Amazon Verified Permissions 2021-12-01
- Client: Aws\VerifiedPermissions\VerifiedPermissionsClient
- Service ID: verifiedpermissions
- Version: 2021-12-01
This page describes the parameters and results for the operations of the Amazon Verified Permissions (2021-12-01), and shows how to use the Aws\VerifiedPermissions\VerifiedPermissionsClient object to call the described operations. This documentation is specific to the 2021-12-01 API version of the service.
Operation Summary
Each of the following operations can be created from a client using
$client->getCommand('CommandName')
, where "CommandName" is the
name of one of the following operations. Note: a command is a value that
encapsulates an operation and the parameters used to create an HTTP request.
You can also create and send a command immediately using the magic methods
available on a client object: $client->commandName(/* parameters */)
.
You can send the command asynchronously (returning a promise) by appending the
word "Async" to the operation name: $client->commandNameAsync(/* parameters */)
.
- BatchGetPolicy ( array $params = [] )
- Retrieves information about a group (batch) of policies.
- BatchIsAuthorized ( array $params = [] )
- Makes a series of decisions about multiple authorization requests for one principal or resource.
- BatchIsAuthorizedWithToken ( array $params = [] )
- Makes a series of decisions about multiple authorization requests for one token.
- CreateIdentitySource ( array $params = [] )
- Adds an identity source to a policy store–an Amazon Cognito user pool or OpenID Connect (OIDC) identity provider (IdP).
- CreatePolicy ( array $params = [] )
- Creates a Cedar policy and saves it in the specified policy store.
- CreatePolicyStore ( array $params = [] )
- Creates a policy store.
- CreatePolicyTemplate ( array $params = [] )
- Creates a policy template.
- DeleteIdentitySource ( array $params = [] )
- Deletes an identity source that references an identity provider (IdP) such as Amazon Cognito.
- DeletePolicy ( array $params = [] )
- Deletes the specified policy from the policy store.
- DeletePolicyStore ( array $params = [] )
- Deletes the specified policy store.
- DeletePolicyTemplate ( array $params = [] )
- Deletes the specified policy template from the policy store.
- GetIdentitySource ( array $params = [] )
- Retrieves the details about the specified identity source.
- GetPolicy ( array $params = [] )
- Retrieves information about the specified policy.
- GetPolicyStore ( array $params = [] )
- Retrieves details about a policy store.
- GetPolicyTemplate ( array $params = [] )
- Retrieve the details for the specified policy template in the specified policy store.
- GetSchema ( array $params = [] )
- Retrieve the details for the specified schema in the specified policy store.
- IsAuthorized ( array $params = [] )
- Makes an authorization decision about a service request described in the parameters.
- IsAuthorizedWithToken ( array $params = [] )
- Makes an authorization decision about a service request described in the parameters.
- ListIdentitySources ( array $params = [] )
- Returns a paginated list of all of the identity sources defined in the specified policy store.
- ListPolicies ( array $params = [] )
- Returns a paginated list of all policies stored in the specified policy store.
- ListPolicyStores ( array $params = [] )
- Returns a paginated list of all policy stores in the calling Amazon Web Services account.
- ListPolicyTemplates ( array $params = [] )
- Returns a paginated list of all policy templates in the specified policy store.
- PutSchema ( array $params = [] )
- Creates or updates the policy schema in the specified policy store.
- UpdateIdentitySource ( array $params = [] )
- Updates the specified identity source to use a new identity provider (IdP), or to change the mapping of identities from the IdP to a different principal entity type.
- UpdatePolicy ( array $params = [] )
- Modifies a Cedar static policy in the specified policy store.
- UpdatePolicyStore ( array $params = [] )
- Modifies the validation setting for a policy store.
- UpdatePolicyTemplate ( array $params = [] )
- Updates the specified policy template.
Paginators
Paginators handle automatically iterating over paginated API results. Paginators are associated with specific API operations, and they accept the parameters that the corresponding API operation accepts. You can get a paginator from a client class using getPaginator($paginatorName, $operationParameters). This client supports the following paginators:
Operations
BatchGetPolicy
$result = $client->batchGetPolicy
([/* ... */]); $promise = $client->batchGetPolicyAsync
([/* ... */]);
Retrieves information about a group (batch) of policies.
The BatchGetPolicy
operation doesn't have its own IAM permission. To authorize this operation for Amazon Web Services principals, include the permission verifiedpermissions:GetPolicy
in their IAM policies.
Parameter Syntax
$result = $client->batchGetPolicy([ 'requests' => [ // REQUIRED [ 'policyId' => '<string>', // REQUIRED 'policyStoreId' => '<string>', // REQUIRED ], // ... ], ]);
Parameter Details
Members
- requests
-
- Required: Yes
- Type: Array of BatchGetPolicyInputItem structures
An array of up to 100 policies you want information about.
Result Syntax
[ 'errors' => [ [ 'code' => 'POLICY_STORE_NOT_FOUND|POLICY_NOT_FOUND', 'message' => '<string>', 'policyId' => '<string>', 'policyStoreId' => '<string>', ], // ... ], 'results' => [ [ 'createdDate' => <DateTime>, 'definition' => [ 'static' => [ 'description' => '<string>', 'statement' => '<string>', ], 'templateLinked' => [ 'policyTemplateId' => '<string>', 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ], ], 'lastUpdatedDate' => <DateTime>, 'policyId' => '<string>', 'policyStoreId' => '<string>', 'policyType' => 'STATIC|TEMPLATE_LINKED', ], // ... ], ]
Result Details
Members
- errors
-
- Required: Yes
- Type: Array of BatchGetPolicyErrorItem structures
Information about the policies from the request that resulted in an error. These results are returned in the order they were requested.
- results
-
- Required: Yes
- Type: Array of BatchGetPolicyOutputItem structures
Information about the policies listed in the request that were successfully returned. These results are returned in the order they were requested.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To retrieve details about a policy
The following example retrieves information about the specified policy contained in the specified policy store. In this example, the requested policy is a template-linked policy, so it returns the ID of the policy template, and the specific principal and resource used by this policy.
$result = $client->batchGetPolicy([ 'requests' => [ [ 'policyId' => 'PWv5M6d5HePx3gVVLKY1nK', 'policyStoreId' => 'ERZeDpRc34dkYZeb6FZRVC', ], [ 'policyId' => 'LzFn6KgLWvv4Mbegus35jn', 'policyStoreId' => 'ERZeDpRc34dkYZeb6FZRVC', ], [ 'policyId' => '77gLjer8H5o3mvrnMGrSL5', 'policyStoreId' => 'ERZeDpRc34dkYZeb6FZRVC', ], ], ]);
Result syntax:
[ 'errors' => [ ], 'results' => [ [ 'createdDate' =>, 'definition' => [ 'static' => [ 'description' => 'Users can manage account resources in any account they own', 'statement' => 'permit (principal, action in PhotoFlash::Action::"ManageAccount",resource) when { resource in principal.Account };', ], ], 'lastUpdatedDate' => , 'policyId' => 'PWv5M6d5HePx3gVVLKY1nK', 'policyStoreId' => 'ERZeDpRc34dkYZeb6FZRVC', 'policyType' => 'STATIC', ], [ 'createdDate' => , 'definition' => [ 'static' => [ 'description' => 'User alice can't delete any photos.', 'statement' => 'forbid (principal == PhotoFlash::User::"alice", action in [PhotoFlash::Action::"DeletePhoto"], resource);', ], ], 'lastUpdatedDate' => , 'policyId' => 'LzFn6KgLWvv4Mbegus35jn', 'policyStoreId' => 'ERZeDpRc34dkYZeb6FZRVC', 'policyType' => 'STATIC', ], [ 'createdDate' => , 'definition' => [ 'static' => [ 'description' => 'User alice can view and delete photos.', 'statement' => 'permit (principal == PhotoFlash::User::"alice", action in [PhotoFlash::Action::"DeletePhoto", PhotoFlash::Action::"ViewPhoto"], resource);', ], ], 'lastUpdatedDate' => , 'policyId' => '77gLjer8H5o3mvrnMGrSL5', 'policyStoreId' => 'ERZeDpRc34dkYZeb6FZRVC', 'policyType' => 'STATIC', ], ], ]
BatchIsAuthorized
$result = $client->batchIsAuthorized
([/* ... */]); $promise = $client->batchIsAuthorizedAsync
([/* ... */]);
Makes a series of decisions about multiple authorization requests for one principal or resource. Each request contains the equivalent content of an IsAuthorized
request: principal, action, resource, and context. Either the principal
or the resource
parameter must be identical across all requests. For example, Verified Permissions won't evaluate a pair of requests where bob
views photo1
and alice
views photo2
. Authorization of bob
to view photo1
and photo2
, or bob
and alice
to view photo1
, are valid batches.
The request is evaluated against all policies in the specified policy store that match the entities that you declare. The result of the decisions is a series of Allow
or Deny
responses, along with the IDs of the policies that produced each decision.
The entities
of a BatchIsAuthorized
API request can contain up to 100 principals and up to 100 resources. The requests
of a BatchIsAuthorized
API request can contain up to 30 requests.
The BatchIsAuthorized
operation doesn't have its own IAM permission. To authorize this operation for Amazon Web Services principals, include the permission verifiedpermissions:IsAuthorized
in their IAM policies.
Parameter Syntax
$result = $client->batchIsAuthorized([ 'entities' => [ 'entityList' => [ [ 'attributes' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], 'identifier' => [ // REQUIRED 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'parents' => [ [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], // ... ], ], // ... ], ], 'policyStoreId' => '<string>', // REQUIRED 'requests' => [ // REQUIRED [ 'action' => [ 'actionId' => '<string>', // REQUIRED 'actionType' => '<string>', // REQUIRED ], 'context' => [ 'contextMap' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], ], 'principal' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'resource' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], ], // ... ], ]);
Parameter Details
Members
- entities
-
- Type: EntitiesDefinition structure
Specifies the list of resources and principals and their associated attributes that Verified Permissions can examine when evaluating the policies.
You can include only principal and resource entities in this parameter; you can't include actions. You must specify actions in the schema.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store. Policies in this policy store will be used to make the authorization decisions for the input.
- requests
-
- Required: Yes
- Type: Array of BatchIsAuthorizedInputItem structures
An array of up to 30 requests that you want Verified Permissions to evaluate.
Result Syntax
[ 'results' => [ [ 'decision' => 'ALLOW|DENY', 'determiningPolicies' => [ [ 'policyId' => '<string>', ], // ... ], 'errors' => [ [ 'errorDescription' => '<string>', ], // ... ], 'request' => [ 'action' => [ 'actionId' => '<string>', 'actionType' => '<string>', ], 'context' => [ 'contextMap' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], ], 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ], ], // ... ], ]
Result Details
Members
- results
-
- Required: Yes
- Type: Array of BatchIsAuthorizedOutputItem structures
A series of
Allow
orDeny
decisions for each request, and the policies that produced them. These results are returned in the order they were requested.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: Batch - Example 1
The following example requests two authorization decisions for two principals of type Usernamed Alice and Annalisa.
$result = $client->batchIsAuthorized([ 'entities' => [ 'entityList' => [ [ 'attributes' => [ 'Account' => [ 'entityIdentifier' => [ 'entityId' => '1234', 'entityType' => 'PhotoFlash::Account', ], ], 'Email' => [ 'string' => '', ], ], 'identifier' => [ 'entityId' => 'Alice', 'entityType' => 'PhotoFlash::User', ], 'parents' => [ ], ], [ 'attributes' => [ 'Account' => [ 'entityIdentifier' => [ 'entityId' => '5678', 'entityType' => 'PhotoFlash::Account', ], ], 'Email' => [ 'string' => '', ], ], 'identifier' => [ 'entityId' => 'Annalisa', 'entityType' => 'PhotoFlash::User', ], 'parents' => [ ], ], [ 'attributes' => [ 'IsPrivate' => [ 'boolean' => , ], 'Name' => [ 'string' => '', ], ], 'identifier' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], 'parents' => [ [ 'entityId' => '1234', 'entityType' => 'PhotoFlash::Account', ], ], ], [ 'attributes' => [ 'Name' => [ 'string' => '', ], ], 'identifier' => [ 'entityId' => '1234', 'entityType' => 'PhotoFlash::Account', ], 'parents' => [ ], ], ], ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'requests' => [ [ 'action' => [ 'actionId' => 'ViewPhoto', 'actionType' => 'PhotoFlash::Action', ], 'principal' => [ 'entityId' => 'Alice', 'entityType' => 'PhotoFlash::User', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], [ 'action' => [ 'actionId' => 'DeletePhoto', 'actionType' => 'PhotoFlash::Action', ], 'principal' => [ 'entityId' => 'Annalisa', 'entityType' => 'PhotoFlash::User', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], ], ]);
Result syntax:
[ 'results' => [ [ 'errors' => [ ], 'decision' => 'ALLOW', 'determiningPolicies' => [ [ 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', ], ], 'request' => [ 'action' => [ 'actionId' => 'ViewPhoto', 'actionType' => 'PhotoFlash::Action', ], 'principal' => [ 'entityId' => 'alice', 'entityType' => 'PhotoFlash::User', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], ], [ 'errors' => [ ], 'decision' => 'DENY', 'determiningPolicies' => [ ], 'request' => [ 'action' => [ 'actionId' => 'DeletePhoto', 'actionType' => 'PhotoFlash::Action', ], 'principal' => [ 'entityId' => 'annalisa', 'entityType' => 'PhotoFlash::User', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], ], ], ]
BatchIsAuthorizedWithToken
$result = $client->batchIsAuthorizedWithToken
([/* ... */]); $promise = $client->batchIsAuthorizedWithTokenAsync
([/* ... */]);
Makes a series of decisions about multiple authorization requests for one token. The principal in this request comes from an external identity source in the form of an identity or access token, formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluations.
The request is evaluated against all policies in the specified policy store that match the entities that you provide in the entities declaration and in the token. The result of the decisions is a series of Allow
or Deny
responses, along with the IDs of the policies that produced each decision.
The entities
of a BatchIsAuthorizedWithToken
API request can contain up to 100 resources and up to 99 user groups. The requests
of a BatchIsAuthorizedWithToken
API request can contain up to 30 requests.
The BatchIsAuthorizedWithToken
operation doesn't have its own IAM permission. To authorize this operation for Amazon Web Services principals, include the permission verifiedpermissions:IsAuthorizedWithToken
in their IAM policies.
