PNG  IHDR;IDATxܻn0K )(pA 7LeG{ §㻢|ذaÆ 6lذaÆ 6lذaÆ 6lom$^yذag5bÆ 6lذaÆ 6lذa{ 6lذaÆ `}HFkm,mӪôô! x|'ܢ˟;E:9&ᶒ}{v]n&6 h_tڠ͵-ҫZ;Z$.Pkž)!o>}leQfJTu іچ\X=8Rن4`Vwl>nG^is"ms$ui?wbs[m6K4O.4%/bC%t Mז -lG6mrz2s%9s@-k9=)kB5\+͂Zsٲ Rn~GRC wIcIn7jJhۛNCS|j08yiHKֶۛkɈ+;SzL/F*\Ԕ#"5m2[S=gnaPeғL lذaÆ 6l^ḵaÆ 6lذaÆ 6lذa; _ذaÆ 6lذaÆ 6lذaÆ RIENDB` package Paws::STS::AssumeRoleWithSAMLResponse; use Moose; has AssumedRoleUser => (is => 'ro', isa => 'Paws::STS::AssumedRoleUser'); has Audience => (is => 'ro', isa => 'Str'); has Credentials => (is => 'ro', isa => 'Paws::STS::Credentials'); has Issuer => (is => 'ro', isa => 'Str'); has NameQualifier => (is => 'ro', isa => 'Str'); has PackedPolicySize => (is => 'ro', isa => 'Int'); has SourceIdentity => (is => 'ro', isa => 'Str'); has Subject => (is => 'ro', isa => 'Str'); has SubjectType => (is => 'ro', isa => 'Str'); has _request_id => (is => 'ro', isa => 'Str'); 1; ### main pod documentation begin ### =head1 NAME Paws::STS::AssumeRoleWithSAMLResponse =head1 ATTRIBUTES =head2 AssumedRoleUser => L The identifiers for the temporary security credentials that the operation returns. =head2 Audience => Str The value of the C attribute of the C element of the SAML assertion. =head2 Credentials => L The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token. The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size. =head2 Issuer => Str The value of the C element of the SAML assertion. =head2 NameQualifier => Str A hash value based on the concatenation of the following: =over =item * The C response value. =item * The AWS account ID. =item * The friendly name (the last part of the ARN) of the SAML provider in IAM. =back The combination of C and C can be used to uniquely identify a federated user. The following pseudocode shows how the hash value is calculated: C =head2 PackedPolicySize => Int A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space. =head2 SourceIdentity => Str The value in the C attribute in the SAML assertion. You can require users to set a source identity value when they assume a role. You do this by using the C condition key in a role trust policy. That way, actions that are taken with the role are associated with that user. After the source identity is set, the value cannot be changed. It is present in the request for all actions that are taken by the role and persists across chained role (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining) sessions. You can configure your SAML identity provider to use an attribute associated with your users, like user name or email, as the source identity when calling C. You do this by adding an attribute to the SAML assertion. For more information about using source identity, see Monitor and control actions taken with assumed roles (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html) in the I. The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@- =head2 Subject => Str The value of the C element in the C element of the SAML assertion. =head2 SubjectType => Str The format of the name ID, as defined by the C attribute in the C element of the SAML assertion. Typical examples of the format are C or C. If the format includes the prefix C, that prefix is removed. For example, C is returned as C. If the format includes any other prefix, the format is returned with no modifications. =head2 _request_id => Str =cut