description": "The following operation lists policies that allow ExampleUser01 to access IAM or EC2.", 1057 "id": "listpoliciesaccess-user-1541698749508", 1058 "title": "To list policies that allow access to a service" 1059 } 1060 ], 1061 "ListRoleTags": [ 1062 { 1063 "input": { 1064 "RoleName": "taggedrole1" 1065 }, 1066 "output": { 1067 "IsTruncated": false, 1068 "Tags": [ 1069 { 1070 "Key": "Dept", 1071 "Value": "12345" 1072 }, 1073 { 1074 "Key": "Team", 1075 "Value": "Accounting" 1076 } 1077 ] 1078 }, 1079 "comments": { 1080 "input": { 1081 }, 1082 "output": { 1083 } 1084 }, 1085 "description": "The following example shows how to list the tags attached to a role.", 1086 "id": "to-list-the-tags-attached-to-an-iam-role-1506719238376", 1087 "title": "To list the tags attached to an IAM role" 1088 } 1089 ], 1090 "ListSigningCertificates": [ 1091 { 1092 "input": { 1093 "UserName": "Bob" 1094 }, 1095 "output": { 1096 "Certificates": [ 1097 { 1098 "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----", 1099 "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE", 1100 "Status": "Active", 1101 "UploadDate": "2013-06-06T21:40:08Z", 1102 "UserName": "Bob" 1103 } 1104 ] 1105 }, 1106 "comments": { 1107 "input": { 1108 }, 1109 "output": { 1110 } 1111 }, 1112 "description": "The following command lists the signing certificates for the IAM user named Bob.", 1113 "id": "b4c10256-4fc9-457e-b3fd-4a110d4d73dc", 1114 "title": "To list the signing certificates for an IAM user" 1115 } 1116 ], 1117 "ListUserTags": [ 1118 { 1119 "input": { 1120 "UserName": "anika" 1121 }, 1122 "output": { 1123 "IsTruncated": false, 1124 "Tags": [ 1125 { 1126 "Key": "Dept", 1127 "Value": "12345" 1128 }, 1129 { 1130 "Key": "Team", 1131 "Value": "Accounting" 1132 } 1133 ] 1134 }, 1135 "comments": { 1136 "input": { 1137 }, 1138 "output": { 1139 } 1140 }, 1141 "description": "The following example shows how to list the tags attached to a user.", 1142 "id": "to-list-the-tags-attached-to-an-iam-user-1506719473186", 1143 "title": "To list the tags attached to an IAM user" 1144 } 1145 ], 1146 "ListUsers": [ 1147 { 1148 "input": { 1149 }, 1150 "output": { 1151 "Users": [ 1152 { 1153 "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Juan", 1154 "CreateDate": "2012-09-05T19:38:48Z", 1155 "PasswordLastUsed": "2016-09-08T21:47:36Z", 1156 "Path": "/division_abc/subdivision_xyz/engineering/", 1157 "UserId": "AID2MAB8DPLSRHEXAMPLE", 1158 "UserName": "Juan" 1159 }, 1160 { 1161 "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Anika", 1162 "CreateDate": "2014-04-09T15:43:45Z", 1163 "PasswordLastUsed": "2016-09-24T16:18:07Z", 1164 "Path": "/division_abc/subdivision_xyz/engineering/", 1165 "UserId": "AIDIODR4TAW7CSEXAMPLE", 1166 "UserName": "Anika" 1167 } 1168 ] 1169 }, 1170 "comments": { 1171 "input": { 1172 }, 1173 "output": { 1174 } 1175 }, 1176 "description": "The following command lists the IAM users in the current account.", 1177 "id": "9edfbd73-03d8-4d8a-9a79-76c85e8c8298", 1178 "title": "To list IAM users" 1179 } 1180 ], 1181 "ListVirtualMFADevices": [ 1182 { 1183 "input": { 1184 }, 1185 "output": { 1186 "VirtualMFADevices": [ 1187 { 1188 "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleMFADevice" 1189 }, 1190 { 1191 "SerialNumber": "arn:aws:iam::123456789012:mfa/Juan" 1192 } 1193 ] 1194 }, 1195 "comments": { 1196 "input": { 1197 }, 