github.com/aavshr/aws-sdk-go@v1.41.3/models/apis/iam/2010-05-08/examples-1.json (about)

     1  {
     2    "version": "1.0",
     3    "examples": {
     4      "AddClientIDToOpenIDConnectProvider": [
     5        {
     6          "input": {
     7            "ClientID": "my-application-ID",
     8            "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
     9          },
    10          "comments": {
    11            "input": {
    12            },
    13            "output": {
    14            }
    15          },
    16          "description": "The following add-client-id-to-open-id-connect-provider command adds the client ID my-application-ID to the OIDC provider named server.example.com:",
    17          "id": "028e91f4-e2a6-4d59-9e3b-4965a3fb19be",
    18          "title": "To add a client ID (audience) to an Open-ID Connect (OIDC) provider"
    19        }
    20      ],
    21      "AddRoleToInstanceProfile": [
    22        {
    23          "input": {
    24            "InstanceProfileName": "Webserver",
    25            "RoleName": "S3Access"
    26          },
    27          "comments": {
    28            "input": {
    29            },
    30            "output": {
    31            }
    32          },
    33          "description": "The following command adds the role named S3Access to the instance profile named Webserver:",
    34          "id": "c107fac3-edb6-4827-8a71-8863ec91c81f",
    35          "title": "To add a role to an instance profile"
    36        }
    37      ],
    38      "AddUserToGroup": [
    39        {
    40          "input": {
    41            "GroupName": "Admins",
    42            "UserName": "Bob"
    43          },
    44          "comments": {
    45            "input": {
    46            },
    47            "output": {
    48            }
    49          },
    50          "description": "The following command adds an IAM user named Bob to the IAM group named Admins:",
    51          "id": "619c7e6b-09f8-4036-857b-51a6ea5027ca",
    52          "title": "To add a user to an IAM group"
    53        }
    54      ],
    55      "AttachGroupPolicy": [
    56        {
    57          "input": {
    58            "GroupName": "Finance",
    59            "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess"
    60          },
    61          "comments": {
    62            "input": {
    63            },
    64            "output": {
    65            }
    66          },
    67          "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM group named Finance.",
    68          "id": "87551489-86f0-45db-9889-759936778f2b",
    69          "title": "To attach a managed policy to an IAM group"
    70        }
    71      ],
    72      "AttachRolePolicy": [
    73        {
    74          "input": {
    75            "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess",
    76            "RoleName": "ReadOnlyRole"
    77          },
    78          "comments": {
    79            "input": {
    80            },
    81            "output": {
    82            }
    83          },
    84          "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM role named ReadOnlyRole.",
    85          "id": "3e1b8c7c-99c8-4fc4-a20c-131fe3f22c7e",
    86          "title": "To attach a managed policy to an IAM role"
    87        }
    88      ],
    89      "AttachUserPolicy": [
    90        {
    91          "input": {
    92            "PolicyArn": "arn:aws:iam::aws:policy/AdministratorAccess",
    93            "UserName": "Alice"
    94          },
    95          "comments": {
    96            "input": {
    97            },
    98            "output": {
    99            }
   100          },
   101          "description": "The following command attaches the AWS managed policy named AdministratorAccess to the IAM user named Alice.",
   102          "id": "1372ebd8-9475-4b1a-a479-23b6fd4b8b3e",
   103          "title": "To attach a managed policy to an IAM user"
   104        }
   105      ],
   106      "ChangePassword": [
   107        {
   108          "input": {
   109            "NewPassword": "]35d/{pB9Fo9wJ",
   110            "OldPassword": "3s0K_;xh4~8XXI"
   111          },
   112          "comments": {
   113            "input": {
   114            },
   115            "output": {
   116            }
   117          },
   118          "description": "The following command changes the password for the current IAM user.",
   119          "id": "3a80c66f-bffb-46df-947c-1e8fa583b470",
   120          "title": "To change the password for your IAM user"
   121        }
   122      ],
   123      "CreateAccessKey": [
   124        {
   125          "input": {
   126            "UserName": "Bob"
   127          },
   128          "output": {
   129            "AccessKey": {
   130              "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
   131              "CreateDate": "2015-03-09T18:39:23.411Z",
   132              "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
   133              "Status": "Active",
   134              "UserName": "Bob"
   135            }
   136          },
   137          "comments": {
   138            "input": {
   139            },
   140            "output": {
   141            }
   142          },
   143          "description": "The following command creates an access key (access key ID and secret access key) for the IAM user named Bob.",
   144          "id": "1fbb3211-4cf2-41db-8c20-ba58d9f5802d",
   145          "title": "To create an access key for an IAM user"
   146        }
   147      ],
   148      "CreateAccountAlias": [
   149        {
   150          "input": {
   151            "AccountAlias": "examplecorp"
   152          },
   153          "comments": {
   154            "input": {
   155            },
   156            "output": {
   157            }
   158          },
   159          "description": "The following command associates the alias examplecorp to your AWS account.",
   160          "id": "5adaf6fb-94fc-4ca2-b825-2fbc2062add1",
   161          "title": "To create an account alias"
   162        }
   163      ],
   164      "CreateGroup": [
   165        {
   166          "input": {
   167            "GroupName": "Admins"
   168          },
   169          "output": {
   170            "Group": {
   171              "Arn": "arn:aws:iam::123456789012:group/Admins",
   172              "CreateDate": "2015-03-09T20:30:24.940Z",
   173              "GroupId": "AIDGPMS9RO4H3FEXAMPLE",
   174              "GroupName": "Admins",
   175              "Path": "/"
   176            }
   177          },
   178          "comments": {
   179            "input": {
   180            },
   181            "output": {
   182            }
   183          },
   184          "description": "The following command creates an IAM group named Admins.",
   185          "id": "d5da2a90-5e69-4ef7-8ae8-4c33dc21fd21",
   186          "title": "To create an IAM group"
   187        }
   188      ],
   189      "CreateInstanceProfile": [
   190        {
   191          "input": {
   192            "InstanceProfileName": "Webserver"
   193          },
   194          "output": {
   195            "InstanceProfile": {
   196              "Arn": "arn:aws:iam::123456789012:instance-profile/Webserver",
   197              "CreateDate": "2015-03-09T20:33:19.626Z",
   198              "InstanceProfileId": "AIPAJMBYC7DLSPEXAMPLE",
   199              "InstanceProfileName": "Webserver",
   200              "Path": "/",