Parameter Syntax
$result = $client->batchIsAuthorizedWithToken([ 'accessToken' => '<string>', 'entities' => [ 'entityList' => [ [ 'attributes' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], 'identifier' => [ // REQUIRED 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'parents' => [ [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], // ... ], ], // ... ], ], 'identityToken' => '<string>', 'policyStoreId' => '<string>', // REQUIRED 'requests' => [ // REQUIRED [ 'action' => [ 'actionId' => '<string>', // REQUIRED 'actionType' => '<string>', // REQUIRED ], 'context' => [ 'contextMap' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], ], 'resource' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], ], // ... ], ]);
Parameter Details
Members
- accessToken
-
- Type: string
Specifies an access token for the principal that you want to authorize in each request. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
accessToken
, anidentityToken
, or both.Must be an access token. Verified Permissions returns an error if the
token_use
claim in the submitted token isn'taccess
. - entities
-
- Type: EntitiesDefinition structure
Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies.
You can't include principals in this parameter, only resource and action entities. This parameter can't include any entities of a type that matches the user or group entity types that you defined in your identity source.
-
The
BatchIsAuthorizedWithToken
operation takes principal attributes from only theidentityToken
oraccessToken
passed to the operation. -
For action entities, you can include only their
Identifier
andEntityType
.
- identityToken
-
- Type: string
Specifies an identity (ID) token for the principal that you want to authorize in each request. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
accessToken
, anidentityToken
, or both.Must be an ID token. Verified Permissions returns an error if the
token_use
claim in the submitted token isn'tid
. - policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store. Policies in this policy store will be used to make an authorization decision for the input.
- requests
-
- Required: Yes
- Type: Array of BatchIsAuthorizedWithTokenInputItem structures
An array of up to 30 requests that you want Verified Permissions to evaluate.
Result Syntax
[ 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'results' => [ [ 'decision' => 'ALLOW|DENY', 'determiningPolicies' => [ [ 'policyId' => '<string>', ], // ... ], 'errors' => [ [ 'errorDescription' => '<string>', ], // ... ], 'request' => [ 'action' => [ 'actionId' => '<string>', 'actionType' => '<string>', ], 'context' => [ 'contextMap' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ], ], // ... ], ]
Result Details
Members
- principal
-
- Type: EntityIdentifier structure
The identifier of the principal in the ID or access token.
- results
-
- Required: Yes
- Type: Array of BatchIsAuthorizedWithTokenOutputItem structures
A series of
Allow
orDeny
decisions for each request, and the policies that produced them. These results are returned in the order they were requested.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: Batch - Example 1
The following example requests three authorization decisions for two resources and two actions in different photo albums.
$result = $client->batchIsAuthorizedWithToken([ 'entities' => [ 'entityList' => [ [ 'identifier' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], 'parents' => [ [ 'entityId' => 'MyExampleAlbum1', 'entityType' => 'PhotoFlash::Album', ], ], ], [ 'identifier' => [ 'entityId' => 'OfficePhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], 'parents' => [ [ 'entityId' => 'MyExampleAlbum2', 'entityType' => 'PhotoFlash::Album', ], ], ], ], ], 'identityToken' => 'eyJra12345EXAMPLE', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'requests' => [ [ 'action' => [ 'actionId' => 'ViewPhoto', 'actionType' => 'PhotoFlash::Action', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], [ 'action' => [ 'actionId' => 'SharePhoto', 'actionType' => 'PhotoFlash::Action', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], [ 'action' => [ 'actionId' => 'ViewPhoto', 'actionType' => 'PhotoFlash::Action', ], 'resource' => [ 'entityId' => 'OfficePhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], ], ]);
Result syntax:
[ 'principal' => [ 'entityId' => 'us-east-1_EXAMPLE|a1b2c3d4-5678-90ab-cdef-EXAMPLE11111', 'entityType' => 'PhotoFlash::User', ], 'results' => [ [ 'errors' => [ ], 'decision' => 'ALLOW', 'determiningPolicies' => [ [ 'policyId' => '9wYixMplbbZQb5fcZHyJhY', ], ], 'request' => [ 'action' => [ 'actionId' => 'ViewPhoto', 'actionType' => 'PhotoFlash::Action', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], ], [ 'errors' => [ ], 'decision' => 'ALLOW', 'determiningPolicies' => [ [ 'policyId' => '9wYixMplbbZQb5fcZHyJhY', ], ], 'request' => [ 'action' => [ 'actionId' => 'SharePhoto', 'actionType' => 'PhotoFlash::Action', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], ], [ 'errors' => [ ], 'decision' => 'DENY', 'determiningPolicies' => [ ], 'request' => [ 'action' => [ 'actionId' => 'ViewPhoto', 'actionType' => 'PhotoFlash::Action', ], 'resource' => [ 'entityId' => 'OfficePhoto94.jpg', 'entityType' => 'PhotoFlash::Photo', ], ], ], ], ]
CreateIdentitySource
$result = $client->createIdentitySource
([/* ... */]); $promise = $client->createIdentitySourceAsync
([/* ... */]);
Adds an identity source to a policy store–an Amazon Cognito user pool or OpenID Connect (OIDC) identity provider (IdP).
After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken or BatchIsAuthorizedWithToken API operations. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Identity sources provide identity (ID) tokens and access tokens. Verified Permissions derives information about your user and session from token claims. Access tokens provide action context
to your policies, and ID tokens provide principal Attributes
.
Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store
To reference a user from this identity source in your Cedar policies, refer to the following syntax examples.
-
Amazon Cognito user pool:
Namespace::[Entity type]::[User pool ID]|[user principal attribute]
, for exampleMyCorp::User::us-east-1_EXAMPLE|a1b2c3d4-5678-90ab-cdef-EXAMPLE11111
. -
OpenID Connect (OIDC) provider:
Namespace::[Entity type]::[entityIdPrefix]|[user principal attribute]
, for exampleMyCorp::User::MyOIDCProvider|a1b2c3d4-5678-90ab-cdef-EXAMPLE22222
.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->createIdentitySource([ 'clientToken' => '<string>', 'configuration' => [ // REQUIRED 'cognitoUserPoolConfiguration' => [ 'clientIds' => ['<string>', ...], 'groupConfiguration' => [ 'groupEntityType' => '<string>', // REQUIRED ], 'userPoolArn' => '<string>', // REQUIRED ], 'openIdConnectConfiguration' => [ 'entityIdPrefix' => '<string>', 'groupConfiguration' => [ 'groupClaim' => '<string>', // REQUIRED 'groupEntityType' => '<string>', // REQUIRED ], 'issuer' => '<string>', // REQUIRED 'tokenSelection' => [ // REQUIRED 'accessTokenOnly' => [ 'audiences' => ['<string>', ...], 'principalIdClaim' => '<string>', ], 'identityTokenOnly' => [ 'clientIds' => ['<string>', ...], 'principalIdClaim' => '<string>', ], ], ], ], 'policyStoreId' => '<string>', // REQUIRED 'principalEntityType' => '<string>', ]);
Parameter Details
Members
- clientToken
-
- Type: string
Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value..
If you don't provide this value, then Amazon Web Services generates a random one for you.
If you retry the operation with the same
ClientToken
, but with different parameters, the retry fails with anConflictException
error.Verified Permissions recognizes a
ClientToken
for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value ofClientToken
. - configuration
-
- Required: Yes
- Type: Configuration structure
Specifies the details required to communicate with the identity provider (IdP) associated with this identity source.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store in which you want to store this identity source. Only policies and requests made using this policy store can reference identities from the identity provider configured in the new identity source.
- principalEntityType
-
- Type: string
Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
Result Syntax
[ 'createdDate' => <DateTime>, 'identitySourceId' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', ]
Result Details
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the identity source was originally created.
- identitySourceId
-
- Required: Yes
- Type: string
The unique ID of the new identity source.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the identity source was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the identity source.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ServiceQuotaExceededException:
The request failed because it would cause a service quota to be exceeded.
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To create an identity source
The following ``create-identity-source`` example creates an identity source that lets you reference identities stored in the specified Amazon Cognito user pool. Those identities are available in Verified Permissions as entities of type ``User``.
$result = $client->createIdentitySource([ 'clientToken' => 'a1b2c3d4-e5f6-a1b2-c3d4-TOKEN1111111', 'configuration' => [ 'cognitoUserPoolConfiguration' => [ 'clientIds' => [ 'a1b2c3d4e5f6g7h8i9j0kalbmc', ], 'userPoolArn' => 'arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5', ], ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'principalEntityType' => 'User', ]);
Result syntax:
[ 'createdDate' =>, 'identitySourceId' => 'ISEXAMPLEabcdefg111111', 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]
CreatePolicy
$result = $client->createPolicy
([/* ... */]); $promise = $client->createPolicyAsync
([/* ... */]);
Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template.
-
To create a static policy, provide the Cedar policy text in the
StaticPolicy
section of thePolicyDefinition
. -
To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the
templateLinked
section of thePolicyDefinition
. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template.
Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->createPolicy([ 'clientToken' => '<string>', 'definition' => [ // REQUIRED 'static' => [ 'description' => '<string>', 'statement' => '<string>', // REQUIRED ], 'templateLinked' => [ 'policyTemplateId' => '<string>', // REQUIRED 'principal' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'resource' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], ], ], 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- clientToken
-
- Type: string
Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value..
If you don't provide this value, then Amazon Web Services generates a random one for you.
If you retry the operation with the same
ClientToken
, but with different parameters, the retry fails with anConflictException
error.Verified Permissions recognizes a
ClientToken
for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value ofClientToken
. - definition
-
- Required: Yes
- Type: PolicyDefinition structure
A structure that specifies the policy type and content to use for the new policy. You must include either a static or a templateLinked element. The policy content must be written in the Cedar policy language.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the
PolicyStoreId
of the policy store you want to store the policy in.
Result Syntax
[ 'actions' => [ [ 'actionId' => '<string>', 'actionType' => '<string>', ], // ... ], 'createdDate' => <DateTime>, 'effect' => 'Permit|Forbid', 'lastUpdatedDate' => <DateTime>, 'policyId' => '<string>', 'policyStoreId' => '<string>', 'policyType' => 'STATIC|TEMPLATE_LINKED', 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ]
Result Details
Members
- actions
-
- Type: Array of ActionIdentifier structures
The action that a policy permits or forbids. For example,
{"actions": [{"actionId": "ViewPhoto", "actionType": "PhotoFlash::Action"}, {"entityID": "SharePhoto", "entityType": "PhotoFlash::Action"}]}
. - createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy was originally created.
- effect
-
- Type: string
The effect of the decision that a policy returns to an authorization request. For example,
"effect": "Permit"
. - lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy was last updated.
- policyId
-
- Required: Yes
- Type: string
The unique ID of the new policy.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the new policy.
- policyType
-
- Required: Yes
- Type: string
The policy type of the new policy.
- principal
-
- Type: EntityIdentifier structure
The principal specified in the new policy's scope. This response element isn't present when
principal
isn't specified in the policy content. - resource
-
- Type: EntityIdentifier structure
The resource specified in the new policy's scope. This response element isn't present when the
resource
isn't specified in the policy content.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ServiceQuotaExceededException:
The request failed because it would cause a service quota to be exceeded.
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To create a static policy
The following example request creates a static policy with a policy scope that specifies both a principal and a resource. The response includes both the Principal and Resource elements because both were specified in the request policy scope.
$result = $client->createPolicy([ 'clientToken' => 'a1b2c3d4-e5f6-a1b2-c3d4-TOKEN1111111', 'definition' => [ 'static' => [ 'description' => 'Grant members of janeFriends UserGroup access to the vacationFolder Album', 'statement' => 'permit( principal in UserGroup::"janeFriends", action, resource in Album::"vacationFolder" );', ], ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'principal' => [ 'entityId' => 'janeFriends', 'entityType' => 'UserGroup', ], 'resource' => [ 'entityId' => 'vacationFolder', 'entityType' => 'Album', ], ]
Example 2: To create a static policy
The following example request creates a static policy with a policy scope that specifies both a principal and a resource. The response includes both the Principal and Resource elements because both were specified in the request policy scope.
$result = $client->createPolicy([ 'clientToken' => 'a1b2c3d4-e5f6-a1b2-c3d4-TOKEN1111111', 'definition' => [ 'static' => [ 'description' => 'Grant members of janeFriends UserGroup access to the vacationFolder Album', 'statement' => 'permit( principal in UserGroup::"janeFriends", action, resource in Album::"vacationFolder" );', ], ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'principal' => [ 'entityId' => 'janeFriends', 'entityType' => 'UserGroup', ], 'resource' => [ 'entityId' => 'vacationFolder', 'entityType' => 'Album', ], ]
Example 3: To create a template-linked policy
The following example creates a template-linked policy using the specified policy template and associates the specified principal to use with the new template-linked policy.
$result = $client->createPolicy([ 'clientToken' => 'a1b2c3d4-e5f6-a1b2-c3d4-TOKEN1111111', 'definition' => [ 'templateLinked' => [ 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', 'principal' => [ 'entityId' => 'alice', 'entityType' => 'User', ], ], ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'policyId' => 'Et9KxMplyaDdyurDw8TeFa', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'TEMPLATE_LINKED', 'principal' => [ 'entityId' => 'alice', 'entityType' => 'User', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'Photo', ], ]
CreatePolicyStore
$result = $client->createPolicyStore
([/* ... */]); $promise = $client->createPolicyStoreAsync
([/* ... */]);
Creates a policy store. A policy store is a container for policy resources.
Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->createPolicyStore([ 'clientToken' => '<string>', 'description' => '<string>', 'validationSettings' => [ // REQUIRED 'mode' => 'OFF|STRICT', // REQUIRED ], ]);
Parameter Details
Members
- clientToken
-
- Type: string
Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value..
If you don't provide this value, then Amazon Web Services generates a random one for you.
If you retry the operation with the same
ClientToken
, but with different parameters, the retry fails with anConflictException
error.Verified Permissions recognizes a
ClientToken
for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value ofClientToken
. - description
-
- Type: string
Descriptive text that you can provide to help with identification of the current policy store.
- validationSettings
-
- Required: Yes
- Type: ValidationSettings structure
Specifies the validation setting for this policy store.
Currently, the only valid and required value is
Mode
.We recommend that you turn on
STRICT
mode only after you define a schema. If a schema doesn't exist, thenSTRICT
mode causes any policy to fail validation, and Verified Permissions rejects the policy. You can turn off validation by using the UpdatePolicyStore. Then, when you have a schema defined, use UpdatePolicyStore again to turn validation back on.
Result Syntax
[ 'arn' => '<string>', 'createdDate' => <DateTime>, 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', ]
Result Details
Members
- arn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the new policy store.
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy store was originally created.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy store was last updated.
- policyStoreId
-
- Required: Yes
- Type: string
The unique ID of the new policy store.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ServiceQuotaExceededException:
The request failed because it would cause a service quota to be exceeded.
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To create policy store
The following example creates a new policy store with strict validation turned on.
