lib/aws/generated/iam.ex

# WARNING: DO NOT EDIT, AUTO-GENERATED CODE!
# See https://github.com/aws-beam/aws-codegen for more details.

defmodule AWS.IAM do
  @moduledoc """
  Identity and Access Management

  Identity and Access Management (IAM) is a web service for securely controlling
  access to Amazon Web Services services.

  With IAM, you can centrally manage users, security credentials such as access
  keys, and permissions that control which Amazon Web Services resources users and
  applications can access. For more information about IAM, see [Identity and Access Management (IAM)](http://aws.amazon.com/iam/) and the [Identity and Access Management User
  Guide](https://docs.aws.amazon.com/IAM/latest/UserGuide/).
  """

  alias AWS.Client
  alias AWS.Request

  def metadata do
    %AWS.ServiceMetadata{
      abbreviation: "IAM",
      api_version: "2010-05-08",
      content_type: "application/x-www-form-urlencoded",
      credential_scope: "us-east-1",
      endpoint_prefix: "iam",
      global?: true,
      protocol: "query",
      service_id: "IAM",
      signature_version: "v4",
      signing_name: "iam",
      target_prefix: nil
    }
  end

  @doc """
  Adds a new client ID (also known as audience) to the list of client IDs already
  registered for the specified IAM OpenID Connect (OIDC) provider resource.

  This operation is idempotent; it does not fail or return an error if you add an
  existing client ID to the provider.
  """
  def add_client_id_to_open_id_connect_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "AddClientIDToOpenIDConnectProvider", input, options)
  end

  @doc """
  Adds the specified IAM role to the specified instance profile.

  An instance profile can contain only one role, and this quota cannot be
  increased. You can remove the existing role and then add a different role to an
  instance profile. You must then wait for the change to appear across all of
  Amazon Web Services because of [eventual consistency](https://en.wikipedia.org/wiki/Eventual_consistency). To force the
  change, you must [disassociate the instance profile](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DisassociateIamInstanceProfile.html)
  and then [associate the instance profile](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_AssociateIamInstanceProfile.html),
  or you can stop your instance and then restart it.

  The caller of this operation must be granted the `PassRole` permission on the
  IAM role by a permissions policy.

  For more information about roles, see [Working with roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html).
  For more information about instance profiles, see [About instance profiles](https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html).
  """
  def add_role_to_instance_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "AddRoleToInstanceProfile", input, options)
  end

  @doc """
  Adds the specified user to the specified group.
  """
  def add_user_to_group(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "AddUserToGroup", input, options)
  end

  @doc """
  Attaches the specified managed policy to the specified IAM group.

  You use this operation to attach a managed policy to a group. To embed an inline
  policy in a group, use `PutGroupPolicy`.

  As a best practice, you can validate your IAM policies. To learn more, see
  [Validating IAM policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_policy-validator.html)
  in the *IAM User Guide*.

  For more information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def attach_group_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "AttachGroupPolicy", input, options)
  end

  @doc """
  Attaches the specified managed policy to the specified IAM role.

  When you attach a managed policy to a role, the managed policy becomes part of
  the role's permission (access) policy.

  You cannot use a managed policy as the role's trust policy. The role's trust
  policy is created at the same time as the role, using `CreateRole`. You can
  update a role's trust policy using `UpdateAssumeRolePolicy`.

  Use this operation to attach a *managed* policy to a role. To embed an inline
  policy in a role, use `PutRolePolicy`. For more information about policies, see
  [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  As a best practice, you can validate your IAM policies. To learn more, see
  [Validating IAM policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_policy-validator.html)
  in the *IAM User Guide*.
  """
  def attach_role_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "AttachRolePolicy", input, options)
  end

  @doc """
  Attaches the specified managed policy to the specified user.

  You use this operation to attach a *managed* policy to a user. To embed an
  inline policy in a user, use `PutUserPolicy`.

  As a best practice, you can validate your IAM policies. To learn more, see
  [Validating IAM policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_policy-validator.html)
  in the *IAM User Guide*.

  For more information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def attach_user_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "AttachUserPolicy", input, options)
  end

  @doc """
  Changes the password of the IAM user who is calling this operation.

  This operation can be performed using the CLI, the Amazon Web Services API, or
  the **My Security Credentials** page in the Amazon Web Services Management
  Console. The Amazon Web Services account root user password is not affected by
  this operation.

  Use `UpdateLoginProfile` to use the CLI, the Amazon Web Services API, or the
  **Users** page in the IAM console to change the password for any IAM user. For
  more information about modifying passwords, see [Managing passwords](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html)
  in the *IAM User Guide*.
  """
  def change_password(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ChangePassword", input, options)
  end

  @doc """
  Creates a new Amazon Web Services secret access key and corresponding Amazon Web
  Services access key ID for the specified user.

  The default status for new keys is `Active`.

  If you do not specify a user name, IAM determines the user name implicitly based
  on the Amazon Web Services access key ID signing the request. This operation
  works for access keys under the Amazon Web Services account. Consequently, you
  can use this operation to manage Amazon Web Services account root user
  credentials. This is true even if the Amazon Web Services account has no
  associated users.

  For information about quotas on the number of keys you can create, see [IAM and STS
  quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.

  To ensure the security of your Amazon Web Services account, the secret access
  key is accessible only during key and user creation. You must save the key (for
  example, in a text file) if you want to be able to access it again. If a secret
  key is lost, you can delete the access keys for the associated user and then
  create new keys.
  """
  def create_access_key(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateAccessKey", input, options)
  end

  @doc """
  Creates an alias for your Amazon Web Services account.

  For information about using an Amazon Web Services account alias, see [Using an alias for your Amazon Web Services account
  ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAlias.html) in the
  *IAM User Guide*.
  """
  def create_account_alias(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateAccountAlias", input, options)
  end

  @doc """
  Creates a new group.

  For information about the number of groups you can create, see [IAM and STS quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.
  """
  def create_group(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateGroup", input, options)
  end

  @doc """
  Creates a new instance profile.

  For information about instance profiles, see [Using roles for applications on Amazon
  EC2](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2.html)
  in the *IAM User Guide*, and [Instance profiles](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html#ec2-instance-profile)
  in the *Amazon EC2 User Guide*.

  For information about the number of instance profiles you can create, see [IAM object
  quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.
  """
  def create_instance_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateInstanceProfile", input, options)
  end

  @doc """
  Creates a password for the specified IAM user.

  A password allows an IAM user to access Amazon Web Services services through the
  Amazon Web Services Management Console.

  You can use the CLI, the Amazon Web Services API, or the **Users** page in the
  IAM console to create a password for any IAM user. Use `ChangePassword` to
  update your own existing password in the **My Security Credentials** page in the
  Amazon Web Services Management Console.

  For more information about managing passwords, see [Managing passwords](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html)
  in the *IAM User Guide*.
  """
  def create_login_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateLoginProfile", input, options)
  end

  @doc """
  Creates an IAM entity to describe an identity provider (IdP) that supports
  [OpenID Connect (OIDC)](http://openid.net/connect/).   The OIDC provider that you create with this operation can be used as a principal
  in a role's trust policy. Such a policy establishes a trust relationship between
  Amazon Web Services and the OIDC provider.

  If you are using an OIDC identity provider from Google, Facebook, or Amazon
  Cognito, you don't need to create a separate IAM identity provider. These OIDC
  identity providers are already built-in to Amazon Web Services and are available
  for your use. Instead, you can move directly to creating new roles using your
  identity provider. To learn more, see [Creating a role for web identity or
  OpenID connect
  federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html)
  in the *IAM User Guide*.

  When you create the IAM OIDC provider, you specify the following:

    * The URL of the OIDC identity provider (IdP) to trust

    * A list of client IDs (also known as audiences) that identify the
  application or applications allowed to authenticate using the OIDC provider

    * A list of thumbprints of one or more server certificates that the
  IdP uses

  You get all of this information from the OIDC IdP you want to use to access
  Amazon Web Services.

  Amazon Web Services secures communication with some OIDC identity providers
  (IdPs) through our library of trusted certificate authorities (CAs) instead of
  using a certificate thumbprint to verify your IdP server certificate. These OIDC
  IdPs include Google, and those that use an Amazon S3 bucket to host a JSON Web
  Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your
  configuration, but is no longer used for validation.

  The trust for the OIDC provider is derived from the IAM provider that this
  operation creates. Therefore, it is best to limit access to the
  `CreateOpenIDConnectProvider` operation to highly privileged users.
  """
  def create_open_id_connect_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateOpenIDConnectProvider", input, options)
  end

  @doc """
  Creates a new managed policy for your Amazon Web Services account.

  This operation creates a policy version with a version identifier of `v1` and
  sets v1 as the policy's default version. For more information about policy
  versions, see [Versioning for managed policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html)
  in the *IAM User Guide*.

  As a best practice, you can validate your IAM policies. To learn more, see
  [Validating IAM policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_policy-validator.html)
  in the *IAM User Guide*.

  For more information about managed policies in general, see [Managed policies and inline
  policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def create_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreatePolicy", input, options)
  end

  @doc """
  Creates a new version of the specified managed policy.

  To update a managed policy, you create a new policy version. A managed policy
  can have up to five versions. If the policy has five versions, you must delete
  an existing version using `DeletePolicyVersion` before you create a new version.

