| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
|
|
2
|
|
|
|
|
|
|
package Paws::STS::AssumeRoleWithSAMLResponse; |
|
3
|
1
|
|
|
1
|
|
290
|
use Moose; |
|
|
1
|
|
|
|
|
3
|
|
|
|
1
|
|
|
|
|
5
|
|
|
4
|
|
|
|
|
|
|
has AssumedRoleUser => (is => 'ro', isa => 'Paws::STS::AssumedRoleUser'); |
|
5
|
|
|
|
|
|
|
has Audience => (is => 'ro', isa => 'Str'); |
|
6
|
|
|
|
|
|
|
has Credentials => (is => 'ro', isa => 'Paws::STS::Credentials'); |
|
7
|
|
|
|
|
|
|
has Issuer => (is => 'ro', isa => 'Str'); |
|
8
|
|
|
|
|
|
|
has NameQualifier => (is => 'ro', isa => 'Str'); |
|
9
|
|
|
|
|
|
|
has PackedPolicySize => (is => 'ro', isa => 'Int'); |
|
10
|
|
|
|
|
|
|
has Subject => (is => 'ro', isa => 'Str'); |
|
11
|
|
|
|
|
|
|
has SubjectType => (is => 'ro', isa => 'Str'); |
|
12
|
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
has _request_id => (is => 'ro', isa => 'Str'); |
|
14
|
|
|
|
|
|
|
1; |
|
15
|
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
### main pod documentation begin ### |
|
17
|
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
=head1 NAME |
|
19
|
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
Paws::STS::AssumeRoleWithSAMLResponse |
|
21
|
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
=head1 ATTRIBUTES |
|
23
|
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
=head2 AssumedRoleUser => L<Paws::STS::AssumedRoleUser> |
|
26
|
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
The identifiers for the temporary security credentials that the |
|
28
|
|
|
|
|
|
|
operation returns. |
|
29
|
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
=head2 Audience => Str |
|
32
|
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
The value of the C<Recipient> attribute of the |
|
34
|
|
|
|
|
|
|
C<SubjectConfirmationData> element of the SAML assertion. |
|
35
|
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
=head2 Credentials => L<Paws::STS::Credentials> |
|
38
|
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
The temporary security credentials, which include an access key ID, a |
|
40
|
|
|
|
|
|
|
secret access key, and a security (or session) token. |
|
41
|
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
B<Note:> The size of the security token that STS APIs return is not |
|
43
|
|
|
|
|
|
|
fixed. We strongly recommend that you make no assumptions about the |
|
44
|
|
|
|
|
|
|
maximum size. As of this writing, the typical size is less than 4096 |
|
45
|
|
|
|
|
|
|
bytes, but that can vary. Also, future updates to AWS might require |
|
46
|
|
|
|
|
|
|
larger sizes. |
|
47
|
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
=head2 Issuer => Str |
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
The value of the C<Issuer> element of the SAML assertion. |
|
52
|
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
=head2 NameQualifier => Str |
|
55
|
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
A hash value based on the concatenation of the C<Issuer> response |
|
57
|
|
|
|
|
|
|
value, the AWS account ID, and the friendly name (the last part of the |
|
58
|
|
|
|
|
|
|
ARN) of the SAML provider in IAM. The combination of C<NameQualifier> |
|
59
|
|
|
|
|
|
|
and C<Subject> can be used to uniquely identify a federated user. |
|
60
|
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
The following pseudocode shows how the hash value is calculated: |
|
62
|
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
C<BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + |
|
64
|
|
|
|
|
|
|
"/MySAMLIdP" ) )> |
|
65
|
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
=head2 PackedPolicySize => Int |
|
68
|
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
A percentage value that indicates the size of the policy in packed |
|
70
|
|
|
|
|
|
|
form. The service rejects any policy with a packed size greater than |
|
71
|
|
|
|
|
|
|
100 percent, which means the policy exceeded the allowed space. |
|
72
|
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
=head2 Subject => Str |
|
75
|
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
The value of the C<NameID> element in the C<Subject> element of the |
|
77
|
|
|
|
|
|
|
SAML assertion. |
|
78
|
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
=head2 SubjectType => Str |
|
81
|
|
|
|
|
|
|
|
|
82
|
|
|
|
|
|
|
The format of the name ID, as defined by the C<Format> attribute in the |
|
83
|
|
|
|
|
|
|
C<NameID> element of the SAML assertion. Typical examples of the format |
|
84
|
|
|
|
|
|
|
are C<transient> or C<persistent>. |
|
85
|
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
If the format includes the prefix |
|
87
|
|
|
|
|
|
|
C<urn:oasis:names:tc:SAML:2.0:nameid-format>, that prefix is removed. |
|
88
|
|
|
|
|
|
|
For example, C<urn:oasis:names:tc:SAML:2.0:nameid-format:transient> is |
|
89
|
|
|
|
|
|
|
returned as C<transient>. If the format includes any other prefix, the |
|
90
|
|
|
|
|
|
|
format is returned with no modifications. |
|
91
|
|
|
|
|
|
|
|
|
92
|
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
=head2 _request_id => Str |
|
94
|
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
=cut |
|
97
|
|
|
|
|
|
|
|