UNPKG

@aws-sdk/client-cognito-identity-provider

Version:

AWS SDK for JavaScript Cognito Identity Provider Client for Node.js, Browser and React Native

166 lines (165 loc) 8.65 kB
import { Command as $Command } from "@smithy/smithy-client"; import { MetadataBearer as __MetadataBearer } from "@smithy/types"; import { CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../CognitoIdentityProviderClient"; import { SetUserPoolMfaConfigRequest, SetUserPoolMfaConfigResponse } from "../models/models_1"; /** * @public */ export type { __MetadataBearer }; export { $Command }; /** * @public * * The input for {@link SetUserPoolMfaConfigCommand}. */ export interface SetUserPoolMfaConfigCommandInput extends SetUserPoolMfaConfigRequest { } /** * @public * * The output of {@link SetUserPoolMfaConfigCommand}. */ export interface SetUserPoolMfaConfigCommandOutput extends SetUserPoolMfaConfigResponse, __MetadataBearer { } declare const SetUserPoolMfaConfigCommand_base: { new (input: SetUserPoolMfaConfigCommandInput): import("@smithy/smithy-client").CommandImpl<SetUserPoolMfaConfigCommandInput, SetUserPoolMfaConfigCommandOutput, CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>; new (input: SetUserPoolMfaConfigCommandInput): import("@smithy/smithy-client").CommandImpl<SetUserPoolMfaConfigCommandInput, SetUserPoolMfaConfigCommandOutput, CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>; getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions; }; /** * <p>Sets user pool multi-factor authentication (MFA) and passkey configuration. For more * information about user pool MFA, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa.html">Adding MFA</a>. For more information about WebAuthn passkeys see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-authentication-flow-methods.html#amazon-cognito-user-pools-authentication-flow-methods-passkey">Authentication flows</a>.</p> * <note> * <p>This action might generate an SMS text message. Starting June 1, 2021, US telecom carriers * require you to register an origination phone number before you can send SMS messages * to US phone numbers. If you use SMS text messages in Amazon Cognito, you must register a * phone number with <a href="https://console.aws.amazon.com/pinpoint/home/">Amazon Pinpoint</a>. * Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must * receive SMS messages might not be able to sign up, activate their accounts, or sign * in.</p> * <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service, * Amazon Simple Notification Service might place your account in the SMS sandbox. In <i> * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox * mode</a> * </i>, you can send messages only to verified phone * numbers. After you test your app while in the sandbox environment, you can move out * of the sandbox and into production. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-sms-settings.html"> SMS message settings for Amazon Cognito user pools</a> in the <i>Amazon Cognito * Developer Guide</i>.</p> * </note> * @example * Use a bare-bones client and the command you need to make an API call. * ```javascript * import { CognitoIdentityProviderClient, SetUserPoolMfaConfigCommand } from "@aws-sdk/client-cognito-identity-provider"; // ES Modules import * // const { CognitoIdentityProviderClient, SetUserPoolMfaConfigCommand } = require("@aws-sdk/client-cognito-identity-provider"); // CommonJS import * const client = new CognitoIdentityProviderClient(config); * const input = { // SetUserPoolMfaConfigRequest * UserPoolId: "STRING_VALUE", // required * SmsMfaConfiguration: { // SmsMfaConfigType * SmsAuthenticationMessage: "STRING_VALUE", * SmsConfiguration: { // SmsConfigurationType * SnsCallerArn: "STRING_VALUE", // required * ExternalId: "STRING_VALUE", * SnsRegion: "STRING_VALUE", * }, * }, * SoftwareTokenMfaConfiguration: { // SoftwareTokenMfaConfigType * Enabled: true || false, * }, * EmailMfaConfiguration: { // EmailMfaConfigType * Message: "STRING_VALUE", * Subject: "STRING_VALUE", * }, * MfaConfiguration: "OFF" || "ON" || "OPTIONAL", * WebAuthnConfiguration: { // WebAuthnConfigurationType * RelyingPartyId: "STRING_VALUE", * UserVerification: "required" || "preferred", * }, * }; * const command = new SetUserPoolMfaConfigCommand(input); * const response = await client.send(command); * // { // SetUserPoolMfaConfigResponse * // SmsMfaConfiguration: { // SmsMfaConfigType * // SmsAuthenticationMessage: "STRING_VALUE", * // SmsConfiguration: { // SmsConfigurationType * // SnsCallerArn: "STRING_VALUE", // required * // ExternalId: "STRING_VALUE", * // SnsRegion: "STRING_VALUE", * // }, * // }, * // SoftwareTokenMfaConfiguration: { // SoftwareTokenMfaConfigType * // Enabled: true || false, * // }, * // EmailMfaConfiguration: { // EmailMfaConfigType * // Message: "STRING_VALUE", * // Subject: "STRING_VALUE", * // }, * // MfaConfiguration: "OFF" || "ON" || "OPTIONAL", * // WebAuthnConfiguration: { // WebAuthnConfigurationType * // RelyingPartyId: "STRING_VALUE", * // UserVerification: "required" || "preferred", * // }, * // }; * * ``` * * @param SetUserPoolMfaConfigCommandInput - {@link SetUserPoolMfaConfigCommandInput} * @returns {@link SetUserPoolMfaConfigCommandOutput} * @see {@link SetUserPoolMfaConfigCommandInput} for command's `input` shape. * @see {@link SetUserPoolMfaConfigCommandOutput} for command's `response` shape. * @see {@link CognitoIdentityProviderClientResolvedConfig | config} for CognitoIdentityProviderClient's `config` shape. * * @throws {@link ConcurrentModificationException} (client fault) * <p>This exception is thrown if two or more modifications are happening * concurrently.</p> * * @throws {@link FeatureUnavailableInTierException} (client fault) * <p>This exception is thrown when a feature you attempted to configure isn't * available in your current feature plan.</p> * * @throws {@link InternalErrorException} (server fault) * <p>This exception is thrown when Amazon Cognito encounters an internal error.</p> * * @throws {@link InvalidParameterException} (client fault) * <p>This exception is thrown when the Amazon Cognito service encounters an invalid * parameter.</p> * * @throws {@link InvalidSmsRoleAccessPolicyException} (client fault) * <p>This exception is returned when the role provided for SMS configuration doesn't have * permission to publish using Amazon SNS.</p> * * @throws {@link InvalidSmsRoleTrustRelationshipException} (client fault) * <p>This exception is thrown when the trust relationship is not valid for the role * provided for SMS configuration. This can happen if you don't trust * <code>cognito-idp.amazonaws.com</code> or the external ID provided in the role does * not match what is provided in the SMS configuration for the user pool.</p> * * @throws {@link NotAuthorizedException} (client fault) * <p>This exception is thrown when a user isn't authorized.</p> * * @throws {@link ResourceNotFoundException} (client fault) * <p>This exception is thrown when the Amazon Cognito service can't find the requested * resource.</p> * * @throws {@link TooManyRequestsException} (client fault) * <p>This exception is thrown when the user has made too many requests for a given * operation.</p> * * @throws {@link CognitoIdentityProviderServiceException} * <p>Base exception class for all service exceptions from CognitoIdentityProvider service.</p> * * * @public */ export declare class SetUserPoolMfaConfigCommand extends SetUserPoolMfaConfigCommand_base { /** @internal type navigation helper, not in runtime. */ protected static __types: { api: { input: SetUserPoolMfaConfigRequest; output: SetUserPoolMfaConfigResponse; }; sdk: { input: SetUserPoolMfaConfigCommandInput; output: SetUserPoolMfaConfigCommandOutput; }; }; }