  Optionally, you can set the new version as the policy's default version. The
  default version is the version that is in effect for the IAM users, groups, and
  roles to which the policy is attached.

  For more information about managed policy versions, see [Versioning for managed policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html)
  in the *IAM User Guide*.
  """
  def create_policy_version(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreatePolicyVersion", input, options)
  end

  @doc """
  Creates a new role for your Amazon Web Services account.

  For more information about roles, see [IAM roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html).
  For information about quotas for role names and the number of roles you can
  create, see [IAM and STS quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.
  """
  def create_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateRole", input, options)
  end

  @doc """
  Creates an IAM resource that describes an identity provider (IdP) that supports
  SAML 2.0.

  The SAML provider resource that you create with this operation can be used as a
  principal in an IAM role's trust policy. Such a policy can enable federated
  users who sign in using the SAML IdP to assume the role. You can create an IAM
  role that supports Web-based single sign-on (SSO) to the Amazon Web Services
  Management Console or one that supports API access to Amazon Web Services.

  When you create the SAML provider resource, you upload a SAML metadata document
  that you get from your IdP. That document includes the issuer's name, expiration
  information, and keys that can be used to validate the SAML authentication
  response (assertions) that the IdP sends. You must generate the metadata
  document using the identity management software that is used as your
  organization's IdP.

  This operation requires [Signature Version 4](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html).

  For more information, see [Enabling SAML 2.0 federated users to access the Amazon Web Services Management
  Console](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-saml.html)
  and [About SAML 2.0-based federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html)
  in the *IAM User Guide*.
  """
  def create_saml_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateSAMLProvider", input, options)
  end

  @doc """
  Creates an IAM role that is linked to a specific Amazon Web Services service.

  The service controls the attached policies and when the role can be deleted.
  This helps ensure that the service is not broken by an unexpectedly changed or
  deleted role, which could put your Amazon Web Services resources into an unknown
  state. Allowing the service to control the role helps improve service stability
  and proper cleanup when a service and its role are no longer needed. For more
  information, see [Using service-linked roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/using-service-linked-roles.html)
  in the *IAM User Guide*.

  To attach a policy to this service-linked role, you must make the request using
  the Amazon Web Services service that depends on this role.
  """
  def create_service_linked_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateServiceLinkedRole", input, options)
  end

  @doc """
  Generates a set of credentials consisting of a user name and password that can
  be used to access the service specified in the request.

  These credentials are generated by IAM, and can be used only for the specified
  service.

  You can have a maximum of two sets of service-specific credentials for each
  supported service per user.

  You can create service-specific credentials for CodeCommit and Amazon Keyspaces
  (for Apache Cassandra).

  You can reset the password to a new service-generated value by calling
  `ResetServiceSpecificCredential`.

  For more information about service-specific credentials, see [Using IAM with CodeCommit: Git credentials, SSH keys, and Amazon Web Services access
  keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_ssh-keys.html)
  in the *IAM User Guide*.
  """
  def create_service_specific_credential(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateServiceSpecificCredential", input, options)
  end

  @doc """
  Creates a new IAM user for your Amazon Web Services account.

  For information about quotas for the number of IAM users you can create, see
  [IAM and STS quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.
  """
  def create_user(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateUser", input, options)
  end

  @doc """
  Creates a new virtual MFA device for the Amazon Web Services account.

  After creating the virtual MFA, use `EnableMFADevice` to attach the MFA device
  to an IAM user. For more information about creating and working with virtual MFA
  devices, see [Using a virtual MFA device](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html)
  in the *IAM User Guide*.

  For information about the maximum number of MFA devices you can create, see [IAM and STS
  quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.

  The seed information contained in the QR code and the Base32 string should be
  treated like any other secret access information. In other words, protect the
  seed information as you would your Amazon Web Services access keys or your
  passwords. After you provision your virtual device, you should ensure that the
  information is destroyed following secure procedures.
  """
  def create_virtual_mfa_device(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "CreateVirtualMFADevice", input, options)
  end

  @doc """
  Deactivates the specified MFA device and removes it from association with the
  user name for which it was originally enabled.

  For more information about creating and working with virtual MFA devices, see
  [Enabling a virtual multi-factor authentication (MFA) device](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html)
  in the *IAM User Guide*.
  """
  def deactivate_mfa_device(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeactivateMFADevice", input, options)
  end

  @doc """
  Deletes the access key pair associated with the specified IAM user.

  If you do not specify a user name, IAM determines the user name implicitly based
  on the Amazon Web Services access key ID signing the request. This operation
  works for access keys under the Amazon Web Services account. Consequently, you
  can use this operation to manage Amazon Web Services account root user
  credentials even if the Amazon Web Services account has no associated users.
  """
  def delete_access_key(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteAccessKey", input, options)
  end

  @doc """
  Deletes the specified Amazon Web Services account alias.

  For information about using an Amazon Web Services account alias, see [Using an alias for your Amazon Web Services account
  ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAlias.html) in the
  *IAM User Guide*.
  """
  def delete_account_alias(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteAccountAlias", input, options)
  end

  @doc """
  Deletes the password policy for the Amazon Web Services account.

  There are no parameters.
  """
  def delete_account_password_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteAccountPasswordPolicy", input, options)
  end

  @doc """
  Deletes the specified IAM group.

  The group must not contain any users or have any attached policies.
  """
  def delete_group(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteGroup", input, options)
  end

  @doc """
  Deletes the specified inline policy that is embedded in the specified IAM group.

  A group can also have managed policies attached to it. To detach a managed
  policy from a group, use `DetachGroupPolicy`. For more information about
  policies, refer to [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def delete_group_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteGroupPolicy", input, options)
  end

  @doc """
  Deletes the specified instance profile.

  The instance profile must not have an associated role.

  Make sure that you do not have any Amazon EC2 instances running with the
  instance profile you are about to delete. Deleting a role or instance profile
  that is associated with a running instance will break any applications running
  on the instance.

  For more information about instance profiles, see [About instance profiles](https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html).
  """
  def delete_instance_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteInstanceProfile", input, options)
  end

  @doc """
  Deletes the password for the specified IAM user, which terminates the user's
  ability to access Amazon Web Services services through the Amazon Web Services
  Management Console.

  You can use the CLI, the Amazon Web Services API, or the **Users** page in the
  IAM console to delete a password for any IAM user. You can use `ChangePassword`
  to update, but not delete, your own password in the ## My Security Credentials
  page in the Amazon Web Services Management Console.

  Deleting a user's password does not prevent a user from accessing Amazon Web
  Services through the command line interface or the API. To prevent all user
  access, you must also either make any access keys inactive or delete them. For
  more information about making keys inactive or deleting them, see
  `UpdateAccessKey` and `DeleteAccessKey`.
  """
  def delete_login_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteLoginProfile", input, options)
  end

  @doc """
  Deletes an OpenID Connect identity provider (IdP) resource object in IAM.

  Deleting an IAM OIDC provider resource does not update any roles that reference
  the provider as a principal in their trust policies. Any attempt to assume a
  role that references a deleted provider fails.

  This operation is idempotent; it does not fail or return an error if you call
  the operation for a provider that does not exist.
  """
  def delete_open_id_connect_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteOpenIDConnectProvider", input, options)
  end

  @doc """
  Deletes the specified managed policy.

  Before you can delete a managed policy, you must first detach the policy from
  all users, groups, and roles that it is attached to. In addition, you must
  delete all the policy's versions. The following steps describe the process for
  deleting a managed policy:

    * Detach the policy from all users, groups, and roles that the
  policy is attached to, using `DetachUserPolicy`, `DetachGroupPolicy`, or
  `DetachRolePolicy`. To list all the users, groups, and roles that a policy is
  attached to, use `ListEntitiesForPolicy`.

    * Delete all versions of the policy using `DeletePolicyVersion`. To
  list the policy's versions, use `ListPolicyVersions`. You cannot use
  `DeletePolicyVersion` to delete the version that is marked as the default
  version. You delete the policy's default version in the next step of the
  process.

    * Delete the policy (this automatically deletes the policy's default
  version) using this operation.

  For information about managed policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def delete_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeletePolicy", input, options)
  end

  @doc """
  Deletes the specified version from the specified managed policy.

  You cannot delete the default version from a policy using this operation. To
  delete the default version from a policy, use `DeletePolicy`. To find out which
  version of a policy is marked as the default version, use `ListPolicyVersions`.

  For information about versions for managed policies, see [Versioning for managed policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html)
  in the *IAM User Guide*.
  """
  def delete_policy_version(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeletePolicyVersion", input, options)
  end

  @doc """
  Deletes the specified role.

  The role must not have any policies attached. For more information about roles,
  see [Working with roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html).

  Make sure that you do not have any Amazon EC2 instances running with the role
  you are about to delete. Deleting a role or instance profile that is associated
  with a running instance will break any applications running on the instance.
  """
  def delete_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteRole", input, options)
  end

  @doc """
  Deletes the permissions boundary for the specified IAM role.

  Deleting the permissions boundary for a role might increase its permissions. For
  example, it might allow anyone who assumes the role to perform all the actions
  granted in its permissions policies.
  """
  def delete_role_permissions_boundary(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteRolePermissionsBoundary", input, options)
  end

  @doc """
  Deletes the specified inline policy that is embedded in the specified IAM role.

