Skip to content

Commit 341f7a8

Browse files
docs(cfnspec): update CloudFormation documentation (#26334)
1 parent 73f2741 commit 341f7a8

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

packages/@aws-cdk/cfnspec/spec-source/cfn-docs/cfn-docs.json

+21-21
Original file line numberDiff line numberDiff line change
@@ -57434,33 +57434,33 @@
5743457434
"AWS::RolesAnywhere::CRL": {
5743557435
"attributes": {
5743657436
"CrlId": "The unique primary identifier of the Crl",
57437-
"Ref": "The name of the CRL."
57437+
"Ref": "`Ref` returns `CrlId` ."
5743857438
},
57439-
"description": "Creates a Crl.",
57439+
"description": "Imports the certificate revocation list (CRL). A CRL is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the CRL before issuing credentials.\n\n*Required permissions:* `rolesanywhere:ImportCrl` .",
5744057440
"properties": {
57441-
"CrlData": "x509 v3 Certificate Revocation List to revoke auth for corresponding certificates presented in CreateSession operations",
57442-
"Enabled": "The enabled status of the resource.",
57443-
"Name": "The customer specified name of the resource.",
57444-
"Tags": "A list of Tags.",
57441+
"CrlData": "The x509 v3 specified certificate revocation list (CRL).",
57442+
"Enabled": "Specifies whether the certificate revocation list (CRL) is enabled.",
57443+
"Name": "The name of the certificate revocation list (CRL).",
57444+
"Tags": "A list of tags to attach to the certificate revocation list (CRL).",
5744557445
"TrustAnchorArn": "The ARN of the TrustAnchor the certificate revocation list (CRL) will provide revocation for."
5744657446
}
5744757447
},
5744857448
"AWS::RolesAnywhere::Profile": {
5744957449
"attributes": {
5745057450
"ProfileArn": "The ARN of the profile.",
5745157451
"ProfileId": "The unique primary identifier of the Profile",
57452-
"Ref": "The name of the Profile"
57452+
"Ref": "`Ref` returns `ProfileId` ."
5745357453
},
57454-
"description": "Creates a Profile.",
57454+
"description": "Creates a *profile* , a list of the roles that Roles Anywhere service is trusted to assume. You use profiles to intersect permissions with IAM managed policies.\n\n*Required permissions:* `rolesanywhere:CreateProfile` .",
5745557455
"properties": {
57456-
"DurationSeconds": "The number of seconds vended session credentials will be valid for",
57457-
"Enabled": "The enabled status of the resource.",
57458-
"ManagedPolicyArns": "A list of managed policy ARNs. Managed policies identified by this list will be applied to the vended session credentials.",
57459-
"Name": "The customer specified name of the resource.",
57460-
"RequireInstanceProperties": "Specifies whether instance properties are required in CreateSession requests with this profile.",
57461-
"RoleArns": "A list of IAM role ARNs that can be assumed when this profile is specified in a CreateSession request.",
57462-
"SessionPolicy": "A session policy that will applied to the trust boundary of the vended session credentials.",
57463-
"Tags": "A list of Tags."
57456+
"DurationSeconds": "Sets the maximum number of seconds that vended temporary credentials through [CreateSession](https://docs.aws.amazon.com/rolesanywhere/latest/userguide/authentication-create-session.html) will be valid for, between 900 and 3600.",
57457+
"Enabled": "Indicates whether the profile is enabled.",
57458+
"ManagedPolicyArns": "A list of managed policy ARNs that apply to the vended session credentials.",
57459+
"Name": "The name of the profile.",
57460+
"RequireInstanceProperties": "Specifies whether instance properties are required in temporary credential requests with this profile.",
57461+
"RoleArns": "A list of IAM role ARNs. During `CreateSession` , if a matching role ARN is provided, the properties in this profile will be applied to the intersection session policy.",
57462+
"SessionPolicy": "A session policy that applies to the trust boundary of the vended session credentials.",
57463+
"Tags": "The tags to attach to the profile."
5746457464
}
5746557465
},
5746657466
"AWS::RolesAnywhere::TrustAnchor": {
@@ -57469,7 +57469,7 @@
5746957469
"TrustAnchorArn": "The ARN of the trust anchor.",
5747057470
"TrustAnchorId": "The unique identifier of the trust anchor."
5747157471
},
57472-
"description": "Creates a TrustAnchor.",
57472+
"description": "Creates a trust anchor to establish trust between IAM Roles Anywhere and your certificate authority (CA). You can define a trust anchor as a reference to an AWS Private Certificate Authority ( AWS Private CA ) or by uploading a CA certificate. Your AWS workloads can authenticate with the trust anchor using certificates issued by the CA in exchange for temporary AWS credentials.\n\n*Required permissions:* `rolesanywhere:CreateTrustAnchor` .",
5747357473
"properties": {
5747457474
"Enabled": "Indicates whether the trust anchor is enabled.",
5747557475
"Name": "The name of the trust anchor.",
@@ -57479,15 +57479,15 @@
5747957479
},
5748057480
"AWS::RolesAnywhere::TrustAnchor.Source": {
5748157481
"attributes": {},
57482-
"description": "Object representing the TrustAnchor type and its related certificate data.",
57482+
"description": "The trust anchor type and its related certificate data.",
5748357483
"properties": {
57484-
"SourceData": "A union object representing the data field of the TrustAnchor depending on its type",
57485-
"SourceType": "The type of the TrustAnchor."
57484+
"SourceData": "The data field of the trust anchor depending on its type.",
57485+
"SourceType": "The type of the TrustAnchor.\n\n> `AWS_ACM_PCA` is not an allowed value in your region."
5748657486
}
5748757487
},
5748857488
"AWS::RolesAnywhere::TrustAnchor.SourceData": {
5748957489
"attributes": {},
57490-
"description": "A union object representing the data field of the TrustAnchor depending on its type",
57490+
"description": "The data field of the trust anchor depending on its type.",
5749157491
"properties": {
5749257492
"AcmPcaArn": "The root certificate of the AWS Private Certificate Authority specified by this ARN is used in trust validation for temporary credential requests. Included for trust anchors of type `AWS_ACM_PCA` .\n\n> This field is not supported in your region.",
5749357493
"X509CertificateData": "The PEM-encoded data for the certificate anchor. Included for trust anchors of type `CERTIFICATE_BUNDLE` ."

0 commit comments

Comments
 (0)