   201              "Roles": [
   202  
   203              ]
   204            }
   205          },
   206          "comments": {
   207            "input": {
   208            },
   209            "output": {
   210            }
   211          },
   212          "description": "The following command creates an instance profile named Webserver that is ready to have a role attached and then be associated with an EC2 instance.",
   213          "id": "5d84e6ae-5921-4e39-8454-10232cd9ff9a",
   214          "title": "To create an instance profile"
   215        }
   216      ],
   217      "CreateLoginProfile": [
   218        {
   219          "input": {
   220            "Password": "h]6EszR}vJ*m",
   221            "PasswordResetRequired": true,
   222            "UserName": "Bob"
   223          },
   224          "output": {
   225            "LoginProfile": {
   226              "CreateDate": "2015-03-10T20:55:40.274Z",
   227              "PasswordResetRequired": true,
   228              "UserName": "Bob"
   229            }
   230          },
   231          "comments": {
   232            "input": {
   233            },
   234            "output": {
   235            }
   236          },
   237          "description": "The following command changes IAM user Bob's password and sets the flag that required Bob to change the password the next time he signs in.",
   238          "id": "c63795bc-3444-40b3-89df-83c474ef88be",
   239          "title": "To create an instance profile"
   240        }
   241      ],
   242      "CreateOpenIDConnectProvider": [
   243        {
   244          "input": {
   245            "ClientIDList": [
   246              "my-application-id"
   247            ],
   248            "ThumbprintList": [
   249              "3768084dfb3d2b68b7897bf5f565da8efEXAMPLE"
   250            ],
   251            "Url": "https://server.example.com"
   252          },
   253          "output": {
   254            "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
   255          },
   256          "comments": {
   257            "input": {
   258            },
   259            "output": {
   260            }
   261          },
   262          "description": "The following example defines a new OIDC provider in IAM with a client ID of my-application-id and pointing at the server with a URL of https://server.example.com.",
   263          "id": "4e4a6bff-cc97-4406-922e-0ab4a82cdb63",
   264          "title": "To create an instance profile"
   265        }
   266      ],
   267      "CreateRole": [
   268        {
   269          "input": {
   270            "AssumeRolePolicyDocument": "<Stringified-JSON>",
   271            "Path": "/",
   272            "RoleName": "Test-Role"
   273          },
   274          "output": {
   275            "Role": {
   276              "Arn": "arn:aws:iam::123456789012:role/Test-Role",
   277              "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
   278              "CreateDate": "2013-06-07T20:43:32.821Z",
   279              "Path": "/",
   280              "RoleId": "AKIAIOSFODNN7EXAMPLE",
   281              "RoleName": "Test-Role"
   282            }
   283          },
   284          "comments": {
   285            "input": {
   286            },
   287            "output": {
   288            }
   289          },
   290          "description": "The following command creates a role named Test-Role and attaches a trust policy that you must convert from JSON to a string. Upon success, the response includes the same policy as a URL-encoded JSON string.",
   291          "id": "eaaa4b5f-51f1-4f73-b0d3-30127040eff8",
   292          "title": "To create an IAM role"
   293        }
   294      ],
   295      "CreateUser": [
   296        {
   297          "input": {
   298            "UserName": "Bob"
   299          },
   300          "output": {
   301            "User": {
   302              "Arn": "arn:aws:iam::123456789012:user/Bob",
   303              "CreateDate": "2013-06-08T03:20:41.270Z",
   304              "Path": "/",
   305              "UserId": "AKIAIOSFODNN7EXAMPLE",
   306              "UserName": "Bob"
   307            }
   308          },
   309          "comments": {
   310            "input": {
   311            },
   312            "output": {
   313            }
   314          },
   315          "description": "The following create-user command creates an IAM user named Bob in the current account.",
   316          "id": "eb15f90b-e5f5-4af8-a594-e4e82b181a62",
   317          "title": "To create an IAM user"
   318        }
   319      ],
   320      "DeleteAccessKey": [
   321        {
   322          "input": {
   323            "AccessKeyId": "AKIDPMS9RO4H3FEXAMPLE",
   324            "UserName": "Bob"
   325          },
   326          "comments": {
   327            "input": {
   328            },
   329            "output": {
   330            }
   331          },
   332          "description": "The following command deletes one access key (access key ID and secret access key) assigned to the IAM user named Bob.",
   333          "id": "61a785a7-d30a-415a-ae18-ab9236e56871",
   334          "title": "To delete an access key for an IAM user"
   335        }
   336      ],
   337      "DeleteAccountAlias": [
   338        {
   339          "input": {
   340            "AccountAlias": "mycompany"
   341          },
   342          "comments": {
   343            "input": {
   344            },
   345            "output": {
   346            }
   347          },
   348          "description": "The following command removes the alias mycompany from the current AWS account:",
   349          "id": "7abeca65-04a8-4500-a890-47f1092bf766",
   350          "title": "To delete an account alias"
   351        }
   352      ],
   353      "DeleteAccountPasswordPolicy": [
   354        {
   355          "comments": {
   356            "input": {
   357            },
   358            "output": {
   359            }
   360          },
   361          "description": "The following command removes the password policy from the current AWS account:",
   362          "id": "9ddf755e-495c-49bc-ae3b-ea6cc9b8ebcf",
   363          "title": "To delete the current account password policy"
   364        }
   365      ],
   366      "DeleteGroupPolicy": [
   367        {
   368          "input": {
   369            "GroupName": "Admins",
   370            "PolicyName": "ExamplePolicy"
   371          },
   372          "comments": {
   373            "input": {
   374            },
   375            "output": {
   376            }
   377          },
   378          "description": "The following command deletes the policy named ExamplePolicy from the group named Admins:",
   379          "id": "e683f2bd-98a4-4fe0-bb66-33169c692d4a",
   380          "title": "To delete a policy from an IAM group"
   381        }
   382      ],
   383      "DeleteInstanceProfile": [
   384        {
   385          "input": {
   386            "InstanceProfileName": "ExampleInstanceProfile"
   387          },
   388          "comments": {
   389            "input": {
   390            },
   391            "output": {
   392            }
   393          },
   394          "description": "The following command deletes the instance profile named ExampleInstanceProfile",
   395          "id": "12d74fb8-3433-49db-8171-a1fc764e354d",
   396          "title": "To delete an instance profile"
   397        }
   398      ],
   399      "DeleteLoginProfile": [
   400        {
