Skip to content

Create Token With Iam

ssooidc_create_token_with_iam R Documentation

Creates and returns access and refresh tokens for clients and applications that are authenticated using IAM entities

Description

Creates and returns access and refresh tokens for clients and applications that are authenticated using IAM entities. The access token can be used to fetch short-term credentials for the assigned Amazon Web Services accounts or to access application APIs using bearer authentication.

Usage

ssooidc_create_token_with_iam(clientId, grantType, code, refreshToken,
  assertion, scope, redirectUri, subjectToken, subjectTokenType,
  requestedTokenType, codeVerifier)

Arguments

clientId

[required] The unique identifier string for the client or application. This value is an application ARN that has OAuth grants configured.

grantType

[required] Supports the following OAuth grant types: Authorization Code, Refresh Token, JWT Bearer, and Token Exchange. Specify one of the following values, depending on the grant type that you want:

  • Authorization Code - authorization_code

  • Refresh Token - refresh_token

  • JWT Bearer - urn:ietf:params:oauth:grant-type:jwt-bearer

  • Token Exchange - urn:ietf:params:oauth:grant-type:token-exchange

code

Used only when calling this API for the Authorization Code grant type. This short-term code is used to identify this authorization request. The code is obtained through a redirect from IAM Identity Center to a redirect URI persisted in the Authorization Code GrantOptions for the application.

refreshToken

Used only when calling this API for the Refresh Token grant type. This token is used to refresh short-term tokens, such as the access token, that might expire.

For more information about the features and limitations of the current IAM Identity Center OIDC implementation, see Considerations for Using this Guide in the IAM Identity Center OIDC API Reference.

assertion

Used only when calling this API for the JWT Bearer grant type. This value specifies the JSON Web Token (JWT) issued by a trusted token issuer. To authorize a trusted token issuer, configure the JWT Bearer GrantOptions for the application.

scope

The list of scopes for which authorization is requested. The access token that is issued is limited to the scopes that are granted. If the value is not specified, IAM Identity Center authorizes all scopes configured for the application, including the following default scopes: openid, aws, sts:identity_context.

redirectUri

Used only when calling this API for the Authorization Code grant type. This value specifies the location of the client or application that has registered to receive the authorization code.

subjectToken

Used only when calling this API for the Token Exchange grant type. This value specifies the subject of the exchange. The value of the subject token must be an access token issued by IAM Identity Center to a different client or application. The access token must have authorized scopes that indicate the requested application as a target audience.

subjectTokenType

Used only when calling this API for the Token Exchange grant type. This value specifies the type of token that is passed as the subject of the exchange. The following value is supported:

  • Access Token - urn:ietf:params:oauth:token-type:access_token

requestedTokenType

Used only when calling this API for the Token Exchange grant type. This value specifies the type of token that the requester can receive. The following values are supported:

  • Access Token - urn:ietf:params:oauth:token-type:access_token

  • Refresh Token - urn:ietf:params:oauth:token-type:refresh_token

codeVerifier

Used only when calling this API for the Authorization Code grant type. This value is generated by the client and presented to validate the original code challenge value the client passed at authorization time.

Value

A list with the following syntax:

list(
  accessToken = "string",
  tokenType = "string",
  expiresIn = 123,
  refreshToken = "string",
  idToken = "string",
  issuedTokenType = "string",
  scope = list(
    "string"
  )
)

Request syntax

svc$create_token_with_iam(
  clientId = "string",
  grantType = "string",
  code = "string",
  refreshToken = "string",
  assertion = "string",
  scope = list(
    "string"
  ),
  redirectUri = "string",
  subjectToken = "string",
  subjectTokenType = "string",
  requestedTokenType = "string",
  codeVerifier = "string"
)

Examples

## Not run: 
# 
svc$create_token_with_iam(
  clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
  code = "yJraWQiOiJrZXktMTU2Njk2ODA4OCIsImFsZyI6IkhTMzg0In0EXAMPLEAUTHCODE",
  grantType = "authorization_code",
  redirectUri = "https://mywebapp.example/redirect",
  scope = list(
    "openid",
    "aws",
    "sts:identity_context"
  )
)

# 
svc$create_token_with_iam(
  clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
  grantType = "refresh_token",
  refreshToken = "aorvJYubGpU6i91YnH7Mfo-AT2fIVa1zCfA_Rvq9yjVKIP3onFmmykuQ7..."
)

# 
svc$create_token_with_iam(
  assertion = "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6IjFMVE16YWtpaGlS...",
  clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
  grantType = "urn:ietf:params:oauth:grant-type:jwt-bearer"
)

# 
svc$create_token_with_iam(
  clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
  grantType = "urn:ietf:params:oauth:grant-type:token-exchange",
  requestedTokenType = "urn:ietf:params:oauth:token-type:access_token",
  subjectToken = "aoak-Hig8TUDPNX1xZwOMXM5MxOWDL0E0jg9P6_C_jKQPxS_SKCP6f0kh...",
  subjectTokenType = "urn:ietf:params:oauth:token-type:access_token"
)

## End(Not run)