/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include Represents the request to update the user pool client.See
* Also:
AWS
* API Reference
The user pool ID for the user pool where you want to update the user pool * client.
*/ inline const Aws::String& GetUserPoolId() const{ return m_userPoolId; } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline bool UserPoolIdHasBeenSet() const { return m_userPoolIdHasBeenSet; } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline void SetUserPoolId(const Aws::String& value) { m_userPoolIdHasBeenSet = true; m_userPoolId = value; } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline void SetUserPoolId(Aws::String&& value) { m_userPoolIdHasBeenSet = true; m_userPoolId = std::move(value); } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline void SetUserPoolId(const char* value) { m_userPoolIdHasBeenSet = true; m_userPoolId.assign(value); } /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline UpdateUserPoolClientRequest& WithUserPoolId(const Aws::String& value) { SetUserPoolId(value); return *this;} /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline UpdateUserPoolClientRequest& WithUserPoolId(Aws::String&& value) { SetUserPoolId(std::move(value)); return *this;} /** *The user pool ID for the user pool where you want to update the user pool * client.
*/ inline UpdateUserPoolClientRequest& WithUserPoolId(const char* value) { SetUserPoolId(value); return *this;} /** *The ID of the client associated with the user pool.
*/ inline const Aws::String& GetClientId() const{ return m_clientId; } /** *The ID of the client associated with the user pool.
*/ inline bool ClientIdHasBeenSet() const { return m_clientIdHasBeenSet; } /** *The ID of the client associated with the user pool.
*/ inline void SetClientId(const Aws::String& value) { m_clientIdHasBeenSet = true; m_clientId = value; } /** *The ID of the client associated with the user pool.
*/ inline void SetClientId(Aws::String&& value) { m_clientIdHasBeenSet = true; m_clientId = std::move(value); } /** *The ID of the client associated with the user pool.
*/ inline void SetClientId(const char* value) { m_clientIdHasBeenSet = true; m_clientId.assign(value); } /** *The ID of the client associated with the user pool.
*/ inline UpdateUserPoolClientRequest& WithClientId(const Aws::String& value) { SetClientId(value); return *this;} /** *The ID of the client associated with the user pool.
*/ inline UpdateUserPoolClientRequest& WithClientId(Aws::String&& value) { SetClientId(std::move(value)); return *this;} /** *The ID of the client associated with the user pool.
*/ inline UpdateUserPoolClientRequest& WithClientId(const char* value) { SetClientId(value); return *this;} /** *The client name from the update user pool client request.
*/ inline const Aws::String& GetClientName() const{ return m_clientName; } /** *The client name from the update user pool client request.
*/ inline bool ClientNameHasBeenSet() const { return m_clientNameHasBeenSet; } /** *The client name from the update user pool client request.
*/ inline void SetClientName(const Aws::String& value) { m_clientNameHasBeenSet = true; m_clientName = value; } /** *The client name from the update user pool client request.
*/ inline void SetClientName(Aws::String&& value) { m_clientNameHasBeenSet = true; m_clientName = std::move(value); } /** *The client name from the update user pool client request.
*/ inline void SetClientName(const char* value) { m_clientNameHasBeenSet = true; m_clientName.assign(value); } /** *The client name from the update user pool client request.
*/ inline UpdateUserPoolClientRequest& WithClientName(const Aws::String& value) { SetClientName(value); return *this;} /** *The client name from the update user pool client request.
*/ inline UpdateUserPoolClientRequest& WithClientName(Aws::String&& value) { SetClientName(std::move(value)); return *this;} /** *The client name from the update user pool client request.
