You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: clients/client-iam/src/IAM.ts
+11-7Lines changed: 11 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -3928,11 +3928,13 @@ export class IAM extends IAMClient {
3928
3928
* If there is none, the operation returns an empty list.</p>
3929
3929
* <p>Although each user is limited to a small number of keys, you can still paginate the
3930
3930
* results using the <code>MaxItems</code> and <code>Marker</code> parameters.</p>
3931
-
* <p>If the <code>UserName</code> field is not specified, the user name is determined
3932
-
* implicitly based on the Amazon Web Services access key ID used to sign the request. This operation
3933
-
* works for access keys under the Amazon Web Services account. Consequently, you can use this operation
3934
-
* to manage Amazon Web Services account root user credentials even if the Amazon Web Services account has no
3935
-
* associated users.</p>
3931
+
* <p>If the <code>UserName</code> is not specified, the user name is determined implicitly
3932
+
* based on the Amazon Web Services access key ID used to sign the request. If a temporary access key is
3933
+
* used, then <code>UserName</code> is required. If a long-term key is assigned to the
3934
+
* user, then <code>UserName</code> is not required. This operation works for access keys
3935
+
* under the Amazon Web Services account. Consequently, you can use this operation to manage
3936
+
* Amazon Web Services account root user credentials even if the Amazon Web Services account has no associated
3937
+
* users.</p>
3936
3938
* <note>
3937
3939
* <p>To ensure the security of your Amazon Web Services account, the secret access key is accessible
3938
3940
* only during key and user creation.</p>
@@ -6642,8 +6644,10 @@ export class IAM extends IAMClient {
6642
6644
* This operation can be used to disable a user's key as part of a key rotation
6643
6645
* workflow.</p>
6644
6646
* <p>If the <code>UserName</code> is not specified, the user name is determined implicitly
6645
-
* based on the Amazon Web Services access key ID used to sign the request. This operation works for
6646
-
* access keys under the Amazon Web Services account. Consequently, you can use this operation to manage
6647
+
* based on the Amazon Web Services access key ID used to sign the request. If a temporary access key is
6648
+
* used, then <code>UserName</code> is required. If a long-term key is assigned to the
6649
+
* user, then <code>UserName</code> is not required. This operation works for access keys
6650
+
* under the Amazon Web Services account. Consequently, you can use this operation to manage
6647
6651
* Amazon Web Services account root user credentials even if the Amazon Web Services account has no associated
6648
6652
* users.</p>
6649
6653
* <p>For information about rotating keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingCredentials.html">Managing keys and certificates</a>
* This operation can be used to disable a user's key as part of a key rotation
28
28
* workflow.</p>
29
29
* <p>If the <code>UserName</code> is not specified, the user name is determined implicitly
30
-
* based on the Amazon Web Services access key ID used to sign the request. This operation works for
31
-
* access keys under the Amazon Web Services account. Consequently, you can use this operation to manage
30
+
* based on the Amazon Web Services access key ID used to sign the request. If a temporary access key is
31
+
* used, then <code>UserName</code> is required. If a long-term key is assigned to the
32
+
* user, then <code>UserName</code> is not required. This operation works for access keys
33
+
* under the Amazon Web Services account. Consequently, you can use this operation to manage
32
34
* Amazon Web Services account root user credentials even if the Amazon Web Services account has no associated
33
35
* users.</p>
34
36
* <p>For information about rotating keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingCredentials.html">Managing keys and certificates</a>
* not match one of the following scenarios, then you can omit this parameter. The
6894
6894
* following list shows each of the supported scenario values and the resources that you
6895
6895
* must define to run the simulation.</p>
6896
-
* <p>Each of the EC2 scenarios requires that you specify instance, image, and
6897
-
* security-group resources. If your scenario includes an EBS volume, then you must specify
6898
-
* that volume as a resource. If the EC2 scenario includes VPC, then you must supply the
6899
-
* network-interface resource. If it includes an IP subnet, then you must specify the
6900
-
* subnet resource. For more information on the EC2 scenario options, see <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-supported-platforms.html">Supported platforms</a> in the <i>Amazon EC2 User
6896
+
* <p>Each of the EC2 scenarios requires that you specify instance, image, and security
6897
+
* group resources. If your scenario includes an EBS volume, then you must specify that
6898
+
* volume as a resource. If the EC2 scenario includes VPC, then you must supply the network
6899
+
* interface resource. If it includes an IP subnet, then you must specify the subnet
6900
+
* resource. For more information on the EC2 scenario options, see <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-supported-platforms.html">Supported platforms</a> in the <i>Amazon EC2 User
0 commit comments