  A role can also have managed policies attached to it. To detach a managed policy
  from a role, use `DetachRolePolicy`. For more information about policies, refer
  to [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def delete_role_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteRolePolicy", input, options)
  end

  @doc """
  Deletes a SAML provider resource in IAM.

  Deleting the provider resource from IAM does not update any roles that reference
  the SAML provider resource's ARN as a principal in their trust policies. Any
  attempt to assume a role that references a non-existent provider resource ARN
  fails.

  This operation requires [Signature Version 4](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html).
  """
  def delete_saml_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteSAMLProvider", input, options)
  end

  @doc """
  Deletes the specified server certificate.

  For more information about working with server certificates, see [Working with server
  certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*. This topic also includes a list of Amazon Web Services
  services that can use the server certificates that you manage with IAM.

  If you are using a server certificate with Elastic Load Balancing, deleting the
  certificate could have implications for your application. If Elastic Load
  Balancing doesn't detect the deletion of bound certificates, it may continue to
  use the certificates. This could cause Elastic Load Balancing to stop accepting
  traffic. We recommend that you remove the reference to the certificate from
  Elastic Load Balancing before using this command to delete the certificate. For
  more information, see
  [DeleteLoadBalancerListeners](https://docs.aws.amazon.com/ElasticLoadBalancing/latest/APIReference/API_DeleteLoadBalancerListeners.html)
  in the *Elastic Load Balancing API Reference*.
  """
  def delete_server_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteServerCertificate", input, options)
  end

  @doc """
  Submits a service-linked role deletion request and returns a `DeletionTaskId`,
  which you can use to check the status of the deletion.

  Before you call this operation, confirm that the role has no active sessions and
  that any resources used by the role in the linked service are deleted. If you
  call this operation more than once for the same service-linked role and an
  earlier deletion task is not complete, then the `DeletionTaskId` of the earlier
  request is returned.

  If you submit a deletion request for a service-linked role whose linked service
  is still accessing a resource, then the deletion task fails. If it fails, the
  `GetServiceLinkedRoleDeletionStatus` operation returns the reason for the
  failure, usually including the resources that must be deleted. To delete the
  service-linked role, you must first remove those resources from the linked
  service and then submit the deletion request again. Resources are specific to
  the service that is linked to the role. For more information about removing
  resources from a service, see the [Amazon Web Services documentation](http://docs.aws.amazon.com/) for your service.

  For more information about service-linked roles, see [Roles terms and concepts: Amazon Web Services service-linked
  role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html#iam-term-service-linked-role)
  in the *IAM User Guide*.
  """
  def delete_service_linked_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteServiceLinkedRole", input, options)
  end

  @doc """
  Deletes the specified service-specific credential.
  """
  def delete_service_specific_credential(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteServiceSpecificCredential", input, options)
  end

  @doc """
  Deletes a signing certificate associated with the specified IAM user.

  If you do not specify a user name, IAM determines the user name implicitly based
  on the Amazon Web Services access key ID signing the request. This operation
  works for access keys under the Amazon Web Services account. Consequently, you
  can use this operation to manage Amazon Web Services account root user
  credentials even if the Amazon Web Services account has no associated IAM users.
  """
  def delete_signing_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteSigningCertificate", input, options)
  end

  @doc """
  Deletes the specified SSH public key.

  The SSH public key deleted by this operation is used only for authenticating the
  associated IAM user to an CodeCommit repository. For more information about
  using SSH keys to authenticate to an CodeCommit repository, see [Set up CodeCommit for SSH
  connections](https://docs.aws.amazon.com/codecommit/latest/userguide/setting-up-credentials-ssh.html)
  in the *CodeCommit User Guide*.
  """
  def delete_ssh_public_key(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteSSHPublicKey", input, options)
  end

  @doc """
  Deletes the specified IAM user.

  Unlike the Amazon Web Services Management Console, when you delete a user
  programmatically, you must delete the items attached to the user manually, or
  the deletion fails. For more information, see [Deleting an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting_cli).
  Before attempting to delete a user, remove the following items:

    * Password (`DeleteLoginProfile`)

    * Access keys (`DeleteAccessKey`)

    * Signing certificate (`DeleteSigningCertificate`)

    * SSH public key (`DeleteSSHPublicKey`)

    * Git credentials (`DeleteServiceSpecificCredential`)

    * Multi-factor authentication (MFA) device (`DeactivateMFADevice`,
  `DeleteVirtualMFADevice`)

    * Inline policies (`DeleteUserPolicy`)

    * Attached managed policies (`DetachUserPolicy`)

    * Group memberships (`RemoveUserFromGroup`)
  """
  def delete_user(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteUser", input, options)
  end

  @doc """
  Deletes the permissions boundary for the specified IAM user.

  Deleting the permissions boundary for a user might increase its permissions by
  allowing the user to perform all the actions granted in its permissions
  policies.
  """
  def delete_user_permissions_boundary(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteUserPermissionsBoundary", input, options)
  end

  @doc """
  Deletes the specified inline policy that is embedded in the specified IAM user.

  A user can also have managed policies attached to it. To detach a managed policy
  from a user, use `DetachUserPolicy`. For more information about policies, refer
  to [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def delete_user_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteUserPolicy", input, options)
  end

  @doc """
  Deletes a virtual MFA device.

  You must deactivate a user's virtual MFA device before you can delete it. For
  information about deactivating MFA devices, see `DeactivateMFADevice`.
  """
  def delete_virtual_mfa_device(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DeleteVirtualMFADevice", input, options)
  end

  @doc """
  Removes the specified managed policy from the specified IAM group.

  A group can also have inline policies embedded with it. To delete an inline
  policy, use `DeleteGroupPolicy`. For information about policies, see [Managed policies and inline
  policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def detach_group_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DetachGroupPolicy", input, options)
  end

  @doc """
  Removes the specified managed policy from the specified role.

  A role can also have inline policies embedded with it. To delete an inline
  policy, use `DeleteRolePolicy`. For information about policies, see [Managed policies and inline
  policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def detach_role_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DetachRolePolicy", input, options)
  end

  @doc """
  Removes the specified managed policy from the specified user.

  A user can also have inline policies embedded with it. To delete an inline
  policy, use `DeleteUserPolicy`. For information about policies, see [Managed policies and inline
  policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def detach_user_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "DetachUserPolicy", input, options)
  end

  @doc """
  Enables the specified MFA device and associates it with the specified IAM user.

  When enabled, the MFA device is required for every subsequent login by the IAM
  user associated with the device.
  """
  def enable_mfa_device(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "EnableMFADevice", input, options)
  end

  @doc """
  Generates a credential report for the Amazon Web Services account.

  For more information about the credential report, see [Getting credential reports](https://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html)
  in the *IAM User Guide*.
  """
  def generate_credential_report(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GenerateCredentialReport", input, options)
  end

  @doc """
  Generates a report for service last accessed data for Organizations.

  You can generate a report for any entities (organization root, organizational
  unit, or account) or policies in your organization.

  To call this operation, you must be signed in using your Organizations
  management account credentials. You can use your long-term IAM user or root user
  credentials, or temporary credentials from assuming an IAM role. SCPs must be
  enabled for your organization root. You must have the required IAM and
  Organizations permissions. For more information, see [Refining permissions using service last accessed
  data](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html)
  in the *IAM User Guide*.

  You can generate a service last accessed data report for entities by specifying
  only the entity's path. This data includes a list of services that are allowed
  by any service control policies (SCPs) that apply to the entity.

  You can generate a service last accessed data report for a policy by specifying
  an entity's path and an optional Organizations policy ID. This data includes a
  list of services that are allowed by the specified SCP.

  For each service in both report types, the data includes the most recent account
  activity that the policy allows to account principals in the entity or the
  entity's children. For important information about the data, reporting period,
  permissions required, troubleshooting, and supported Regions see [Reducing permissions using service last accessed
  data](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html)
  in the *IAM User Guide*.

  The data includes all attempts to access Amazon Web Services, not just the
  successful ones. This includes all attempts that were made using the Amazon Web
  Services Management Console, the Amazon Web Services API through any of the
  SDKs, or any of the command line tools. An unexpected entry in the service last
  accessed data does not mean that an account has been compromised, because the
  request might have been denied. Refer to your CloudTrail logs as the
  authoritative source for information about all API calls and whether they were
  successful or denied access. For more information, see [Logging IAM events with CloudTrail](https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html)
  in the *IAM User Guide*.

  This operation returns a `JobId`. Use this parameter in the `
  `GetOrganizationsAccessReport` ` operation to check the status of the report
  generation. To check the status of this request, use the `JobId` parameter in
  the ` `GetOrganizationsAccessReport` ` operation and test the `JobStatus`
  response parameter. When the job is complete, you can retrieve the report.

  To generate a service last accessed data report for entities, specify an entity
  path without specifying the optional Organizations policy ID. The type of entity
  that you specify determines the data returned in the report.

    * **Root** – When you specify the organizations root as the entity,
  the resulting report lists all of the services allowed by SCPs that are attached
  to your root. For each service, the report includes data for all accounts in
  your organization except the management account, because the management account
  is not limited by SCPs.

