UNPKG

@aws-sdk/client-cognito-identity-provider

Version:

AWS SDK for JavaScript Cognito Identity Provider Client for Node.js, Browser and React Native

132 lines (131 loc) 6.55 kB
import { Command as $Command } from "@smithy/smithy-client"; import { MetadataBearer as __MetadataBearer } from "@smithy/types"; import { CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../CognitoIdentityProviderClient"; import { VerifySoftwareTokenRequest, VerifySoftwareTokenResponse } from "../models/models_1"; /** * @public */ export type { __MetadataBearer }; export { $Command }; /** * @public * * The input for {@link VerifySoftwareTokenCommand}. */ export interface VerifySoftwareTokenCommandInput extends VerifySoftwareTokenRequest { } /** * @public * * The output of {@link VerifySoftwareTokenCommand}. */ export interface VerifySoftwareTokenCommandOutput extends VerifySoftwareTokenResponse, __MetadataBearer { } declare const VerifySoftwareTokenCommand_base: { new (input: VerifySoftwareTokenCommandInput): import("@smithy/smithy-client").CommandImpl<VerifySoftwareTokenCommandInput, VerifySoftwareTokenCommandOutput, CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>; new (input: VerifySoftwareTokenCommandInput): import("@smithy/smithy-client").CommandImpl<VerifySoftwareTokenCommandInput, VerifySoftwareTokenCommandOutput, CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>; getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions; }; /** * <p>Registers the current user's time-based one-time password (TOTP) authenticator * with a code generated in their authenticator app from a private key that's supplied * by your user pool. Marks the user's software token MFA status as "verified" if * successful. The request takes an access token or a session string, but not both.</p> * <note> * <p>Amazon Cognito doesn't evaluate Identity and Access Management (IAM) policies in requests for this API operation. For * this operation, you can't use IAM credentials to authorize requests, and you can't * grant IAM permissions in policies. For more information about authorization models in * Amazon Cognito, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html">Using the Amazon Cognito user pools API and user pool endpoints</a>.</p> * </note> * @example * Use a bare-bones client and the command you need to make an API call. * ```javascript * import { CognitoIdentityProviderClient, VerifySoftwareTokenCommand } from "@aws-sdk/client-cognito-identity-provider"; // ES Modules import * // const { CognitoIdentityProviderClient, VerifySoftwareTokenCommand } = require("@aws-sdk/client-cognito-identity-provider"); // CommonJS import * const client = new CognitoIdentityProviderClient(config); * const input = { // VerifySoftwareTokenRequest * AccessToken: "STRING_VALUE", * Session: "STRING_VALUE", * UserCode: "STRING_VALUE", // required * FriendlyDeviceName: "STRING_VALUE", * }; * const command = new VerifySoftwareTokenCommand(input); * const response = await client.send(command); * // { // VerifySoftwareTokenResponse * // Status: "SUCCESS" || "ERROR", * // Session: "STRING_VALUE", * // }; * * ``` * * @param VerifySoftwareTokenCommandInput - {@link VerifySoftwareTokenCommandInput} * @returns {@link VerifySoftwareTokenCommandOutput} * @see {@link VerifySoftwareTokenCommandInput} for command's `input` shape. * @see {@link VerifySoftwareTokenCommandOutput} for command's `response` shape. * @see {@link CognitoIdentityProviderClientResolvedConfig | config} for CognitoIdentityProviderClient's `config` shape. * * @throws {@link CodeMismatchException} (client fault) * <p>This exception is thrown if the provided code doesn't match what the server was * expecting.</p> * * @throws {@link EnableSoftwareTokenMFAException} (client fault) * <p>This exception is thrown when there is a code mismatch and the service fails to * configure the software token TOTP multi-factor authentication (MFA).</p> * * @throws {@link ForbiddenException} (client fault) * <p>This exception is thrown when WAF doesn't allow your request based on a web * ACL that's associated with your user pool.</p> * * @throws {@link InternalErrorException} (server fault) * <p>This exception is thrown when Amazon Cognito encounters an internal error.</p> * * @throws {@link InvalidParameterException} (client fault) * <p>This exception is thrown when the Amazon Cognito service encounters an invalid * parameter.</p> * * @throws {@link InvalidUserPoolConfigurationException} (client fault) * <p>This exception is thrown when the user pool configuration is not valid.</p> * * @throws {@link NotAuthorizedException} (client fault) * <p>This exception is thrown when a user isn't authorized.</p> * * @throws {@link PasswordResetRequiredException} (client fault) * <p>This exception is thrown when a password reset is required.</p> * * @throws {@link ResourceNotFoundException} (client fault) * <p>This exception is thrown when the Amazon Cognito service can't find the requested * resource.</p> * * @throws {@link SoftwareTokenMFANotFoundException} (client fault) * <p>This exception is thrown when the software token time-based one-time password (TOTP) * multi-factor authentication (MFA) isn't activated for the user pool.</p> * * @throws {@link TooManyRequestsException} (client fault) * <p>This exception is thrown when the user has made too many requests for a given * operation.</p> * * @throws {@link UserNotConfirmedException} (client fault) * <p>This exception is thrown when a user isn't confirmed successfully.</p> * * @throws {@link UserNotFoundException} (client fault) * <p>This exception is thrown when a user isn't found.</p> * * @throws {@link CognitoIdentityProviderServiceException} * <p>Base exception class for all service exceptions from CognitoIdentityProvider service.</p> * * * @public */ export declare class VerifySoftwareTokenCommand extends VerifySoftwareTokenCommand_base { /** @internal type navigation helper, not in runtime. */ protected static __types: { api: { input: VerifySoftwareTokenRequest; output: VerifySoftwareTokenResponse; }; sdk: { input: VerifySoftwareTokenCommandInput; output: VerifySoftwareTokenCommandOutput; }; }; }