/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include Represents the request to update the user pool client.See
* Also:
AWS
* API Reference
The user pool ID for the user pool where you want to update the user pool * client.
*/ inline const Aws::String& GetUserPoolId() const{ return m_userPoolId; } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline bool UserPoolIdHasBeenSet() const { return m_userPoolIdHasBeenSet; } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline void SetUserPoolId(const Aws::String& value) { m_userPoolIdHasBeenSet = true; m_userPoolId = value; } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline void SetUserPoolId(Aws::String&& value) { m_userPoolIdHasBeenSet = true; m_userPoolId = std::move(value); } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline void SetUserPoolId(const char* value) { m_userPoolIdHasBeenSet = true; m_userPoolId.assign(value); } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline UpdateUserPoolClientRequest& WithUserPoolId(const Aws::String& value) { SetUserPoolId(value); return *this;} /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline UpdateUserPoolClientRequest& WithUserPoolId(Aws::String&& value) { SetUserPoolId(std::move(value)); return *this;} /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline UpdateUserPoolClientRequest& WithUserPoolId(const char* value) { SetUserPoolId(value); return *this;} /** *The ID of the client associated with the user pool.
*/ inline const Aws::String& GetClientId() const{ return m_clientId; } /** *The ID of the client associated with the user pool.
*/ inline bool ClientIdHasBeenSet() const { return m_clientIdHasBeenSet; } /** *The ID of the client associated with the user pool.
*/ inline void SetClientId(const Aws::String& value) { m_clientIdHasBeenSet = true; m_clientId = value; } /** *The ID of the client associated with the user pool.
*/ inline void SetClientId(Aws::String&& value) { m_clientIdHasBeenSet = true; m_clientId = std::move(value); } /** *The ID of the client associated with the user pool.
*/ inline void SetClientId(const char* value) { m_clientIdHasBeenSet = true; m_clientId.assign(value); } /** *The ID of the client associated with the user pool.
*/ inline UpdateUserPoolClientRequest& WithClientId(const Aws::String& value) { SetClientId(value); return *this;} /** *The ID of the client associated with the user pool.
*/ inline UpdateUserPoolClientRequest& WithClientId(Aws::String&& value) { SetClientId(std::move(value)); return *this;} /** *The ID of the client associated with the user pool.
*/ inline UpdateUserPoolClientRequest& WithClientId(const char* value) { SetClientId(value); return *this;} /** *The client name from the update user pool client request.
*/ inline const Aws::String& GetClientName() const{ return m_clientName; } /** *The client name from the update user pool client request.
*/ inline bool ClientNameHasBeenSet() const { return m_clientNameHasBeenSet; } /** *The client name from the update user pool client request.
*/ inline void SetClientName(const Aws::String& value) { m_clientNameHasBeenSet = true; m_clientName = value; } /** *The client name from the update user pool client request.
*/ inline void SetClientName(Aws::String&& value) { m_clientNameHasBeenSet = true; m_clientName = std::move(value); } /** *The client name from the update user pool client request.
*/ inline void SetClientName(const char* value) { m_clientNameHasBeenSet = true; m_clientName.assign(value); } /** *The client name from the update user pool client request.
*/ inline UpdateUserPoolClientRequest& WithClientName(const Aws::String& value) { SetClientName(value); return *this;} /** *The client name from the update user pool client request.
*/ inline UpdateUserPoolClientRequest& WithClientName(Aws::String&& value) { SetClientName(std::move(value)); return *this;} /** *The client name from the update user pool client request.
*/ inline UpdateUserPoolClientRequest& WithClientName(const char* value) { SetClientName(value); return *this;} /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity as 10 and
* TokenValidityUnits as days, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity in an API request is
* days. You can't set RefreshTokenValidity to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline int GetRefreshTokenValidity() const{ return m_refreshTokenValidity; } /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity as 10 and
* TokenValidityUnits as days, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity in an API request is
* days. You can't set RefreshTokenValidity to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline bool RefreshTokenValidityHasBeenSet() const { return m_refreshTokenValidityHasBeenSet; } /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity as 10 and
* TokenValidityUnits as days, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity in an API request is
* days. You can't set RefreshTokenValidity to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline void SetRefreshTokenValidity(int value) { m_refreshTokenValidityHasBeenSet = true; m_refreshTokenValidity = value; } /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity as 10 and
* TokenValidityUnits as days, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity in an API request is
* days. You can't set RefreshTokenValidity to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline UpdateUserPoolClientRequest& WithRefreshTokenValidity(int value) { SetRefreshTokenValidity(value); return *this;} /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity to 10 and
* TokenValidityUnits to hours, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline int GetAccessTokenValidity() const{ return m_accessTokenValidity; } /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity to 10 and
* TokenValidityUnits to hours, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline bool AccessTokenValidityHasBeenSet() const { return m_accessTokenValidityHasBeenSet; } /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity to 10 and
* TokenValidityUnits to hours, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline void SetAccessTokenValidity(int value) { m_accessTokenValidityHasBeenSet = true; m_accessTokenValidity = value; } /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity as seconds, minutes,
* hours, or days, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity to 10 and
* TokenValidityUnits to hours, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline UpdateUserPoolClientRequest& WithAccessTokenValidity(int value) { SetAccessTokenValidity(value); return *this;} /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity as
* seconds, minutes, hours, or
* days, set a TokenValidityUnits value in your API
* request.