$result = $client->createPolicyStore([ 'clientToken' => 'a1b2c3d4-e5f6-a1b2-c3d4-TOKEN1111111', 'validationSettings' => [ 'mode' => 'STRICT', ], ]);
Result syntax:
[ 'arn' => 'arn:aws:verifiedpermissions::123456789012:policy-store/C7v5xMplfFH3i3e4Jrzb1a', 'createdDate' =>, 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]
CreatePolicyTemplate
$result = $client->createPolicyTemplate
([/* ... */]); $promise = $client->createPolicyTemplateAsync
([/* ... */]);
Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->createPolicyTemplate([ 'clientToken' => '<string>', 'description' => '<string>', 'policyStoreId' => '<string>', // REQUIRED 'statement' => '<string>', // REQUIRED ]);
Parameter Details
Members
- clientToken
-
- Type: string
Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value..
If you don't provide this value, then Amazon Web Services generates a random one for you.
If you retry the operation with the same
ClientToken
, but with different parameters, the retry fails with anConflictException
error.Verified Permissions recognizes a
ClientToken
for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value ofClientToken
. - description
-
- Type: string
Specifies a description for the policy template.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store in which to create the policy template.
- statement
-
- Required: Yes
- Type: string
Specifies the content that you want to use for the new policy template, written in the Cedar policy language.
Result Syntax
[ 'createdDate' => <DateTime>, 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', 'policyTemplateId' => '<string>', ]
Result Details
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy template was originally created.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy template was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the policy template.
- policyTemplateId
-
- Required: Yes
- Type: string
The unique ID of the new policy template.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ServiceQuotaExceededException:
The request failed because it would cause a service quota to be exceeded.
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To create a policy template
The following example creates a policy template that has a placeholder for the principal.
$result = $client->createPolicyTemplate([ 'clientToken' => 'a1b2c3d4-e5f6-a1b2-c3d4-TOKEN1111111', 'description' => 'Template for research dept', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'statement' => '"AccessVacation"permit( principal in ?principal, action == Action::"view", resource == Photo::"VacationPhoto94.jpg")when { principal has department && principal.department == "research"};', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', ]
DeleteIdentitySource
$result = $client->deleteIdentitySource
([/* ... */]); $promise = $client->deleteIdentitySourceAsync
([/* ... */]);
Deletes an identity source that references an identity provider (IdP) such as Amazon Cognito. After you delete the identity source, you can no longer use tokens for identities from that identity source to represent principals in authorization queries made using IsAuthorizedWithToken. operations.
Parameter Syntax
$result = $client->deleteIdentitySource([ 'identitySourceId' => '<string>', // REQUIRED 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- identitySourceId
-
- Required: Yes
- Type: string
Specifies the ID of the identity source that you want to delete.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the identity source that you want to delete.
Result Syntax
[]
Result Details
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To delete an identity source
The following example request deletes the specified identity source.
$result = $client->deleteIdentitySource([ 'identitySourceId' => 'ISEXAMPLEabcdefg111111', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ ]
DeletePolicy
$result = $client->deletePolicy
([/* ... */]); $promise = $client->deletePolicyAsync
([/* ... */]);
Deletes the specified policy from the policy store.
This operation is idempotent; if you specify a policy that doesn't exist, the request response returns a successful HTTP 200
status code.
Parameter Syntax
$result = $client->deletePolicy([ 'policyId' => '<string>', // REQUIRED 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- policyId
-
- Required: Yes
- Type: string
Specifies the ID of the policy that you want to delete.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the policy that you want to delete.
Result Syntax
[]
Result Details
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To delete a policy
The following example deletes the specified policy from its policy store.
$result = $client->deletePolicy([ 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ ]
DeletePolicyStore
$result = $client->deletePolicyStore
([/* ... */]); $promise = $client->deletePolicyStoreAsync
([/* ... */]);
Deletes the specified policy store.
This operation is idempotent. If you specify a policy store that does not exist, the request response will still return a successful HTTP 200 status code.
Parameter Syntax
$result = $client->deletePolicyStore([ 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that you want to delete.
Result Syntax
[]
Result Details
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To delete a policy store
The following example deletes the specified policy store.
$result = $client->deletePolicyStore([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ ]
DeletePolicyTemplate
$result = $client->deletePolicyTemplate
([/* ... */]); $promise = $client->deletePolicyTemplateAsync
([/* ... */]);
Deletes the specified policy template from the policy store.
This operation also deletes any policies that were created from the specified policy template. Those policies are immediately removed from all future API responses, and are asynchronously deleted from the policy store.
Parameter Syntax
$result = $client->deletePolicyTemplate([ 'policyStoreId' => '<string>', // REQUIRED 'policyTemplateId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the policy template that you want to delete.
- policyTemplateId
-
- Required: Yes
- Type: string
Specifies the ID of the policy template that you want to delete.
Result Syntax
[]
Result Details
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To delete a policy template
The following example deletes a policy template. Before you can perform this operation, you must first delete any template-linked policies that were instantiated from this policy template. To delete them, use DeletePolicy.
$result = $client->deletePolicyTemplate([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', ]);
Result syntax:
[ ]
GetIdentitySource
$result = $client->getIdentitySource
([/* ... */]); $promise = $client->getIdentitySourceAsync
([/* ... */]);
Retrieves the details about the specified identity source.
Parameter Syntax
$result = $client->getIdentitySource([ 'identitySourceId' => '<string>', // REQUIRED 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- identitySourceId
-
- Required: Yes
- Type: string
Specifies the ID of the identity source you want information about.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the identity source you want information about.
Result Syntax
[ 'configuration' => [ 'cognitoUserPoolConfiguration' => [ 'clientIds' => ['<string>', ...], 'groupConfiguration' => [ 'groupEntityType' => '<string>', ], 'issuer' => '<string>', 'userPoolArn' => '<string>', ], 'openIdConnectConfiguration' => [ 'entityIdPrefix' => '<string>', 'groupConfiguration' => [ 'groupClaim' => '<string>', 'groupEntityType' => '<string>', ], 'issuer' => '<string>', 'tokenSelection' => [ 'accessTokenOnly' => [ 'audiences' => ['<string>', ...], 'principalIdClaim' => '<string>', ], 'identityTokenOnly' => [ 'clientIds' => ['<string>', ...], 'principalIdClaim' => '<string>', ], ], ], ], 'createdDate' => <DateTime>, 'details' => [ 'clientIds' => ['<string>', ...], 'discoveryUrl' => '<string>', 'openIdIssuer' => 'COGNITO', 'userPoolArn' => '<string>', ], 'identitySourceId' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', 'principalEntityType' => '<string>', ]
Result Details
Members
- configuration
-
- Type: ConfigurationDetail structure
Contains configuration information about an identity source.
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the identity source was originally created.
- details
-
- Type: IdentitySourceDetails structure
A structure that describes the configuration of the identity source.
- identitySourceId
-
- Required: Yes
- Type: string
The ID of the identity source.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the identity source was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the identity source.
- principalEntityType
-
- Required: Yes
- Type: string
The data type of principals generated for identities authenticated by this identity source.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To retrieve details about an identity source
The following example retrieves the details for the specified identity source.
$result = $client->getIdentitySource([ 'identitySourceId' => 'ISEXAMPLEabcdefg111111', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'details' => [ 'clientIds' => [ 'a1b2c3d4e5f6g7h8i9j0kalbmc', ], 'discoveryUrl' => 'https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5', 'openIdIssuer' => 'COGNITO', 'userPoolArn' => 'arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5', ], 'identitySourceId' => 'ISEXAMPLEabcdefg111111', 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'principalEntityType' => 'AWS::Cognito', ]
GetPolicy
$result = $client->getPolicy
([/* ... */]); $promise = $client->getPolicyAsync
([/* ... */]);
Retrieves information about the specified policy.
Parameter Syntax
$result = $client->getPolicy([ 'policyId' => '<string>', // REQUIRED 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- policyId
-
- Required: Yes
- Type: string
Specifies the ID of the policy you want information about.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the policy that you want information about.
Result Syntax
[ 'actions' => [ [ 'actionId' => '<string>', 'actionType' => '<string>', ], // ... ], 'createdDate' => <DateTime>, 'definition' => [ 'static' => [ 'description' => '<string>', 'statement' => '<string>', ], 'templateLinked' => [ 'policyTemplateId' => '<string>', 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ], ], 'effect' => 'Permit|Forbid', 'lastUpdatedDate' => <DateTime>, 'policyId' => '<string>', 'policyStoreId' => '<string>', 'policyType' => 'STATIC|TEMPLATE_LINKED', 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ]
Result Details
Members
- actions
-
- Type: Array of ActionIdentifier structures
The action that a policy permits or forbids. For example,
{"actions": [{"actionId": "ViewPhoto", "actionType": "PhotoFlash::Action"}, {"entityID": "SharePhoto", "entityType": "PhotoFlash::Action"}]}
. - createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy was originally created.
- definition
-
- Required: Yes
- Type: PolicyDefinitionDetail structure
The definition of the requested policy.
- effect
-
- Type: string
The effect of the decision that a policy returns to an authorization request. For example,
"effect": "Permit"
. - lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy was last updated.
- policyId
-
- Required: Yes
- Type: string
The unique ID of the policy that you want information about.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the policy that you want information about.
- policyType
-
- Required: Yes
- Type: string
The type of the policy.
- principal
-
- Type: EntityIdentifier structure
The principal specified in the policy's scope. This element isn't included in the response when
Principal
isn't present in the policy content. - resource
-
- Type: EntityIdentifier structure
The resource specified in the policy's scope. This element isn't included in the response when
Resource
isn't present in the policy content.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: To retrieve details about a policy
The following example retrieves information about the specified policy contained in the specified policy store. In this example, the requested policy is a template-linked policy, so it returns the ID of the policy template, and the specific principal and resource used by this policy.
$result = $client->getPolicy([ 'policyId' => '9wYixMplbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'definition' => [ 'static' => [ 'description' => 'Grant everyone of janeFriends UserGroup access to the vacationFolder Album', 'statement' => 'permit(principal, action, resource in Album::"publicFolder");', ], ], 'lastUpdatedDate' => , 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'resource' => [ 'entityId' => 'publicFolder', 'entityType' => 'Album', ], ]
GetPolicyStore
$result = $client->getPolicyStore
([/* ... */]); $promise = $client->getPolicyStoreAsync
([/* ... */]);
Retrieves details about a policy store.
Parameter Syntax
$result = $client->getPolicyStore([ 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that you want information about.
Result Syntax
[ 'arn' => '<string>', 'createdDate' => <DateTime>, 'description' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', 'validationSettings' => [ 'mode' => 'OFF|STRICT', ], ]
Result Details
Members
- arn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the policy store.
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy store was originally created.
- description
-
- Type: string
Descriptive text that you can provide to help with identification of the current policy store.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy store was last updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store;
- validationSettings
-
- Required: Yes
- Type: ValidationSettings structure
The current validation settings for the policy store.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: GetPolicyStore
The following example retrieves details about the specified policy store.
$result = $client->getPolicyStore([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'arn' => 'arn:aws:verifiedpermissions::123456789012:policy-store/C7v5xMplfFH3i3e4Jrzb1a', 'createdDate' =>, 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'validationSettings' => [ 'mode' => 'STRICT', ], ]
GetPolicyTemplate
$result = $client->getPolicyTemplate
([/* ... */]); $promise = $client->getPolicyTemplateAsync
([/* ... */]);
Retrieve the details for the specified policy template in the specified policy store.
Parameter Syntax
$result = $client->getPolicyTemplate([ 'policyStoreId' => '<string>', // REQUIRED 'policyTemplateId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the policy template that you want information about.
- policyTemplateId
-
- Required: Yes
- Type: string
Specifies the ID of the policy template that you want information about.
Result Syntax
[ 'createdDate' => <DateTime>, 'description' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', 'policyTemplateId' => '<string>', 'statement' => '<string>', ]
Result Details
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy template was originally created.
- description
-
- Type: string
The description of the policy template.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy template was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the policy template.
- policyTemplateId
-
- Required: Yes
- Type: string
The ID of the policy template.
- statement
-
- Required: Yes
- Type: string
The content of the body of the policy template written in the Cedar policy language.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: GetPolicyTemplate
The following example displays the details of the specified policy template.
$result = $client->getPolicyTemplate([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', ]);
Result syntax:
[ 'createdDate' =>, 'description' => 'Template for research dept', 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', 'statement' => 'permit( principal ?principal, action == Action::"view", resource in ?resource) when { principal has department && principal.department == "research"};', ]
GetSchema
$result = $client->getSchema
([/* ... */]); $promise = $client->getSchemaAsync
([/* ... */]);
Retrieve the details for the specified schema in the specified policy store.
Parameter Syntax
$result = $client->getSchema([ 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the schema.
Result Syntax
[ 'createdDate' => <DateTime>, 'lastUpdatedDate' => <DateTime>, 'namespaces' => ['<string>', ...], 'policyStoreId' => '<string>', 'schema' => '<string>', ]
Result Details
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the schema was originally created.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the schema was most recently updated.
- namespaces
-
- Type: Array of strings
The namespaces of the entities referenced by this schema.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the schema.
- schema
-
- Required: Yes
- Type: string
The body of the schema, written in Cedar schema JSON.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: GetSchema
The following example retrieves the current schema stored in the specified policy store.NoteThe JSON in the parameters of this operation are strings that can contain embedded quotation marks (") within the outermost quotation mark pair. This requires that you stringify the JSON object by preceding all embedded quotation marks with a backslash character ( \" ) and combining all lines into a single text line with no line breaks.Example strings might be displayed wrapped across multiple lines here for readability, but the operation requires the parameters be submitted as single line strings.
$result = $client->getSchema([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'schema' => '{"My::Application": {"actions": {"remoteAccess": {"appliesTo": {"principalTypes": ["Employee"]}}},"entityTypes": {"Employee": {"shape": {"attributes": {"jobLevel": { "type": "Long" },"name": { "type":"String" }},"type": "Record"}}}} }', ]
IsAuthorized
$result = $client->isAuthorized
([/* ... */]); $promise = $client->isAuthorizedAsync
([/* ... */]);
Makes an authorization decision about a service request described in the parameters. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow
or Deny
, along with a list of the policies that resulted in the decision.
Parameter Syntax
$result = $client->isAuthorized([ 'action' => [ 'actionId' => '<string>', // REQUIRED 'actionType' => '<string>', // REQUIRED ], 'context' => [ 'contextMap' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], ], 'entities' => [ 'entityList' => [ [ 'attributes' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], 'identifier' => [ // REQUIRED 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'parents' => [ [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], // ... ], ], // ... ], ], 'policyStoreId' => '<string>', // REQUIRED 'principal' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'resource' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], ]);
Parameter Details
Members
- action
-
- Type: ActionIdentifier structure
Specifies the requested action to be authorized. For example, is the principal authorized to perform this action on the resource?
