You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: clients/client-acm-pca/ACMPCA.ts
+11-11
Original file line number
Diff line number
Diff line change
@@ -130,10 +130,10 @@ export class ACMPCA extends ACMPCAClient {
130
130
* validity period of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME
131
131
* alias for the S3 bucket that is included in certificates issued by the CA. If
132
132
* successful, this action returns the Amazon Resource Name (ARN) of the CA.</p>
133
-
* <p>ACM Private CAA assets that are stored in Amazon S3 can be protected with encryption.
133
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
134
134
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
135
135
* CRLs</a>.</p>
136
-
* <note>
136
+
* <note>
137
137
* <p>Both PCA and the IAM principal must have permission to write to
138
138
* the S3 bucket that you specify. If the IAM principal making the call
139
139
* does not have permission to write to the bucket, then an exception is
@@ -176,15 +176,15 @@ export class ACMPCA extends ACMPCAClient {
176
176
*
177
177
* The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
178
178
* the private key. </p>
179
-
* <note>
179
+
* <note>
180
180
* <p>Both PCA and the IAM principal must have permission to write to
181
181
* the S3 bucket that you specify. If the IAM principal making the call
182
182
* does not have permission to write to the bucket, then an exception is
183
183
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html">Configure
184
184
* Access to ACM Private CA</a>.</p>
185
185
* </note>
186
186
*
187
-
* <p>ACM Private CAA assets that are stored in Amazon S3 can be protected with encryption.
187
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
188
188
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting Your Audit
189
189
* Reports</a>.</p>
190
190
*/
@@ -336,7 +336,7 @@ export class ACMPCA extends ACMPCAClient {
336
336
* renew the affected certificates automatically.</p>
337
337
* <p>Permissions can be granted with the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreatePermission.html">CreatePermission</a> action and
338
338
* listed with the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListPermissions.html">ListPermissions</a> action. </p>
339
-
* <p class="title">
339
+
* <p class="title">
340
340
* <b>About Permissions</b>
341
341
* </p>
342
342
* <ul>
@@ -675,7 +675,7 @@ export class ACMPCA extends ACMPCAClient {
675
675
* resource or the policy cannot be found, this action returns a
676
676
* <code>ResourceNotFoundException</code>. </p>
677
677
* <p>The policy can be attached or updated with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_PutPolicy.html">PutPolicy</a> and removed with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeletePolicy.html">DeletePolicy</a>.</p>
678
-
* <p class="title">
678
+
* <p class="title">
679
679
* <b>About Policies</b>
680
680
* </p>
681
681
* <ul>
@@ -1052,7 +1052,7 @@ export class ACMPCA extends ACMPCAClient {
1052
1052
* Manager (RAM). For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-ram.html">Attach a Policy for Cross-Account
1053
1053
* Access</a>.</p>
1054
1054
* <p>The policy can be displayed with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_GetPolicy.html">GetPolicy</a> and removed with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeletePolicy.html">DeletePolicy</a>.</p>
1055
-
* <p class="title">
1055
+
* <p class="title">
1056
1056
* <b>About Policies</b>
1057
1057
* </p>
1058
1058
* <ul>
@@ -1154,15 +1154,15 @@ export class ACMPCA extends ACMPCAClient {
1154
1154
* further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms for the
1155
1155
* metrics <code>CRLGenerated</code> and <code>MisconfiguredCRLBucket</code>. For more
1156
1156
* information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html">Supported CloudWatch Metrics</a>.</p>
1157
-
* <note>
1157
+
* <note>
1158
1158
* <p>Both PCA and the IAM principal must have permission to write to
1159
1159
* the S3 bucket that you specify. If the IAM principal making the call
1160
1160
* does not have permission to write to the bucket, then an exception is
1161
1161
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html">Configure
1162
1162
* Access to ACM Private CA</a>.</p>
1163
1163
* </note>
1164
-
* <p>ACM Private CA also writes revocation information to the audit report. For more information,
1165
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
1164
+
* <p>ACM Private CA also writes
1165
+
* revocation information to the audit report. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
1166
1166
* <note>
1167
1167
* <p>You cannot revoke a root CA self-signed certificate.</p>
1168
1168
* </note>
@@ -1276,7 +1276,7 @@ export class ACMPCA extends ACMPCAClient {
1276
1276
* private CA must be in the <code>ACTIVE</code> or <code>DISABLED</code> state before you
1277
1277
* can update it. You can disable a private CA that is in the <code>ACTIVE</code> state or
1278
1278
* make a CA that is in the <code>DISABLED</code> state active again.</p>
1279
-
* <note>
1279
+
* <note>
1280
1280
* <p>Both PCA and the IAM principal must have permission to write to
1281
1281
* the S3 bucket that you specify. If the IAM principal making the call
1282
1282
* does not have permission to write to the bucket, then an exception is
* The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
34
34
* the private key. </p>
35
-
* <note>
35
+
* <note>
36
36
* <p>Both PCA and the IAM principal must have permission to write to
37
37
* the S3 bucket that you specify. If the IAM principal making the call
38
38
* does not have permission to write to the bucket, then an exception is
39
39
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html">Configure
40
40
* Access to ACM Private CA</a>.</p>
41
41
* </note>
42
42
*
43
-
* <p>ACM Private CAA assets that are stored in Amazon S3 can be protected with encryption.
