sts-2011-06-15.examples.json 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271
  1. {
  2. "version": "1.0",
  3. "examples": {
  4. "AssumeRole": [
  5. {
  6. "input": {
  7. "ExternalId": "123ABC",
  8. "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
  9. "RoleArn": "arn:aws:iam::123456789012:role/demo",
  10. "RoleSessionName": "testAssumeRoleSession",
  11. "Tags": [
  12. {
  13. "Key": "Project",
  14. "Value": "Unicorn"
  15. },
  16. {
  17. "Key": "Team",
  18. "Value": "Automation"
  19. },
  20. {
  21. "Key": "Cost-Center",
  22. "Value": "12345"
  23. }
  24. ],
  25. "TransitiveTagKeys": [
  26. "Project",
  27. "Cost-Center"
  28. ]
  29. },
  30. "output": {
  31. "AssumedRoleUser": {
  32. "Arn": "arn:aws:sts::123456789012:assumed-role/demo/Bob",
  33. "AssumedRoleId": "ARO123EXAMPLE123:Bob"
  34. },
  35. "Credentials": {
  36. "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
  37. "Expiration": "2011-07-15T23:28:33.359Z",
  38. "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
  39. "SessionToken": "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
  40. },
  41. "PackedPolicySize": 8
  42. },
  43. "comments": {
  44. "input": {
  45. },
  46. "output": {
  47. }
  48. },
  49. "description": "",
  50. "id": "to-assume-a-role-1480532402212",
  51. "title": "To assume a role"
  52. }
  53. ],
  54. "AssumeRoleWithSAML": [
  55. {
  56. "input": {
  57. "DurationSeconds": 3600,
  58. "PrincipalArn": "arn:aws:iam::123456789012:saml-provider/SAML-test",
  59. "RoleArn": "arn:aws:iam::123456789012:role/TestSaml",
  60. "SAMLAssertion": "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"
  61. },
  62. "output": {
  63. "AssumedRoleUser": {
  64. "Arn": "arn:aws:sts::123456789012:assumed-role/TestSaml",
  65. "AssumedRoleId": "ARO456EXAMPLE789:TestSaml"
  66. },
  67. "Audience": "https://signin.aws.amazon.com/saml",
  68. "Credentials": {
  69. "AccessKeyId": "ASIAV3ZUEFP6EXAMPLE",
  70. "Expiration": "2019-11-01T20:26:47Z",
  71. "SecretAccessKey": "8P+SQvWIuLnKhh8d++jpw0nNmQRBZvNEXAMPLEKEY",
  72. "SessionToken": "IQoJb3JpZ2luX2VjEOz////////////////////wEXAMPLEtMSJHMEUCIDoKK3JH9uGQE1z0sINr5M4jk+Na8KHDcCYRVjJCZEvOAiEA3OvJGtw1EcViOleS2vhs8VdCKFJQWPQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
  73. },
  74. "Issuer": "https://integ.example.com/idp/shibboleth",
  75. "NameQualifier": "SbdGOnUkh1i4+EXAMPLExL/jEvs=",
  76. "PackedPolicySize": 6,
  77. "Subject": "SamlExample",
  78. "SubjectType": "transient"
  79. },
  80. "comments": {
  81. "input": {
  82. },
  83. "output": {
  84. }
  85. },
  86. "description": "",
  87. "id": "to-assume-role-with-saml-14882749597814",
  88. "title": "To assume a role using a SAML assertion"
  89. }
  90. ],
  91. "AssumeRoleWithWebIdentity": [
  92. {
  93. "input": {
  94. "DurationSeconds": 3600,
  95. "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
  96. "ProviderId": "www.amazon.com",
  97. "RoleArn": "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
  98. "RoleSessionName": "app1",