    * **OU** – When you specify an organizational unit (OU) as the
  entity, the resulting report lists all of the services allowed by SCPs that are
  attached to the OU and its parents. For each service, the report includes data
  for all accounts in the OU or its children. This data excludes the management
  account, because the management account is not limited by SCPs.

    * **management account** – When you specify the management account,
  the resulting report lists all Amazon Web Services services, because the
  management account is not limited by SCPs. For each service, the report includes
  data for only the management account.

    * **Account** – When you specify another account as the entity, the
  resulting report lists all of the services allowed by SCPs that are attached to
  the account and its parents. For each service, the report includes data for only
  the specified account.

  To generate a service last accessed data report for policies, specify an entity
  path and the optional Organizations policy ID. The type of entity that you
  specify determines the data returned for each service.

    * **Root** – When you specify the root entity and a policy ID, the
  resulting report lists all of the services that are allowed by the specified
  SCP. For each service, the report includes data for all accounts in your
  organization to which the SCP applies. This data excludes the management
  account, because the management account is not limited by SCPs. If the SCP is
  not attached to any entities in the organization, then the report will return a
  list of services with no data.

    * **OU** – When you specify an OU entity and a policy ID, the
  resulting report lists all of the services that are allowed by the specified
  SCP. For each service, the report includes data for all accounts in the OU or
  its children to which the SCP applies. This means that other accounts outside
  the OU that are affected by the SCP might not be included in the data. This data
  excludes the management account, because the management account is not limited
  by SCPs. If the SCP is not attached to the OU or one of its children, the report
  will return a list of services with no data.

    * **management account** – When you specify the management account,
  the resulting report lists all Amazon Web Services services, because the
  management account is not limited by SCPs. If you specify a policy ID in the CLI
  or API, the policy is ignored. For each service, the report includes data for
  only the management account.

    * **Account** – When you specify another account entity and a policy
  ID, the resulting report lists all of the services that are allowed by the
  specified SCP. For each service, the report includes data for only the specified
  account. This means that other accounts in the organization that are affected by
  the SCP might not be included in the data. If the SCP is not attached to the
  account, the report will return a list of services with no data.

  Service last accessed data does not use other policy types when determining
  whether a principal could access a service. These other policy types include
  identity-based policies, resource-based policies, access control lists, IAM
  permissions boundaries, and STS assume role policies. It only applies SCP logic.
  For more about the evaluation of policy types, see [Evaluating policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics)
  in the *IAM User Guide*.

  For more information about service last accessed data, see [Reducing policy scope by viewing user
  activity](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html)
  in the *IAM User Guide*.
  """
  def generate_organizations_access_report(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GenerateOrganizationsAccessReport", input, options)
  end

  @doc """
  Generates a report that includes details about when an IAM resource (user,
  group, role, or policy) was last used in an attempt to access Amazon Web
  Services services.

  Recent activity usually appears within four hours. IAM reports activity for the
  last 365 days, or less if your Region began supporting this feature within the
  last year. For more information, see [Regions where data is tracked](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#access-advisor_tracking-period).

  The service last accessed data includes all attempts to access an Amazon Web
  Services API, not just the successful ones. This includes all attempts that were
  made using the Amazon Web Services Management Console, the Amazon Web Services
  API through any of the SDKs, or any of the command line tools. An unexpected
  entry in the service last accessed data does not mean that your account has been
  compromised, because the request might have been denied. Refer to your
  CloudTrail logs as the authoritative source for information about all API calls
  and whether they were successful or denied access. For more information,
  see [Logging IAM events with CloudTrail](https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html)
  in the *IAM User Guide*.

  The `GenerateServiceLastAccessedDetails` operation returns a `JobId`. Use this
  parameter in the following operations to retrieve the following details from
  your report:

    * `GetServiceLastAccessedDetails` – Use this operation for users,
  groups, roles, or policies to list every Amazon Web Services service that the
  resource could access using permissions policies. For each service, the response
  includes information about the most recent access attempt.

  The `JobId` returned by `GenerateServiceLastAccessedDetail` must be used by the
  same role within a session, or by the same user when used to call
  `GetServiceLastAccessedDetail`.

    * `GetServiceLastAccessedDetailsWithEntities` – Use this operation
  for groups and policies to list information about the associated entities (users
  or roles) that attempted to access a specific Amazon Web Services service.

  To check the status of the `GenerateServiceLastAccessedDetails` request, use the
  `JobId` parameter in the same operations and test the `JobStatus` response
  parameter.

  For additional information about the permissions policies that allow an identity
  (user, group, or role) to access specific services, use the
  `ListPoliciesGrantingServiceAccess` operation.

  Service last accessed data does not use other policy types when determining
  whether a resource could access a service. These other policy types include
  resource-based policies, access control lists, Organizations policies, IAM
  permissions boundaries, and STS assume role policies. It only applies
  permissions policy logic. For more about the evaluation of policy types, see
  [Evaluating policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics)
  in the *IAM User Guide*.

  For more information about service and action last accessed data, see [Reducing permissions using service last accessed
  data](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html)
  in the *IAM User Guide*.
  """
  def generate_service_last_accessed_details(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GenerateServiceLastAccessedDetails", input, options)
  end

  @doc """
  Retrieves information about when the specified access key was last used.

  The information includes the date and time of last use, along with the Amazon
  Web Services service and Region that were specified in the last request made
  with that key.
  """
  def get_access_key_last_used(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetAccessKeyLastUsed", input, options)
  end

  @doc """
  Retrieves information about all IAM users, groups, roles, and policies in your
  Amazon Web Services account, including their relationships to one another.

  Use this operation to obtain a snapshot of the configuration of IAM permissions
  (users, groups, roles, and policies) in your account.

  Policies returned by this operation are URL-encoded compliant with [RFC 3986](https://tools.ietf.org/html/rfc3986). You can use a URL decoding method to
  convert the policy back to plain JSON text. For example, if you use Java, you
  can use the `decode` method of the `java.net.URLDecoder` utility class in the
  Java SDK. Other languages and SDKs provide similar functionality.

  You can optionally filter the results using the `Filter` parameter. You can
  paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def get_account_authorization_details(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetAccountAuthorizationDetails", input, options)
  end

  @doc """
  Retrieves the password policy for the Amazon Web Services account.

  This tells you the complexity requirements and mandatory rotation periods for
  the IAM user passwords in your account. For more information about using a
  password policy, see [Managing an IAM password policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingPasswordPolicies.html).
  """
  def get_account_password_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetAccountPasswordPolicy", input, options)
  end

  @doc """
  Retrieves information about IAM entity usage and IAM quotas in the Amazon Web
  Services account.

  For information about IAM quotas, see [IAM and STS quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.
  """
  def get_account_summary(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetAccountSummary", input, options)
  end

  @doc """
  Gets a list of all of the context keys referenced in the input policies.

  The policies are supplied as a list of one or more strings. To get the context
  keys from policies associated with an IAM user, group, or role, use
  `GetContextKeysForPrincipalPolicy`.

  Context keys are variables maintained by Amazon Web Services and its services
  that provide details about the context of an API query request. Context keys can
  be evaluated by testing against a value specified in an IAM policy. Use
  `GetContextKeysForCustomPolicy` to understand what key names and values you must
  supply when you call `SimulateCustomPolicy`. Note that all parameters are shown
  in unencoded form here for clarity but must be URL encoded to be included as a
  part of a real HTML request.
  """
  def get_context_keys_for_custom_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetContextKeysForCustomPolicy", input, options)
  end

  @doc """
  Gets a list of all of the context keys referenced in all the IAM policies that
  are attached to the specified IAM entity.

  The entity can be an IAM user, group, or role. If you specify a user, then the
  request also includes all of the policies attached to groups that the user is a
  member of.

  You can optionally include a list of one or more additional policies, specified
  as strings. If you want to include *only* a list of policies by string, use
  `GetContextKeysForCustomPolicy` instead.

  **Note:** This operation discloses information about the permissions granted to
  other users. If you do not want users to see other user's permissions, then
  consider allowing them to use `GetContextKeysForCustomPolicy` instead.

  Context keys are variables maintained by Amazon Web Services and its services
  that provide details about the context of an API query request. Context keys can
  be evaluated by testing against a value in an IAM policy. Use
  `GetContextKeysForPrincipalPolicy` to understand what key names and values you
  must supply when you call `SimulatePrincipalPolicy`.
  """
  def get_context_keys_for_principal_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetContextKeysForPrincipalPolicy", input, options)
  end

  @doc """
  Retrieves a credential report for the Amazon Web Services account.

  For more information about the credential report, see [Getting credential reports](https://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html)
  in the *IAM User Guide*.
  """
  def get_credential_report(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetCredentialReport", input, options)
  end

  @doc """
  Returns a list of IAM users that are in the specified IAM group.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def get_group(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetGroup", input, options)
  end

  @doc """
  Retrieves the specified inline policy document that is embedded in the specified
  IAM group.

  Policies returned by this operation are URL-encoded compliant with [RFC 3986](https://tools.ietf.org/html/rfc3986). You can use a URL decoding method to
  convert the policy back to plain JSON text. For example, if you use Java, you
  can use the `decode` method of the `java.net.URLDecoder` utility class in the
  Java SDK. Other languages and SDKs provide similar functionality.