- context
-
- Type: ContextDefinition structure
Specifies additional context that can be used to make more granular authorization decisions.
- entities
-
- Type: EntitiesDefinition structure
Specifies the list of resources and principals and their associated attributes that Verified Permissions can examine when evaluating the policies.
You can include only principal and resource entities in this parameter; you can't include actions. You must specify actions in the schema.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store. Policies in this policy store will be used to make an authorization decision for the input.
- principal
-
- Type: EntityIdentifier structure
Specifies the principal for which the authorization decision is to be made.
- resource
-
- Type: EntityIdentifier structure
Specifies the resource for which the authorization decision is to be made.
Result Syntax
[ 'decision' => 'ALLOW|DENY', 'determiningPolicies' => [ [ 'policyId' => '<string>', ], // ... ], 'errors' => [ [ 'errorDescription' => '<string>', ], // ... ], ]
Result Details
Members
- decision
-
- Required: Yes
- Type: string
An authorization decision that indicates if the authorization request should be allowed or denied.
- determiningPolicies
-
- Required: Yes
- Type: Array of DeterminingPolicyItem structures
The list of determining policies used to make the authorization decision. For example, if there are two matching policies, where one is a forbid and the other is a permit, then the forbid policy will be the determining policy. In the case of multiple matching permit policies then there would be multiple determining policies. In the case that no policies match, and hence the response is DENY, there would be no determining policies.
- errors
-
- Required: Yes
- Type: Array of EvaluationErrorItem structures
Errors that occurred while making an authorization decision, for example, a policy references an Entity or entity Attribute that does not exist in the slice.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: IsAuthorized - Example 1
The following example requests an authorization decision for a principal of type User named Alice, who wants to perform the updatePhoto operation, on a resource of type Photo named VacationPhoto94.jpg.The response shows that the request was allowed by one policy.
$result = $client->isAuthorized([ 'action' => [ 'actionId' => 'view', 'actionType' => 'Action', ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'principal' => [ 'entityId' => 'alice', 'entityType' => 'User', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'Photo', ], ]);
Result syntax:
[ 'errors' => [ ], 'decision' => 'ALLOW', 'determiningPolicies' => [ [ 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', ], ], ]
Example 2: IsAuthorized - Example 2
The following example is the same as the previous example, except that the principal is User::"bob", and the policy store doesn't contain any policy that allows that user access to Album::"alice_folder". The output infers that the Deny was implicit because the list of DeterminingPolicies is empty.
$result = $client->isAuthorized([ 'action' => [ 'actionId' => 'view', 'actionType' => 'Action', ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'principal' => [ 'entityId' => 'bob', 'entityType' => 'User', ], 'resource' => [ 'entityId' => 'VacationPhoto94.jpg', 'entityType' => 'Photo', ], ]);
Result syntax:
[ 'errors' => [ ], 'decision' => 'DENY', 'determiningPolicies' => [ ], ]
IsAuthorizedWithToken
$result = $client->isAuthorizedWithToken
([/* ... */]); $promise = $client->isAuthorizedWithTokenAsync
([/* ... */]);
Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow
or Deny
, along with a list of the policies that resulted in the decision.
Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature.
Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store
Parameter Syntax
$result = $client->isAuthorizedWithToken([ 'accessToken' => '<string>', 'action' => [ 'actionId' => '<string>', // REQUIRED 'actionType' => '<string>', // REQUIRED ], 'context' => [ 'contextMap' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], ], 'entities' => [ 'entityList' => [ [ 'attributes' => [ '<String>' => [ 'boolean' => true || false, 'decimal' => '<string>', 'entityIdentifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'ipaddr' => '<string>', 'long' => <integer>, 'record' => [ '<String>' => [...], // RECURSIVE // ... ], 'set' => [ [...], // RECURSIVE // ... ], 'string' => '<string>', ], // ... ], 'identifier' => [ // REQUIRED 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'parents' => [ [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], // ... ], ], // ... ], ], 'identityToken' => '<string>', 'policyStoreId' => '<string>', // REQUIRED 'resource' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], ]);
Parameter Details
Members
- accessToken
-
- Type: string
Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
accessToken
, anidentityToken
, or both.Must be an access token. Verified Permissions returns an error if the
token_use
claim in the submitted token isn'taccess
. - action
-
- Type: ActionIdentifier structure
Specifies the requested action to be authorized. Is the specified principal authorized to perform this action on the specified resource.
- context
-
- Type: ContextDefinition structure
Specifies additional context that can be used to make more granular authorization decisions.
- entities
-
- Type: EntitiesDefinition structure
Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies.
You can't include principals in this parameter, only resource and action entities. This parameter can't include any entities of a type that matches the user or group entity types that you defined in your identity source.
-
The
IsAuthorizedWithToken
operation takes principal attributes from only theidentityToken
oraccessToken
passed to the operation. -
For action entities, you can include only their
Identifier
andEntityType
.
- identityToken
-
- Type: string
Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
accessToken
, anidentityToken
, or both.Must be an ID token. Verified Permissions returns an error if the
token_use
claim in the submitted token isn'tid
. - policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store. Policies in this policy store will be used to make an authorization decision for the input.
- resource
-
- Type: EntityIdentifier structure
Specifies the resource for which the authorization decision is made. For example, is the principal allowed to perform the action on the resource?
Result Syntax
[ 'decision' => 'ALLOW|DENY', 'determiningPolicies' => [ [ 'policyId' => '<string>', ], // ... ], 'errors' => [ [ 'errorDescription' => '<string>', ], // ... ], 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ]
Result Details
Members
- decision
-
- Required: Yes
- Type: string
An authorization decision that indicates if the authorization request should be allowed or denied.
- determiningPolicies
-
- Required: Yes
- Type: Array of DeterminingPolicyItem structures
The list of determining policies used to make the authorization decision. For example, if there are multiple matching policies, where at least one is a forbid policy, then because forbid always overrides permit the forbid policies are the determining policies. If all matching policies are permit policies, then those policies are the determining policies. When no policies match and the response is the default DENY, there are no determining policies.
- errors
-
- Required: Yes
- Type: Array of EvaluationErrorItem structures
Errors that occurred while making an authorization decision. For example, a policy references an entity or entity attribute that does not exist in the slice.
- principal
-
- Type: EntityIdentifier structure
The identifier of the principal in the ID or access token.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: IsAuthorizedWithToken - Example 1
The following example requests an authorization decision for a user who was authenticated by Amazon Cognito. The request uses the identity token provided by Amazon Cognito instead of the access token. In this example, the specified information store is configured to return principals as entities of type CognitoUser. The policy store contains a policy with the following statement.permit( principal == CognitoUser::"us-east-1_1a2b3c4d5|a1b2c3d4e5f6g7h8i9j0kalbmc", action, resource == Photo::"VacationPhoto94.jpg");
$result = $client->isAuthorizedWithToken([ 'action' => [ 'actionId' => 'View', 'actionType' => 'Action', ], 'identityToken' => 'EgZjxMPlbWUyBggAEEUYOdIBCDM3NDlqMGo3qAIAsAIA', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'resource' => [ 'entityId' => 'vacationPhoto94.jpg', 'entityType' => 'Photo', ], ]);
Result syntax:
[ 'errors' => [ ], 'decision' => 'ALLOW', 'determiningPolicies' => [ [ 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', ], ], ]
ListIdentitySources
$result = $client->listIdentitySources
([/* ... */]); $promise = $client->listIdentitySourcesAsync
([/* ... */]);
Returns a paginated list of all of the identity sources defined in the specified policy store.
Parameter Syntax
$result = $client->listIdentitySources([ 'filters' => [ [ 'principalEntityType' => '<string>', ], // ... ], 'maxResults' => <integer>, 'nextToken' => '<string>', 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- filters
-
- Type: Array of IdentitySourceFilter structures
Specifies characteristics of an identity source that you can use to limit the output to matching identity sources.
- maxResults
-
- Type: int
Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the
NextToken
response element is returned with a value (not null). Include the specified value as theNextToken
request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should checkNextToken
after every operation to ensure that you receive all of the results.If you do not specify this parameter, the operation defaults to 10 identity sources per response. You can specify a maximum of 50 identity sources per response.
- nextToken
-
- Type: string
Specifies that you want to receive the next page of results. Valid only if you received a
NextToken
response in the previous request. If you did, it indicates that more output is available. Set this parameter to the value provided by the previous call'sNextToken
response to request the next page of results. - policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the identity sources that you want to list.
Result Syntax
[ 'identitySources' => [ [ 'configuration' => [ 'cognitoUserPoolConfiguration' => [ 'clientIds' => ['<string>', ...], 'groupConfiguration' => [ 'groupEntityType' => '<string>', ], 'issuer' => '<string>', 'userPoolArn' => '<string>', ], 'openIdConnectConfiguration' => [ 'entityIdPrefix' => '<string>', 'groupConfiguration' => [ 'groupClaim' => '<string>', 'groupEntityType' => '<string>', ], 'issuer' => '<string>', 'tokenSelection' => [ 'accessTokenOnly' => [ 'audiences' => ['<string>', ...], 'principalIdClaim' => '<string>', ], 'identityTokenOnly' => [ 'clientIds' => ['<string>', ...], 'principalIdClaim' => '<string>', ], ], ], ], 'createdDate' => <DateTime>, 'details' => [ 'clientIds' => ['<string>', ...], 'discoveryUrl' => '<string>', 'openIdIssuer' => 'COGNITO', 'userPoolArn' => '<string>', ], 'identitySourceId' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', 'principalEntityType' => '<string>', ], // ... ], 'nextToken' => '<string>', ]
Result Details
Members
- identitySources
-
- Required: Yes
- Type: Array of IdentitySourceItem structures
The list of identity sources stored in the specified policy store.
- nextToken
-
- Type: string
If present, this value indicates that more output is available than is included in the current response. Use this value in the
NextToken
request parameter in a subsequent call to the operation to get the next part of the output. You should repeat this until theNextToken
response element comes back asnull
. This indicates that this is the last page of results.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: ListIdentitySources
The following example request creates lists the identity sources currently defined in the specified policy store.
$result = $client->listIdentitySources([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'identitySources' => [ [ 'createdDate' =>, 'details' => [ 'clientIds' => [ 'a1b2c3d4e5f6g7h8i9j0kalbmc', ], 'discoveryUrl' => 'https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5', 'openIdIssuer' => 'COGNITO', 'userPoolArn' => 'arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5', ], 'identitySourceId' => 'ISEXAMPLEabcdefg111111', 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'principalEntityType' => 'User', ], ], ]
ListPolicies
$result = $client->listPolicies
([/* ... */]); $promise = $client->listPoliciesAsync
([/* ... */]);
Returns a paginated list of all policies stored in the specified policy store.
Parameter Syntax
$result = $client->listPolicies([ 'filter' => [ 'policyTemplateId' => '<string>', 'policyType' => 'STATIC|TEMPLATE_LINKED', 'principal' => [ 'identifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'unspecified' => true || false, ], 'resource' => [ 'identifier' => [ 'entityId' => '<string>', // REQUIRED 'entityType' => '<string>', // REQUIRED ], 'unspecified' => true || false, ], ], 'maxResults' => <integer>, 'nextToken' => '<string>', 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- filter
-
- Type: PolicyFilter structure
Specifies a filter that limits the response to only policies that match the specified criteria. For example, you list only the policies that reference a specified principal.
- maxResults
-
- Type: int
Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the
NextToken
response element is returned with a value (not null). Include the specified value as theNextToken
request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should checkNextToken
after every operation to ensure that you receive all of the results.If you do not specify this parameter, the operation defaults to 10 policies per response. You can specify a maximum of 50 policies per response.
- nextToken
-
- Type: string
Specifies that you want to receive the next page of results. Valid only if you received a
NextToken
response in the previous request. If you did, it indicates that more output is available. Set this parameter to the value provided by the previous call'sNextToken
response to request the next page of results. - policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store you want to list policies from.
Result Syntax
[ 'nextToken' => '<string>', 'policies' => [ [ 'actions' => [ [ 'actionId' => '<string>', 'actionType' => '<string>', ], // ... ], 'createdDate' => <DateTime>, 'definition' => [ 'static' => [ 'description' => '<string>', ], 'templateLinked' => [ 'policyTemplateId' => '<string>', 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ], ], 'effect' => 'Permit|Forbid', 'lastUpdatedDate' => <DateTime>, 'policyId' => '<string>', 'policyStoreId' => '<string>', 'policyType' => 'STATIC|TEMPLATE_LINKED', 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ], // ... ], ]
Result Details
Members
- nextToken
-
- Type: string
If present, this value indicates that more output is available than is included in the current response. Use this value in the
NextToken
request parameter in a subsequent call to the operation to get the next part of the output. You should repeat this until theNextToken
response element comes back asnull
. This indicates that this is the last page of results. - policies
-
- Required: Yes
- Type: Array of PolicyItem structures
Lists all policies that are available in the specified policy store.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: ListPolicies - Example 1
The following example lists all policies in the policy store.
$result = $client->listPolicies([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'policies' => [ [ 'createdDate' =>, 'definition' => [ 'static' => [ 'description' => 'Grant members of janeFriends UserGroup access to the vacationFolder Album', ], ], 'lastUpdatedDate' => , 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'principal' => [ 'entityId' => 'janeFriends', 'entityType' => 'UserGroup', ], 'resource' => [ 'entityId' => 'vacationFolder', 'entityType' => 'Album', ], ], [ 'createdDate' => , 'definition' => [ 'static' => [ 'description' => 'Grant everyone access to the publicFolder Album', ], ], 'lastUpdatedDate' => , 'policyId' => 'Et9KxMplyaDdyurDw8TeFa', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'resource' => [ 'entityId' => 'publicFolder', 'entityType' => 'Album', ], ], ], ]
Example 2: ListPolicies - Example 2
The following example lists all policies for a specified principal.
$result = $client->listPolicies([ 'filter' => [ 'principal' => [ 'identifier' => [ 'entityId' => 'alice', 'entityType' => 'User', ], ], ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'policies' => [ [ 'createdDate' =>, 'definition' => [ 'static' => [ 'description' => 'An example policy', ], ], 'lastUpdatedDate' => , 'policyId' => 'Et9KxMplyaDdyurDw8TeFa', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'principal' => [ 'entityId' => 'alice', 'entityType' => 'User', ], 'resource' => [ 'entityId' => 'bob_folder', 'entityType' => 'Album', ], ], [ 'createdDate' => , 'definition' => [ 'static' => [ ], ], 'lastUpdatedDate' => , 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'principal' => [ 'entityId' => 'alice', 'entityType' => 'User', ], 'resource' => [ 'entityId' => 'alice_folder', 'entityType' => 'Album', ], ], ], ]
Example 3: ListPolicies - Example 3
The following example uses the Filter parameter to list only the template-linked policies in the specified policy store.