1198 "output": { 1199 } 1200 }, 1201 "description": "The following command lists the virtual MFA devices that have been configured for the current account.", 1202 "id": "54f9ac18-5100-4070-bec4-fe5f612710d5", 1203 "title": "To list virtual MFA devices" 1204 } 1205 ], 1206 "PutGroupPolicy": [ 1207 { 1208 "input": { 1209 "GroupName": "Admins", 1210 "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}", 1211 "PolicyName": "AllPerms" 1212 }, 1213 "comments": { 1214 "input": { 1215 }, 1216 "output": { 1217 } 1218 }, 1219 "description": "The following command adds a policy named AllPerms to the IAM group named Admins.", 1220 "id": "4bc17418-758f-4d0f-ab0c-4d00265fec2e", 1221 "title": "To add a policy to a group" 1222 } 1223 ], 1224 "PutRolePolicy": [ 1225 { 1226 "input": { 1227 "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"s3:*\",\"Resource\":\"*\"}}", 1228 "PolicyName": "S3AccessPolicy", 1229 "RoleName": "S3Access" 1230 }, 1231 "comments": { 1232 "input": { 1233 }, 1234 "output": { 1235 } 1236 }, 1237 "description": "The following command adds a permissions policy to the role named Test-Role.", 1238 "id": "de62fd00-46c7-4601-9e0d-71d5fbb11ecb", 1239 "title": "To attach a permissions policy to an IAM role" 1240 } 1241 ], 1242 "PutUserPolicy": [ 1243 { 1244 "input": { 1245 "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}", 1246 "PolicyName": "AllAccessPolicy", 1247 "UserName": "Bob" 1248 }, 1249 "comments": { 1250 "input": { 1251 }, 1252 "output": { 1253 } 1254 }, 1255 "description": "The following command attaches a policy to the IAM user named Bob.", 1256 "id": "2551ffc6-3576-4d39-823f-30b60bffc2c7", 1257 "title": "To attach a policy to an IAM user" 1258 } 1259 ], 1260 "RemoveRoleFromInstanceProfile": [ 1261 { 1262 "input": { 1263 "InstanceProfileName": "ExampleInstanceProfile", 1264 "RoleName": "Test-Role" 1265 }, 1266 "comments": { 1267 "input": { 1268 }, 1269 "output": { 1270 } 1271 }, 1272 "description": "The following command removes the role named Test-Role from the instance profile named ExampleInstanceProfile.", 1273 "id": "6d9f46f1-9f4a-4873-b403-51a85c5c627c", 1274 "title": "To remove a role from an instance profile" 1275 } 1276 ], 1277 "RemoveUserFromGroup": [ 1278 { 1279 "input": { 1280 "GroupName": "Admins", 1281 "UserName": "Bob" 1282 }, 1283 "comments": { 1284 "input": { 1285 }, 1286 "output": { 1287 } 1288 }, 1289 "description": "The following command removes the user named Bob from the IAM group named Admins.", 1290 "id": "fb54d5b4-0caf-41d8-af0e-10a84413f174", 1291 "title": "To remove a user from an IAM group" 1292 } 1293 ], 1294 "SetSecurityTokenServicePreferences": [ 1295 { 1296 "input": { 1297 "GlobalEndpointTokenVersion": "v2Token" 1298 }, 1299 "comments": { 1300 "input": { 1301 }, 1302 "output": { 1303 } 1304 }, 1305 "description": "The following command sets the STS global endpoint token to version 2. Version 2 tokens are valid in all Regions.", 1306 "id": "61a785a7-d30a-415a-ae18-ab9236e56871", 1307 "title": "To delete an access key for an IAM user" 1308 } 1309 ], 1310 "TagRole": [ 1311 { 1312 "input": { 1313 "RoleName": "taggedrole", 1314 "Tags": [ 1315 { 1316 "Key": "Dept", 1317 "Value": "Accounting" 1318 }, 1319 { 1320 "Key": "CostCenter", 1321 "Value": "12345" 1322 } 1323 ] 1324 }, 1325 "comments": { 1326 "input": { 1327 }, 1328 "output": { 1329 } 1330 }, 1331 "description": "The following example shows how to add tags to an existing role.", 1332 "id": "to-add-a-tag-key-and-value-to-an-iam-role-1506718791513", 1333 "title": "To add a tag key and value to an IAM role" 1334 } 1335 ], 1336 "TagUser": [ 1337 { 1338 "input": { 1339 "Tags": [ 1340 { 1341 "Key": "Dept", 1342 "Value": "Accounting" 1343 }, 1344 { 1345 "Key": "CostCenter", 1346 "Value": "12345" 1347 } 1348 ], 1349 "UserName": "anika" 1350 }, 1351 "comments": { 1352 "input": { 1353 }, 1354 "output": { 1355 } 1356 }, 1357 "description": "The following example shows how to add tags to an existing user.", 1358 "id": "to-add-a-tag-key-and-value-to-an-iam-user-1506719044227", 1359 "title": "To add a tag key and value to an IAM user" 1360 } 1361 ], 1362 "UntagRole": [ 1363 { 1364 "input": { 1365 "RoleName": "taggedrole", 1366 "TagKeys": [ 1367 "Dept" 1368 ] 1369 }, 1370 "comments": { 1371 "input": { 1372 }, 1373 "output": { 1374 } 1375 }, 1376 "description": "The following example shows how to remove a tag with the key 'Dept' from a role named 'taggedrole'.", 1377 "id": "to-remove-a-tag-from-an-iam-role-1506719589943", 1378 "title": "To remove a tag from an IAM role" 1379 } 1380 ], 1381 "UntagUser": [ 1382 { 1383 "input": { 1384 "TagKeys": [ 1385 "Dept" 1386 ], 1387 "UserName": "anika" 1388 }, 1389 "comments": { 1390 "input": { 1391 }, 1392 "output": { 1393 } 1394 }, 1395 "description": "The following example shows how to remove tags that are attached to a user named 'anika'.", 1396 "id": "to-remove-a-tag-from-an-iam-user-1506719725554", 1397 "title": "To remove a tag from an IAM user" 1398 } 1399 ], 1400 "UpdateAccessKey": [ 1401 { 1402 "input": { 1403 "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", 1404 "Status": "Inactive", 1405 "UserName": "Bob" 1406 }, 1407 "comments": { 1408 "input": { 1409 }, 1410 "output": { 1411 } 1412 }, 1413 "description": "The following command deactivates the specified access key (access key ID and secret access key) for the IAM user named Bob.", 1414 "id": "02b556fd-e673-49b7-ab6b-f2f9035967d0", 1415 "title": "To activate or deactivate an access key for an IAM user" 1416 } 1417 ], 1418 "UpdateAccountPasswordPolicy": [ 1419 { 1420 "input": { 1421 "MinimumPasswordLength": 8, 1422 "RequireNumbers": true 1423 }, 1424 "comments": { 1425 "input": { 1426 }, 1427 "output": { 1428 } 1429 }, 1430 "description": "The following command sets the password policy to require a minimum length of eight characters and to require one or more numbers in the password:", 1431 "id": "c263a1af-37dc-4423-8dba-9790284ef5e0", 1432 "title": "To set or change the current account password policy" 1433 } 1434 ], 1435 "UpdateAssumeRolePolicy": [ 1436 { 1437 "input": { 1438 "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}", 1439 "RoleName": "S3AccessForEC2Instances" 1440 }, 1441 "comments": { 1442 "input": { 1443 }, 1444 "output": { 1445 } 1446 }, 1447 "description": "The following command updates the role trust policy for the role named Test-Role:", 1448 "id": "c9150063-d953-4e99-9576-9685872006c6", 1449 "title": "To update the trust policy for an IAM role" 1450 } 1451 ], 1452 "UpdateGroup": [ 1453 { 1454 "input": { 1455 "GroupName": "Test", 1456 "NewGroupName": "Test-1" 1457 }, 1458 "comments": { 1459 "input": { 1460 }, 1461 "output": { 1462 } 1463 }, 1464 "description": "The following command changes the name of the IAM group Test to Test-1.", 1465 "id": "f0cf1662-91ae-4278-a80e-7db54256ccba", 1466 "title": "To rename an IAM group" 1467 } 1468 ], 1469 "UpdateLoginProfile": [ 1470 { 1471 "input": { 1472 "Password": "SomeKindOfPassword123!