   401          "input": {
   402            "UserName": "Bob"
   403          },
   404          "comments": {
   405            "input": {
   406            },
   407            "output": {
   408            }
   409          },
   410          "description": "The following command deletes the password for the IAM user named Bob.",
   411          "id": "1fe57059-fc73-42e2-b992-517b7d573b5c",
   412          "title": "To delete a password for an IAM user"
   413        }
   414      ],
   415      "DeleteRole": [
   416        {
   417          "input": {
   418            "RoleName": "Test-Role"
   419          },
   420          "comments": {
   421            "input": {
   422            },
   423            "output": {
   424            }
   425          },
   426          "description": "The following command removes the role named Test-Role.",
   427          "id": "053cdf74-9bda-44b8-bdbb-140fd5a32603",
   428          "title": "To delete an IAM role"
   429        }
   430      ],
   431      "DeleteRolePolicy": [
   432        {
   433          "input": {
   434            "PolicyName": "ExamplePolicy",
   435            "RoleName": "Test-Role"
   436          },
   437          "comments": {
   438            "input": {
   439            },
   440            "output": {
   441            }
   442          },
   443          "description": "The following command removes the policy named ExamplePolicy from the role named Test-Role.",
   444          "id": "9c667336-fde3-462c-b8f3-950800821e27",
   445          "title": "To remove a policy from an IAM role"
   446        }
   447      ],
   448      "DeleteSigningCertificate": [
   449        {
   450          "input": {
   451            "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
   452            "UserName": "Anika"
   453          },
   454          "comments": {
   455            "input": {
   456            },
   457            "output": {
   458            }
   459          },
   460          "description": "The following command deletes the specified signing certificate for the IAM user named Anika.",
   461          "id": "e3357586-ba9c-4070-b35b-d1a899b71987",
   462          "title": "To delete a signing certificate for an IAM user"
   463        }
   464      ],
   465      "DeleteUser": [
   466        {
   467          "input": {
   468            "UserName": "Bob"
   469          },
   470          "comments": {
   471            "input": {
   472            },
   473            "output": {
   474            }
   475          },
   476          "description": "The following command removes the IAM user named Bob from the current account.",
   477          "id": "a13dc3f9-59fe-42d9-abbb-fb98b204fdf0",
   478          "title": "To delete an IAM user"
   479        }
   480      ],
   481      "DeleteUserPolicy": [
   482        {
   483          "input": {
   484            "PolicyName": "ExamplePolicy",
   485            "UserName": "Juan"
   486          },
   487          "comments": {
   488            "input": {
   489            },
   490            "output": {
   491            }
   492          },
   493          "description": "The following delete-user-policy command removes the specified policy from the IAM user named Juan:",
   494          "id": "34f07ddc-9bc1-4f52-bc59-cd0a3ccd06c8",
   495          "title": "To remove a policy from an IAM user"
   496        }
   497      ],
   498      "DeleteVirtualMFADevice": [
   499        {
   500          "input": {
   501            "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleName"
   502          },
   503          "comments": {
   504            "input": {
   505            },
   506            "output": {
   507            }
   508          },
   509          "description": "The following delete-virtual-mfa-device command removes the specified MFA device from the current AWS account.",
   510          "id": "2933b08b-dbe7-4b89-b8c1-fdf75feea1ee",
   511          "title": "To remove a virtual MFA device"
   512        }
   513      ],
   514      "GenerateOrganizationsAccessReport": [
   515        {
   516          "input": {
   517            "EntityPath": "o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-1a2b3c-k9l8m7n6o5example"
   518          },
   519          "output": {
   520            "JobId": "examplea-1234-b567-cde8-90fg123abcd4"
   521          },
   522          "comments": {
   523            "input": {
   524            },
   525            "output": {
   526            }
   527          },
   528          "description": "The following operation generates a report for the organizational unit ou-rge0-awexample",
   529          "id": "generateorganizationsaccessreport-ou",
   530          "title": "To generate a service last accessed data report for an organizational unit"
   531        }
   532      ],
   533      "GenerateServiceLastAccessedDetails": [
   534        {
   535          "input": {
   536            "Arn": "arn:aws:iam::123456789012:policy/ExamplePolicy1"
   537          },
   538          "output": {
   539            "JobId": "examplef-1305-c245-eba4-71fe298bcda7"
   540          },
   541          "comments": {
   542            "input": {
   543            },
   544            "output": {
   545            }
   546          },
   547          "description": "The following operation generates a report for the policy: ExamplePolicy1",
   548          "id": "generateaccessdata-policy-1541695178514",
   549          "title": "To generate a service last accessed data report for a policy"
   550        }
   551      ],
   552      "GetAccountPasswordPolicy": [
   553        {
   554          "output": {
   555            "PasswordPolicy": {
   556              "AllowUsersToChangePassword": false,
   557              "ExpirePasswords": false,
   558              "HardExpiry": false,
   559              "MaxPasswordAge": 90,
   560              "MinimumPasswordLength": 8,
   561              "PasswordReusePrevention": 12,
   562              "RequireLowercaseCharacters": false,
   563              "RequireNumbers": true,
   564              "RequireSymbols": true,
   565              "RequireUppercaseCharacters": false
   566            }
   567          },
   568          "comments": {
   569            "input": {
   570            },
   571            "output": {
   572            }
   573          },
   574          "description": "The following command displays details about the password policy for the current AWS account.",
   575          "id": "5e4598c7-c425-431f-8af1-19073b3c4a5f",
   576          "title": "To see the current account password policy"
   577        }
   578      ],
   579      "GetAccountSummary": [
   580        {
   581          "output": {
   582            "SummaryMap": {
   583              "AccessKeysPerUserQuota": 2,
   584              "AccountAccessKeysPresent": 1,
   585              "AccountMFAEnabled": 0,
   586              "AccountSigningCertificatesPresent": 0,
   587              "AttachedPoliciesPerGroupQuota": 10,
   588              "AttachedPoliciesPerRoleQuota": 10,
   589              "AttachedPoliciesPerUserQuota": 10,
   590              "GlobalEndpointTokenVersion": 2,
   591              "GroupPolicySizeQuota": 5120,
   592              "Groups": 15,
   593              "GroupsPerUserQuota": 10,
   594              "GroupsQuota": 100,
   595              "MFADevices": 6,
   596              "MFADevicesInUse": 3,
   597              "Policies": 8,
   598              "PoliciesQuota": 1000,
