You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: clients/client-iam/src/IAM.ts
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -1792,18 +1792,18 @@ export class IAM extends IAMClient {
1792
1792
}
1793
1793
1794
1794
/**
1795
-
* <p>Deletes the password for the specified IAM user, which terminates the user's ability
1796
-
* to access Amazon Web Services services through the Amazon Web Services Management Console.</p>
1795
+
* <p>Deletes the password for the specified IAM user, For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_admin-change-user.html">Managing
1796
+
* passwords for IAM users</a>.</p>
1797
1797
* <p>You can use the CLI, the Amazon Web Services API, or the <b>Users</b>
1798
1798
* page in the IAM console to delete a password for any IAM user. You can use <a>ChangePassword</a> to update, but not delete, your own password in the
1799
1799
* <b>My Security Credentials</b> page in the
1800
1800
* Amazon Web Services Management Console.</p>
1801
1801
* <important>
1802
-
* <p>Deleting a user's password does not prevent a user from accessing Amazon Web Services through
1802
+
* <p>Deleting a user's password does not prevent a user from accessing Amazon Web Services through
1803
1803
* the command line interface or the API. To prevent all user access, you must also
1804
1804
* either make any access keys inactive or delete them. For more information about
1805
1805
* making keys inactive or deleting them, see <a>UpdateAccessKey</a> and
* <p>Deletes the password for the specified IAM user, which terminates the user's ability
27
-
* to access Amazon Web Services services through the Amazon Web Services Management Console.</p>
26
+
* <p>Deletes the password for the specified IAM user, For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_admin-change-user.html">Managing
27
+
* passwords for IAM users</a>.</p>
28
28
* <p>You can use the CLI, the Amazon Web Services API, or the <b>Users</b>
29
29
* page in the IAM console to delete a password for any IAM user. You can use <a>ChangePassword</a> to update, but not delete, your own password in the
30
30
* <b>My Security Credentials</b> page in the
31
31
* Amazon Web Services Management Console.</p>
32
32
* <important>
33
-
* <p>Deleting a user's password does not prevent a user from accessing Amazon Web Services through
33
+
* <p>Deleting a user's password does not prevent a user from accessing Amazon Web Services through
34
34
* the command line interface or the API. To prevent all user access, you must also
35
35
* either make any access keys inactive or delete them. For more information about
36
36
* making keys inactive or deleting them, see <a>UpdateAccessKey</a> and
37
-
* <a>DeleteAccessKey</a>.</p>
37
+
* <a>DeleteAccessKey</a>.</p>
38
38
* </important>
39
39
* @example
40
40
* Use a bare-bones client and the command you need to make an API call.
Copy file name to clipboardExpand all lines: clients/client-iam/src/models/models_0.ts
+65-45Lines changed: 65 additions & 45 deletions
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ export interface AccessDetail {
34
34
/**
35
35
* <p>The Region where the last service access attempt occurred.</p>
36
36
* <p>This field is null if no principals in the reported Organizations entity attempted to access the
37
-
* service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">reporting period</a>.</p>
37
+
* service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">tracking period</a>.</p>
38
38
*/
39
39
Region?: string;
40
40
@@ -43,7 +43,7 @@ export interface AccessDetail {
43
43
* authenticated principal last attempted to access the service. Amazon Web Services does not report
44
44
* unauthenticated requests.</p>
45
45
* <p>This field is null if no principals (IAM users, IAM roles, or root users) in the
46
-
* reported Organizations entity attempted to access the service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">reporting period</a>.</p>
46
+
* reported Organizations entity attempted to access the service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">tracking period</a>.</p>
* format</a>, when an authenticated principal most recently attempted to access the
53
53
* service. Amazon Web Services does not report unauthenticated requests.</p>
54
54
* <p>This field is null if no principals in the reported Organizations entity attempted to access the
55
-
* service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">reporting period</a>.</p>
55
+
* service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">tracking period</a>.</p>
56
56
*/
57
57
LastAuthenticatedTime?: Date;
58
58
59
59
/**
60
60
* <p>The number of accounts with authenticated principals (root users, IAM users, and IAM
61
-
* roles) that attempted to access the service in the reporting period.</p>
61
+
* roles) that attempted to access the service in the tracking period.</p>
62
62
*/
63
63
TotalAuthenticatedEntities?: number;
64
64
}
65
65
66
-
exporttypeStatusType="Active"|"Inactive";
66
+
exportenumStatusType{
67
+
Active="Active",
68
+
Inactive="Inactive",
69
+
}
67
70
68
71
/**
69
72
* <p>Contains information about an Amazon Web Services access key.</p>
* <p>The total number of authenticated principals (root user, IAM users, or IAM roles)
3723
3737
* that have attempted to access the service.</p>
3724
-
* <p>This field is null if no principals attempted to access the service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">reporting period</a>.</p>
3738
+
* <p>This field is null if no principals attempted to access the service within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">tracking period</a>.</p>
3725
3739
*/
3726
3740
TotalAuthenticatedEntities?: number;
3727
3741
3728
3742
/**
3729
3743
* <p>An object that contains details about the most recent attempt to access a tracked action
3730
3744
* within the service.</p>
3731
3745
* <p>This field is null if there no tracked actions or if the principal did not use the
3732
-
* tracked actions within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">reporting period</a>. This field is also null if the report was generated at the
3746
+
* tracked actions within the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#service-last-accessed-reporting-period">tracking period</a>. This field is also null if the report was generated at the
3733
3747
* service level and not the action level. For more information, see the
3734
3748
* <code>Granularity</code> field in <a>GenerateServiceLastAccessedDetails</a>.</p>
0 commit comments