  An IAM group can also have managed policies attached to it. To retrieve a
  managed policy document that is attached to a group, use `GetPolicy` to
  determine the policy's default version, then use `GetPolicyVersion` to retrieve
  the policy document.

  For more information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def get_group_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetGroupPolicy", input, options)
  end

  @doc """
  Retrieves information about the specified instance profile, including the
  instance profile's path, GUID, ARN, and role.

  For more information about instance profiles, see [About instance profiles](https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html)
  in the *IAM User Guide*.
  """
  def get_instance_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetInstanceProfile", input, options)
  end

  @doc """
  Retrieves the user name for the specified IAM user.

  A login profile is created when you create a password for the user to access the
  Amazon Web Services Management Console. If the user does not exist or does not
  have a password, the operation returns a 404 (`NoSuchEntity`) error.

  If you create an IAM user with access to the console, the `CreateDate` reflects
  the date you created the initial password for the user.

  If you create an IAM user with programmatic access, and then later add a
  password for the user to access the Amazon Web Services Management Console, the
  `CreateDate` reflects the initial password creation date. A user with
  programmatic access does not have a login profile unless you create a password
  for the user to access the Amazon Web Services Management Console.
  """
  def get_login_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetLoginProfile", input, options)
  end

  @doc """
  Returns information about the specified OpenID Connect (OIDC) provider resource
  object in IAM.
  """
  def get_open_id_connect_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetOpenIDConnectProvider", input, options)
  end

  @doc """
  Retrieves the service last accessed data report for Organizations that was
  previously generated using the ` `GenerateOrganizationsAccessReport` `
  operation.

  This operation retrieves the status of your report job and the report contents.

  Depending on the parameters that you passed when you generated the report, the
  data returned could include different information. For details, see
  `GenerateOrganizationsAccessReport`.

  To call this operation, you must be signed in to the management account in your
  organization. SCPs must be enabled for your organization root. You must have
  permissions to perform this operation. For more information, see [Refining permissions using service last accessed
  data](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html)
  in the *IAM User Guide*.

  For each service that principals in an account (root users, IAM users, or IAM
  roles) could access using SCPs, the operation returns details about the most
  recent access attempt. If there was no attempt, the service is listed without
  details about the most recent attempt to access the service. If the operation
  fails, it returns the reason that it failed.

  By default, the list is sorted by service namespace.
  """
  def get_organizations_access_report(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetOrganizationsAccessReport", input, options)
  end

  @doc """
  Retrieves information about the specified managed policy, including the policy's
  default version and the total number of IAM users, groups, and roles to which
  the policy is attached.

  To retrieve the list of the specific users, groups, and roles that the policy is
  attached to, use `ListEntitiesForPolicy`. This operation returns metadata about
  the policy. To retrieve the actual policy document for a specific version of the
  policy, use `GetPolicyVersion`.

  This operation retrieves information about managed policies. To retrieve
  information about an inline policy that is embedded with an IAM user, group, or
  role, use `GetUserPolicy`, `GetGroupPolicy`, or `GetRolePolicy`.

  For more information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def get_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetPolicy", input, options)
  end

  @doc """
  Retrieves information about the specified version of the specified managed
  policy, including the policy document.

  Policies returned by this operation are URL-encoded compliant with [RFC 3986](https://tools.ietf.org/html/rfc3986). You can use a URL decoding method to
  convert the policy back to plain JSON text. For example, if you use Java, you
  can use the `decode` method of the `java.net.URLDecoder` utility class in the
  Java SDK. Other languages and SDKs provide similar functionality.

  To list the available versions for a policy, use `ListPolicyVersions`.

  This operation retrieves information about managed policies. To retrieve
  information about an inline policy that is embedded in a user, group, or role,
  use `GetUserPolicy`, `GetGroupPolicy`, or `GetRolePolicy`.

  For more information about the types of policies, see [Managed policies and inline
  policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  For more information about managed policy versions, see [Versioning for managed policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html)
  in the *IAM User Guide*.
  """
  def get_policy_version(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetPolicyVersion", input, options)
  end

  @doc """
  Retrieves information about the specified role, including the role's path, GUID,
  ARN, and the role's trust policy that grants permission to assume the role.

  For more information about roles, see [Working with roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html).

  Policies returned by this operation are URL-encoded compliant with [RFC 3986](https://tools.ietf.org/html/rfc3986). You can use a URL decoding method to
  convert the policy back to plain JSON text. For example, if you use Java, you
  can use the `decode` method of the `java.net.URLDecoder` utility class in the
  Java SDK. Other languages and SDKs provide similar functionality.
  """
  def get_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetRole", input, options)
  end

  @doc """
  Retrieves the specified inline policy document that is embedded with the
  specified IAM role.

  Policies returned by this operation are URL-encoded compliant with [RFC 3986](https://tools.ietf.org/html/rfc3986). You can use a URL decoding method to
  convert the policy back to plain JSON text. For example, if you use Java, you
  can use the `decode` method of the `java.net.URLDecoder` utility class in the
  Java SDK. Other languages and SDKs provide similar functionality.

  An IAM role can also have managed policies attached to it. To retrieve a managed
  policy document that is attached to a role, use `GetPolicy` to determine the
  policy's default version, then use `GetPolicyVersion` to retrieve the policy
  document.

  For more information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  For more information about roles, see [Using roles to delegate permissions and federate
  identities](https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html).
  """
  def get_role_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetRolePolicy", input, options)
  end

  @doc """
  Returns the SAML provider metadocument that was uploaded when the IAM SAML
  provider resource object was created or updated.

  This operation requires [Signature Version 4](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html).
  """
  def get_saml_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetSAMLProvider", input, options)
  end

  @doc """
  Retrieves information about the specified server certificate stored in IAM.

  For more information about working with server certificates, see [Working with server
  certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*. This topic includes a list of Amazon Web Services
  services that can use the server certificates that you manage with IAM.
  """
  def get_server_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetServerCertificate", input, options)
  end

  @doc """
  Retrieves a service last accessed report that was created using the
  `GenerateServiceLastAccessedDetails` operation.

  You can use the `JobId` parameter in `GetServiceLastAccessedDetails` to retrieve
  the status of your report job. When the report is complete, you can retrieve the
  generated report. The report includes a list of Amazon Web Services services
  that the resource (user, group, role, or managed policy) can access.

  Service last accessed data does not use other policy types when determining
  whether a resource could access a service. These other policy types include
  resource-based policies, access control lists, Organizations policies, IAM
  permissions boundaries, and STS assume role policies. It only applies
  permissions policy logic. For more about the evaluation of policy types, see
  [Evaluating policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics)
  in the *IAM User Guide*.

  For each service that the resource could access using permissions policies, the
  operation returns details about the most recent access attempt. If there was no
  attempt, the service is listed without details about the most recent attempt to
  access the service. If the operation fails, the `GetServiceLastAccessedDetails`
  operation returns the reason that it failed.

  The `GetServiceLastAccessedDetails` operation returns a list of services. This
  list includes the number of entities that have attempted to access the service
  and the date and time of the last attempt. It also returns the ARN of the
  following entity, depending on the resource ARN that you used to generate the
  report:

    * **User** – Returns the user ARN that you used to generate the
  report

    * **Group** – Returns the ARN of the group member (user) that last
  attempted to access the service

    * **Role** – Returns the role ARN that you used to generate the
  report

    * **Policy** – Returns the ARN of the user or role that last used
  the policy to attempt to access the service

  By default, the list is sorted by service namespace.

  If you specified `ACTION_LEVEL` granularity when you generated the report, this
  operation returns service and action last accessed data. This includes the most
  recent access attempt for each tracked action within a service. Otherwise, this
  operation returns only service data.

  For more information about service and action last accessed data, see [Reducing permissions using service last accessed
  data](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html)
  in the *IAM User Guide*.
  """
  def get_service_last_accessed_details(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetServiceLastAccessedDetails", input, options)
  end

  @doc """
  After you generate a group or policy report using the
  `GenerateServiceLastAccessedDetails` operation, you can use the `JobId`
  parameter in `GetServiceLastAccessedDetailsWithEntities`.

  This operation retrieves the status of your report job and a list of entities
  that could have used group or policy permissions to access the specified
  service.

    * **Group** – For a group report, this operation returns a list of
  users in the group that could have used the group’s policies in an attempt to
  access the service.

    * **Policy** – For a policy report, this operation returns a list of
  entities (users or roles) that could have used the policy in an attempt to
  access the service.

  You can also use this operation for user or role reports to retrieve details
  about those entities.

  If the operation fails, the `GetServiceLastAccessedDetailsWithEntities`
  operation returns the reason that it failed.

  By default, the list of associated entities is sorted by date, with the most
  recent access listed first.
  """
  def get_service_last_accessed_details_with_entities(%Client{} = client, input, options \\ []) do
    Request.request_post(
      client,
      metadata(),
      "GetServiceLastAccessedDetailsWithEntities",
      input,
      options
    )
  end

  @doc """
  Retrieves the status of your service-linked role deletion.

  After you use `DeleteServiceLinkedRole` to submit a service-linked role for
  deletion, you can use the `DeletionTaskId` parameter in
  `GetServiceLinkedRoleDeletionStatus` to check the status of the deletion. If the
  deletion fails, this operation returns the reason that it failed, if that
  information is returned by the service.
  """
  def get_service_linked_role_deletion_status(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetServiceLinkedRoleDeletionStatus", input, options)
  end

  @doc """
  Retrieves the specified SSH public key, including metadata about the key.