*/ inline UpdateUserPoolClientRequest& WithClientName(const char* value) { SetClientName(value); return *this;} /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity
as 10
and
* TokenValidityUnits
as days
, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity
in an API request is
* days. You can't set RefreshTokenValidity
to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline int GetRefreshTokenValidity() const{ return m_refreshTokenValidity; } /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity
as 10
and
* TokenValidityUnits
as days
, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity
in an API request is
* days. You can't set RefreshTokenValidity
to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline bool RefreshTokenValidityHasBeenSet() const { return m_refreshTokenValidityHasBeenSet; } /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity
as 10
and
* TokenValidityUnits
as days
, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity
in an API request is
* days. You can't set RefreshTokenValidity
to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline void SetRefreshTokenValidity(int value) { m_refreshTokenValidityHasBeenSet = true; m_refreshTokenValidity = value; } /** *The refresh token time limit. After this limit expires, your user can't use
* their refresh token. To specify the time unit for
* RefreshTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* RefreshTokenValidity
as 10
and
* TokenValidityUnits
as days
, your user can refresh
* their session and retrieve new access and ID tokens for 10 days.
The
* default time unit for RefreshTokenValidity
in an API request is
* days. You can't set RefreshTokenValidity
to 0. If you do, Amazon
* Cognito overrides the value with the default value of 30 days. Valid
* range is displayed below in seconds.
If you don't specify otherwise * in the configuration of your app client, your refresh tokens are valid for 30 * days.
*/ inline UpdateUserPoolClientRequest& WithRefreshTokenValidity(int value) { SetRefreshTokenValidity(value); return *this;} /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity
to 10
and
* TokenValidityUnits
to hours
, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity
in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline int GetAccessTokenValidity() const{ return m_accessTokenValidity; } /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity
to 10
and
* TokenValidityUnits
to hours
, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity
in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline bool AccessTokenValidityHasBeenSet() const { return m_accessTokenValidityHasBeenSet; } /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity
to 10
and
* TokenValidityUnits
to hours
, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity
in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline void SetAccessTokenValidity(int value) { m_accessTokenValidityHasBeenSet = true; m_accessTokenValidity = value; } /** *The access token time limit. After this limit expires, your user can't use
* their access token. To specify the time unit for
* AccessTokenValidity
as seconds
, minutes
,
* hours
, or days
, set a TokenValidityUnits
* value in your API request.
For example, when you set
* AccessTokenValidity
to 10
and
* TokenValidityUnits
to hours
, your user can authorize
* access with their access token for 10 hours.
The default time unit for
* AccessTokenValidity
in an API request is hours. Valid range
* is displayed below in seconds.
If you don't specify otherwise in the * configuration of your app client, your access tokens are valid for one hour.
*/ inline UpdateUserPoolClientRequest& WithAccessTokenValidity(int value) { SetAccessTokenValidity(value); return *this;} /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity
as
* seconds
, minutes
, hours
, or
* days
, set a TokenValidityUnits
value in your API
* request.
For example, when you set IdTokenValidity
as
* 10
and TokenValidityUnits
as hours
, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity
in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline int GetIdTokenValidity() const{ return m_idTokenValidity; } /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity
as
* seconds
, minutes
, hours
, or
* days
, set a TokenValidityUnits
value in your API
* request.
For example, when you set IdTokenValidity
as
* 10
and TokenValidityUnits
as hours
, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity
in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline bool IdTokenValidityHasBeenSet() const { return m_idTokenValidityHasBeenSet; } /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity
as
* seconds
, minutes
, hours
, or
* days
, set a TokenValidityUnits
value in your API
* request.
For example, when you set IdTokenValidity
as
* 10
and TokenValidityUnits
as hours
, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity
in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline void SetIdTokenValidity(int value) { m_idTokenValidityHasBeenSet = true; m_idTokenValidity = value; } /** *The ID token time limit. After this limit expires, your user can't use their
* ID token. To specify the time unit for IdTokenValidity
as
* seconds
, minutes
, hours
, or
* days
, set a TokenValidityUnits
value in your API
* request.
For example, when you set IdTokenValidity
as
* 10
and TokenValidityUnits
as hours
, your
* user can authenticate their session with their ID token for 10 hours.
The
* default time unit for AccessTokenValidity
in an API request is
* hours. Valid range is displayed below in seconds.
If you don't * specify otherwise in the configuration of your app client, your ID tokens are * valid for one hour.