$result = $client->listPolicies([ 'filter' => [ 'policyType' => 'TEMPLATE_LINKED', ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'policies' => [ [ 'createdDate' =>, 'definition' => [ 'templateLinked' => [ 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', 'principal' => [ 'entityId' => 'alice', 'entityType' => 'User', ], 'resource' => [ 'entityId' => 'pic.jpg', 'entityType' => 'Photo', ], ], ], 'lastUpdatedDate' => , 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'TEMPLATE_LINKED', 'principal' => [ 'entityId' => 'alice', 'entityType' => 'User', ], 'resource' => [ 'entityId' => 'pic.jpg', 'entityType' => 'Photo', ], ], ], ]
ListPolicyStores
$result = $client->listPolicyStores
([/* ... */]); $promise = $client->listPolicyStoresAsync
([/* ... */]);
Returns a paginated list of all policy stores in the calling Amazon Web Services account.
Parameter Syntax
$result = $client->listPolicyStores([ 'maxResults' => <integer>, 'nextToken' => '<string>', ]);
Parameter Details
Members
- maxResults
-
- Type: int
Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the
NextToken
response element is returned with a value (not null). Include the specified value as theNextToken
request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should checkNextToken
after every operation to ensure that you receive all of the results.If you do not specify this parameter, the operation defaults to 10 policy stores per response. You can specify a maximum of 50 policy stores per response.
- nextToken
-
- Type: string
Specifies that you want to receive the next page of results. Valid only if you received a
NextToken
response in the previous request. If you did, it indicates that more output is available. Set this parameter to the value provided by the previous call'sNextToken
response to request the next page of results.
Result Syntax
[ 'nextToken' => '<string>', 'policyStores' => [ [ 'arn' => '<string>', 'createdDate' => <DateTime>, 'description' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', ], // ... ], ]
Result Details
Members
- nextToken
-
- Type: string
If present, this value indicates that more output is available than is included in the current response. Use this value in the
NextToken
request parameter in a subsequent call to the operation to get the next part of the output. You should repeat this until theNextToken
response element comes back asnull
. This indicates that this is the last page of results. - policyStores
-
- Required: Yes
- Type: Array of PolicyStoreItem structures
The list of policy stores in the account.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: ListPolicyStores
The following example lists all policy stores in the AWS account in the AWS Region in which you call the operation.
$result = $client->listPolicyStores([ ]);
Result syntax:
[ 'policyStores' => [ [ 'arn' => 'arn:aws:verifiedpermissions::123456789012:policy-store/C7v5xMplfFH3i3e4Jrzb1a', 'createdDate' =>, 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ], [ 'arn' => 'arn:aws:verifiedpermissions::123456789012:policy-store/PSEXAMPLEabcdefg222222', 'createdDate' => , 'policyStoreId' => 'PSEXAMPLEabcdefg222222', ], ], ]
ListPolicyTemplates
$result = $client->listPolicyTemplates
([/* ... */]); $promise = $client->listPolicyTemplatesAsync
([/* ... */]);
Returns a paginated list of all policy templates in the specified policy store.
Parameter Syntax
$result = $client->listPolicyTemplates([ 'maxResults' => <integer>, 'nextToken' => '<string>', 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- maxResults
-
- Type: int
Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the
NextToken
response element is returned with a value (not null). Include the specified value as theNextToken
request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should checkNextToken
after every operation to ensure that you receive all of the results.If you do not specify this parameter, the operation defaults to 10 policy templates per response. You can specify a maximum of 50 policy templates per response.
- nextToken
-
- Type: string
Specifies that you want to receive the next page of results. Valid only if you received a
NextToken
response in the previous request. If you did, it indicates that more output is available. Set this parameter to the value provided by the previous call'sNextToken
response to request the next page of results. - policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the policy templates you want to list.
Result Syntax
[ 'nextToken' => '<string>', 'policyTemplates' => [ [ 'createdDate' => <DateTime>, 'description' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', 'policyTemplateId' => '<string>', ], // ... ], ]
Result Details
Members
- nextToken
-
- Type: string
If present, this value indicates that more output is available than is included in the current response. Use this value in the
NextToken
request parameter in a subsequent call to the operation to get the next part of the output. You should repeat this until theNextToken
response element comes back asnull
. This indicates that this is the last page of results. - policyTemplates
-
- Required: Yes
- Type: Array of PolicyTemplateItem structures
The list of the policy templates in the specified policy store.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: ListPolicyTemplates
The following example retrieves a list of all of the policy templates in the specified policy store.
$result = $client->listPolicyTemplates([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'policyTemplates' => [ [ 'createdDate' =>, 'description' => 'Generic template', 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', ], [ 'createdDate' => , 'description' => 'Template for research dept', 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg222222', ], ], ]
PutSchema
$result = $client->putSchema
([/* ... */]); $promise = $client->putSchemaAsync
([/* ... */]);
Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->putSchema([ 'definition' => [ // REQUIRED 'cedarJson' => '<string>', ], 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- definition
-
- Required: Yes
- Type: SchemaDefinition structure
Specifies the definition of the schema to be stored. The schema definition must be written in Cedar schema JSON.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store in which to place the schema.
Result Syntax
[ 'createdDate' => <DateTime>, 'lastUpdatedDate' => <DateTime>, 'namespaces' => ['<string>', ...], 'policyStoreId' => '<string>', ]
Result Details
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the schema was originally created.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the schema was last updated.
- namespaces
-
- Required: Yes
- Type: Array of strings
Identifies the namespaces of the entities referenced by this schema.
- policyStoreId
-
- Required: Yes
- Type: string
The unique ID of the policy store that contains the schema.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ServiceQuotaExceededException:
The request failed because it would cause a service quota to be exceeded.
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: PutSchema
The following example creates a new schema, or updates an existing schema, in the specified policy store. Note that the schema text is shown line wrapped for readability. You should submit the entire schema text as a single line of text.NoteThe JSON in the parameters of this operation are strings that can contain embedded quotation marks (") within the outermost quotation mark pair. This requires that you stringify the JSON object by preceding all embedded quotation marks with a backslash character ( \" ) and combining all lines into a single text line with no line breaks.Example strings might be displayed wrapped across multiple lines here for readability, but the operation requires the parameters be submitted as single line strings.
$result = $client->putSchema([ 'definition' => [ 'cedarJson' => '{"MySampleNamespace": {"actions": {"remoteAccess": {"appliesTo": {"principalTypes": ["Employee"]}}},"entityTypes": {"Employee": {"shape": {"attributes": {"jobLevel": {"type": "Long"},"name": {"type": "String"}},"type": "Record"}}}}}', ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'namespaces' => [ 'My::Sample::Namespace', ], 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]
UpdateIdentitySource
$result = $client->updateIdentitySource
([/* ... */]); $promise = $client->updateIdentitySourceAsync
([/* ... */]);
Updates the specified identity source to use a new identity provider (IdP), or to change the mapping of identities from the IdP to a different principal entity type.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->updateIdentitySource([ 'identitySourceId' => '<string>', // REQUIRED 'policyStoreId' => '<string>', // REQUIRED 'principalEntityType' => '<string>', 'updateConfiguration' => [ // REQUIRED 'cognitoUserPoolConfiguration' => [ 'clientIds' => ['<string>', ...], 'groupConfiguration' => [ 'groupEntityType' => '<string>', // REQUIRED ], 'userPoolArn' => '<string>', // REQUIRED ], 'openIdConnectConfiguration' => [ 'entityIdPrefix' => '<string>', 'groupConfiguration' => [ 'groupClaim' => '<string>', // REQUIRED 'groupEntityType' => '<string>', // REQUIRED ], 'issuer' => '<string>', // REQUIRED 'tokenSelection' => [ // REQUIRED 'accessTokenOnly' => [ 'audiences' => ['<string>', ...], 'principalIdClaim' => '<string>', ], 'identityTokenOnly' => [ 'clientIds' => ['<string>', ...], 'principalIdClaim' => '<string>', ], ], ], ], ]);
Parameter Details
Members
- identitySourceId
-
- Required: Yes
- Type: string
Specifies the ID of the identity source that you want to update.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the identity source that you want to update.
- principalEntityType
-
- Type: string
Specifies the data type of principals generated for identities authenticated by the identity source.
- updateConfiguration
-
- Required: Yes
- Type: UpdateConfiguration structure
Specifies the details required to communicate with the identity provider (IdP) associated with this identity source.
Result Syntax
[ 'createdDate' => <DateTime>, 'identitySourceId' => '<string>', 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', ]
Result Details
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the updated identity source was originally created.
- identitySourceId
-
- Required: Yes
- Type: string
The ID of the updated identity source.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the identity source was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the updated identity source.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: UpdateIdentitySource
The following example updates the configuration of the specified identity source with a new configuration.
$result = $client->updateIdentitySource([ 'identitySourceId' => 'ISEXAMPLEabcdefg111111', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'updateConfiguration' => [ 'cognitoUserPoolConfiguration' => [ 'clientIds' => [ 'a1b2c3d4e5f6g7h8i9j0kalbmc', ], 'userPoolArn' => 'arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5', ], ], ]);
Result syntax:
[ 'createdDate' =>, 'identitySourceId' => 'ISEXAMPLEabcdefg111111', 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]
UpdatePolicy
$result = $client->updatePolicy
([/* ... */]); $promise = $client->updatePolicyAsync
([/* ... */]);
Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate.
-
If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored.
-
When you edit a static policy, you can change only certain elements of a static policy:
-
The action referenced by the policy.
-
A condition clause, such as when and unless.
You can't change these elements of a static policy:
-
Changing a policy from a static policy to a template-linked policy.
-
Changing the effect of a static policy from permit or forbid.
-
The principal referenced by a static policy.
-
The resource referenced by a static policy.
-
-
To update a template-linked policy, you must update the template instead.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->updatePolicy([ 'definition' => [ // REQUIRED 'static' => [ 'description' => '<string>', 'statement' => '<string>', // REQUIRED ], ], 'policyId' => '<string>', // REQUIRED 'policyStoreId' => '<string>', // REQUIRED ]);
Parameter Details
Members
- definition
-
- Required: Yes
- Type: UpdatePolicyDefinition structure
Specifies the updated policy content that you want to replace on the specified policy. The content must be valid Cedar policy language text.
You can change only the following elements from the policy definition:
-
The
action
referenced by the policy. -
Any conditional clauses, such as
when
orunless
clauses.
You can't change the following elements:
-
Changing from
static
totemplateLinked
. -
Changing the effect of the policy from
permit
orforbid
. -
The
principal
referenced by the policy. -
The
resource
referenced by the policy.
- policyId
-
- Required: Yes
- Type: string
Specifies the ID of the policy that you want to update. To find this value, you can use ListPolicies.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the policy that you want to update.
Result Syntax
[ 'actions' => [ [ 'actionId' => '<string>', 'actionType' => '<string>', ], // ... ], 'createdDate' => <DateTime>, 'effect' => 'Permit|Forbid', 'lastUpdatedDate' => <DateTime>, 'policyId' => '<string>', 'policyStoreId' => '<string>', 'policyType' => 'STATIC|TEMPLATE_LINKED', 'principal' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], 'resource' => [ 'entityId' => '<string>', 'entityType' => '<string>', ], ]
Result Details
Members
- actions
-
- Type: Array of ActionIdentifier structures
The action that a policy permits or forbids. For example,
{"actions": [{"actionId": "ViewPhoto", "actionType": "PhotoFlash::Action"}, {"entityID": "SharePhoto", "entityType": "PhotoFlash::Action"}]}
. - createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy was originally created.
- effect
-
- Type: string
The effect of the decision that a policy returns to an authorization request. For example,
"effect": "Permit"
. - lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy was most recently updated.
- policyId
-
- Required: Yes
- Type: string
The ID of the policy that was updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the policy that was updated.
- policyType
-
- Required: Yes
- Type: string
The type of the policy that was updated.
- principal
-
- Type: EntityIdentifier structure
The principal specified in the policy's scope. This element isn't included in the response when
Principal
isn't present in the policy content. - resource
-
- Type: EntityIdentifier structure
The resource specified in the policy's scope. This element isn't included in the response when
Resource
isn't present in the policy content.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ServiceQuotaExceededException:
The request failed because it would cause a service quota to be exceeded.
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: UpdatePolicy
The following example replaces the definition of the specified static policy with a new one.
$result = $client->updatePolicy([ 'definition' => [ 'static' => [ 'statement' => 'permit(principal, action, resource in Album::"public_folder");', ], ], 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'policyId' => '9wYxMpljbbZQb5fcZHyJhY', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyType' => 'STATIC', 'resource' => [ 'entityId' => 'public_folder', 'entityType' => 'Album', ], ]
UpdatePolicyStore
$result = $client->updatePolicyStore
([/* ... */]); $promise = $client->updatePolicyStoreAsync
([/* ... */]);
Modifies the validation setting for a policy store.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->updatePolicyStore([ 'description' => '<string>', 'policyStoreId' => '<string>', // REQUIRED 'validationSettings' => [ // REQUIRED 'mode' => 'OFF|STRICT', // REQUIRED ], ]);
Parameter Details
Members
- description
-
- Type: string
Descriptive text that you can provide to help with identification of the current policy store.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that you want to update
- validationSettings
-
- Required: Yes
- Type: ValidationSettings structure
A structure that defines the validation settings that want to enable for the policy store.
Result Syntax
[ 'arn' => '<string>', 'createdDate' => <DateTime>, 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', ]
Result Details
Members
- arn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the updated policy store.
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy store was originally created.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy store was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the updated policy store.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: UpdatePolicyStore
The following example turns off the validation settings for a policy store.
$result = $client->updatePolicyStore([ 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'validationSettings' => [ 'mode' => 'OFF', ], ]);
Result syntax:
[ 'arn' => 'arn:aws:verifiedpermissions::123456789012:policy-store/C7v5xMplfFH3i3e4Jrzb1a', 'createdDate' =>, 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', ]
UpdatePolicyTemplate
$result = $client->updatePolicyTemplate
([/* ... */]); $promise = $client->updatePolicyTemplateAsync
([/* ... */]);
Updates the specified policy template. You can update only the description and the some elements of the policyBody.
Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template.
Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
Parameter Syntax
$result = $client->updatePolicyTemplate([ 'description' => '<string>', 'policyStoreId' => '<string>', // REQUIRED 'policyTemplateId' => '<string>', // REQUIRED 'statement' => '<string>', // REQUIRED ]);
Parameter Details
Members
- description
-
- Type: string
Specifies a new description to apply to the policy template.
- policyStoreId
-
- Required: Yes
- Type: string
Specifies the ID of the policy store that contains the policy template that you want to update.