   599              "PolicySizeQuota": 5120,
   600              "PolicyVersionsInUse": 22,
   601              "PolicyVersionsInUseQuota": 10000,
   602              "ServerCertificates": 1,
   603              "ServerCertificatesQuota": 20,
   604              "SigningCertificatesPerUserQuota": 2,
   605              "UserPolicySizeQuota": 2048,
   606              "Users": 27,
   607              "UsersQuota": 5000,
   608              "VersionsPerPolicyQuota": 5
   609            }
   610          },
   611          "comments": {
   612            "input": {
   613            },
   614            "output": {
   615            }
   616          },
   617          "description": "The following command returns information about the IAM entity quotas and usage in the current AWS account.",
   618          "id": "9d8447af-f344-45de-8219-2cebc3cce7f2",
   619          "title": "To get information about IAM entity quotas and usage in the current account"
   620        }
   621      ],
   622      "GetInstanceProfile": [
   623        {
   624          "input": {
   625            "InstanceProfileName": "ExampleInstanceProfile"
   626          },
   627          "output": {
   628            "InstanceProfile": {
   629              "Arn": "arn:aws:iam::336924118301:instance-profile/ExampleInstanceProfile",
   630              "CreateDate": "2013-06-12T23:52:02Z",
   631              "InstanceProfileId": "AID2MAB8DPLSRHEXAMPLE",
   632              "InstanceProfileName": "ExampleInstanceProfile",
   633              "Path": "/",
   634              "Roles": [
   635                {
   636                  "Arn": "arn:aws:iam::336924118301:role/Test-Role",
   637                  "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
   638                  "CreateDate": "2013-01-09T06:33:26Z",
   639                  "Path": "/",
   640                  "RoleId": "AIDGPMS9RO4H3FEXAMPLE",
   641                  "RoleName": "Test-Role"
   642                }
   643              ]
   644            }
   645          },
   646          "comments": {
   647            "input": {
   648            },
   649            "output": {
   650            }
   651          },
   652          "description": "The following command gets information about the instance profile named ExampleInstanceProfile.",
   653          "id": "463b9ba5-18cc-4608-9ccb-5a7c6b6e5fe7",
   654          "title": "To get information about an instance profile"
   655        }
   656      ],
   657      "GetLoginProfile": [
   658        {
   659          "input": {
   660            "UserName": "Anika"
   661          },
   662          "output": {
   663            "LoginProfile": {
   664              "CreateDate": "2012-09-21T23:03:39Z",
   665              "UserName": "Anika"
   666            }
   667          },
   668          "comments": {
   669            "input": {
   670            },
   671            "output": {
   672            }
   673          },
   674          "description": "The following command gets information about the password for the IAM user named Anika.",
   675          "id": "d6b580cc-909f-4925-9caa-d425cbc1ad47",
   676          "title": "To get password information for an IAM user"
   677        }
   678      ],
   679      "GetOrganizationsAccessReport": [
   680        {
   681          "input": {
   682            "JobId": "examplea-1234-b567-cde8-90fg123abcd4"
   683          },
   684          "output": {
   685            "AccessDetails": [
   686              {
   687                "EntityPath": "o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-1a2b3c-k9l8m7n6o5example/111122223333",
   688                "LastAuthenticatedTime": "2019-05-25T16:29:52Z",
   689                "Region": "us-east-1",
   690                "ServiceName": "Amazon DynamoDB",
   691                "ServiceNamespace": "dynamodb",
   692                "TotalAuthenticatedEntities": 2
   693              },
   694              {
   695                "EntityPath": "o-a1b2c3d4e5/r-f6g7h8i9j0example/ou-1a2b3c-k9l8m7n6o5example/123456789012",
   696                "LastAuthenticatedTime": "2019-06-15T13:12:06Z",
   697                "Region": "us-east-1",
   698                "ServiceName": "AWS Identity and Access Management",
   699                "ServiceNamespace": "iam",
   700                "TotalAuthenticatedEntities": 4
   701              },
   702              {
   703                "ServiceName": "Amazon Simple Storage Service",
   704                "ServiceNamespace": "s3",
   705                "TotalAuthenticatedEntities": 0
   706              }
   707            ],
   708            "IsTruncated": false,
   709            "JobCompletionDate": "2019-06-18T19:47:35.241Z",
   710            "JobCreationDate": "2019-06-18T19:47:31.466Z",
   711            "JobStatus": "COMPLETED",
   712            "NumberOfServicesAccessible": 3,
   713            "NumberOfServicesNotAccessed": 1
   714          },
   715          "comments": {
   716            "input": {
   717            },
   718            "output": {
   719            }
   720          },
   721          "description": "The following operation gets details about the report with the job ID: examplea-1234-b567-cde8-90fg123abcd4",
   722          "id": "getorganizationsaccessreport-ou",
   723          "title": "To get details from a previously generated organizational unit report"
   724        }
   725      ],
   726      "GetRole": [
   727        {
   728          "input": {
   729            "RoleName": "Test-Role"
   730          },
   731          "output": {
   732            "Role": {
   733              "Arn": "arn:aws:iam::123456789012:role/Test-Role",
   734              "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
   735              "CreateDate": "2013-04-18T05:01:58Z",
   736              "MaxSessionDuration": 3600,
   737              "Path": "/",
   738              "RoleId": "AROADBQP57FF2AEXAMPLE",
   739              "RoleLastUsed": {
   740                "LastUsedDate": "2019-11-18T05:01:58Z",
   741                "Region": "us-east-1"
   742              },
   743              "RoleName": "Test-Role"
   744            }
   745          },
   746          "comments": {
   747            "input": {
   748            },
   749            "output": {
   750            }
   751          },
   752          "description": "The following command gets information about the role named Test-Role.",
   753          "id": "5b7d03a6-340c-472d-aa77-56425950d8b0",
   754          "title": "To get information about an IAM role"
   755        }
   756      ],
   757      "GetServiceLastAccessedDetails": [
   758        {
   759          "input": {
   760            "JobId": "examplef-1305-c245-eba4-71fe298bcda7"
   761          },
   762          "output": {
   763            "IsTruncated": false,
   764            "JobCompletionDate": "2018-10-24T19:47:35.241Z",
   765            "JobCreationDate": "2018-10-24T19:47:31.466Z",
   766            "JobStatus": "COMPLETED",
   767            "ServicesLastAccessed": [
   768              {
   769                "LastAuthenticated": "2018-10-24T19:11:00Z",
   770                "LastAuthenticatedEntity": "arn:aws:iam::123456789012:user/AWSExampleUser01",
   771                "ServiceName": "AWS Identity and Access Management",
   772                "ServiceNamespace": "iam",
   773                "TotalAuthenticatedEntities": 2
   774              },
   775              {
   776                "ServiceName": "Amazon Simple Storage Service",