*/ inline UpdateUserPoolClientRequest& WithIdTokenValidity(int value) { SetIdTokenValidity(value); return *this;} /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline const TokenValidityUnitsType& GetTokenValidityUnits() const{ return m_tokenValidityUnits; } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline bool TokenValidityUnitsHasBeenSet() const { return m_tokenValidityUnitsHasBeenSet; } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline void SetTokenValidityUnits(const TokenValidityUnitsType& value) { m_tokenValidityUnitsHasBeenSet = true; m_tokenValidityUnits = value; } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline void SetTokenValidityUnits(TokenValidityUnitsType&& value) { m_tokenValidityUnitsHasBeenSet = true; m_tokenValidityUnits = std::move(value); } /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline UpdateUserPoolClientRequest& WithTokenValidityUnits(const TokenValidityUnitsType& value) { SetTokenValidityUnits(value); return *this;} /** *The units in which the validity times are represented. The default unit for * RefreshToken is days, and the default for ID and access tokens is hours.
*/ inline UpdateUserPoolClientRequest& WithTokenValidityUnits(TokenValidityUnitsType&& value) { SetTokenValidityUnits(std::move(value)); return *this;} /** *The read-only attributes of the user pool.
*/ inline const Aws::VectorThe read-only attributes of the user pool.
*/ inline bool ReadAttributesHasBeenSet() const { return m_readAttributesHasBeenSet; } /** *The read-only attributes of the user pool.
*/ inline void SetReadAttributes(const Aws::VectorThe read-only attributes of the user pool.
*/ inline void SetReadAttributes(Aws::VectorThe read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithReadAttributes(const Aws::VectorThe read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithReadAttributes(Aws::VectorThe read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddReadAttributes(const Aws::String& value) { m_readAttributesHasBeenSet = true; m_readAttributes.push_back(value); return *this; } /** *The read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddReadAttributes(Aws::String&& value) { m_readAttributesHasBeenSet = true; m_readAttributes.push_back(std::move(value)); return *this; } /** *The read-only attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddReadAttributes(const char* value) { m_readAttributesHasBeenSet = true; m_readAttributes.push_back(value); return *this; } /** *The writeable attributes of the user pool.
*/ inline const Aws::VectorThe writeable attributes of the user pool.
*/ inline bool WriteAttributesHasBeenSet() const { return m_writeAttributesHasBeenSet; } /** *The writeable attributes of the user pool.
*/ inline void SetWriteAttributes(const Aws::VectorThe writeable attributes of the user pool.
*/ inline void SetWriteAttributes(Aws::VectorThe writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithWriteAttributes(const Aws::VectorThe writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& WithWriteAttributes(Aws::VectorThe writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddWriteAttributes(const Aws::String& value) { m_writeAttributesHasBeenSet = true; m_writeAttributes.push_back(value); return *this; } /** *The writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddWriteAttributes(Aws::String&& value) { m_writeAttributesHasBeenSet = true; m_writeAttributes.push_back(std::move(value)); return *this; } /** *The writeable attributes of the user pool.
*/ inline UpdateUserPoolClientRequest& AddWriteAttributes(const char* value) { m_writeAttributesHasBeenSet = true; m_writeAttributes.push_back(value); return *this; } /** *The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
The authentication flows that you want your user pool client to support. For * each app client in your user pool, you can sign in your users with any * combination of one or more flows, including with a user name and Secure Remote * Password (SRP), a user name and password, or a custom authentication process * that you define with Lambda functions.
If you don't specify a
* value for ExplicitAuthFlows
, your user client supports
* ALLOW_REFRESH_TOKEN_AUTH
, ALLOW_USER_SRP_AUTH
, and
* ALLOW_CUSTOM_AUTH
.
Valid values include:
ALLOW_ADMIN_USER_PASSWORD_AUTH
: Enable admin based user
* password authentication flow ADMIN_USER_PASSWORD_AUTH
. This setting
* replaces the ADMIN_NO_SRP_AUTH
setting. With this authentication
* flow, your app passes a user name and password to Amazon Cognito in the request,
* instead of using the Secure Remote Password (SRP) protocol to securely transmit
* the password.