  The SSH public key retrieved by this operation is used only for authenticating
  the associated IAM user to an CodeCommit repository. For more information about
  using SSH keys to authenticate to an CodeCommit repository, see [Set up CodeCommit for SSH
  connections](https://docs.aws.amazon.com/codecommit/latest/userguide/setting-up-credentials-ssh.html)
  in the *CodeCommit User Guide*.
  """
  def get_ssh_public_key(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetSSHPublicKey", input, options)
  end

  @doc """
  Retrieves information about the specified IAM user, including the user's
  creation date, path, unique ID, and ARN.

  If you do not specify a user name, IAM determines the user name implicitly based
  on the Amazon Web Services access key ID used to sign the request to this
  operation.
  """
  def get_user(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetUser", input, options)
  end

  @doc """
  Retrieves the specified inline policy document that is embedded in the specified
  IAM user.

  Policies returned by this operation are URL-encoded compliant with [RFC 3986](https://tools.ietf.org/html/rfc3986). You can use a URL decoding method to
  convert the policy back to plain JSON text. For example, if you use Java, you
  can use the `decode` method of the `java.net.URLDecoder` utility class in the
  Java SDK. Other languages and SDKs provide similar functionality.

  An IAM user can also have managed policies attached to it. To retrieve a managed
  policy document that is attached to a user, use `GetPolicy` to determine the
  policy's default version. Then use `GetPolicyVersion` to retrieve the policy
  document.

  For more information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def get_user_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "GetUserPolicy", input, options)
  end

  @doc """
  Returns information about the access key IDs associated with the specified IAM
  user.

  If there is none, the operation returns an empty list.

  Although each user is limited to a small number of keys, you can still paginate
  the results using the `MaxItems` and `Marker` parameters.

  If the `UserName` field is not specified, the user name is determined implicitly
  based on the Amazon Web Services access key ID used to sign the request. This
  operation works for access keys under the Amazon Web Services account.
  Consequently, you can use this operation to manage Amazon Web Services account
  root user credentials even if the Amazon Web Services account has no associated
  users.

  To ensure the security of your Amazon Web Services account, the secret access
  key is accessible only during key and user creation.
  """
  def list_access_keys(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListAccessKeys", input, options)
  end

  @doc """
  Lists the account alias associated with the Amazon Web Services account (Note:
  you can have only one).

  For information about using an Amazon Web Services account alias, see [Using an alias for your Amazon Web Services account
  ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAlias.html) in the
  *IAM User Guide*.
  """
  def list_account_aliases(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListAccountAliases", input, options)
  end

  @doc """
  Lists all managed policies that are attached to the specified IAM group.

  An IAM group can also have inline policies embedded with it. To list the inline
  policies for a group, use `ListGroupPolicies`. For information about policies,
  see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  You can paginate the results using the `MaxItems` and `Marker` parameters. You
  can use the `PathPrefix` parameter to limit the list of policies to only those
  matching the specified path prefix. If there are no policies attached to the
  specified group (or none that match the specified path prefix), the operation
  returns an empty list.
  """
  def list_attached_group_policies(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListAttachedGroupPolicies", input, options)
  end

  @doc """
  Lists all managed policies that are attached to the specified IAM role.

  An IAM role can also have inline policies embedded with it. To list the inline
  policies for a role, use `ListRolePolicies`. For information about policies, see
  [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  You can paginate the results using the `MaxItems` and `Marker` parameters. You
  can use the `PathPrefix` parameter to limit the list of policies to only those
  matching the specified path prefix. If there are no policies attached to the
  specified role (or none that match the specified path prefix), the operation
  returns an empty list.
  """
  def list_attached_role_policies(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListAttachedRolePolicies", input, options)
  end

  @doc """
  Lists all managed policies that are attached to the specified IAM user.

  An IAM user can also have inline policies embedded with it. To list the inline
  policies for a user, use `ListUserPolicies`. For information about policies, see
  [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  You can paginate the results using the `MaxItems` and `Marker` parameters. You
  can use the `PathPrefix` parameter to limit the list of policies to only those
  matching the specified path prefix. If there are no policies attached to the
  specified group (or none that match the specified path prefix), the operation
  returns an empty list.
  """
  def list_attached_user_policies(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListAttachedUserPolicies", input, options)
  end

  @doc """
  Lists all IAM users, groups, and roles that the specified managed policy is
  attached to.

  You can use the optional `EntityFilter` parameter to limit the results to a
  particular type of entity (users, groups, or roles). For example, to list only
  the roles that are attached to the specified policy, set `EntityFilter` to
  `Role`.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_entities_for_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListEntitiesForPolicy", input, options)
  end

  @doc """
  Lists the names of the inline policies that are embedded in the specified IAM
  group.

  An IAM group can also have managed policies attached to it. To list the managed
  policies that are attached to a group, use `ListAttachedGroupPolicies`. For more
  information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  You can paginate the results using the `MaxItems` and `Marker` parameters. If
  there are no inline policies embedded with the specified group, the operation
  returns an empty list.
  """
  def list_group_policies(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListGroupPolicies", input, options)
  end

  @doc """
  Lists the IAM groups that have the specified path prefix.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_groups(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListGroups", input, options)
  end

  @doc """
  Lists the IAM groups that the specified IAM user belongs to.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_groups_for_user(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListGroupsForUser", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified IAM instance profile.

  The returned list of tags is sorted by tag key. For more information about
  tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def list_instance_profile_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListInstanceProfileTags", input, options)
  end

  @doc """
  Lists the instance profiles that have the specified path prefix.

  If there are none, the operation returns an empty list. For more information
  about instance profiles, see [About instance profiles](https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html).

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for an
  instance profile, see `GetInstanceProfile`.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_instance_profiles(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListInstanceProfiles", input, options)
  end

  @doc """
  Lists the instance profiles that have the specified associated IAM role.

  If there are none, the operation returns an empty list. For more information
  about instance profiles, go to [About instance profiles](https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html).

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_instance_profiles_for_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListInstanceProfilesForRole", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified IAM virtual multi-factor
  authentication (MFA) device.

  The returned list of tags is sorted by tag key. For more information about
  tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def list_mfa_device_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListMFADeviceTags", input, options)
  end

  @doc """
  Lists the MFA devices for an IAM user.

  If the request includes a IAM user name, then this operation lists all the MFA
  devices associated with the specified user. If you do not specify a user name,
  IAM determines the user name implicitly based on the Amazon Web Services access
  key ID signing the request for this operation.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_mfa_devices(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListMFADevices", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified OpenID Connect
  (OIDC)-compatible identity provider.

  The returned list of tags is sorted by tag key. For more information, see [About web identity
  federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html).

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def list_open_id_connect_provider_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListOpenIDConnectProviderTags", input, options)
  end

  @doc """
  Lists information about the IAM OpenID Connect (OIDC) provider resource objects
  defined in the Amazon Web Services account.

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for an
  OIDC provider, see `GetOpenIDConnectProvider`.
  """
  def list_open_id_connect_providers(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListOpenIDConnectProviders", input, options)
  end

  @doc """
  Lists all the managed policies that are available in your Amazon Web Services
  account, including your own customer-defined managed policies and all Amazon Web
  Services managed policies.

  You can filter the list of policies that is returned using the optional
  `OnlyAttached`, `Scope`, and `PathPrefix` parameters. For example, to list only
  the customer managed policies in your Amazon Web Services account, set `Scope`
  to `Local`. To list only Amazon Web Services managed policies, set `Scope` to
  `AWS`.

  You can paginate the results using the `MaxItems` and `Marker` parameters.

  For more information about managed policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for a
  customer manged policy, see `GetPolicy`.
  """
  def list_policies(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListPolicies", input, options)
  end

  @doc """
  Retrieves a list of policies that the IAM identity (user, group, or role) can
  use to access each specified service.

  This operation does not use other policy types when determining whether a
  resource could access a service. These other policy types include resource-based
  policies, access control lists, Organizations policies, IAM permissions
  boundaries, and STS assume role policies. It only applies permissions policy
  logic. For more about the evaluation of policy types, see [Evaluating policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics)
  in the *IAM User Guide*.

  The list of policies returned by the operation depends on the ARN of the
  identity that you provide.

    * **User** – The list of policies includes the managed and inline
  policies that are attached to the user directly. The list also includes any
  additional managed and inline policies that are attached to the group to which
  the user belongs.

    * **Group** – The list of policies includes only the managed and
  inline policies that are attached to the group directly. Policies that are
  attached to the group’s user are not included.

    * **Role** – The list of policies includes only the managed and
  inline policies that are attached to the role.

  For each managed policy, this operation returns the ARN and policy name. For
  each inline policy, it returns the policy name and the entity to which it is
  attached. Inline policies do not have an ARN. For more information about these
  policy types, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html)
  in the *IAM User Guide*.

  Policies that are attached to users and roles as permissions boundaries are not
  returned. To view which managed policy is currently used to set the permissions
  boundary for a user or role, use the `GetUser` or `GetRole` operations.
  """
  def list_policies_granting_service_access(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListPoliciesGrantingServiceAccess", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified IAM customer managed policy.