   777                "ServiceNamespace": "s3",
   778                "TotalAuthenticatedEntities": 0
   779              }
   780            ]
   781          },
   782          "comments": {
   783            "input": {
   784            },
   785            "output": {
   786            }
   787          },
   788          "description": "The following operation gets details about the report with the job ID: examplef-1305-c245-eba4-71fe298bcda7",
   789          "id": "getserviceaccessdetails-policy-1541696298085",
   790          "title": "To get details from a previously-generated report"
   791        }
   792      ],
   793      "GetServiceLastAccessedDetailsWithEntities": [
   794        {
   795          "input": {
   796            "JobId": "examplef-1305-c245-eba4-71fe298bcda7",
   797            "ServiceNamespace": "iam"
   798          },
   799          "output": {
   800            "EntityDetailsList": [
   801              {
   802                "EntityInfo": {
   803                  "Arn": "arn:aws:iam::123456789012:user/AWSExampleUser01",
   804                  "Id": "AIDAEX2EXAMPLEB6IGCDC",
   805                  "Name": "AWSExampleUser01",
   806                  "Path": "/",
   807                  "Type": "USER"
   808                },
   809                "LastAuthenticated": "2018-10-24T19:10:00Z"
   810              },
   811              {
   812                "EntityInfo": {
   813                  "Arn": "arn:aws:iam::123456789012:role/AWSExampleRole01",
   814                  "Id": "AROAEAEXAMPLEIANXSIU4",
   815                  "Name": "AWSExampleRole01",
   816                  "Path": "/",
   817                  "Type": "ROLE"
   818                }
   819              }
   820            ],
   821            "IsTruncated": false,
   822            "JobCompletionDate": "2018-10-24T19:47:35.241Z",
   823            "JobCreationDate": "2018-10-24T19:47:31.466Z",
   824            "JobStatus": "COMPLETED"
   825          },
   826          "comments": {
   827            "input": {
   828            },
   829            "output": {
   830            }
   831          },
   832          "description": "The following operation returns details about the entities that attempted to access the IAM service.",
   833          "id": "getserviceaccessdetailsentity-policy-1541697621384",
   834          "title": "To get sntity details from a previously-generated report"
   835        }
   836      ],
   837      "GetUser": [
   838        {
   839          "input": {
   840            "UserName": "Bob"
   841          },
   842          "output": {
   843            "User": {
   844              "Arn": "arn:aws:iam::123456789012:user/Bob",
   845              "CreateDate": "2012-09-21T23:03:13Z",
   846              "Path": "/",
   847              "UserId": "AKIAIOSFODNN7EXAMPLE",
   848              "UserName": "Bob"
   849            }
   850          },
   851          "comments": {
   852            "input": {
   853            },
   854            "output": {
   855            }
   856          },
   857          "description": "The following command gets information about the IAM user named Bob.",
   858          "id": "ede000a1-9e4c-40db-bd0a-d4f95e41a6ab",
   859          "title": "To get information about an IAM user"
   860        }
   861      ],
   862      "ListAccessKeys": [
   863        {
   864          "input": {
   865            "UserName": "Alice"
   866          },
   867          "output": {
   868            "AccessKeyMetadata": [
   869              {
   870                "AccessKeyId": "AKIA111111111EXAMPLE",
   871                "CreateDate": "2016-12-01T22:19:58Z",
   872                "Status": "Active",
   873                "UserName": "Alice"
   874              },
   875              {
   876                "AccessKeyId": "AKIA222222222EXAMPLE",
   877                "CreateDate": "2016-12-01T22:20:01Z",
   878                "Status": "Active",
   879                "UserName": "Alice"
   880              }
   881            ]
   882          },
   883          "comments": {
   884            "input": {
   885            },
   886            "output": {
   887            }
   888          },
   889          "description": "The following command lists the access keys IDs for the IAM user named Alice.",
   890          "id": "15571463-ebea-411a-a021-1c76bd2a3625",
   891          "title": "To list the access key IDs for an IAM user"
   892        }
   893      ],
   894      "ListAccountAliases": [
   895        {
   896          "input": {
   897          },
   898          "output": {
   899            "AccountAliases": [
   900              "exmaple-corporation"
   901            ]
   902          },
   903          "comments": {
   904            "input": {
   905            },
   906            "output": {
   907            }
   908          },
   909          "description": "The following command lists the aliases for the current account.",
   910          "id": "e27b457a-16f9-4e05-a006-3df7b3472741",
   911          "title": "To list account aliases"
   912        }
   913      ],
   914      "ListGroupPolicies": [
   915        {
   916          "input": {
   917            "GroupName": "Admins"
   918          },
   919          "output": {
   920            "PolicyNames": [
   921              "AdminRoot",
   922              "KeyPolicy"
   923            ]
   924          },
   925          "comments": {
   926            "input": {
   927            },
   928            "output": {
   929            }
   930          },
   931          "description": "The following command lists the names of in-line policies that are embedded in the IAM group named Admins.",
   932          "id": "02de5095-2410-4d3a-ac1b-cc40234af68f",
   933          "title": "To list the in-line policies for an IAM group"
   934        }
   935      ],
   936      "ListGroups": [
   937        {
   938          "input": {
   939          },
   940          "output": {
   941            "Groups": [
   942              {
   943                "Arn": "arn:aws:iam::123456789012:group/Admins",
   944                "CreateDate": "2016-12-15T21:40:08.121Z",
   945                "GroupId": "AGPA1111111111EXAMPLE",
   946                "GroupName": "Admins",
   947                "Path": "/division_abc/subdivision_xyz/"
   948              },
   949              {
   950                "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
   951                "CreateDate": "2016-11-30T14:10:01.156Z",
   952                "GroupId": "AGP22222222222EXAMPLE",
   953                "GroupName": "Test",
   954                "Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
   955              },
   956              {
   957                "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
   958                "CreateDate": "2016-06-12T20:14:52.032Z",
   959                "GroupId": "AGPI3333333333EXAMPLE",
   960                "GroupName": "Managers",
   961                "Path": "/division_abc/subdivision_xyz/product_1234/"
   962              }
   963            ]
   964          },
   965          "comments": {
   966            "input": {
   967            },
   968            "output": {
   969            }
   970          },
   971          "description": "The following command lists the IAM groups in the current account:",
   972          "id": "b3ab1380-2a21-42fb-8e85-503f65512c66",
   973          "title": "To list the IAM groups for the current account"