ALLOW_CUSTOM_AUTH
: Enable Lambda
* trigger based authentication.
* ALLOW_USER_PASSWORD_AUTH
: Enable user password-based
* authentication. In this flow, Amazon Cognito receives the password in the
* request instead of using the SRP protocol to verify passwords.
ALLOW_USER_SRP_AUTH
: Enable SRP-based authentication.
ALLOW_REFRESH_TOKEN_AUTH
: Enable authflow to refresh
* tokens.
In some environments, you will see the values
* ADMIN_NO_SRP_AUTH
, CUSTOM_AUTH_FLOW_ONLY
, or
* USER_PASSWORD_AUTH
. You can't assign these legacy
* ExplicitAuthFlows
values to user pool clients at the same time as
* values that begin with ALLOW_
, like
* ALLOW_USER_SRP_AUTH
.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of provider names for the IdPs that this client supports. The
* following are supported: COGNITO
, Facebook
,
* Google
, SignInWithApple
, LoginWithAmazon
,
* and the names of your own SAML and OIDC providers.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed redirect (callback) URLs for the IdPs.
A redirect * URI must:
Be an absolute URI.
Be registered * with the authorization server.
Not include a fragment * component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for * http://localhost for testing purposes only.
App callback URLs such as
* myapp://example
are also supported.
A list of allowed logout URLs for the IdPs.
*/ inline const Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline bool LogoutURLsHasBeenSet() const { return m_logoutURLsHasBeenSet; } /** *A list of allowed logout URLs for the IdPs.
*/ inline void SetLogoutURLs(const Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline void SetLogoutURLs(Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& WithLogoutURLs(const Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& WithLogoutURLs(Aws::VectorA list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& AddLogoutURLs(const Aws::String& value) { m_logoutURLsHasBeenSet = true; m_logoutURLs.push_back(value); return *this; } /** *A list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& AddLogoutURLs(Aws::String&& value) { m_logoutURLsHasBeenSet = true; m_logoutURLs.push_back(std::move(value)); return *this; } /** *A list of allowed logout URLs for the IdPs.
*/ inline UpdateUserPoolClientRequest& AddLogoutURLs(const char* value) { m_logoutURLsHasBeenSet = true; m_logoutURLs.push_back(value); return *this; } /** *The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The default redirect URI. Must be in the CallbackURLs
list.
A redirect URI must:
Be an absolute URI.
Be registered with the authorization server.
Not include a * fragment component.
See OAuth 2.0 - Redirection * Endpoint.
Amazon Cognito requires HTTPS over HTTP except for
* http://localhost
for testing purposes only.
App callback
* URLs such as myapp://example
are also supported.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth flows.
Use a code grant
* flow, which provides an authorization code as the response. This code can be
* exchanged for access tokens with the /oauth2/token
endpoint.
Issue the access token (and, optionally, ID * token, based on scopes) directly to your user.
Issue the access token from the
* /oauth2/token
endpoint directly to a non-person user using a
* combination of the client ID and client secret.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
The allowed OAuth scopes. Possible values provided by OAuth are
* phone
, email
, openid
, and
* profile
. Possible values provided by Amazon Web Services are
* aws.cognito.signin.user.admin
. Custom scopes created in Resource
* Servers are also supported.
Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline bool GetAllowedOAuthFlowsUserPoolClient() const{ return m_allowedOAuthFlowsUserPoolClient; } /** *Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline bool AllowedOAuthFlowsUserPoolClientHasBeenSet() const { return m_allowedOAuthFlowsUserPoolClientHasBeenSet; } /** *Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline void SetAllowedOAuthFlowsUserPoolClient(bool value) { m_allowedOAuthFlowsUserPoolClientHasBeenSet = true; m_allowedOAuthFlowsUserPoolClient = value; } /** *Set to true if the client is allowed to follow the OAuth protocol when * interacting with Amazon Cognito user pools.
