From 07f9765e25fb60aea6a42c0ed9fdbf79d028b118 Mon Sep 17 00:00:00 2001
From: awstools Additional information that's used by a managed rule group. Most managed rule groups don't require this. Use this for the account takeover prevention managed rule group
* You can provide multiple individual Indicates whether the managed rule group is versioned. If it is, you can retrieve the versions list by calling ListAvailableManagedRuleGroupVersions. The description of the managed rule group, provided by Amazon Web Services Managed Rules or the Amazon Web Services Marketplace seller who manages it. The versions that are currently available for the specified managed rule group. The name of the version that's currently set as the default.
- * AWSManagedRulesATPRuleSet
, to provide information about the sign-in page of your application. ManagedRuleGroupConfig
objects for any rule group configuration, for example UsernameField
and PasswordField
. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: LoginPath
, PasswordField
, PayloadType
and UsernameField
.Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and wafv2:PutFirewallManagerRuleGroups
. WAF rejects any extra actions or wildcard actions in the policy.Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and
+ * wafv2:PutFirewallManagerRuleGroups
and may optionally specify wafv2:GetRuleGroup
.
+ * WAF rejects any extra actions or wildcard actions in the policy.
The policy must not include a Resource
parameter.
- * Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and wafv2:PutFirewallManagerRuleGroups
. WAF rejects any extra actions or wildcard actions in the policy.
Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and
+ * wafv2:PutFirewallManagerRuleGroups
and may optionally specify wafv2:GetRuleGroup
.
+ * WAF rejects any extra actions or wildcard actions in the policy.
* The policy must not include a Resource
parameter.
Additional information that's used by a managed rule group. Most managed rule groups don't require this.
*Use this for the account takeover prevention managed rule group
* AWSManagedRulesATPRuleSet
, to provide information about the sign-in page of your application.
You can provide multiple individual ManagedRuleGroupConfig
objects for any rule group configuration, for example UsernameField
and PasswordField
. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: LoginPath
, PasswordField
, PayloadType
and UsernameField
.
The versions that are currently available for the specified managed rule group.
" } + }, + "CurrentDefaultVersion": { + "target": "com.amazonaws.wafv2#VersionKeyString", + "traits": { + "smithy.api#documentation": "The name of the version that's currently set as the default.
" + } } } }, @@ -5302,7 +5317,7 @@ } }, "traits": { - "smithy.api#documentation": "Additional information that's used by a managed rule group. Most managed rule groups don't require this.
\nUse this for the account takeover prevention managed rule group \n AWSManagedRulesATPRuleSet
, to provide information about the sign-in page of your application.
Additional information that's used by a managed rule group. Most managed rule groups don't require this.
\nUse this for the account takeover prevention managed rule group \n AWSManagedRulesATPRuleSet
, to provide information about the sign-in page of your application.
You can provide multiple individual ManagedRuleGroupConfig
objects for any rule group configuration, for example UsernameField
and PasswordField
. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: LoginPath
, PasswordField
, PayloadType
and UsernameField
.
Additional information that's used by a managed rule group. Most managed rule groups don't require this.
\nUse this for the account takeover prevention managed rule group \n AWSManagedRulesATPRuleSet
, to provide information about the sign-in page of your application.
Additional information that's used by a managed rule group. Most managed rule groups don't require this.
\nUse this for the account takeover prevention managed rule group \n AWSManagedRulesATPRuleSet
, to provide information about the sign-in page of your application.
You can provide multiple individual ManagedRuleGroupConfig
objects for any rule group configuration, for example UsernameField
and PasswordField
. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: LoginPath
, PasswordField
, PayloadType
and UsernameField
.
The name of the managed rule group. You use this, along with the vendor name, to identify the rule group.
" } }, + "VersioningSupported": { + "target": "com.amazonaws.wafv2#Boolean", + "traits": { + "smithy.api#documentation": "Indicates whether the managed rule group is versioned. If it is, you can retrieve the versions list by calling ListAvailableManagedRuleGroupVersions.
" + } + }, "Description": { "target": "com.amazonaws.wafv2#EntityDescription", "traits": { @@ -6226,7 +6247,7 @@ "Policy": { "target": "com.amazonaws.wafv2#PolicyString", "traits": { - "smithy.api#documentation": "The policy to attach to the specified rule group.
\n \nThe policy specifications must conform to the following:
\nThe policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.
\nThe policy must include specifications for Effect
, Action
, and Principal
.
\n Effect
must specify Allow
.
\n Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and wafv2:PutFirewallManagerRuleGroups
. WAF rejects any extra actions or wildcard actions in the policy.
The policy must not include a Resource
parameter.
For more information, see IAM Policies.
", + "smithy.api#documentation": "The policy to attach to the specified rule group.
\n \nThe policy specifications must conform to the following:
\nThe policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.
\nThe policy must include specifications for Effect
, Action
, and Principal
.
\n Effect
must specify Allow
.
\n Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and \n wafv2:PutFirewallManagerRuleGroups
and may optionally specify wafv2:GetRuleGroup
. \n WAF rejects any extra actions or wildcard actions in the policy.
The policy must not include a Resource
parameter.
For more information, see IAM Policies.
", "smithy.api#required": {} } } @@ -8287,7 +8308,7 @@ } }, "traits": { - "smithy.api#documentation": "The operation failed because the specified policy isn't in the proper format.
\n \nThe policy specifications must conform to the following:
\nThe policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.
\nThe policy must include specifications for Effect
, Action
, and Principal
.
\n Effect
must specify Allow
.
\n Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and wafv2:PutFirewallManagerRuleGroups
. WAF rejects any extra actions or wildcard actions in the policy.
The policy must not include a Resource
parameter.
For more information, see IAM Policies.
", + "smithy.api#documentation": "The operation failed because the specified policy isn't in the proper format.
\n \nThe policy specifications must conform to the following:
\nThe policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.
\nThe policy must include specifications for Effect
, Action
, and Principal
.
\n Effect
must specify Allow
.
\n Action
must specify wafv2:CreateWebACL
, wafv2:UpdateWebACL
, and \n wafv2:PutFirewallManagerRuleGroups
and may optionally specify wafv2:GetRuleGroup
. \n WAF rejects any extra actions or wildcard actions in the policy.
The policy must not include a Resource
parameter.
For more information, see IAM Policies.
", "smithy.api#error": "client" } },