- policyTemplateId
-
- Required: Yes
- Type: string
Specifies the ID of the policy template that you want to update.
- statement
-
- Required: Yes
- Type: string
Specifies new statement content written in Cedar policy language to replace the current body of the policy template.
You can change only the following elements of the policy body:
-
The
action
referenced by the policy template. -
Any conditional clauses, such as
when
orunless
clauses.
You can't change the following elements:
-
The effect (
permit
orforbid
) of the policy template. -
The
principal
referenced by the policy template. -
The
resource
referenced by the policy template.
Result Syntax
[ 'createdDate' => <DateTime>, 'lastUpdatedDate' => <DateTime>, 'policyStoreId' => '<string>', 'policyTemplateId' => '<string>', ]
Result Details
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy template was originally created.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy template was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The ID of the policy store that contains the updated policy template.
- policyTemplateId
-
- Required: Yes
- Type: string
The ID of the updated policy template.
Errors
- ValidationException:
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
-
- ConflictException:
The request failed because another request to modify a resource occurred at the same.
- AccessDeniedException:
You don't have sufficient access to perform this action.
- ResourceNotFoundException:
The request failed because it references a resource that doesn't exist.
- ThrottlingException:
The request failed because it exceeded a throttling quota.
- InternalServerException:
The request failed because of an internal error. Try your request again later
Examples
Example 1: UpdatePolicyTemplate
The following example updates a policy template with both a new description and a new policy body. The effect, principal, and resource are the same as the original policy template. Only the action in the head, and the when and unless clauses can be different.NoteThe JSON in the parameters of this operation are strings that can contain embedded quotation marks (") within the outermost quotation mark pair. This requires that you stringify the JSON object by preceding all embedded quotation marks with a backslash character ( \" ) and combining all lines into a single text line with no line breaks.Example strings might be displayed wrapped across multiple lines here for readability, but the operation requires the parameters be submitted as single line strings.
$result = $client->updatePolicyTemplate([ 'description' => 'My updated template description', 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', 'statement' => '"ResearchAccess"permit(principal in ?principal,action == Action::"view",resource in ?resource")when {principal has department && principal.department == "research"};', ]);
Result syntax:
[ 'createdDate' =>, 'lastUpdatedDate' => , 'policyStoreId' => 'C7v5xMplfFH3i3e4Jrzb1a', 'policyTemplateId' => 'PTEXAMPLEabcdefg111111', ]
Shapes
AccessDeniedException
Description
You don't have sufficient access to perform this action.
Members
- message
-
- Required: Yes
- Type: string
ActionIdentifier
Description
Contains information about an action for a request for which an authorization decision is made.
This data type is used as a request parameter to the IsAuthorized, BatchIsAuthorized, and IsAuthorizedWithToken operations.
Example: { "actionId": "<action name>", "actionType": "Action" }
Members
- actionId
-
- Required: Yes
- Type: string
The ID of an action.
- actionType
-
- Required: Yes
- Type: string
The type of an action.
AttributeValue
Description
The value of an attribute.
Contains information about the runtime context for a request for which an authorization decision is made.
This data type is used as a member of the ContextDefinition structure which is uses as a request parameter for the IsAuthorized, BatchIsAuthorized, and IsAuthorizedWithToken operations.
Members
- boolean
-
- Type: boolean
An attribute value of Boolean type.
Example:
{"boolean": true}
- decimal
-
- Type: string
An attribute value of decimal type.
Example:
{"decimal": "1.1"}
- entityIdentifier
-
- Type: EntityIdentifier structure
An attribute value of type EntityIdentifier.
Example:
"entityIdentifier": { "entityId": "<id>", "entityType": "<entity type>"}
- ipaddr
-
- Type: string
An attribute value of ipaddr type.
Example:
{"ip": "192.168.1.100"}
- long
-
- Type: long (int|float)
An attribute value of Long type.
Example:
{"long": 0}
- record
-
- Type: Associative array of custom strings keys (String) to AttributeValue structures
An attribute value of Record type.
Example:
{"record": { "keyName": {} } }
- set
-
- Type: Array of AttributeValue structures
An attribute value of Set type.
Example:
{"set": [ {} ] }
- string
-
- Type: string
An attribute value of String type.
Example:
{"string": "abc"}
BatchGetPolicyErrorItem
Description
Contains the information about an error resulting from a BatchGetPolicy
API call.
Members
- code
-
- Required: Yes
- Type: string
The error code that was returned.
- message
-
- Required: Yes
- Type: string
A detailed error message.
- policyId
-
- Required: Yes
- Type: string
The identifier of the policy associated with the failed request.
- policyStoreId
-
- Required: Yes
- Type: string
The identifier of the policy store associated with the failed request.
BatchGetPolicyInputItem
Description
Information about a policy that you include in a BatchGetPolicy
API request.
Members
- policyId
-
- Required: Yes
- Type: string
The identifier of the policy you want information about.
- policyStoreId
-
- Required: Yes
- Type: string
The identifier of the policy store where the policy you want information about is stored.
BatchGetPolicyOutputItem
Description
Contains information about a policy returned from a BatchGetPolicy
API request.
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy was created.
- definition
-
- Required: Yes
- Type: PolicyDefinitionDetail structure
The policy definition of an item in the list of policies returned.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy was most recently updated.
- policyId
-
- Required: Yes
- Type: string
The identifier of the policy you want information about.
- policyStoreId
-
- Required: Yes
- Type: string
The identifier of the policy store where the policy you want information about is stored.
- policyType
-
- Required: Yes
- Type: string
The type of the policy. This is one of the following values:
-
STATIC
-
TEMPLATE_LINKED
BatchIsAuthorizedInputItem
Description
An authorization request that you include in a BatchIsAuthorized
API request.
Members
- action
-
- Type: ActionIdentifier structure
Specifies the requested action to be authorized. For example,
PhotoFlash::ReadPhoto
. - context
-
- Type: ContextDefinition structure
Specifies additional context that can be used to make more granular authorization decisions.
- principal
-
- Type: EntityIdentifier structure
Specifies the principal for which the authorization decision is to be made.
- resource
-
- Type: EntityIdentifier structure
Specifies the resource that you want an authorization decision for. For example,
PhotoFlash::Photo
.
BatchIsAuthorizedOutputItem
Description
The decision, based on policy evaluation, from an individual authorization request in a BatchIsAuthorized
API request.
Members
- decision
-
- Required: Yes
- Type: string
An authorization decision that indicates if the authorization request should be allowed or denied.
- determiningPolicies
-
- Required: Yes
- Type: Array of DeterminingPolicyItem structures
The list of determining policies used to make the authorization decision. For example, if there are two matching policies, where one is a forbid and the other is a permit, then the forbid policy will be the determining policy. In the case of multiple matching permit policies then there would be multiple determining policies. In the case that no policies match, and hence the response is DENY, there would be no determining policies.
- errors
-
- Required: Yes
- Type: Array of EvaluationErrorItem structures
Errors that occurred while making an authorization decision. For example, a policy might reference an entity or attribute that doesn't exist in the request.
- request
-
- Required: Yes
- Type: BatchIsAuthorizedInputItem structure
The authorization request that initiated the decision.
BatchIsAuthorizedWithTokenInputItem
Description
An authorization request that you include in a BatchIsAuthorizedWithToken
API request.
Members
- action
-
- Type: ActionIdentifier structure
Specifies the requested action to be authorized. For example,
PhotoFlash::ReadPhoto
. - context
-
- Type: ContextDefinition structure
Specifies additional context that can be used to make more granular authorization decisions.
- resource
-
- Type: EntityIdentifier structure
Specifies the resource that you want an authorization decision for. For example,
PhotoFlash::Photo
.
BatchIsAuthorizedWithTokenOutputItem
Description
The decision, based on policy evaluation, from an individual authorization request in a BatchIsAuthorizedWithToken
API request.
Members
- decision
-
- Required: Yes
- Type: string
An authorization decision that indicates if the authorization request should be allowed or denied.
- determiningPolicies
-
- Required: Yes
- Type: Array of DeterminingPolicyItem structures
The list of determining policies used to make the authorization decision. For example, if there are two matching policies, where one is a forbid and the other is a permit, then the forbid policy will be the determining policy. In the case of multiple matching permit policies then there would be multiple determining policies. In the case that no policies match, and hence the response is DENY, there would be no determining policies.
- errors
-
- Required: Yes
- Type: Array of EvaluationErrorItem structures
Errors that occurred while making an authorization decision. For example, a policy might reference an entity or attribute that doesn't exist in the request.
- request
-
- Required: Yes
- Type: BatchIsAuthorizedWithTokenInputItem structure
The authorization request that initiated the decision.
CognitoGroupConfiguration
Description
The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source.
This data type is part of a CognitoUserPoolConfiguration structure and is a request parameter in CreateIdentitySource.
Members
- groupEntityType
-
- Required: Yes
- Type: string
The name of the schema entity type that's mapped to the user pool group. Defaults to
AWS::CognitoGroup
.
CognitoGroupConfigurationDetail
Description
The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source.
This data type is part of an CognitoUserPoolConfigurationDetail structure and is a response parameter to GetIdentitySource.
Members
- groupEntityType
-
- Type: string
The name of the schema entity type that's mapped to the user pool group. Defaults to
AWS::CognitoGroup
.
CognitoGroupConfigurationItem
Description
The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source.
This data type is part of an CognitoUserPoolConfigurationItem structure and is a response parameter to ListIdentitySources.
Members
- groupEntityType
-
- Type: string
The name of the schema entity type that's mapped to the user pool group. Defaults to
AWS::CognitoGroup
.
CognitoUserPoolConfiguration
Description
The configuration for an identity source that represents a connection to an Amazon Cognito user pool used as an identity provider for Verified Permissions.
This data type part of a Configuration structure that is used as a parameter to CreateIdentitySource.
Example:"CognitoUserPoolConfiguration":{"UserPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","ClientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}
Members
- clientIds
-
- Type: Array of strings
The unique application client IDs that are associated with the specified Amazon Cognito user pool.
Example:
"ClientIds": ["&ExampleCogClientId;"]
- groupConfiguration
-
- Type: CognitoGroupConfiguration structure
The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source.
- userPoolArn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
Example:
"UserPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
CognitoUserPoolConfigurationDetail
Description
The configuration for an identity source that represents a connection to an Amazon Cognito user pool used as an identity provider for Verified Permissions.
This data type is used as a field that is part of an ConfigurationDetail structure that is part of the response to GetIdentitySource.
Example:"CognitoUserPoolConfiguration":{"UserPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","ClientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}
Members
- clientIds
-
- Required: Yes
- Type: Array of strings
The unique application client IDs that are associated with the specified Amazon Cognito user pool.
Example:
"clientIds": ["&ExampleCogClientId;"]
- groupConfiguration
-
- Type: CognitoGroupConfigurationDetail structure
The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source.
- issuer
-
- Required: Yes
- Type: string
The OpenID Connect (OIDC)
issuer
ID of the Amazon Cognito user pool that contains the identities to be authorized.Example:
"issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
- userPoolArn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
Example:
"userPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
CognitoUserPoolConfigurationItem
Description
The configuration for an identity source that represents a connection to an Amazon Cognito user pool used as an identity provider for Verified Permissions.
This data type is used as a field that is part of the ConfigurationItem structure that is part of the response to ListIdentitySources.
Example:"CognitoUserPoolConfiguration":{"UserPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","ClientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}
Members
- clientIds
-
- Required: Yes
- Type: Array of strings
The unique application client IDs that are associated with the specified Amazon Cognito user pool.
Example:
"clientIds": ["&ExampleCogClientId;"]
- groupConfiguration
-
- Type: CognitoGroupConfigurationItem structure
The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source.
- issuer
-
- Required: Yes
- Type: string
The OpenID Connect (OIDC)
issuer
ID of the Amazon Cognito user pool that contains the identities to be authorized.Example:
"issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
- userPoolArn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
Example:
"userPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
Configuration
Description
Contains configuration information used when creating a new identity source.
This data type is used as a request parameter for the CreateIdentitySource operation.
Members
- cognitoUserPoolConfiguration
-
- Type: CognitoUserPoolConfiguration structure
Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs.
Example:
"configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
- openIdConnectConfiguration
-
- Type: OpenIdConnectConfiguration structure
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
Example:
"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
ConfigurationDetail
Description
Contains configuration information about an identity source.
This data type is a response parameter to the GetIdentitySource operation.
Members
- cognitoUserPoolConfiguration
-
- Type: CognitoUserPoolConfigurationDetail structure
Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool, the policy store entity that you want to assign to user groups, and one or more application client IDs.
Example:
"configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
- openIdConnectConfiguration
-
- Type: OpenIdConnectConfigurationDetail structure
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
Example:
"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
ConfigurationItem
Description
Contains configuration information about an identity source.
This data type is a response parameter to the ListIdentitySources operation.
Members
- cognitoUserPoolConfiguration
-
- Type: CognitoUserPoolConfigurationItem structure
Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool, the policy store entity that you want to assign to user groups, and one or more application client IDs.
Example:
"configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
- openIdConnectConfiguration
-
- Type: OpenIdConnectConfigurationItem structure
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
Example:
"configuration":{"openIdConnectConfiguration":{"issuer":"https://auth.example.com","tokenSelection":{"accessTokenOnly":{"audiences":["https://myapp.example.com","https://myapp2.example.com"],"principalIdClaim":"sub"}},"entityIdPrefix":"MyOIDCProvider","groupConfiguration":{"groupClaim":"groups","groupEntityType":"MyCorp::UserGroup"}}}
ConflictException
Description
The request failed because another request to modify a resource occurred at the same.
Members
- message
-
- Required: Yes
- Type: string
- resources
-
- Required: Yes
- Type: Array of ResourceConflict structures
The list of resources referenced with this failed request.
ContextDefinition
Description
Contains additional details about the context of the request. Verified Permissions evaluates this information in an authorization request as part of the when
and unless
clauses in a policy.
This data type is used as a request parameter for the IsAuthorized, BatchIsAuthorized, and IsAuthorizedWithToken operations.
Example: "context":{"contextMap":{"<KeyName1>":{"boolean":true},"<KeyName2>":{"long":1234}}}
Members
- contextMap
-
- Type: Associative array of custom strings keys (String) to AttributeValue structures
An list of attributes that are needed to successfully evaluate an authorization request. Each attribute in this array must include a map of a data type and its value.
Example:
"contextMap":{"<KeyName1>":{"boolean":true},"<KeyName2>":{"long":1234}}
DeterminingPolicyItem
Description
Contains information about one of the policies that determined an authorization decision.
This data type is used as an element in a response parameter for the IsAuthorized, BatchIsAuthorized, and IsAuthorizedWithToken operations.
