Learn R Programming

paws.security.identity (version 0.4.0)

ssoadmin: AWS Single Sign-On Admin

Description

AWS IAM Identity Center (successor to AWS Single Sign-On) helps you securely create, or connect, your workforce identities and manage their access centrally across AWS accounts and applications. IAM Identity Center is the recommended approach for workforce authentication and authorization in AWS, for organizations of any size and type.

Although AWS Single Sign-On was renamed, the sso and identitystore API namespaces will continue to retain their original name for backward compatibility purposes. For more information, see IAM Identity Center rename.

This reference guide provides information on single sign-on operations which could be used for access management of AWS accounts. For information about IAM Identity Center features, see the IAM Identity Center User Guide.

Many operations in the IAM Identity Center APIs rely on identifiers for users and groups, known as principals. For more information about how to work with principals and principal IDs in IAM Identity Center, see the Identity Store API Reference.

AWS provides SDKs that consist of libraries and sample code for various programming languages and platforms (Java, Ruby, .Net, iOS, Android, and more). The SDKs provide a convenient way to create programmatic access to IAM Identity Center and other AWS services. For more information about the AWS SDKs, including how to download and install them, see Tools for Amazon Web Services.

Usage

ssoadmin(config = list(), credentials = list(), endpoint = NULL, region = NULL)

Value

A client for the service. You can call the service's operations using syntax like svc$operation(...), where svc is the name you've assigned to the client. The available operations are listed in the Operations section.

Arguments

config

Optional configuration of credentials, endpoint, and/or region.

  • credentials:

    • creds:

      • access_key_id: AWS access key ID

      • secret_access_key: AWS secret access key

      • session_token: AWS temporary session token

    • profile: The name of a profile to use. If not given, then the default profile is used.

    • anonymous: Set anonymous credentials.

    • endpoint: The complete URL to use for the constructed client.

    • region: The AWS Region used in instantiating the client.

  • close_connection: Immediately close all HTTP connections.

  • timeout: The time in seconds till a timeout exception is thrown when attempting to make a connection. The default is 60 seconds.

  • s3_force_path_style: Set this to true to force the request to use path-style addressing, i.e. http://s3.amazonaws.com/BUCKET/KEY.

  • sts_regional_endpoint: Set sts regional endpoint resolver to regional or legacy https://docs.aws.amazon.com/sdkref/latest/guide/feature-sts-regionalized-endpoints.html

credentials

Optional credentials shorthand for the config parameter

  • creds:

    • access_key_id: AWS access key ID

    • secret_access_key: AWS secret access key

    • session_token: AWS temporary session token

  • profile: The name of a profile to use. If not given, then the default profile is used.

  • anonymous: Set anonymous credentials.

endpoint

Optional shorthand for complete URL to use for the constructed client.

region

Optional shorthand for AWS Region used in instantiating the client.

Service syntax

svc <- ssoadmin(
  config = list(
    credentials = list(
      creds = list(
        access_key_id = "string",
        secret_access_key = "string",
        session_token = "string"
      ),
      profile = "string",
      anonymous = "logical"
    ),
    endpoint = "string",
    region = "string",
    close_connection = "logical",
    timeout = "numeric",
    s3_force_path_style = "logical",
    sts_regional_endpoint = "string"
  ),
  credentials = list(
    creds = list(
      access_key_id = "string",
      secret_access_key = "string",
      session_token = "string"
    ),
    profile = "string",
    anonymous = "logical"
  ),
  endpoint = "string",
  region = "string"
)

Operations

attach_customer_managed_policy_reference_to_permission_setAttaches the specified customer managed policy to the specified PermissionSet
attach_managed_policy_to_permission_setAttaches an AWS managed policy ARN to a permission set
create_account_assignmentAssigns access to a principal for a specified AWS account using a specified permission set
create_instance_access_control_attribute_configurationEnables the attributes-based access control (ABAC) feature for the specified IAM Identity Center instance
create_permission_setCreates a permission set within a specified IAM Identity Center instance
delete_account_assignmentDeletes a principal's access from a specified AWS account using a specified permission set
delete_inline_policy_from_permission_setDeletes the inline policy from a specified permission set
delete_instance_access_control_attribute_configurationDisables the attributes-based access control (ABAC) feature for the specified IAM Identity Center instance and deletes all of the attribute mappings that have been configured
delete_permissions_boundary_from_permission_setDeletes the permissions boundary from a specified PermissionSet
delete_permission_setDeletes the specified permission set
describe_account_assignment_creation_statusDescribes the status of the assignment creation request
describe_account_assignment_deletion_statusDescribes the status of the assignment deletion request
describe_instance_access_control_attribute_configurationReturns the list of IAM Identity Center identity store attributes that have been configured to work with attributes-based access control (ABAC) for the specified IAM Identity Center instance
describe_permission_setGets the details of the permission set
describe_permission_set_provisioning_statusDescribes the status for the given permission set provisioning request
detach_customer_managed_policy_reference_from_permission_setDetaches the specified customer managed policy from the specified PermissionSet
detach_managed_policy_from_permission_setDetaches the attached AWS managed policy ARN from the specified permission set
get_inline_policy_for_permission_setObtains the inline policy assigned to the permission set
get_permissions_boundary_for_permission_setObtains the permissions boundary for a specified PermissionSet
list_account_assignment_creation_statusLists the status of the AWS account assignment creation requests for a specified IAM Identity Center instance
list_account_assignment_deletion_statusLists the status of the AWS account assignment deletion requests for a specified IAM Identity Center instance
list_account_assignmentsLists the assignee of the specified AWS account with the specified permission set
list_accounts_for_provisioned_permission_setLists all the AWS accounts where the specified permission set is provisioned
list_customer_managed_policy_references_in_permission_setLists all customer managed policies attached to a specified PermissionSet
list_instancesLists the IAM Identity Center instances that the caller has access to
list_managed_policies_in_permission_setLists the AWS managed policy that is attached to a specified permission set
list_permission_set_provisioning_statusLists the status of the permission set provisioning requests for a specified IAM Identity Center instance
list_permission_setsLists the PermissionSets in an IAM Identity Center instance
list_permission_sets_provisioned_to_accountLists all the permission sets that are provisioned to a specified AWS account
list_tags_for_resourceLists the tags that are attached to a specified resource
provision_permission_setThe process by which a specified permission set is provisioned to the specified target
put_inline_policy_to_permission_setAttaches an inline policy to a permission set
put_permissions_boundary_to_permission_setAttaches an AWS managed or customer managed policy to the specified PermissionSet as a permissions boundary
tag_resourceAssociates a set of tags with a specified resource
untag_resourceDisassociates a set of tags from a specified resource
update_instance_access_control_attribute_configurationUpdates the IAM Identity Center identity store attributes that you can use with the IAM Identity Center instance for attributes-based access control (ABAC)
update_permission_setUpdates an existing permission set

Examples

Run this code
if (FALSE) {
svc <- ssoadmin()
svc$attach_customer_managed_policy_reference_to_permission_set(
  Foo = 123
)
}

Run the code above in your browser using DataLab