  99. "WebIdentityToken": "Atza%7CIQEBLjAsAhRFiXuWpUXuRvQ9PZL3GMFcYevydwIUFAHZwXZXXXXXXXXJnrulxKDHwy87oGKPznh0D6bEQZTSCzyoCtL_8S07pLpr0zMbn6w1lfVZKNTBdDansFBmtGnIsIapjI6xKR02Yc_2bQ8LZbUXSGm6Ry6_BG7PrtLZtj_dfCTj92xNGed-CrKqjG7nPBjNIL016GGvuS5gSvPRUxWES3VYfm1wl7WTI7jn-Pcb6M-buCgHhFOzTQxod27L9CqnOLio7N3gZAGpsp6n1-AJBOCJckcyXe2c6uD0srOJeZlKUm2eTDVMf8IehDVI0r1QOnTV6KzzAI3OY87Vd_cVMQ"
  100. },
  101. "output": {
  102. "AssumedRoleUser": {
  103. "Arn": "arn:aws:sts::123456789012:assumed-role/FederatedWebIdentityRole/app1",
  104. "AssumedRoleId": "AROACLKWSDQRAOEXAMPLE:app1"
  105. },
  106. "Audience": "client.5498841531868486423.1548@apps.example.com",
  107. "Credentials": {
  108. "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
  109. "Expiration": "2014-10-24T23:00:23Z",
  110. "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
  111. "SessionToken": "AQoDYXdzEE0a8ANXXXXXXXXNO1ewxE5TijQyp+IEXAMPLE"
  112. },
  113. "PackedPolicySize": 123,
  114. "Provider": "www.amazon.com",
  115. "SubjectFromWebIdentityToken": "amzn1.account.AF6RHO7KZU5XRVQJGXK6HEXAMPLE"
  116. },
  117. "comments": {
  118. "input": {
  119. },
  120. "output": {
  121. }
  122. },
  123. "description": "",
  124. "id": "to-assume-a-role-as-an-openid-connect-federated-user-1480533445696",
  125. "title": "To assume a role as an OpenID Connect-federated user"
  126. }
  127. ],
  128. "DecodeAuthorizationMessage": [
  129. {
  130. "input": {
  131. "EncodedMessage": "<encoded-message>"
  132. },
  133. "output": {
  134. "DecodedMessage": "{\"allowed\": \"false\",\"explicitDeny\": \"false\",\"matchedStatements\": \"\",\"failures\": \"\",\"context\": {\"principal\": {\"id\": \"AIDACKCEVSQ6C2EXAMPLE\",\"name\": \"Bob\",\"arn\": \"arn:aws:iam::123456789012:user/Bob\"},\"action\": \"ec2:StopInstances\",\"resource\": \"arn:aws:ec2:us-east-1:123456789012:instance/i-dd01c9bd\",\"conditions\": [{\"item\": {\"key\": \"ec2:Tenancy\",\"values\": [\"default\"]},{\"item\": {\"key\": \"ec2:ResourceTag/elasticbeanstalk:environment-name\",\"values\": [\"Default-Environment\"]}},(Additional items ...)]}}"
  135. },
  136. "comments": {
  137. "input": {
  138. },
  139. "output": {
  140. }
  141. },
  142. "description": "",
  143. "id": "to-decode-information-about-an-authorization-status-of-a-request-1480533854499",
  144. "title": "To decode information about an authorization status of a request"
  145. }
  146. ],
  147. "GetCallerIdentity": [
  148. {
  149. "input": {
  150. },
  151. "output": {
  152. "Account": "123456789012",
  153. "Arn": "arn:aws:iam::123456789012:user/Alice",
  154. "UserId": "AKIAI44QH8DHBEXAMPLE"
  155. },
  156. "comments": {
  157. "input": {
  158. },
  159. "output": {
  160. }
  161. },
  162. "description": "This example shows a request and response made with the credentials for a user named Alice in the AWS account 123456789012.",
  163. "id": "to-get-details-about-a-calling-iam-user-1480540050376",
  164. "title": "To get details about a calling IAM user"
  165. },
  166. {
  167. "input": {
  168. },
  169. "output": {
  170. "Account": "123456789012",
  171. "Arn": "arn:aws:sts::123456789012:assumed-role/my-role-name/my-role-session-name",
  172. "UserId": "AKIAI44QH8DHBEXAMPLE:my-role-session-name"
  173. },
  174. "comments": {
  175. "input": {
  176. },
  177. "output": {
  178. }
  179. },