  The returned list of tags is sorted by tag key. For more information about
  tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def list_policy_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListPolicyTags", input, options)
  end

  @doc """
  Lists information about the versions of the specified managed policy, including
  the version that is currently set as the policy's default version.

  For more information about managed policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def list_policy_versions(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListPolicyVersions", input, options)
  end

  @doc """
  Lists the names of the inline policies that are embedded in the specified IAM
  role.

  An IAM role can also have managed policies attached to it. To list the managed
  policies that are attached to a role, use `ListAttachedRolePolicies`. For more
  information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  You can paginate the results using the `MaxItems` and `Marker` parameters. If
  there are no inline policies embedded with the specified role, the operation
  returns an empty list.
  """
  def list_role_policies(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListRolePolicies", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified role.

  The returned list of tags is sorted by tag key. For more information about
  tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def list_role_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListRoleTags", input, options)
  end

  @doc """
  Lists the IAM roles that have the specified path prefix.

  If there are none, the operation returns an empty list. For more information
  about roles, see [Working with roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html).

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for a
  role, see `GetRole`.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_roles(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListRoles", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified Security Assertion Markup
  Language (SAML) identity provider.

  The returned list of tags is sorted by tag key. For more information, see [About SAML 2.0-based
  federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html).

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def list_saml_provider_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListSAMLProviderTags", input, options)
  end

  @doc """
  Lists the SAML provider resource objects defined in IAM in the account.

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for a
  SAML provider, see `GetSAMLProvider`.

  This operation requires [Signature Version 4](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html).
  """
  def list_saml_providers(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListSAMLProviders", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified IAM server certificate.

  The returned list of tags is sorted by tag key. For more information about
  tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

  For certificates in a Region supported by Certificate Manager (ACM), we
  recommend that you don't use IAM server certificates. Instead, use ACM to
  provision, manage, and deploy your server certificates. For more information
  about IAM server certificates, [Working with server certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*.
  """
  def list_server_certificate_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListServerCertificateTags", input, options)
  end

  @doc """
  Lists the server certificates stored in IAM that have the specified path prefix.

  If none exist, the operation returns an empty list.

  You can paginate the results using the `MaxItems` and `Marker` parameters.

  For more information about working with server certificates, see [Working with server
  certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*. This topic also includes a list of Amazon Web Services
  services that can use the server certificates that you manage with IAM.

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for a
  servercertificate, see `GetServerCertificate`.
  """
  def list_server_certificates(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListServerCertificates", input, options)
  end

  @doc """
  Returns information about the service-specific credentials associated with the
  specified IAM user.

  If none exists, the operation returns an empty list. The service-specific
  credentials returned by this operation are used only for authenticating the IAM
  user to a specific service. For more information about using service-specific
  credentials to authenticate to an Amazon Web Services service, see [Set up service-specific
  credentials](https://docs.aws.amazon.com/codecommit/latest/userguide/setting-up-gc.html)
  in the CodeCommit User Guide.
  """
  def list_service_specific_credentials(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListServiceSpecificCredentials", input, options)
  end

  @doc """
  Returns information about the signing certificates associated with the specified
  IAM user.

  If none exists, the operation returns an empty list.

  Although each user is limited to a small number of signing certificates, you can
  still paginate the results using the `MaxItems` and `Marker` parameters.

  If the `UserName` field is not specified, the user name is determined implicitly
  based on the Amazon Web Services access key ID used to sign the request for this
  operation. This operation works for access keys under the Amazon Web Services
  account. Consequently, you can use this operation to manage Amazon Web Services
  account root user credentials even if the Amazon Web Services account has no
  associated users.
  """
  def list_signing_certificates(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListSigningCertificates", input, options)
  end

  @doc """
  Returns information about the SSH public keys associated with the specified IAM
  user.

  If none exists, the operation returns an empty list.

  The SSH public keys returned by this operation are used only for authenticating
  the IAM user to an CodeCommit repository. For more information about using SSH
  keys to authenticate to an CodeCommit repository, see [Set up CodeCommit for SSH connections](https://docs.aws.amazon.com/codecommit/latest/userguide/setting-up-credentials-ssh.html)
  in the *CodeCommit User Guide*.

  Although each user is limited to a small number of keys, you can still paginate
  the results using the `MaxItems` and `Marker` parameters.
  """
  def list_ssh_public_keys(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListSSHPublicKeys", input, options)
  end

  @doc """
  Lists the names of the inline policies embedded in the specified IAM user.

  An IAM user can also have managed policies attached to it. To list the managed
  policies that are attached to a user, use `ListAttachedUserPolicies`. For more
  information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  You can paginate the results using the `MaxItems` and `Marker` parameters. If
  there are no inline policies embedded with the specified user, the operation
  returns an empty list.
  """
  def list_user_policies(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListUserPolicies", input, options)
  end

  @doc """
  Lists the tags that are attached to the specified IAM user.

  The returned list of tags is sorted by tag key. For more information about
  tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def list_user_tags(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListUserTags", input, options)
  end

  @doc """
  Lists the IAM users that have the specified path prefix.

  If no path prefix is specified, the operation returns all users in the Amazon
  Web Services account. If there are none, the operation returns an empty list.

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for a
  user, see `GetUser`.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_users(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListUsers", input, options)
  end

  @doc """
  Lists the virtual MFA devices defined in the Amazon Web Services account by
  assignment status.

  If you do not specify an assignment status, the operation returns a list of all
  virtual MFA devices. Assignment status can be `Assigned`, `Unassigned`, or
  `Any`.

  IAM resource-listing operations return a subset of the available attributes for
  the resource. For example, this operation does not return tags, even though they
  are an attribute of the returned object. To view all of the information for a
  virtual MFA device, see `ListVirtualMFADevices`.

  You can paginate the results using the `MaxItems` and `Marker` parameters.
  """
  def list_virtual_mfa_devices(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ListVirtualMFADevices", input, options)
  end

  @doc """
  Adds or updates an inline policy document that is embedded in the specified IAM
  group.

  A user can also have managed policies attached to it. To attach a managed policy
  to a group, use `AttachGroupPolicy`. To create a new managed policy, use
  `CreatePolicy`. For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  For information about the maximum number of inline policies that you can embed
  in a group, see [IAM and STS quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.

  Because policy documents can be large, you should use POST rather than GET when
  calling `PutGroupPolicy`. For general information about using the Query API with
  IAM, see [Making query requests](https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html)
  in the *IAM User Guide*.
  """
  def put_group_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "PutGroupPolicy", input, options)
  end

  @doc """
  Adds or updates the policy that is specified as the IAM role's permissions
  boundary.

  You can use an Amazon Web Services managed policy or a customer managed policy
  to set the boundary for a role. Use the boundary to control the maximum
  permissions that the role can have. Setting a permissions boundary is an
  advanced feature that can affect the permissions for the role.

  You cannot set the boundary for a service-linked role.

  Policies used as permissions boundaries do not provide permissions. You must
  also attach a permissions policy to the role. To learn how the effective
  permissions for a role are evaluated, see [IAM JSON policy evaluation logic](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html)
  in the IAM User Guide.
  """
  def put_role_permissions_boundary(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "PutRolePermissionsBoundary", input, options)
  end

  @doc """
  Adds or updates an inline policy document that is embedded in the specified IAM
  role.

  When you embed an inline policy in a role, the inline policy is used as part of
  the role's access (permissions) policy. The role's trust policy is created at
  the same time as the role, using `CreateRole`. You can update a role's trust
  policy using `UpdateAssumeRolePolicy`. For more information about IAM roles, see
  [Using roles to delegate permissions and federate identities](https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html).

  A role can also have a managed policy attached to it. To attach a managed policy
  to a role, use `AttachRolePolicy`. To create a new managed policy, use
  `CreatePolicy`. For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  For information about the maximum number of inline policies that you can embed
  with a role, see [IAM and STS quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.

  Because policy documents can be large, you should use POST rather than GET when
  calling `PutRolePolicy`. For general information about using the Query API with
  IAM, see [Making query requests](https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html)
  in the *IAM User Guide*.
  """
  def put_role_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "PutRolePolicy", input, options)
  end

  @doc """
  Adds or updates the policy that is specified as the IAM user's permissions
  boundary.

  You can use an Amazon Web Services managed policy or a customer managed policy
  to set the boundary for a user. Use the boundary to control the maximum
  permissions that the user can have. Setting a permissions boundary is an
  advanced feature that can affect the permissions for the user.

  Policies that are used as permissions boundaries do not provide permissions. You
  must also attach a permissions policy to the user. To learn how the effective
  permissions for a user are evaluated, see [IAM JSON policy evaluation logic](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html)
  in the IAM User Guide.
  """
  def put_user_permissions_boundary(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "PutUserPermissionsBoundary", input, options)
  end

  @doc """
  Adds or updates an inline policy document that is embedded in the specified IAM
  user.

  An IAM user can also have a managed policy attached to it. To attach a managed
  policy to a user, use `AttachUserPolicy`. To create a new managed policy, use
  `CreatePolicy`. For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.

  For information about the maximum number of inline policies that you can embed
  in a user, see [IAM and STS quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.