Example: "determiningPolicies":[{"policyId":"SPEXAMPLEabcdefg111111"}]
Members
- policyId
-
- Required: Yes
- Type: string
The Id of a policy that determined to an authorization decision.
Example:
"policyId":"SPEXAMPLEabcdefg111111"
EntitiesDefinition
Description
Contains the list of entities to be considered during an authorization request. This includes all principals, resources, and actions required to successfully evaluate the request.
This data type is used as a field in the response parameter for the IsAuthorized and IsAuthorizedWithToken operations.
Members
- entityList
-
- Type: Array of EntityItem structures
An array of entities that are needed to successfully evaluate an authorization request. Each entity in this array must include an identifier for the entity, the attributes of the entity, and a list of any parent entities.
EntityIdentifier
Description
Contains the identifier of an entity, including its ID and type.
This data type is used as a request parameter for IsAuthorized operation, and as a response parameter for the CreatePolicy, GetPolicy, and UpdatePolicy operations.
Example: {"entityId":"string","entityType":"string"}
Members
- entityId
-
- Required: Yes
- Type: string
The identifier of an entity.
"entityId":"identifier"
- entityType
-
- Required: Yes
- Type: string
The type of an entity.
Example:
"entityType":"typeName"
EntityItem
Description
Contains information about an entity that can be referenced in a Cedar policy.
This data type is used as one of the fields in the EntitiesDefinition structure.
{ "identifier": { "entityType": "Photo", "entityId": "VacationPhoto94.jpg" }, "attributes": {}, "parents": [ { "entityType": "Album", "entityId": "alice_folder" } ] }
Members
- attributes
-
- Type: Associative array of custom strings keys (String) to AttributeValue structures
A list of attributes for the entity.
- identifier
-
- Required: Yes
- Type: EntityIdentifier structure
The identifier of the entity.
- parents
-
- Type: Array of EntityIdentifier structures
The parent entities in the hierarchy that contains the entity. A principal or resource entity can be defined with at most 99 transitive parents per authorization request.
A transitive parent is an entity in the hierarchy of entities including all direct parents, and parents of parents. For example, a user can be a member of 91 groups if one of those groups is a member of eight groups, for a total of 100: one entity, 91 entity parents, and eight parents of parents.
EntityReference
Description
Contains information about a principal or resource that can be referenced in a Cedar policy.
This data type is used as part of the PolicyFilter structure that is used as a request parameter for the ListPolicies operation..
Members
- identifier
-
- Type: EntityIdentifier structure
The identifier of the entity. It can consist of either an EntityType and EntityId, a principal, or a resource.
- unspecified
-
- Type: boolean
Used to indicate that a principal or resource is not specified. This can be used to search for policies that are not associated with a specific principal or resource.
EvaluationErrorItem
Description
Contains a description of an evaluation error.
This data type is a response parameter of the IsAuthorized, BatchIsAuthorized, and IsAuthorizedWithToken operations.
Members
- errorDescription
-
- Required: Yes
- Type: string
The error description.
IdentitySourceDetails
Description
A structure that contains configuration of the identity source.
This data type was a response parameter for the GetIdentitySource operation. Replaced by ConfigurationDetail.
Members
- clientIds
-
- Type: Array of strings
The application client IDs associated with the specified Amazon Cognito user pool that are enabled for this identity source.
- discoveryUrl
-
- Type: string
The well-known URL that points to this user pool's OIDC discovery endpoint. This is a URL string in the following format. This URL replaces the placeholders for both the Amazon Web Services Region and the user pool identifier with those appropriate for this user pool.
https://cognito-idp.<region>.amazonaws.com/<user-pool-id>/.well-known/openid-configuration
- openIdIssuer
-
- Type: string
A string that identifies the type of OIDC service represented by this identity source.
At this time, the only valid value is
cognito
. - userPoolArn
-
- Type: string
The Amazon Resource Name (ARN) of the Amazon Cognito user pool whose identities are accessible to this Verified Permissions policy store.
IdentitySourceFilter
Description
A structure that defines characteristics of an identity source that you can use to filter.
This data type is a request parameter for the ListIdentityStores operation.
Members
- principalEntityType
-
- Type: string
The Cedar entity type of the principals returned by the identity provider (IdP) associated with this identity source.
IdentitySourceItem
Description
A structure that defines an identity source.
This data type is a response parameter to the ListIdentitySources operation.
Members
- configuration
-
- Type: ConfigurationItem structure
Contains configuration information about an identity source.
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the identity source was originally created.
- details
-
- Type: IdentitySourceItemDetails structure
A structure that contains the details of the associated identity provider (IdP).
- identitySourceId
-
- Required: Yes
- Type: string
The unique identifier of the identity source.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the identity source was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The identifier of the policy store that contains the identity source.
- principalEntityType
-
- Required: Yes
- Type: string
The Cedar entity type of the principals returned from the IdP associated with this identity source.
IdentitySourceItemDetails
Description
A structure that contains configuration of the identity source.
This data type was a response parameter for the ListIdentitySources operation. Replaced by ConfigurationItem.
Members
- clientIds
-
- Type: Array of strings
The application client IDs associated with the specified Amazon Cognito user pool that are enabled for this identity source.
- discoveryUrl
-
- Type: string
The well-known URL that points to this user pool's OIDC discovery endpoint. This is a URL string in the following format. This URL replaces the placeholders for both the Amazon Web Services Region and the user pool identifier with those appropriate for this user pool.
https://cognito-idp.<region>.amazonaws.com/<user-pool-id>/.well-known/openid-configuration
- openIdIssuer
-
- Type: string
A string that identifies the type of OIDC service represented by this identity source.
At this time, the only valid value is
cognito
. - userPoolArn
-
- Type: string
The Amazon Cognito user pool whose identities are accessible to this Verified Permissions policy store.
InternalServerException
Description
The request failed because of an internal error. Try your request again later
Members
- message
-
- Required: Yes
- Type: string
OpenIdConnectAccessTokenConfiguration
Description
The configuration of an OpenID Connect (OIDC) identity source for handling access token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a OpenIdConnectTokenSelection structure, which is a parameter of CreateIdentitySource.
Members
- audiences
-
- Type: Array of strings
The access token
aud
claim values that you want to accept in your policy store. For example,https://myapp.example.com, https://myapp2.example.com
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
OpenIdConnectAccessTokenConfigurationDetail
Description
The configuration of an OpenID Connect (OIDC) identity source for handling access token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a OpenIdConnectTokenSelectionDetail structure, which is a parameter of GetIdentitySource.
Members
- audiences
-
- Type: Array of strings
The access token
aud
claim values that you want to accept in your policy store. For example,https://myapp.example.com, https://myapp2.example.com
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
OpenIdConnectAccessTokenConfigurationItem
Description
The configuration of an OpenID Connect (OIDC) identity source for handling access token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a OpenIdConnectTokenSelectionItem structure, which is a parameter of ListIdentitySources.
Members
- audiences
-
- Type: Array of strings
The access token
aud
claim values that you want to accept in your policy store. For example,https://myapp.example.com, https://myapp2.example.com
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
OpenIdConnectConfiguration
Description
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
This data type is part of a Configuration structure, which is a parameter to CreateIdentitySource.
Members
- entityIdPrefix
-
- Type: string
A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an
entityIdPrefix
ofMyOIDCProvider
, you can reference principals in your policies in the formatMyCorp::User::MyOIDCProvider|Carlos
. - groupConfiguration
-
- Type: OpenIdConnectGroupConfiguration structure
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a
groups
claim toMyCorp::UserGroup
. - issuer
-
- Required: Yes
- Type: string
The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path
.well-known/openid-configuration
. - tokenSelection
-
- Required: Yes
- Type: OpenIdConnectTokenSelection structure
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
OpenIdConnectConfigurationDetail
Description
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
This data type is part of a ConfigurationDetail structure, which is a parameter to GetIdentitySource.
Members
- entityIdPrefix
-
- Type: string
A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an
entityIdPrefix
ofMyOIDCProvider
, you can reference principals in your policies in the formatMyCorp::User::MyOIDCProvider|Carlos
. - groupConfiguration
-
- Type: OpenIdConnectGroupConfigurationDetail structure
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a
groups
claim toMyCorp::UserGroup
. - issuer
-
- Required: Yes
- Type: string
The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path
.well-known/openid-configuration
. - tokenSelection
-
- Required: Yes
- Type: OpenIdConnectTokenSelectionDetail structure
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
OpenIdConnectConfigurationItem
Description
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
This data type is part of a ConfigurationItem structure, which is a parameter to ListIdentitySources.
Members
- entityIdPrefix
-
- Type: string
A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an
entityIdPrefix
ofMyOIDCProvider
, you can reference principals in your policies in the formatMyCorp::User::MyOIDCProvider|Carlos
. - groupConfiguration
-
- Type: OpenIdConnectGroupConfigurationItem structure
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a
groups
claim toMyCorp::UserGroup
. - issuer
-
- Required: Yes
- Type: string
The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path
.well-known/openid-configuration
. - tokenSelection
-
- Required: Yes
- Type: OpenIdConnectTokenSelectionItem structure
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
OpenIdConnectGroupConfiguration
Description
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups
claim to MyCorp::UserGroup
.
This data type is part of a OpenIdConnectConfiguration structure, which is a parameter of CreateIdentitySource.
Members
- groupClaim
-
- Required: Yes
- Type: string
The token claim that you want Verified Permissions to interpret as group membership. For example,
groups
. - groupEntityType
-
- Required: Yes
- Type: string
The policy store entity type that you want to map your users' group claim to. For example,
MyCorp::UserGroup
. A group entity type is an entity that can have a user entity type as a member.
OpenIdConnectGroupConfigurationDetail
Description
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups
claim to MyCorp::UserGroup
.
This data type is part of a OpenIdConnectConfigurationDetail structure, which is a parameter of GetIdentitySource.
Members
- groupClaim
-
- Required: Yes
- Type: string
The token claim that you want Verified Permissions to interpret as group membership. For example,
groups
. - groupEntityType
-
- Required: Yes
- Type: string
The policy store entity type that you want to map your users' group claim to. For example,
MyCorp::UserGroup
. A group entity type is an entity that can have a user entity type as a member.
OpenIdConnectGroupConfigurationItem
Description
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups
claim to MyCorp::UserGroup
.
This data type is part of a OpenIdConnectConfigurationItem structure, which is a parameter of ListIdentitySourcea.
Members
- groupClaim
-
- Required: Yes
- Type: string
The token claim that you want Verified Permissions to interpret as group membership. For example,
groups
. - groupEntityType
-
- Required: Yes
- Type: string
The policy store entity type that you want to map your users' group claim to. For example,
MyCorp::UserGroup
. A group entity type is an entity that can have a user entity type as a member.
OpenIdConnectIdentityTokenConfiguration
Description
The configuration of an OpenID Connect (OIDC) identity source for handling identity (ID) token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a OpenIdConnectTokenSelection structure, which is a parameter of CreateIdentitySource.
Members
- clientIds
-
- Type: Array of strings
The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example,
1example23456789, 2example10111213
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
OpenIdConnectIdentityTokenConfigurationDetail
Description
The configuration of an OpenID Connect (OIDC) identity source for handling identity (ID) token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a OpenIdConnectTokenSelectionDetail structure, which is a parameter of GetIdentitySource.
Members
- clientIds
-
- Type: Array of strings
The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example,
1example23456789, 2example10111213
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
OpenIdConnectIdentityTokenConfigurationItem
Description
The configuration of an OpenID Connect (OIDC) identity source for handling identity (ID) token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a OpenIdConnectTokenSelectionItem structure, which is a parameter of ListIdentitySources.
Members
- clientIds
-
- Type: Array of strings
The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example,
1example23456789, 2example10111213
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
OpenIdConnectTokenSelection
Description
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
This data type is part of a OpenIdConnectConfiguration structure, which is a parameter of CreateIdentitySource.
Members
- accessTokenOnly
-
- Type: OpenIdConnectAccessTokenConfiguration structure
The OIDC configuration for processing access tokens. Contains allowed audience claims, for example
https://auth.example.com
, and the claim that you want to map to the principal, for examplesub
. - identityTokenOnly
-
- Type: OpenIdConnectIdentityTokenConfiguration structure
The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example
1example23456789
, and the claim that you want to map to the principal, for examplesub
.
OpenIdConnectTokenSelectionDetail
Description
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
This data type is part of a OpenIdConnectConfigurationDetail structure, which is a parameter of GetIdentitySource.
Members
- accessTokenOnly
-
- Type: OpenIdConnectAccessTokenConfigurationDetail structure
The OIDC configuration for processing access tokens. Contains allowed audience claims, for example
https://auth.example.com
, and the claim that you want to map to the principal, for examplesub
. - identityTokenOnly
-
- Type: OpenIdConnectIdentityTokenConfigurationDetail structure
The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example
1example23456789
, and the claim that you want to map to the principal, for examplesub
.
OpenIdConnectTokenSelectionItem
Description
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
This data type is part of a OpenIdConnectConfigurationItem structure, which is a parameter of ListIdentitySources.
Members
- accessTokenOnly
-
- Type: OpenIdConnectAccessTokenConfigurationItem structure
The OIDC configuration for processing access tokens. Contains allowed audience claims, for example
https://auth.example.com
, and the claim that you want to map to the principal, for examplesub
. - identityTokenOnly
-
- Type: OpenIdConnectIdentityTokenConfigurationItem structure
The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example
1example23456789
, and the claim that you want to map to the principal, for examplesub
.
PolicyDefinition
Description
A structure that contains the details for a Cedar policy definition. It includes the policy type, a description, and a policy body. This is a top level data type used to create a policy.
This data type is used as a request parameter for the CreatePolicy operation. This structure must always have either an static
or a templateLinked
element.
Members
- static
-
- Type: StaticPolicyDefinition structure
A structure that describes a static policy. An static policy doesn't use a template or allow placeholders for entities.
- templateLinked
-
- Type: TemplateLinkedPolicyDefinition structure
A structure that describes a policy that was instantiated from a template. The template can specify placeholders for
principal
andresource
. When you use CreatePolicy to create a policy from a template, you specify the exact principal and resource to use for the instantiated policy.
PolicyDefinitionDetail
Description
A structure that describes a policy definition. It must always have either an static
or a templateLinked
element.
This data type is used as a response parameter for the GetPolicy operation.
Members
- static
-
- Type: StaticPolicyDefinitionDetail structure
Information about a static policy that wasn't created with a policy template.
- templateLinked
-
- Type: TemplateLinkedPolicyDefinitionDetail structure
Information about a template-linked policy that was created by instantiating a policy template.
PolicyDefinitionItem
Description
A structure that describes a PolicyDefinintion. It will always have either an StaticPolicy
or a TemplateLinkedPolicy
element.
This data type is used as a response parameter for the CreatePolicy and ListPolicies operations.