  180. "description": "This example shows a request and response made with temporary credentials created by AssumeRole. The name of the assumed role is my-role-name, and the RoleSessionName is set to my-role-session-name.",
  181. "id": "to-get-details-about-a-calling-user-federated-with-assumerole-1480540158545",
  182. "title": "To get details about a calling user federated with AssumeRole"
  183. },
  184. {
  185. "input": {
  186. },
  187. "output": {
  188. "Account": "123456789012",
  189. "Arn": "arn:aws:sts::123456789012:federated-user/my-federated-user-name",
  190. "UserId": "123456789012:my-federated-user-name"
  191. },
  192. "comments": {
  193. "input": {
  194. },
  195. "output": {
  196. }
  197. },
  198. "description": "This example shows a request and response made with temporary credentials created by using GetFederationToken. The Name parameter is set to my-federated-user-name.",
  199. "id": "to-get-details-about-a-calling-user-federated-with-getfederationtoken-1480540231316",
  200. "title": "To get details about a calling user federated with GetFederationToken"
  201. }
  202. ],
  203. "GetFederationToken": [
  204. {
  205. "input": {
  206. "DurationSeconds": 3600,
  207. "Name": "testFedUserSession",
  208. "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
  209. "Tags": [
  210. {
  211. "Key": "Project",
  212. "Value": "Pegasus"
  213. },
  214. {
  215. "Key": "Cost-Center",
  216. "Value": "98765"
  217. }
  218. ]
  219. },
  220. "output": {
  221. "Credentials": {
  222. "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
  223. "Expiration": "2011-07-15T23:28:33.359Z",
  224. "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
  225. "SessionToken": "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
  226. },
  227. "FederatedUser": {
  228. "Arn": "arn:aws:sts::123456789012:federated-user/Bob",
  229. "FederatedUserId": "123456789012:Bob"
  230. },
  231. "PackedPolicySize": 8
  232. },
  233. "comments": {
  234. "input": {
  235. },
  236. "output": {
  237. }
  238. },
  239. "description": "",
  240. "id": "to-get-temporary-credentials-for-a-role-by-using-getfederationtoken-1480540749900",
  241. "title": "To get temporary credentials for a role by using GetFederationToken"
  242. }
  243. ],
  244. "GetSessionToken": [
  245. {
  246. "input": {
  247. "DurationSeconds": 3600,
  248. "SerialNumber": "YourMFASerialNumber",
  249. "TokenCode": "123456"
  250. },
  251. "output": {
  252. "Credentials": {
  253. "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
  254. "Expiration": "2011-07-11T19:55:29.611Z",
  255. "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
  256. "SessionToken": "AQoEXAMPLEH4aoAH0gNCAPyJxz4BlCFFxWNE1OPTgk5TthT+FvwqnKwRcOIfrRh3c/LTo6UDdyJwOOvEVPvLXCrrrUtdnniCEXAMPLE/IvU1dYUg2RVAJBanLiHb4IgRmpRV3zrkuWJOgQs8IZZaIv2BXIa2R4OlgkBN9bkUDNCJiBeb/AXlzBBko7b15fjrBs2+cTQtpZ3CYWFXG8C5zqx37wnOE49mRl/+OtkIKGO7fAE"
  257. }
  258. },
  259. "comments": {
  260. "input": {
  261. },
  262. "output": {
  263. }
  264. },
  265. "description": "",
  266. "id": "to-get-temporary-credentials-for-an-iam-user-or-an-aws-account-1480540814038",
  267. "title": "To get temporary credentials for an IAM user or an AWS account"
  268. }
  269. ]
  270. }
  271. }