   974        }
   975      ],
   976      "ListGroupsForUser": [
   977        {
   978          "input": {
   979            "UserName": "Bob"
   980          },
   981          "output": {
   982            "Groups": [
   983              {
   984                "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
   985                "CreateDate": "2016-11-30T14:10:01.156Z",
   986                "GroupId": "AGP2111111111EXAMPLE",
   987                "GroupName": "Test",
   988                "Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
   989              },
   990              {
   991                "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
   992                "CreateDate": "2016-06-12T20:14:52.032Z",
   993                "GroupId": "AGPI222222222SEXAMPLE",
   994                "GroupName": "Managers",
   995                "Path": "/division_abc/subdivision_xyz/product_1234/"
   996              }
   997            ]
   998          },
   999          "comments": {
  1000            "input": {
  1001            },
  1002            "output": {
  1003            }
  1004          },
  1005          "description": "The following command displays the groups that the IAM user named Bob belongs to.",
  1006          "id": "278ec2ee-fc28-4136-83fb-433af0ae46a2",
  1007          "title": "To list the groups that an IAM user belongs to"
  1008        }
  1009      ],
  1010      "ListPoliciesGrantingServiceAccess": [
  1011        {
  1012          "input": {
  1013            "Arn": "arn:aws:iam::123456789012:user/ExampleUser01",
  1014            "ServiceNamespaces": [
  1015              "iam",
  1016              "ec2"
  1017            ]
  1018          },
  1019          "output": {
  1020            "IsTruncated": false,
  1021            "PoliciesGrantingServiceAccess": [
  1022              {
  1023                "Policies": [
  1024                  {
  1025                    "PolicyArn": "arn:aws:iam::123456789012:policy/ExampleIamPolicy",
  1026                    "PolicyName": "ExampleIamPolicy",
  1027                    "PolicyType": "MANAGED"
  1028                  },
  1029                  {
  1030                    "EntityName": "AWSExampleGroup1",
  1031                    "EntityType": "GROUP",
  1032                    "PolicyName": "ExampleGroup1Policy",
  1033                    "PolicyType": "INLINE"
  1034                  }
  1035                ],
  1036                "ServiceNamespace": "iam"
  1037              },
  1038              {
  1039                "Policies": [
  1040                  {
  1041                    "PolicyArn": "arn:aws:iam::123456789012:policy/ExampleEc2Policy",
  1042                    "PolicyName": "ExampleEc2Policy",
  1043                    "PolicyType": "MANAGED"
  1044                  }
  1045                ],
  1046                "ServiceNamespace": "ec2"
  1047              }
  1048            ]
  1049          },
  1050          "comments": {
  1051            "input": {
  1052            },
  1053            "output": {
  1054            }
  1055          },
  1056          "description": "The following operation lists policies that allow ExampleUser01 to access IAM or EC2.",
  1057          "id": "listpoliciesaccess-user-1541698749508",
  1058          "title": "To list policies that allow access to a service"
  1059        }
  1060      ],
  1061      "ListRoleTags": [
  1062        {
  1063          "input": {
  1064            "RoleName": "taggedrole1"
  1065          },
  1066          "output": {
  1067            "IsTruncated": false,
  1068            "Tags": [
  1069              {
  1070                "Key": "Dept",
  1071                "Value": "12345"
  1072              },
  1073              {
  1074                "Key": "Team",
  1075                "Value": "Accounting"
  1076              }
  1077            ]
  1078          },
  1079          "comments": {
  1080            "input": {
  1081            },
  1082            "output": {
  1083            }
  1084          },
  1085          "description": "The following example shows how to list the tags attached to a role.",
  1086          "id": "to-list-the-tags-attached-to-an-iam-role-1506719238376",
  1087          "title": "To list the tags attached to an IAM role"
  1088        }
  1089      ],
  1090      "ListSigningCertificates": [
  1091        {
  1092          "input": {
  1093            "UserName": "Bob"
  1094          },
  1095          "output": {
  1096            "Certificates": [
  1097              {
  1098                "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
  1099                "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
  1100                "Status": "Active",
  1101                "UploadDate": "2013-06-06T21:40:08Z",
  1102                "UserName": "Bob"
  1103              }
  1104            ]
  1105          },
  1106          "comments": {
  1107            "input": {
  1108            },
  1109            "output": {
  1110            }
  1111          },
  1112          "description": "The following command lists the signing certificates for the IAM user named Bob.",
  1113          "id": "b4c10256-4fc9-457e-b3fd-4a110d4d73dc",
  1114          "title": "To list the signing certificates for an IAM user"
  1115        }
  1116      ],
  1117      "ListUserTags": [
  1118        {
  1119          "input": {
  1120            "UserName": "anika"
  1121          },
  1122          "output": {
  1123            "IsTruncated": false,
  1124            "Tags": [
  1125              {
  1126                "Key": "Dept",
  1127                "Value": "12345"
  1128              },
  1129              {
  1130                "Key": "Team",
  1131                "Value": "Accounting"
  1132              }
  1133            ]
  1134          },
  1135          "comments": {
  1136            "input": {
  1137            },
  1138            "output": {
  1139            }
  1140          },
  1141          "description": "The following example shows how to list the tags attached to a user.",
  1142          "id": "to-list-the-tags-attached-to-an-iam-user-1506719473186",
  1143          "title": "To list the tags attached to an IAM user"
  1144        }
  1145      ],
  1146      "ListUsers": [
  1147        {
  1148          "input": {
  1149          },
  1150          "output": {
  1151            "Users": [
  1152              {
  1153                "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Juan",
  1154                "CreateDate": "2012-09-05T19:38:48Z",
  1155                "PasswordLastUsed": "2016-09-08T21:47:36Z",
  1156                "Path": "/division_abc/subdivision_xyz/engineering/",
  1157                "UserId": "AID2MAB8DPLSRHEXAMPLE",
  1158                "UserName": "Juan"
  1159              },
  1160              {
  1161                "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Anika",
  1162                "CreateDate": "2014-04-09T15:43:45Z",
  1163                "PasswordLastUsed": "2016-09-24T16:18:07Z",
  1164                "Path": "/division_abc/subdivision_xyz/engineering/",
  1165                "UserId": "AIDIODR4TAW7CSEXAMPLE",
  1166                "UserName": "Anika"
  1167              }
  1168            ]
  1169          },
  1170          "comments": {
  1171            "input": {
  1172            },
  1173            "output": {
  1174            }
  1175          },
  1176          "description": "The following command lists the IAM users in the current account.",
