diff --git a/.changes/next-release/feature-AmazonElasticsearchService-f30adfb.json b/.changes/next-release/feature-AmazonElasticsearchService-f30adfb.json new file mode 100644 index 000000000000..a2eb01646bc0 --- /dev/null +++ b/.changes/next-release/feature-AmazonElasticsearchService-f30adfb.json @@ -0,0 +1,6 @@ +{ + "type": "feature", + "category": "Amazon Elasticsearch Service", + "contributor": "", + "description": "Amazon Elasticsearch Service now supports native SAML authentication that seamlessly integrates with the customers' existing SAML 2.0 Identity Provider (IdP)." +} diff --git a/services/elasticsearch/src/main/resources/codegen-resources/service-2.json b/services/elasticsearch/src/main/resources/codegen-resources/service-2.json index 9342cdbd9a9d..522361463a4c 100644 --- a/services/elasticsearch/src/main/resources/codegen-resources/service-2.json +++ b/services/elasticsearch/src/main/resources/codegen-resources/service-2.json @@ -732,6 +732,10 @@ "InternalUserDatabaseEnabled":{ "shape":"Boolean", "documentation":"

True if the internal user database is enabled.

" + }, + "SAMLOptions":{ + "shape":"SAMLOptionsOutput", + "documentation":"

Describes the SAML application configured for a domain.

" } }, "documentation":"

Specifies the advanced security configuration: whether advanced security is enabled, whether the internal database option is enabled.

" @@ -750,6 +754,10 @@ "MasterUserOptions":{ "shape":"MasterUserOptions", "documentation":"

Credentials for the master user: username and password, ARN, or both.

" + }, + "SAMLOptions":{ + "shape":"SAMLOptionsInput", + "documentation":"

Specifies the SAML application configuration for the domain.

" } }, "documentation":"

Specifies the advanced security configuration: whether advanced security is enabled, whether the internal database option is enabled, master username and password (if internal database is enabled), and master user ARN (if IAM is enabled).

" @@ -804,6 +812,11 @@ }, "documentation":"

Container for response returned by AssociatePackage operation.

" }, + "BackendRole":{ + "type":"string", + "max":256, + "min":1 + }, "BaseException":{ "type":"structure", "members":{ @@ -3036,6 +3049,94 @@ "min":3 }, "S3Key":{"type":"string"}, + "SAMLEntityId":{ + "type":"string", + "max":512, + "min":8 + }, + "SAMLIdp":{ + "type":"structure", + "required":[ + "MetadataContent", + "EntityId" + ], + "members":{ + "MetadataContent":{ + "shape":"SAMLMetadata", + "documentation":"

The Metadata of the SAML application in xml format.

" + }, + "EntityId":{ + "shape":"SAMLEntityId", + "documentation":"

The unique Entity ID of the application in SAML Identity Provider.

" + } + }, + "documentation":"

Specifies the SAML Identity Provider's information.

" + }, + "SAMLMetadata":{ + "type":"string", + "max":1048576, + "min":1 + }, + "SAMLOptionsInput":{ + "type":"structure", + "members":{ + "Enabled":{ + "shape":"Boolean", + "documentation":"

True if SAML is enabled.

" + }, + "Idp":{ + "shape":"SAMLIdp", + "documentation":"

Specifies the SAML Identity Provider's information.

" + }, + "MasterUserName":{ + "shape":"Username", + "documentation":"

The SAML master username, which is stored in the Amazon Elasticsearch Service domain's internal database.

" + }, + "MasterBackendRole":{ + "shape":"BackendRole", + "documentation":"

The backend role to which the SAML master user is mapped to.

" + }, + "SubjectKey":{ + "shape":"String", + "documentation":"

The key to use for matching the SAML Subject attribute.

" + }, + "RolesKey":{ + "shape":"String", + "documentation":"

The key to use for matching the SAML Roles attribute.

" + }, + "SessionTimeoutMinutes":{ + "shape":"IntegerClass", + "documentation":"

The duration, in minutes, after which a user session becomes inactive. Acceptable values are between 1 and 1440, and the default value is 60.

" + } + }, + "documentation":"

Specifies the SAML application configuration for the domain.

" + }, + "SAMLOptionsOutput":{ + "type":"structure", + "members":{ + "Enabled":{ + "shape":"Boolean", + "documentation":"

True if SAML is enabled.

" + }, + "Idp":{ + "shape":"SAMLIdp", + "documentation":"

Describes the SAML Identity Provider's information.

" + }, + "SubjectKey":{ + "shape":"String", + "documentation":"

The key used for matching the SAML Subject attribute.

" + }, + "RolesKey":{ + "shape":"String", + "documentation":"

The key used for matching the SAML Roles attribute.

" + }, + "SessionTimeoutMinutes":{ + "shape":"IntegerClass", + "documentation":"

The duration, in minutes, after which a user session becomes inactive.

" + } + }, + "documentation":"

Describes the SAML application configured for the domain.

" + }, "ServiceSoftwareOptions":{ "type":"structure", "members":{