For example, when you set IdTokenValidity as
* 10 and TokenValidityUnits as hours, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline int GetIdTokenValidity() const{ return m_idTokenValidity; } /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity as
* seconds, minutes, hours, or
* days, set a TokenValidityUnits value in your API
* request.
For example, when you set IdTokenValidity as
* 10 and TokenValidityUnits as hours, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline bool IdTokenValidityHasBeenSet() const { return m_idTokenValidityHasBeenSet; } /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity as
* seconds, minutes, hours, or
* days, set a TokenValidityUnits value in your API
* request.
For example, when you set IdTokenValidity as
* 10 and TokenValidityUnits as hours, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline void SetIdTokenValidity(int value) { m_idTokenValidityHasBeenSet = true; m_idTokenValidity = value; } /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity as
* seconds, minutes, hours, or
* days, set a TokenValidityUnits value in your API
* request.
For example, when you set IdTokenValidity as
* 10 and TokenValidityUnits as hours, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline UpdateUserPoolClientRequest& WithIdTokenValidity(int value) { SetIdTokenValidity(value); return *this;} /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline const TokenValidityUnitsType& GetTokenValidityUnits() const{ return m_tokenValidityUnits; } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline bool TokenValidityUnitsHasBeenSet() const { return m_tokenValidityUnitsHasBeenSet; } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline void SetTokenValidityUnits(const TokenValidityUnitsType& value) { m_tokenValidityUnitsHasBeenSet = true; m_tokenValidityUnits = value; } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline void SetTokenValidityUnits(TokenValidityUnitsType&& value) { m_tokenValidityUnitsHasBeenSet = true; m_tokenValidityUnits = std::move(value); } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline UpdateUserPoolClientRequest& WithTokenValidityUnits(const TokenValidityUnitsType& value) { SetTokenValidityUnits(value); return *this;} /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline UpdateUserPoolClientRequest& WithTokenValidityUnits(TokenValidityUnitsType&& value) { SetTokenValidityUnits(std::move(value)); return *this;} /** *The read-only attributes of the user pool.
*/ inline const Aws::VectorThe read-only attributes of the user pool.
*/ inline bool ReadAttributesHasBeenSet() const { return m_readAttributesHasBeenSet; } /** *The read-only attributes of the user pool.
*/ inline void SetReadAttributes(const Aws::VectorThe read-only attributes of the user pool.
*/ inline void SetReadAttributes(Aws::VectorThe read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithReadAttributes(const Aws::VectorThe read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithReadAttributes(Aws::VectorThe read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddReadAttributes(const Aws::String& value) { m_readAttributesHasBeenSet = true; m_readAttributes.push_back(value); return *this; } /** *The read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddReadAttributes(Aws::String&& value) { m_readAttributesHasBeenSet = true; m_readAttributes.push_back(std::move(value)); return *this; } /** *The read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddReadAttributes(const char* value) { m_readAttributesHasBeenSet = true; m_readAttributes.push_back(value); return *this; } /** *The writeable attributes of the user pool.
*/ inline const Aws::VectorThe writeable attributes of the user pool.
*/ inline bool WriteAttributesHasBeenSet() const { return m_writeAttributesHasBeenSet; } /** *The writeable attributes of the user pool.
*/ inline void SetWriteAttributes(const Aws::VectorThe writeable attributes of the user pool.