  1177          "id": "9edfbd73-03d8-4d8a-9a79-76c85e8c8298",
  1178          "title": "To list IAM users"
  1179        }
  1180      ],
  1181      "ListVirtualMFADevices": [
  1182        {
  1183          "input": {
  1184          },
  1185          "output": {
  1186            "VirtualMFADevices": [
  1187              {
  1188                "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleMFADevice"
  1189              },
  1190              {
  1191                "SerialNumber": "arn:aws:iam::123456789012:mfa/Juan"
  1192              }
  1193            ]
  1194          },
  1195          "comments": {
  1196            "input": {
  1197            },
  1198            "output": {
  1199            }
  1200          },
  1201          "description": "The following command lists the virtual MFA devices that have been configured for the current account.",
  1202          "id": "54f9ac18-5100-4070-bec4-fe5f612710d5",
  1203          "title": "To list virtual MFA devices"
  1204        }
  1205      ],
  1206      "PutGroupPolicy": [
  1207        {
  1208          "input": {
  1209            "GroupName": "Admins",
  1210            "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
  1211            "PolicyName": "AllPerms"
  1212          },
  1213          "comments": {
  1214            "input": {
  1215            },
  1216            "output": {
  1217            }
  1218          },
  1219          "description": "The following command adds a policy named AllPerms to the IAM group named Admins.",
  1220          "id": "4bc17418-758f-4d0f-ab0c-4d00265fec2e",
  1221          "title": "To add a policy to a group"
  1222        }
  1223      ],
  1224      "PutRolePolicy": [
  1225        {
  1226          "input": {
  1227            "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"s3:*\",\"Resource\":\"*\"}}",
  1228            "PolicyName": "S3AccessPolicy",
  1229            "RoleName": "S3Access"
  1230          },
  1231          "comments": {
  1232            "input": {
  1233            },
  1234            "output": {
  1235            }
  1236          },
  1237          "description": "The following command adds a permissions policy to the role named Test-Role.",
  1238          "id": "de62fd00-46c7-4601-9e0d-71d5fbb11ecb",
  1239          "title": "To attach a permissions policy to an IAM role"
  1240        }
  1241      ],
  1242      "PutUserPolicy": [
  1243        {
  1244          "input": {
  1245            "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
  1246            "PolicyName": "AllAccessPolicy",
  1247            "UserName": "Bob"
  1248          },
  1249          "comments": {
  1250            "input": {
  1251            },
  1252            "output": {
  1253            }
  1254          },
  1255          "description": "The following command attaches a policy to the IAM user named Bob.",
  1256          "id": "2551ffc6-3576-4d39-823f-30b60bffc2c7",
  1257          "title": "To attach a policy to an IAM user"
  1258        }
  1259      ],
  1260      "RemoveRoleFromInstanceProfile": [
  1261        {
  1262          "input": {
  1263            "InstanceProfileName": "ExampleInstanceProfile",
  1264            "RoleName": "Test-Role"
  1265          },
  1266          "comments": {
  1267            "input": {
  1268            },
  1269            "output": {
  1270            }
  1271          },
  1272          "description": "The following command removes the role named Test-Role from the instance profile named ExampleInstanceProfile.",
  1273          "id": "6d9f46f1-9f4a-4873-b403-51a85c5c627c",
  1274          "title": "To remove a role from an instance profile"
  1275        }
  1276      ],
  1277      "RemoveUserFromGroup": [
  1278        {
  1279          "input": {
  1280            "GroupName": "Admins",
  1281            "UserName": "Bob"
  1282          },
  1283          "comments": {
  1284            "input": {
  1285            },
  1286            "output": {
  1287            }
  1288          },
  1289          "description": "The following command removes the user named Bob from the IAM group named Admins.",
  1290          "id": "fb54d5b4-0caf-41d8-af0e-10a84413f174",
  1291          "title": "To remove a user from an IAM group"
  1292        }
  1293      ],
  1294      "SetSecurityTokenServicePreferences": [
  1295        {
  1296          "input": {
  1297            "GlobalEndpointTokenVersion": "v2Token"
  1298          },
  1299          "comments": {
  1300            "input": {
  1301            },
  1302            "output": {
  1303            }
  1304          },
  1305          "description": "The following command sets the STS global endpoint token to version 2. Version 2 tokens are valid in all Regions.",
  1306          "id": "61a785a7-d30a-415a-ae18-ab9236e56871",
  1307          "title": "To delete an access key for an IAM user"
  1308        }
  1309      ],
  1310      "TagRole": [
  1311        {
  1312          "input": {
  1313            "RoleName": "taggedrole",
  1314            "Tags": [
  1315              {
  1316                "Key": "Dept",
  1317                "Value": "Accounting"
  1318              },
  1319              {
  1320                "Key": "CostCenter",
  1321                "Value": "12345"
  1322              }
  1323            ]
  1324          },
  1325          "comments": {
  1326            "input": {
  1327            },
  1328            "output": {
  1329            }
  1330          },
  1331          "description": "The following example shows how to add tags to an existing role.",
  1332          "id": "to-add-a-tag-key-and-value-to-an-iam-role-1506718791513",
  1333          "title": "To add a tag key and value to an IAM role"
  1334        }
  1335      ],
  1336      "TagUser": [
  1337        {
  1338          "input": {
  1339            "Tags": [
  1340              {
  1341                "Key": "Dept",
  1342                "Value": "Accounting"
  1343              },
  1344              {
  1345                "Key": "CostCenter",
  1346                "Value": "12345"
  1347              }
  1348            ],
  1349            "UserName": "anika"
  1350          },
  1351          "comments": {
  1352            "input": {
  1353            },
  1354            "output": {
  1355            }
  1356          },
  1357          "description": "The following example shows how to add tags to an existing user.",
  1358          "id": "to-add-a-tag-key-and-value-to-an-iam-user-1506719044227",
  1359          "title": "To add a tag key and value to an IAM user"
  1360        }
  1361      ],
  1362      "UntagRole": [
  1363        {
  1364          "input": {
  1365            "RoleName": "taggedrole",
  1366            "TagKeys": [
  1367              "Dept"
  1368            ]
  1369          },
  1370          "comments": {
  1371            "input": {
  1372            },
  1373            "output": {
  1374            }
  1375          },
  1376          "description": "The following example shows how to remove a tag with the key 'Dept' from a role named 'taggedrole'.",
  1377          "id": "to-remove-a-tag-from-an-iam-role-1506719589943",
  1378          "title": "To remove a tag from an IAM role"
  1379        }
  1380      ],
  1381      "UntagUser": [
  1382        {
  1383          "input": {
  1384            "TagKeys": [
  1385              "Dept"
  1386            ],
  1387            "UserName": "anika"