43
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
44
44
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting Your Audit
* renew the affected certificates automatically.</p>
29
29
* <p>Permissions can be granted with the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreatePermission.html">CreatePermission</a> action and
30
30
* listed with the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListPermissions.html">ListPermissions</a> action. </p>
* resource or the policy cannot be found, this action returns a
23
23
* <code>ResourceNotFoundException</code>. </p>
24
24
* <p>The policy can be attached or updated with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_PutPolicy.html">PutPolicy</a> and removed with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeletePolicy.html">DeletePolicy</a>.</p>
* Manager (RAM). For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-ram.html">Attach a Policy for Cross-Account
24
24
* Access</a>.</p>
25
25
* <p>The policy can be displayed with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_GetPolicy.html">GetPolicy</a> and removed with <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeletePolicy.html">DeletePolicy</a>.</p>
* further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms for the
30
30
* metrics <code>CRLGenerated</code> and <code>MisconfiguredCRLBucket</code>. For more
31
31
* information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html">Supported CloudWatch Metrics</a>.</p>
32
-
* <note>
32
+
* <note>
33
33
* <p>Both PCA and the IAM principal must have permission to write to
34
34
* the S3 bucket that you specify. If the IAM principal making the call
35
35
* does not have permission to write to the bucket, then an exception is
36
36
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html">Configure
37
37
* Access to ACM Private CA</a>.</p>
38
38
* </note>
39
-
* <p>ACM Private CA also writes revocation information to the audit report. For more information,
40
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
39
+
* <p>ACM Private CA also writes
40
+
* revocation information to the audit report. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
41
41
* <note>
42
42
* <p>You cannot revoke a root CA self-signed certificate.</p>
* private CA copies the CNAME or the S3 bucket name to the <b>CRL
438
443
* Distribution Points</b> extension of each certificate it issues. Your S3
439
444
* bucket policy must give write permission to ACM Private CA. </p>
440
-
* <p>ACM Private CAA assets that are stored in Amazon S3 can be protected with encryption.
445
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
441
446
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
442
447
* CRLs</a>.</p>
443
448
* <p>Your private CA uses the value in the <b>ExpirationInDays</b> parameter to calculate the <b>nextUpdate</b> field in the CRL. The CRL is refreshed at 1/2 the age of next
* <code>PermanentDeletionTimeInDays</code> parameter of the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeleteCertificateAuthorityRequest.html">DeleteCertificateAuthorityRequest</a> action. </p>
1215
1232
*/
1216
1233
RestorableUntil?: Date;
1234
+
1235
+
/**
1236
+
* <p>Defines a cryptographic key management compliance standard used for handling CA keys. </p>
1237
+
* <p>Default: FIPS_140_2_LEVEL_3_OR_HIGHER</p>
1238
+
* <p>Note: AWS Region ap-northeast-3 supports only FIPS_140_2_LEVEL_2_OR_HIGHER. You must
1239
+
* explicitly specify this parameter and value when creating a CA in that Region.
1240
+
* Specifying a different value (or no value) results in an
1241
+
* <code>InvalidArgsException</code> with the message "A certificate authority cannot
1242
+
* be created in this region with the specified security standard."</p>
* be selected, or else this parameter is ignored. For more information about using these
1851
1879
* templates, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html">Understanding Certificate Templates</a>.</p>
1852
1880
* <p>If conflicting or duplicate certificate information is supplied during certificate
1853
-
* issuance, ACM Private CA applies <a href="xxxxx">order of operation rules</a> to determine
1854
-
* what information is used.</p>
1881
+
* issuance, ACM Private CA applies <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">order of
1882
+
* operation rules</a> to determine what information is used.</p>
0 commit comments