*/ inline void SetWriteAttributes(Aws::VectorThe writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithWriteAttributes(const Aws::VectorThe writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithWriteAttributes(Aws::VectorThe writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddWriteAttributes(const Aws::String& value) { m_writeAttributesHasBeenSet = true; m_writeAttributes.push_back(value); return *this; } /** *The writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddWriteAttributes(Aws::String&& value) { m_writeAttributesHasBeenSet = true; m_writeAttributes.push_back(std::move(value)); return *this; } /** *The writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddWriteAttributes(const char* value) { m_writeAttributesHasBeenSet = true; m_writeAttributes.push_back(value); return *this; } /** *The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and
* ALLOW_CUSTOM_AUTH.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting
* replaces the ADMIN_NO_SRP_AUTH setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or
* USER_PASSWORD_AUTH. You can't assign these legacy
* ExplicitAuthFlows values to user pool clients at the same time as
* values that begin with ALLOW_, like
* ALLOW_USER_SRP_AUTH.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO, Facebook,
* Google, SignInWithApple, LoginWithAmazon,
* and the names of your own SAML and OIDC providers.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example are also supported.
A list of allowed logout URLs for the IdPs.
*/ inline const Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline bool LogoutURLsHasBeenSet() const { return m_logoutURLsHasBeenSet; } /** *A list of allowed logout URLs for the IdPs.
*/ inline void SetLogoutURLs(const Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline void SetLogoutURLs(Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& WithLogoutURLs(const Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& WithLogoutURLs(Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& AddLogoutURLs(const Aws::String& value) { m_logoutURLsHasBeenSet = true; m_logoutURLs.push_back(value); return *this; } /** *A list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& AddLogoutURLs(Aws::String&& value) { m_logoutURLsHasBeenSet = true; m_logoutURLs.push_back(std::move(value)); return *this; } /** *A list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& AddLogoutURLs(const char* value) { m_logoutURLsHasBeenSet = true; m_logoutURLs.push_back(value); return *this; } /** *The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The default redirect URI. Must be in the CallbackURLs list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost for testing purposes only.
App callback
* URLs such as myapp://example are also supported.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone, email, openid, and
* profile. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin. Custom scopes created in Resource
* Servers are also supported.
Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline bool GetAllowedOAuthFlowsUserPoolClient() const{ return m_allowedOAuthFlowsUserPoolClient; } /** *Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline bool AllowedOAuthFlowsUserPoolClientHasBeenSet() const { return m_allowedOAuthFlowsUserPoolClientHasBeenSet; } /** *Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline void SetAllowedOAuthFlowsUserPoolClient(bool value) { m_allowedOAuthFlowsUserPoolClientHasBeenSet = true; m_allowedOAuthFlowsUserPoolClient = value; } /** *Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline UpdateUserPoolClientRequest& WithAllowedOAuthFlowsUserPoolClient(bool value) { SetAllowedOAuthFlowsUserPoolClient(value); return *this;} /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline const AnalyticsConfigurationType& GetAnalyticsConfiguration() const{ return m_analyticsConfiguration; } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline bool AnalyticsConfigurationHasBeenSet() const { return m_analyticsConfigurationHasBeenSet; } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline void SetAnalyticsConfiguration(const AnalyticsConfigurationType& value) { m_analyticsConfigurationHasBeenSet = true; m_analyticsConfiguration = value; } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline void SetAnalyticsConfiguration(AnalyticsConfigurationType&& value) { m_analyticsConfigurationHasBeenSet = true; m_analyticsConfiguration = std::move(value); } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline UpdateUserPoolClientRequest& WithAnalyticsConfiguration(const AnalyticsConfigurationType& value) { SetAnalyticsConfiguration(value); return *this;} /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline UpdateUserPoolClientRequest& WithAnalyticsConfiguration(AnalyticsConfigurationType&& value) { SetAnalyticsConfiguration(std::move(value)); return *this;} /** *Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED - This prevents user
* existence-related errors.
LEGACY - This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED - This prevents user
* existence-related errors.
LEGACY - This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED - This prevents user
* existence-related errors.
LEGACY - This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED - This prevents user
* existence-related errors.
LEGACY - This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED - This prevents user
* existence-related errors.
LEGACY - This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED - This prevents user
* existence-related errors.
LEGACY - This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline bool GetEnableTokenRevocation() const{ return m_enableTokenRevocation; } /** *Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline bool EnableTokenRevocationHasBeenSet() const { return m_enableTokenRevocationHasBeenSet; } /** *Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline void SetEnableTokenRevocation(bool value) { m_enableTokenRevocationHasBeenSet = true; m_enableTokenRevocation = value; } /** *Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline UpdateUserPoolClientRequest& WithEnableTokenRevocation(bool value) { SetEnableTokenRevocation(value); return *this;} /** *Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData in an app client that has
* a client secret.
Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData in an app client that has
* a client secret.
Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData in an app client that has
* a client secret.
Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData in an app client that has
* a client secret.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.