Create Token with Iam
| ssooidc_create_token_with_iam | R Documentation |
Creates and returns access and refresh tokens for clients and applications that are authenticated using IAM entities¶
Description¶
Creates and returns access and refresh tokens for clients and
applications that are authenticated using IAM entities. The access token
can be used to fetch short-term credentials for the assigned Amazon Web
Services accounts or to access application APIs using bearer
authentication.
Usage¶
ssooidc_create_token_with_iam(clientId, grantType, code, refreshToken,
assertion, scope, redirectUri, subjectToken, subjectTokenType,
requestedTokenType, codeVerifier)
Arguments¶
clientId[required] The unique identifier string for the client or application. This value is an application ARN that has OAuth grants configured.
grantType[required] Supports the following OAuth grant types: Authorization Code, Refresh Token, JWT Bearer, and Token Exchange. Specify one of the following values, depending on the grant type that you want:
Authorization Code -
authorization_codeRefresh Token -
refresh_tokenJWT Bearer -
urn:ietf:params:oauth:grant-type:jwt-bearerToken Exchange -
urn:ietf:params:oauth:grant-type:token-exchange
codeUsed only when calling this API for the Authorization Code grant type. This short-term code is used to identify this authorization request. The code is obtained through a redirect from IAM Identity Center to a redirect URI persisted in the Authorization Code GrantOptions for the application.
refreshTokenUsed only when calling this API for the Refresh Token grant type. This token is used to refresh short-term tokens, such as the access token, that might expire.
For more information about the features and limitations of the current IAM Identity Center OIDC implementation, see Considerations for Using this Guide in the IAM Identity Center OIDC API Reference.
assertionUsed only when calling this API for the JWT Bearer grant type. This value specifies the JSON Web Token (JWT) issued by a trusted token issuer. To authorize a trusted token issuer, configure the JWT Bearer GrantOptions for the application.
scopeThe list of scopes for which authorization is requested. The access token that is issued is limited to the scopes that are granted. If the value is not specified, IAM Identity Center authorizes all scopes configured for the application, including the following default scopes:
openid,aws,sts:identity_context.redirectUriUsed only when calling this API for the Authorization Code grant type. This value specifies the location of the client or application that has registered to receive the authorization code.
subjectTokenUsed only when calling this API for the Token Exchange grant type. This value specifies the subject of the exchange. The value of the subject token must be an access token issued by IAM Identity Center to a different client or application. The access token must have authorized scopes that indicate the requested application as a target audience.
subjectTokenTypeUsed only when calling this API for the Token Exchange grant type. This value specifies the type of token that is passed as the subject of the exchange. The following value is supported:
Access Token -
urn:ietf:params:oauth:token-type:access_token
requestedTokenTypeUsed only when calling this API for the Token Exchange grant type. This value specifies the type of token that the requester can receive. The following values are supported:
Access Token -
urn:ietf:params:oauth:token-type:access_tokenRefresh Token -
urn:ietf:params:oauth:token-type:refresh_token
codeVerifierUsed only when calling this API for the Authorization Code grant type. This value is generated by the client and presented to validate the original code challenge value the client passed at authorization time.
Value¶
A list with the following syntax:
list(
accessToken = "string",
tokenType = "string",
expiresIn = 123,
refreshToken = "string",
idToken = "string",
issuedTokenType = "string",
scope = list(
"string"
)
)
Request syntax¶
svc$create_token_with_iam(
clientId = "string",
grantType = "string",
code = "string",
refreshToken = "string",
assertion = "string",
scope = list(
"string"
),
redirectUri = "string",
subjectToken = "string",
subjectTokenType = "string",
requestedTokenType = "string",
codeVerifier = "string"
)
Examples¶
## Not run:
#
svc$create_token_with_iam(
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
code = "yJraWQiOiJrZXktMTU2Njk2ODA4OCIsImFsZyI6IkhTMzg0In0EXAMPLEAUTHCODE",
grantType = "authorization_code",
redirectUri = "https://mywebapp.example/redirect",
scope = list(
"openid",
"aws",
"sts:identity_context"
)
)
#
svc$create_token_with_iam(
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
grantType = "refresh_token",
refreshToken = "aorvJYubGpU6i91YnH7Mfo-AT2fIVa1zCfA_Rvq9yjVKIP3onFmmykuQ7..."
)
#
svc$create_token_with_iam(
assertion = "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6IjFMVE16YWtpaGlS...",
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
grantType = "urn:ietf:params:oauth:grant-type:jwt-bearer"
)
#
svc$create_token_with_iam(
clientId = "arn:aws:sso::123456789012:application/ssoins-111111111111/apl-222222222222",
grantType = "urn:ietf:params:oauth:grant-type:token-exchange",
requestedTokenType = "urn:ietf:params:oauth:token-type:access_token",
subjectToken = "aoak-Hig8TUDPNX1xZwOMXM5MxOWDL0E0jg9P6_C_jKQPxS_SKCP6f0kh...",
subjectTokenType = "urn:ietf:params:oauth:token-type:access_token"
)
## End(Not run)