Members
- static
-
- Type: StaticPolicyDefinitionItem structure
Information about a static policy that wasn't created with a policy template.
- templateLinked
-
- Type: TemplateLinkedPolicyDefinitionItem structure
Information about a template-linked policy that was created by instantiating a policy template.
PolicyFilter
Description
Contains information about a filter to refine policies returned in a query.
This data type is used as a response parameter for the ListPolicies operation.
Members
- policyTemplateId
-
- Type: string
Filters the output to only template-linked policies that were instantiated from the specified policy template.
- policyType
-
- Type: string
Filters the output to only policies of the specified type.
- principal
-
- Type: EntityReference structure
Filters the output to only policies that reference the specified principal.
- resource
-
- Type: EntityReference structure
Filters the output to only policies that reference the specified resource.
PolicyItem
Description
Contains information about a policy.
This data type is used as a response parameter for the ListPolicies operation.
Members
- actions
-
- Type: Array of ActionIdentifier structures
The action that a policy permits or forbids. For example,
{"actions": [{"actionId": "ViewPhoto", "actionType": "PhotoFlash::Action"}, {"entityID": "SharePhoto", "entityType": "PhotoFlash::Action"}]}
. - createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy was created.
- definition
-
- Required: Yes
- Type: PolicyDefinitionItem structure
The policy definition of an item in the list of policies returned.
- effect
-
- Type: string
The effect of the decision that a policy returns to an authorization request. For example,
"effect": "Permit"
. - lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy was most recently updated.
- policyId
-
- Required: Yes
- Type: string
The identifier of the policy you want information about.
- policyStoreId
-
- Required: Yes
- Type: string
The identifier of the policy store where the policy you want information about is stored.
- policyType
-
- Required: Yes
- Type: string
The type of the policy. This is one of the following values:
-
STATIC
-
TEMPLATE_LINKED
- principal
-
- Type: EntityIdentifier structure
The principal associated with the policy.
- resource
-
- Type: EntityIdentifier structure
The resource associated with the policy.
PolicyStoreItem
Description
Contains information about a policy store.
This data type is used as a response parameter for the ListPolicyStores operation.
Members
- arn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the policy store.
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy was created.
- description
-
- Type: string
Descriptive text that you can provide to help with identification of the current policy store.
- lastUpdatedDate
-
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time the policy store was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The unique identifier of the policy store.
PolicyTemplateItem
Description
Contains details about a policy template
This data type is used as a response parameter for the ListPolicyTemplates operation.
Members
- createdDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy template was created.
- description
-
- Type: string
The description attached to the policy template.
- lastUpdatedDate
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time that the policy template was most recently updated.
- policyStoreId
-
- Required: Yes
- Type: string
The unique identifier of the policy store that contains the template.
- policyTemplateId
-
- Required: Yes
- Type: string
The unique identifier of the policy template.
ResourceConflict
Description
Contains information about a resource conflict.
Members
- resourceId
-
- Required: Yes
- Type: string
The unique identifier of the resource involved in a conflict.
- resourceType
-
- Required: Yes
- Type: string
The type of the resource involved in a conflict.
ResourceNotFoundException
Description
The request failed because it references a resource that doesn't exist.
Members
- message
-
- Required: Yes
- Type: string
- resourceId
-
- Required: Yes
- Type: string
The unique ID of the resource referenced in the failed request.
- resourceType
-
- Required: Yes
- Type: string
The resource type of the resource referenced in the failed request.
SchemaDefinition
Description
Contains a list of principal types, resource types, and actions that can be specified in policies stored in the same policy store. If the validation mode for the policy store is set to STRICT
, then policies that can't be validated by this schema are rejected by Verified Permissions and can't be stored in the policy store.
Members
- cedarJson
-
- Type: string
A JSON string representation of the schema supported by applications that use this policy store. To delete the schema, run PutSchema with
{}
for this parameter. For more information, see Policy store schema in the Amazon Verified Permissions User Guide.
ServiceQuotaExceededException
Description
The request failed because it would cause a service quota to be exceeded.
Members
- message
-
- Required: Yes
- Type: string
- quotaCode
-
- Type: string
The quota code recognized by the Amazon Web Services Service Quotas service.
- resourceId
-
- Type: string
The unique ID of the resource referenced in the failed request.
- resourceType
-
- Required: Yes
- Type: string
The resource type of the resource referenced in the failed request.
- serviceCode
-
- Type: string
The code for the Amazon Web Services service that owns the quota.
StaticPolicyDefinition
Description
Contains information about a static policy.
This data type is used as a field that is part of the PolicyDefinitionDetail type.
Members
- description
-
- Type: string
The description of the static policy.
- statement
-
- Required: Yes
- Type: string
The policy content of the static policy, written in the Cedar policy language.
StaticPolicyDefinitionDetail
Description
A structure that contains details about a static policy. It includes the description and policy body.
This data type is used within a PolicyDefinition structure as part of a request parameter for the CreatePolicy operation.
Members
- description
-
- Type: string
A description of the static policy.
- statement
-
- Required: Yes
- Type: string
The content of the static policy written in the Cedar policy language.
StaticPolicyDefinitionItem
Description
A structure that contains details about a static policy. It includes the description and policy statement.
This data type is used within a PolicyDefinition structure as part of a request parameter for the CreatePolicy operation.
Members
- description
-
- Type: string
A description of the static policy.
TemplateLinkedPolicyDefinition
Description
Contains information about a policy created by instantiating a policy template.
Members
- policyTemplateId
-
- Required: Yes
- Type: string
The unique identifier of the policy template used to create this policy.
- principal
-
- Type: EntityIdentifier structure
The principal associated with this template-linked policy. Verified Permissions substitutes this principal for the
?principal
placeholder in the policy template when it evaluates an authorization request. - resource
-
- Type: EntityIdentifier structure
The resource associated with this template-linked policy. Verified Permissions substitutes this resource for the
?resource
placeholder in the policy template when it evaluates an authorization request.
TemplateLinkedPolicyDefinitionDetail
Description
Contains information about a policy that was created by instantiating a policy template.
Members
- policyTemplateId
-
- Required: Yes
- Type: string
The unique identifier of the policy template used to create this policy.
- principal
-
- Type: EntityIdentifier structure
The principal associated with this template-linked policy. Verified Permissions substitutes this principal for the
?principal
placeholder in the policy template when it evaluates an authorization request. - resource
-
- Type: EntityIdentifier structure
The resource associated with this template-linked policy. Verified Permissions substitutes this resource for the
?resource
placeholder in the policy template when it evaluates an authorization request.
TemplateLinkedPolicyDefinitionItem
Description
Contains information about a policy created by instantiating a policy template.
This
Members
- policyTemplateId
-
- Required: Yes
- Type: string
The unique identifier of the policy template used to create this policy.
- principal
-
- Type: EntityIdentifier structure
The principal associated with this template-linked policy. Verified Permissions substitutes this principal for the
?principal
placeholder in the policy template when it evaluates an authorization request. - resource
-
- Type: EntityIdentifier structure
The resource associated with this template-linked policy. Verified Permissions substitutes this resource for the
?resource
placeholder in the policy template when it evaluates an authorization request.
ThrottlingException
Description
The request failed because it exceeded a throttling quota.
Members
- message
-
- Required: Yes
- Type: string
- quotaCode
-
- Type: string
The quota code recognized by the Amazon Web Services Service Quotas service.
- serviceCode
-
- Type: string
The code for the Amazon Web Services service that owns the quota.
UpdateCognitoGroupConfiguration
Description
The user group entities from an Amazon Cognito user pool identity source.
Members
- groupEntityType
-
- Required: Yes
- Type: string
The name of the schema entity type that's mapped to the user pool group. Defaults to
AWS::CognitoGroup
.
UpdateCognitoUserPoolConfiguration
Description
Contains configuration details of a Amazon Cognito user pool for use with an identity source.
Members
- clientIds
-
- Type: Array of strings
The client ID of an app client that is configured for the specified Amazon Cognito user pool.
- groupConfiguration
-
- Type: UpdateCognitoGroupConfiguration structure
The configuration of the user groups from an Amazon Cognito user pool identity source.
- userPoolArn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the Amazon Cognito user pool associated with this identity source.
UpdateConfiguration
Description
Contains an update to replace the configuration in an existing identity source.
Members
- cognitoUserPoolConfiguration
-
- Type: UpdateCognitoUserPoolConfiguration structure
Contains configuration details of a Amazon Cognito user pool.
- openIdConnectConfiguration
-
- Type: UpdateOpenIdConnectConfiguration structure
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
UpdateOpenIdConnectAccessTokenConfiguration
Description
The configuration of an OpenID Connect (OIDC) identity source for handling access token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a UpdateOpenIdConnectTokenSelection structure, which is a parameter to UpdateIdentitySource.
Members
- audiences
-
- Type: Array of strings
The access token
aud
claim values that you want to accept in your policy store. For example,https://myapp.example.com, https://myapp2.example.com
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
UpdateOpenIdConnectConfiguration
Description
Contains configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. It specifies the issuer URL, token type that you want to use, and policy store entity details.
This data type is part of a UpdateConfiguration structure, which is a parameter to UpdateIdentitySource.
Members
- entityIdPrefix
-
- Type: string
A descriptive string that you want to prefix to user entities from your OIDC identity provider. For example, if you set an
entityIdPrefix
ofMyOIDCProvider
, you can reference principals in your policies in the formatMyCorp::User::MyOIDCProvider|Carlos
. - groupConfiguration
-
- Type: UpdateOpenIdConnectGroupConfiguration structure
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a
groups
claim toMyCorp::UserGroup
. - issuer
-
- Required: Yes
- Type: string
The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path
.well-known/openid-configuration
. - tokenSelection
-
- Required: Yes
- Type: UpdateOpenIdConnectTokenSelection structure
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
UpdateOpenIdConnectGroupConfiguration
Description
The claim in OIDC identity provider tokens that indicates a user's group membership, and the entity type that you want to map it to. For example, this object can map the contents of a groups
claim to MyCorp::UserGroup
.
This data type is part of a UpdateOpenIdConnectConfiguration structure, which is a parameter to UpdateIdentitySource.
Members
- groupClaim
-
- Required: Yes
- Type: string
The token claim that you want Verified Permissions to interpret as group membership. For example,
groups
. - groupEntityType
-
- Required: Yes
- Type: string
The policy store entity type that you want to map your users' group claim to. For example,
MyCorp::UserGroup
. A group entity type is an entity that can have a user entity type as a member.
UpdateOpenIdConnectIdentityTokenConfiguration
Description
The configuration of an OpenID Connect (OIDC) identity source for handling identity (ID) token claims. Contains the claim that you want to identify as the principal in an authorization request, and the values of the aud
claim, or audiences, that you want to accept.
This data type is part of a UpdateOpenIdConnectTokenSelection structure, which is a parameter to UpdateIdentitySource.
Members
- clientIds
-
- Type: Array of strings
The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider. For example,
1example23456789, 2example10111213
. - principalIdClaim
-
- Type: string
The claim that determines the principal in OIDC access tokens. For example,
sub
.
UpdateOpenIdConnectTokenSelection
Description
The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source.
This data type is part of a UpdateOpenIdConnectConfiguration structure, which is a parameter to UpdateIdentitySource.
Members
- accessTokenOnly
-
- Type: UpdateOpenIdConnectAccessTokenConfiguration structure
The OIDC configuration for processing access tokens. Contains allowed audience claims, for example
https://auth.example.com
, and the claim that you want to map to the principal, for examplesub
. - identityTokenOnly
-
- Type: UpdateOpenIdConnectIdentityTokenConfiguration structure
The OIDC configuration for processing identity (ID) tokens. Contains allowed client ID claims, for example
1example23456789
, and the claim that you want to map to the principal, for examplesub
.
UpdatePolicyDefinition
Description
Contains information about updates to be applied to a policy.
This data type is used as a request parameter in the UpdatePolicy operation.
Members
- static
-
- Type: UpdateStaticPolicyDefinition structure
Contains details about the updates to be applied to a static policy.
UpdateStaticPolicyDefinition
Description
Contains information about an update to a static policy.
Members
- description
-
- Type: string
Specifies the description to be added to or replaced on the static policy.
- statement
-
- Required: Yes
- Type: string
Specifies the Cedar policy language text to be added to or replaced on the static policy.
You can change only the following elements from the original content:
-
The
action
referenced by the policy. -
Any conditional clauses, such as
when
orunless
clauses.
You can't change the following elements:
-
Changing from
StaticPolicy
toTemplateLinkedPolicy
. -
The effect (
permit
orforbid
) of the policy. -
The
principal
referenced by the policy. -
The
resource
referenced by the policy.
ValidationException
Description
The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.
The possible reasons include the following:
-
UnrecognizedEntityType
The policy includes an entity type that isn't found in the schema.
-
UnrecognizedActionId
The policy includes an action id that isn't found in the schema.
-
InvalidActionApplication
The policy includes an action that, according to the schema, doesn't support the specified principal and resource.
-
UnexpectedType
The policy included an operand that isn't a valid type for the specified operation.
-
IncompatibleTypes
The types of elements included in a
set
, or the types of expressions used in anif...then...else
clause aren't compatible in this context. -
MissingAttribute
The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
UnsafeOptionalAttributeAccess
The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the has (presence of attribute test) operator in the Cedar Policy Language Guide.
-
ImpossiblePolicy
Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.
-
WrongNumberArguments
The policy references an extension type with the wrong number of arguments.
-
FunctionArgumentValidationError
Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.
Members
- fieldList
-
- Type: Array of ValidationExceptionField structures
The list of fields that aren't valid.
- message
-
- Required: Yes
- Type: string
ValidationExceptionField
Description
Details about a field that failed policy validation.
Members
- message
-
- Required: Yes
- Type: string
Describes the policy validation error.
- path
-
- Required: Yes
- Type: string
The path to the specific element that Verified Permissions found to be not valid.
ValidationSettings
Description
A structure that contains Cedar policy validation settings for the policy store. The validation mode determines which validation failures that Cedar considers serious enough to block acceptance of a new or edited static policy or policy template.
This data type is used as a request parameter in the CreatePolicyStore and UpdatePolicyStore operations.
Members
- mode
-
- Required: Yes
- Type: string
The validation mode currently configured for this policy store. The valid values are:
-
OFF – Neither Verified Permissions nor Cedar perform any validation on policies. No validation errors are reported by either service.
-
STRICT – Requires a schema to be present in the policy store. Cedar performs validation on all submitted new or updated static policies and policy templates. Any that fail validation are rejected and Cedar doesn't store them in the policy store.
If
Mode=STRICT
and the policy store doesn't contain a schema, Verified Permissions rejects all static policies and policy templates because there is no schema to validate against.To submit a static policy or policy template without a schema, you must turn off validation.