*/ inline UpdateUserPoolClientRequest& WithAllowedOAuthFlowsUserPoolClient(bool value) { SetAllowedOAuthFlowsUserPoolClient(value); return *this;} /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline const AnalyticsConfigurationType& GetAnalyticsConfiguration() const{ return m_analyticsConfiguration; } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline bool AnalyticsConfigurationHasBeenSet() const { return m_analyticsConfigurationHasBeenSet; } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline void SetAnalyticsConfiguration(const AnalyticsConfigurationType& value) { m_analyticsConfigurationHasBeenSet = true; m_analyticsConfiguration = value; } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline void SetAnalyticsConfiguration(AnalyticsConfigurationType&& value) { m_analyticsConfigurationHasBeenSet = true; m_analyticsConfiguration = std::move(value); } /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline UpdateUserPoolClientRequest& WithAnalyticsConfiguration(const AnalyticsConfigurationType& value) { SetAnalyticsConfiguration(value); return *this;} /** *The Amazon Pinpoint analytics configuration necessary to collect metrics for * this user pool.
In Amazon Web Services Regions where Amazon * Pinpoint isn't available, user pools only support sending events to Amazon * Pinpoint projects in us-east-1. In Regions where Amazon Pinpoint is available, * user pools support sending events to Amazon Pinpoint projects within that same * Region.
*/ inline UpdateUserPoolClientRequest& WithAnalyticsConfiguration(AnalyticsConfigurationType&& value) { SetAnalyticsConfiguration(std::move(value)); return *this;} /** *Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED
and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY
, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED
- This prevents user
* existence-related errors.
LEGACY
- This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED
and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY
, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED
- This prevents user
* existence-related errors.
LEGACY
- This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED
and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY
, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED
- This prevents user
* existence-related errors.
LEGACY
- This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED
and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY
, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED
- This prevents user
* existence-related errors.
LEGACY
- This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED
and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY
, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED
- This prevents user
* existence-related errors.
LEGACY
- This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Errors and responses that you want Amazon Cognito APIs to return during
* authentication, account confirmation, and password recovery when the user
* doesn't exist in the user pool. When set to ENABLED
and the user
* doesn't exist, authentication returns an error indicating either the username or
* password was incorrect. Account confirmation and password recovery return a
* response indicating a code was sent to a simulated destination. When set to
* LEGACY
, those APIs return a UserNotFoundException
* exception if the user doesn't exist in the user pool.
Valid values * include:
ENABLED
- This prevents user
* existence-related errors.
LEGACY
- This
* represents the early behavior of Amazon Cognito where user existence related
* errors aren't prevented.
Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline bool GetEnableTokenRevocation() const{ return m_enableTokenRevocation; } /** *Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline bool EnableTokenRevocationHasBeenSet() const { return m_enableTokenRevocationHasBeenSet; } /** *Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline void SetEnableTokenRevocation(bool value) { m_enableTokenRevocationHasBeenSet = true; m_enableTokenRevocation = value; } /** *Activates or deactivates token revocation. For more information about * revoking tokens, see RevokeToken.
*/ inline UpdateUserPoolClientRequest& WithEnableTokenRevocation(bool value) { SetEnableTokenRevocation(value); return *this;} /** *Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData
in an app client that has
* a client secret.
Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData
in an app client that has
* a client secret.
Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData
in an app client that has
* a client secret.
Activates the propagation of additional user context data. For more
* information about propagation of user context data, see
* Adding advanced security to a user pool. If you don’t include this
* parameter, you can't send device fingerprint information, including source IP
* address, to Amazon Cognito advanced security. You can only activate
* EnablePropagateAdditionalUserContextData
in an app client that has
* a client secret.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity
is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity
is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity
is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.
Amazon Cognito creates a session token for each API request in an
* authentication flow. AuthSessionValidity
is the duration, in
* minutes, of that session token. Your user pool native user must respond to each
* authentication challenge before the session expires.