Skip to content

Commit 5f070cb

Browse files
author
AWS
committed
Amazon Elasticsearch Service Update: Amazon Elasticsearch Service now supports native SAML authentication that seamlessly integrates with the customers' existing SAML 2.0 Identity Provider (IdP).
1 parent 912d171 commit 5f070cb

File tree

2 files changed

+107
-0
lines changed

2 files changed

+107
-0
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon Elasticsearch Service",
4+
"contributor": "",
5+
"description": "Amazon Elasticsearch Service now supports native SAML authentication that seamlessly integrates with the customers' existing SAML 2.0 Identity Provider (IdP)."
6+
}

services/elasticsearch/src/main/resources/codegen-resources/service-2.json

Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -732,6 +732,10 @@
732732
"InternalUserDatabaseEnabled":{
733733
"shape":"Boolean",
734734
"documentation":"<p>True if the internal user database is enabled.</p>"
735+
},
736+
"SAMLOptions":{
737+
"shape":"SAMLOptionsOutput",
738+
"documentation":"<p>Describes the SAML application configured for a domain.</p>"
735739
}
736740
},
737741
"documentation":"<p>Specifies the advanced security configuration: whether advanced security is enabled, whether the internal database option is enabled.</p>"
@@ -750,6 +754,10 @@
750754
"MasterUserOptions":{
751755
"shape":"MasterUserOptions",
752756
"documentation":"<p>Credentials for the master user: username and password, ARN, or both.</p>"
757+
},
758+
"SAMLOptions":{
759+
"shape":"SAMLOptionsInput",
760+
"documentation":"<p>Specifies the SAML application configuration for the domain.</p>"
753761
}
754762
},
755763
"documentation":"<p>Specifies the advanced security configuration: whether advanced security is enabled, whether the internal database option is enabled, master username and password (if internal database is enabled), and master user ARN (if IAM is enabled).</p>"
@@ -804,6 +812,11 @@
804812
},
805813
"documentation":"<p> Container for response returned by <code> <a>AssociatePackage</a> </code> operation. </p>"
806814
},
815+
"BackendRole":{
816+
"type":"string",
817+
"max":256,
818+
"min":1
819+
},
807820
"BaseException":{
808821
"type":"structure",
809822
"members":{
@@ -3036,6 +3049,94 @@
30363049
"min":3
30373050
},
30383051
"S3Key":{"type":"string"},
3052+
"SAMLEntityId":{
3053+
"type":"string",
3054+
"max":512,
3055+
"min":8
3056+
},
3057+
"SAMLIdp":{
3058+
"type":"structure",
3059+
"required":[
3060+
"MetadataContent",
3061+
"EntityId"
3062+
],
3063+
"members":{
3064+
"MetadataContent":{
3065+
"shape":"SAMLMetadata",
3066+
"documentation":"<p>The Metadata of the SAML application in xml format.</p>"
3067+
},
3068+
"EntityId":{
3069+
"shape":"SAMLEntityId",
3070+
"documentation":"<p>The unique Entity ID of the application in SAML Identity Provider.</p>"
3071+
}
3072+
},
3073+
"documentation":"<p>Specifies the SAML Identity Provider's information.</p>"
3074+
},
3075+
"SAMLMetadata":{
3076+
"type":"string",
3077+
"max":1048576,
3078+
"min":1
3079+
},
3080+
"SAMLOptionsInput":{
3081+
"type":"structure",
3082+
"members":{
3083+
"Enabled":{
3084+
"shape":"Boolean",
3085+
"documentation":"<p>True if SAML is enabled.</p>"
3086+
},
3087+
"Idp":{
3088+
"shape":"SAMLIdp",
3089+
"documentation":"<p>Specifies the SAML Identity Provider's information.</p>"
3090+
},
3091+
"MasterUserName":{
3092+
"shape":"Username",
3093+
"documentation":"<p>The SAML master username, which is stored in the Amazon Elasticsearch Service domain's internal database.</p>"
3094+
},
3095+
"MasterBackendRole":{
3096+
"shape":"BackendRole",
3097+
"documentation":"<p>The backend role to which the SAML master user is mapped to.</p>"
3098+
},
3099+
"SubjectKey":{
3100+
"shape":"String",
3101+
"documentation":"<p>The key to use for matching the SAML Subject attribute.</p>"
3102+
},
3103+
"RolesKey":{
3104+
"shape":"String",
3105+
"documentation":"<p>The key to use for matching the SAML Roles attribute.</p>"
3106+
},
3107+
"SessionTimeoutMinutes":{
3108+
"shape":"IntegerClass",
3109+
"documentation":"<p>The duration, in minutes, after which a user session becomes inactive. Acceptable values are between 1 and 1440, and the default value is 60.</p>"
3110+
}
3111+
},
3112+
"documentation":"<p>Specifies the SAML application configuration for the domain.</p>"
3113+
},
3114+
"SAMLOptionsOutput":{
3115+
"type":"structure",
3116+
"members":{
3117+
"Enabled":{
3118+
"shape":"Boolean",
3119+
"documentation":"<p>True if SAML is enabled.</p>"
3120+
},
3121+
"Idp":{
3122+
"shape":"SAMLIdp",
3123+
"documentation":"<p>Describes the SAML Identity Provider's information.</p>"
3124+
},
3125+
"SubjectKey":{
3126+
"shape":"String",
3127+
"documentation":"<p>The key used for matching the SAML Subject attribute.</p>"
3128+
},
3129+
"RolesKey":{
3130+
"shape":"String",
3131+
"documentation":"<p>The key used for matching the SAML Roles attribute.</p>"
3132+
},
3133+
"SessionTimeoutMinutes":{
3134+
"shape":"IntegerClass",
3135+
"documentation":"<p>The duration, in minutes, after which a user session becomes inactive.</p>"
3136+
}
3137+
},
3138+
"documentation":"<p>Describes the SAML application configured for the domain.</p>"
3139+
},
30393140
"ServiceSoftwareOptions":{
30403141
"type":"structure",
30413142
"members":{

0 commit comments

Comments
 (0)