Create Token With Iam
ssooidc_create_token_with_iam | R Documentation |
Creates and returns access and refresh tokens for clients and applications that are authenticated using IAM entities¶
Description¶
Creates and returns access and refresh tokens for clients and
applications that are authenticated using IAM entities. The access token
can be used to fetch short-term credentials for the assigned Amazon Web
Services accounts or to access application APIs using bearer
authentication.
Usage¶
ssooidc_create_token_with_iam(clientId, grantType, code, refreshToken,
assertion, scope, redirectUri, subjectToken, subjectTokenType,
requestedTokenType, codeVerifier)
Arguments¶
clientId
[required] The unique identifier string for the client or application. This value is an application ARN that has OAuth grants configured.
grantType
[required] Supports the following OAuth grant types: Authorization Code, Refresh Token, JWT Bearer, and Token Exchange. Specify one of the following values, depending on the grant type that you want:
Authorization Code -
authorization_code
Refresh Token -
refresh_token
JWT Bearer -
urn:ietf:params:oauth:grant-type:jwt-bearer
Token Exchange -
urn:ietf:params:oauth:grant-type:token-exchange
code
Used only when calling this API for the Authorization Code grant type. This short-term code is used to identify this authorization request. The code is obtained through a redirect from IAM Identity Center to a redirect URI persisted in the Authorization Code GrantOptions for the application.
refreshToken
Used only when calling this API for the Refresh Token grant type. This token is used to refresh short-term tokens, such as the access token, that might expire.
For more information about the features and limitations of the current IAM Identity Center OIDC implementation, see Considerations for Using this Guide in the IAM Identity Center OIDC API Reference.
assertion
Used only when calling this API for the JWT Bearer grant type. This value specifies the JSON Web Token (JWT) issued by a trusted token issuer. To authorize a trusted token issuer, configure the JWT Bearer GrantOptions for the application.
scope
The list of scopes for which authorization is requested. The access token that is issued is limited to the scopes that are granted. If the value is not specified, IAM Identity Center authorizes all scopes configured for the application, including the following default scopes:
openid
,aws
,sts:identity_context
.redirectUri
Used only when calling this API for the Authorization Code grant type. This value specifies the location of the client or application that has registered to receive the authorization code.
subjectToken
Used only when calling this API for the Token Exchange grant type. This value specifies the subject of the exchange. The value of the subject token must be an access token issued by IAM Identity Center to a different client or application. The access token must have authorized scopes that indicate the requested application as a target audience.
subjectTokenType
Used only when calling this API for the Token Exchange grant type. This value specifies the type of token that is passed as the subject of the exchange. The following value is supported:
Access Token -
urn:ietf:params:oauth:token-type:access_token
requestedTokenType
Used only when calling this API for the Token Exchange grant type. This value specifies the type of token that the requester can receive. The following values are supported:
Access Token -
urn:ietf:params:oauth:token-type:access_token
Refresh Token -
urn:ietf:params:oauth:token-type:refresh_token
codeVerifier
Used only when calling this API for the Authorization Code grant type. This value is generated by the client and presented to validate the original code challenge value the client passed at authorization time.
Value¶
A list with the following syntax:
list(
accessToken = "string",
tokenType = "string",
expiresIn = 123,
refreshToken = "string",
idToken = "string",
issuedTokenType = "string",
scope = list(
"string"
)
)
Request syntax¶
svc$create_token_with_iam(
clientId = "string",
grantType = "string",
code = "string",
refreshToken = "string",
assertion = "string",
scope = list(
"string"
),
redirectUri = "string",
subjectToken = "string",
subjectTokenType = "string",
requestedTokenType = "string",
codeVerifier = "string"
)
Examples¶
## Not run:
#
svc$create_token_with_iam(
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
code = "yJraWQiOiJrZXktMTU2Njk2ODA4OCIsImFsZyI6IkhTMzg0In0EXAMPLEAUTHCODE",
grantType = "authorization_code",
redirectUri = "https://mywebapp.example/redirect",
scope = list(
"openid",
"aws",
"sts:identity_context"
)
)
#
svc$create_token_with_iam(
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
grantType = "refresh_token",
refreshToken = "aorvJYubGpU6i91YnH7Mfo-AT2fIVa1zCfA_Rvq9yjVKIP3onFmmykuQ7..."
)
#
svc$create_token_with_iam(
assertion = "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6IjFMVE16YWtpaGlS...",
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
grantType = "urn:ietf:params:oauth:grant-type:jwt-bearer"
)
#
svc$create_token_with_iam(
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
grantType = "urn:ietf:params:oauth:grant-type:token-exchange",
requestedTokenType = "urn:ietf:params:oauth:token-type:access_token",
subjectToken = "aoak-Hig8TUDPNX1xZwOMXM5MxOWDL0E0jg9P6_C_jKQPxS_SKCP6f0kh...",
subjectTokenType = "urn:ietf:params:oauth:token-type:access_token"
)
## End(Not run)