attach-managed-policy-to-permission-set | Attaches an IAM managed policy ARN to a permission set. If the permission set is already referenced by one or more account assignments, you will need to call ProvisionPermissionSet after this action to apply the corresponding IAM policy updates to all assigned accounts |
create-account-assignment | Assigns access to a principal for a specified AWS account using a specified permission set. The term principal here refers to a user or group that is defined in AWS SSO. As part of a successful CreateAccountAssignment call, the specified permission set will automatically be provisioned to the account in the form of an IAM policy attached to the SSO-created IAM role. If the permission set is subsequently updated, the corresponding IAM policies attached to roles in your accounts will not be updated automatically. In this case, you will need to call ProvisionPermissionSet to make these updates |
create-instance-access-control-attribute-configuration | Enables the attributes-based access control (ABAC) feature for the specified AWS SSO instance. You can also specify new attributes to add to your ABAC configuration during the enabling process. For more information about ABAC, see Attribute-Based Access Control in the AWS SSO User Guide |
create-permission-set | Creates a permission set within a specified SSO instance. To grant users and groups access to AWS account resources, use CreateAccountAssignment |
delete-account-assignment | Deletes a principal's access from a specified AWS account using a specified permission set |
delete-inline-policy-from-permission-set | Deletes the inline policy from a specified permission set |
delete-instance-access-control-attribute-configuration | Disables the attributes-based access control (ABAC) feature for the specified AWS SSO instance and deletes all of the attribute mappings that have been configured. Once deleted, any attributes that are received from an identity source and any custom attributes you have previously configured will not be passed. For more information about ABAC, see Attribute-Based Access Control in the AWS SSO User Guide |
delete-permission-set | Deletes the specified permission set |
describe-account-assignment-creation-status | Describes the status of the assignment creation request |
describe-account-assignment-deletion-status | Describes the status of the assignment deletion request |
describe-instance-access-control-attribute-configuration | Returns the list of AWS SSO identity store attributes that have been configured to work with attributes-based access control (ABAC) for the specified AWS SSO instance. This will not return attributes configured and sent by an external identity provider. For more information about ABAC, see Attribute-Based Access Control in the AWS SSO User Guide |
describe-permission-set | Gets the details of the permission set |
describe-permission-set-provisioning-status | Describes the status for the given permission set provisioning request |
detach-managed-policy-from-permission-set | Detaches the attached IAM managed policy ARN from the specified permission set |
get-inline-policy-for-permission-set | Obtains the inline policy assigned to the permission set |
list-account-assignment-creation-status | Lists the status of the AWS account assignment creation requests for a specified SSO instance |
list-account-assignment-deletion-status | Lists the status of the AWS account assignment deletion requests for a specified SSO instance |
list-account-assignments | Lists the assignee of the specified AWS account with the specified permission set |
list-accounts-for-provisioned-permission-set | Lists all the AWS accounts where the specified permission set is provisioned |
list-instances | Lists the SSO instances that the caller has access to |
list-managed-policies-in-permission-set | Lists the IAM managed policy that is attached to a specified permission set |
list-permission-set-provisioning-status | Lists the status of the permission set provisioning requests for a specified SSO instance |
list-permission-sets | Lists the PermissionSets in an SSO instance |
list-permission-sets-provisioned-to-account | Lists all the permission sets that are provisioned to a specified AWS account |
list-tags-for-resource | Lists the tags that are attached to a specified resource |
provision-permission-set | The process by which a specified permission set is provisioned to the specified target |
put-inline-policy-to-permission-set | Attaches an IAM inline policy to a permission set. If the permission set is already referenced by one or more account assignments, you will need to call ProvisionPermissionSet after this action to apply the corresponding IAM policy updates to all assigned accounts |
tag-resource | Associates a set of tags with a specified resource |
untag-resource | Disassociates a set of tags from a specified resource |
update-instance-access-control-attribute-configuration | Updates the AWS SSO identity store attributes to use with the AWS SSO instance for attributes-based access control (ABAC). When using an external identity provider as an identity source, you can pass attributes through the SAML assertion as an alternative to configuring attributes from the AWS SSO identity store. If a SAML assertion passes any of these attributes, AWS SSO will replace the attribute value with the value from the AWS SSO identity store. For more information about ABAC, see Attribute-Based Access Control in the AWS SSO User Guide |
update-permission-set | Updates an existing permission set |