  1388          },
  1389          "comments": {
  1390            "input": {
  1391            },
  1392            "output": {
  1393            }
  1394          },
  1395          "description": "The following example shows how to remove tags that are attached to a user named 'anika'.",
  1396          "id": "to-remove-a-tag-from-an-iam-user-1506719725554",
  1397          "title": "To remove a tag from an IAM user"
  1398        }
  1399      ],
  1400      "UpdateAccessKey": [
  1401        {
  1402          "input": {
  1403            "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
  1404            "Status": "Inactive",
  1405            "UserName": "Bob"
  1406          },
  1407          "comments": {
  1408            "input": {
  1409            },
  1410            "output": {
  1411            }
  1412          },
  1413          "description": "The following command deactivates the specified access key (access key ID and secret access key) for the IAM user named Bob.",
  1414          "id": "02b556fd-e673-49b7-ab6b-f2f9035967d0",
  1415          "title": "To activate or deactivate an access key for an IAM user"
  1416        }
  1417      ],
  1418      "UpdateAccountPasswordPolicy": [
  1419        {
  1420          "input": {
  1421            "MinimumPasswordLength": 8,
  1422            "RequireNumbers": true
  1423          },
  1424          "comments": {
  1425            "input": {
  1426            },
  1427            "output": {
  1428            }
  1429          },
  1430          "description": "The following command sets the password policy to require a minimum length of eight characters and to require one or more numbers in the password:",
  1431          "id": "c263a1af-37dc-4423-8dba-9790284ef5e0",
  1432          "title": "To set or change the current account password policy"
  1433        }
  1434      ],
  1435      "UpdateAssumeRolePolicy": [
  1436        {
  1437          "input": {
  1438            "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}",
  1439            "RoleName": "S3AccessForEC2Instances"
  1440          },
  1441          "comments": {
  1442            "input": {
  1443            },
  1444            "output": {
  1445            }
  1446          },
  1447          "description": "The following command updates the role trust policy for the role named Test-Role:",
  1448          "id": "c9150063-d953-4e99-9576-9685872006c6",
  1449          "title": "To update the trust policy for an IAM role"
  1450        }
  1451      ],
  1452      "UpdateGroup": [
  1453        {
  1454          "input": {
  1455            "GroupName": "Test",
  1456            "NewGroupName": "Test-1"
  1457          },
  1458          "comments": {
  1459            "input": {
  1460            },
  1461            "output": {
  1462            }
  1463          },
  1464          "description": "The following command changes the name of the IAM group Test to Test-1.",
  1465          "id": "f0cf1662-91ae-4278-a80e-7db54256ccba",
  1466          "title": "To rename an IAM group"
  1467        }
  1468      ],
  1469      "UpdateLoginProfile": [
  1470        {
  1471          "input": {
  1472            "Password": "SomeKindOfPassword123!@#",
  1473            "UserName": "Bob"
  1474          },
  1475          "comments": {
  1476            "input": {
  1477            },
  1478            "output": {
  1479            }
  1480          },
  1481          "description": "The following command creates or changes the password for the IAM user named Bob.",
  1482          "id": "036d9498-ecdb-4ed6-a8d8-366c383d1487",
  1483          "title": "To change the password for an IAM user"
  1484        }
  1485      ],
  1486      "UpdateSigningCertificate": [
  1487        {
  1488          "input": {
  1489            "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
  1490            "Status": "Inactive",
  1491            "UserName": "Bob"
  1492          },
  1493          "comments": {
  1494            "input": {
  1495            },
  1496            "output": {
  1497            }
  1498          },
  1499          "description": "The following command changes the status of a signing certificate for a user named Bob to Inactive.",
  1500          "id": "829aee7b-efc5-4b3b-84a5-7f899b38018d",
  1501          "title": "To change the active status of a signing certificate for an IAM user"
  1502        }
  1503      ],
  1504      "UpdateUser": [
  1505        {
  1506          "input": {
  1507            "NewUserName": "Robert",
  1508            "UserName": "Bob"
  1509          },
  1510          "comments": {
  1511            "input": {
  1512            },
  1513            "output": {
  1514            }
  1515          },
  1516          "description": "The following command changes the name of the IAM user Bob to Robert. It does not change the user's path.",
  1517          "id": "275d53ed-347a-44e6-b7d0-a96276154352",
  1518          "title": "To change an IAM user's name"
  1519        }
  1520      ],
  1521      "UploadServerCertificate": [
  1522        {
  1523          "input": {
  1524            "CertificateBody": "-----BEGIN CERTIFICATE-----<a very long certificate text string>-----END CERTIFICATE-----",
  1525            "Path": "/company/servercerts/",
  1526            "PrivateKey": "-----BEGIN DSA PRIVATE KEY-----<a very long private key string>-----END DSA PRIVATE KEY-----",
  1527            "ServerCertificateName": "ProdServerCert"
  1528          },
  1529          "output": {
  1530            "ServerCertificateMetadata": {
  1531              "Arn": "arn:aws:iam::123456789012:server-certificate/company/servercerts/ProdServerCert",
  1532              "Expiration": "2012-05-08T01:02:03.004Z",
  1533              "Path": "/company/servercerts/",
  1534              "ServerCertificateId": "ASCA1111111111EXAMPLE",
  1535              "ServerCertificateName": "ProdServerCert",
  1536              "UploadDate": "2010-05-08T01:02:03.004Z"
  1537            }
  1538          },
  1539          "comments": {
  1540            "input": {
  1541            },
  1542            "output": {
  1543            }
  1544          },
  1545          "description": "The following upload-server-certificate command uploads a server certificate to your AWS account:",
  1546          "id": "06eab6d1-ebf2-4bd9-839d-f7508b9a38b6",
  1547          "title": "To upload a server certificate to your AWS account"
  1548        }
  1549      ],
  1550      "UploadSigningCertificate": [
  1551        {
  1552          "input": {
  1553            "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
  1554            "UserName": "Bob"
  1555          },
  1556          "output": {
  1557            "Certificate": {
  1558              "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
  1559              "CertificateId": "ID123456789012345EXAMPLE",
  1560              "Status": "Active",
  1561              "UploadDate": "2015-06-06T21:40:08.121Z",
  1562              "UserName": "Bob"
  1563            }
  1564          },
  1565          "comments": {
  1566            "input": {
  1567            },
  1568            "output": {
  1569            }
  1570          },
  1571          "description": "The following command uploads a signing certificate for the IAM user named Bob.",
  1572          "id": "e67489b6-7b73-4e30-9ed3-9a9e0231e458",
  1573          "title": "To upload a signing certificate for an IAM user"
  1574        }
  1575      ]
  1576    }
  1577  }