@#", 1473 "UserName": "Bob" 1474 }, 1475 "comments": { 1476 "input": { 1477 }, 1478 "output": { 1479 } 1480 }, 1481 "description": "The following command creates or changes the password for the IAM user named Bob.", 1482 "id": "036d9498-ecdb-4ed6-a8d8-366c383d1487", 1483 "title": "To change the password for an IAM user" 1484 } 1485 ], 1486 "UpdateSigningCertificate": [ 1487 { 1488 "input": { 1489 "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE", 1490 "Status": "Inactive", 1491 "UserName": "Bob" 1492 }, 1493 "comments": { 1494 "input": { 1495 }, 1496 "output": { 1497 } 1498 }, 1499 "description": "The following command changes the status of a signing certificate for a user named Bob to Inactive.", 1500 "id": "829aee7b-efc5-4b3b-84a5-7f899b38018d", 1501 "title": "To change the active status of a signing certificate for an IAM user" 1502 } 1503 ], 1504 "UpdateUser": [ 1505 { 1506 "input": { 1507 "NewUserName": "Robert", 1508 "UserName": "Bob" 1509 }, 1510 "comments": { 1511 "input": { 1512 }, 1513 "output": { 1514 } 1515 }, 1516 "description": "The following command changes the name of the IAM user Bob to Robert. It does not change the user's path.", 1517 "id": "275d53ed-347a-44e6-b7d0-a96276154352", 1518 "title": "To change an IAM user's name" 1519 } 1520 ], 1521 "UploadServerCertificate": [ 1522 { 1523 "input": { 1524 "CertificateBody": "-----BEGIN CERTIFICATE-----<a very long certificate text string>-----END CERTIFICATE-----", 1525 "Path": "/company/servercerts/", 1526 "PrivateKey": "-----BEGIN DSA PRIVATE KEY-----<a very long private key string>-----END DSA PRIVATE KEY-----", 1527 "ServerCertificateName": "ProdServerCert" 1528 }, 1529 "output": { 1530 "ServerCertificateMetadata": { 1531 "Arn": "arn:aws:iam::123456789012:server-certificate/company/servercerts/ProdServerCert", 1532 "Expiration": "2012-05-08T01:02:03.004Z", 1533 "Path": "/company/servercerts/", 1534 "ServerCertificateId": "ASCA1111111111EXAMPLE", 1535 "ServerCertificateName": "ProdServerCert", 1536 "UploadDate": "2010-05-08T01:02:03.004Z" 1537 } 1538 }, 1539 "comments": { 1540 "input": { 1541 }, 1542 "output": { 1543 } 1544 }, 1545 "description": "The following upload-server-certificate command uploads a server certificate to your AWS account:", 1546 "id": "06eab6d1-ebf2-4bd9-839d-f7508b9a38b6", 1547 "title": "To upload a server certificate to your AWS account" 1548 } 1549 ], 1550 "UploadSigningCertificate": [ 1551 { 1552 "input": { 1553 "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----", 1554 "UserName": "Bob" 1555 }, 1556 "output": { 1557 "Certificate": { 1558 "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----", 1559 "CertificateId": "ID123456789012345EXAMPLE", 1560 "Status": "Active", 1561 "UploadDate": "2015-06-06T21:40:08.121Z", 1562 "UserName": "Bob" 1563 } 1564 }, 1565 "comments": { 1566 "input": { 1567 }, 1568 "output": { 1569 } 1570 }, 1571 "description": "The following command uploads a signing certificate for the IAM user named Bob.", 1572 "id": "e67489b6-7b73-4e30-9ed3-9a9e0231e458", 1573 "title": "To upload a signing certificate for an IAM user" 1574 } 1575 ] 1576 } 1577 }