  Because policy documents can be large, you should use POST rather than GET when
  calling `PutUserPolicy`. For general information about using the Query API with
  IAM, see [Making query requests](https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html)
  in the *IAM User Guide*.
  """
  def put_user_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "PutUserPolicy", input, options)
  end

  @doc """
  Removes the specified client ID (also known as audience) from the list of client
  IDs registered for the specified IAM OpenID Connect (OIDC) provider resource
  object.

  This operation is idempotent; it does not fail or return an error if you try to
  remove a client ID that does not exist.
  """
  def remove_client_id_from_open_id_connect_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(
      client,
      metadata(),
      "RemoveClientIDFromOpenIDConnectProvider",
      input,
      options
    )
  end

  @doc """
  Removes the specified IAM role from the specified EC2 instance profile.

  Make sure that you do not have any Amazon EC2 instances running with the role
  you are about to remove from the instance profile. Removing a role from an
  instance profile that is associated with a running instance might break any
  applications running on the instance.

  For more information about IAM roles, see [Working with roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html).
  For more information about instance profiles, see [About instance profiles](https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html).
  """
  def remove_role_from_instance_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "RemoveRoleFromInstanceProfile", input, options)
  end

  @doc """
  Removes the specified user from the specified group.
  """
  def remove_user_from_group(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "RemoveUserFromGroup", input, options)
  end

  @doc """
  Resets the password for a service-specific credential.

  The new password is Amazon Web Services generated and cryptographically strong.
  It cannot be configured by the user. Resetting the password immediately
  invalidates the previous password associated with this user.
  """
  def reset_service_specific_credential(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ResetServiceSpecificCredential", input, options)
  end

  @doc """
  Synchronizes the specified MFA device with its IAM resource object on the Amazon
  Web Services servers.

  For more information about creating and working with virtual MFA devices, see
  [Using a virtual MFA device](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_VirtualMFA.html)
  in the *IAM User Guide*.
  """
  def resync_mfa_device(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "ResyncMFADevice", input, options)
  end

  @doc """
  Sets the specified version of the specified policy as the policy's default
  (operative) version.

  This operation affects all users, groups, and roles that the policy is attached
  to. To list the users, groups, and roles that the policy is attached to, use
  `ListEntitiesForPolicy`.

  For information about managed policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
  in the *IAM User Guide*.
  """
  def set_default_policy_version(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "SetDefaultPolicyVersion", input, options)
  end

  @doc """
  Sets the specified version of the global endpoint token as the token version
  used for the Amazon Web Services account.

  By default, Security Token Service (STS) is available as a global service, and
  all STS requests go to a single endpoint at `https://sts.amazonaws.com`. Amazon
  Web Services recommends using Regional STS endpoints to reduce latency, build in
  redundancy, and increase session token availability. For information about
  Regional endpoints for STS, see [Security Token Service endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/sts.html) in the *Amazon
  Web Services General Reference*.

  If you make an STS call to the global endpoint, the resulting session tokens
  might be valid in some Regions but not others. It depends on the version that is
  set in this operation. Version 1 tokens are valid only in Amazon Web Services
  Regions that are available by default. These tokens do not work in manually
  enabled Regions, such as Asia Pacific (Hong Kong). Version 2 tokens are valid in
  all Regions. However, version 2 tokens are longer and might affect systems where
  you temporarily store tokens. For information, see [Activating and deactivating STS in an Amazon Web Services
  Region](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html)
  in the *IAM User Guide*.

  To view the current session token version, see the `GlobalEndpointTokenVersion`
  entry in the response of the `GetAccountSummary` operation.
  """
  def set_security_token_service_preferences(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "SetSecurityTokenServicePreferences", input, options)
  end

  @doc """
  Simulate how a set of IAM policies and optionally a resource-based policy works
  with a list of API operations and Amazon Web Services resources to determine the
  policies' effective permissions.

  The policies are provided as strings.

  The simulation does not perform the API operations; it only checks the
  authorization to determine if the simulated policies allow or deny the
  operations. You can simulate resources that don't exist in your account.

  If you want to simulate existing policies that are attached to an IAM user,
  group, or role, use `SimulatePrincipalPolicy` instead.

  Context keys are variables that are maintained by Amazon Web Services and its
  services and which provide details about the context of an API query request.
  You can use the `Condition` element of an IAM policy to evaluate context keys.
  To get the list of context keys that the policies require for correct
  simulation, use `GetContextKeysForCustomPolicy`.

  If the output is long, you can use `MaxItems` and `Marker` parameters to
  paginate the results.

  For more information about using the policy simulator, see [Testing IAM policies with the IAM policy simulator
  ](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html)in
  the *IAM User Guide*.
  """
  def simulate_custom_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "SimulateCustomPolicy", input, options)
  end

  @doc """
  Simulate how a set of IAM policies attached to an IAM entity works with a list
  of API operations and Amazon Web Services resources to determine the policies'
  effective permissions.

  The entity can be an IAM user, group, or role. If you specify a user, then the
  simulation also includes all of the policies that are attached to groups that
  the user belongs to. You can simulate resources that don't exist in your
  account.

  You can optionally include a list of one or more additional policies specified
  as strings to include in the simulation. If you want to simulate only policies
  specified as strings, use `SimulateCustomPolicy` instead.

  You can also optionally include one resource-based policy to be evaluated with
  each of the resources included in the simulation.

  The simulation does not perform the API operations; it only checks the
  authorization to determine if the simulated policies allow or deny the
  operations.

  **Note:** This operation discloses information about the permissions granted to
  other users. If you do not want users to see other user's permissions, then
  consider allowing them to use `SimulateCustomPolicy` instead.

  Context keys are variables maintained by Amazon Web Services and its services
  that provide details about the context of an API query request. You can use the
  `Condition` element of an IAM policy to evaluate context keys. To get the list
  of context keys that the policies require for correct simulation, use
  `GetContextKeysForPrincipalPolicy`.

  If the output is long, you can use the `MaxItems` and `Marker` parameters to
  paginate the results.

  For more information about using the policy simulator, see [Testing IAM policies with the IAM policy simulator
  ](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html)in
  the *IAM User Guide*.
  """
  def simulate_principal_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "SimulatePrincipalPolicy", input, options)
  end

  @doc """
  Adds one or more tags to an IAM instance profile.

  If a tag with the same key name already exists, then that tag is overwritten
  with the new value.

  Each tag consists of a key name and an associated value. By assigning tags to
  your resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only an IAM
  instance profile that has a specified tag attached. For examples of policies
  that show how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in the
  *IAM User Guide*.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.
  """
  def tag_instance_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagInstanceProfile", input, options)
  end

  @doc """
  Adds one or more tags to an IAM virtual multi-factor authentication (MFA)
  device.

  If a tag with the same key name already exists, then that tag is overwritten
  with the new value.

  A tag consists of a key name and an associated value. By assigning tags to your
  resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only an IAM
  virtual MFA device that has a specified tag attached. For examples of policies
  that show how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in the
  *IAM User Guide*.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.
  """
  def tag_mfa_device(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagMFADevice", input, options)
  end

  @doc """
  Adds one or more tags to an OpenID Connect (OIDC)-compatible identity provider.

  For more information about these providers, see [About web identity federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html).
  If a tag with the same key name already exists, then that tag is overwritten
  with the new value.

  A tag consists of a key name and an associated value. By assigning tags to your
  resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only an OIDC
  provider that has a specified tag attached. For examples of policies that show
  how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in the
  *IAM User Guide*.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.
  """
  def tag_open_id_connect_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagOpenIDConnectProvider", input, options)
  end

  @doc """
  Adds one or more tags to an IAM customer managed policy.

  If a tag with the same key name already exists, then that tag is overwritten
  with the new value.

  A tag consists of a key name and an associated value. By assigning tags to your
  resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only an IAM
  customer managed policy that has a specified tag attached. For examples of
  policies that show how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in
  the *IAM User Guide*.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.
  """
  def tag_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagPolicy", input, options)
  end

  @doc """
  Adds one or more tags to an IAM role.

  The role can be a regular role or a service-linked role. If a tag with the same
  key name already exists, then that tag is overwritten with the new value.

  A tag consists of a key name and an associated value. By assigning tags to your
  resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only an IAM role
  that has a specified tag attached. You can also restrict access to only those
  resources that have a certain tag attached. For examples of policies that show
  how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in the
  *IAM User Guide*.

    * **Cost allocation** - Use tags to help track which individuals and
  teams are using which Amazon Web Services resources.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.

  For more information about tagging, see [Tagging IAM identities](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in
  the *IAM User Guide*.
  """
  def tag_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagRole", input, options)
  end

  @doc """
  Adds one or more tags to a Security Assertion Markup Language (SAML) identity
  provider.

  For more information about these providers, see [About SAML 2.0-based federation
  ](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html).
  If a tag with the same key name already exists, then that tag is overwritten
  with the new value.

  A tag consists of a key name and an associated value. By assigning tags to your
  resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only a SAML
  identity provider that has a specified tag attached. For examples of policies
  that show how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in the
  *IAM User Guide*.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.
  """
  def tag_saml_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagSAMLProvider", input, options)
  end

  @doc """
  Adds one or more tags to an IAM server certificate.

  If a tag with the same key name already exists, then that tag is overwritten
  with the new value.

  For certificates in a Region supported by Certificate Manager (ACM), we
  recommend that you don't use IAM server certificates. Instead, use ACM to
  provision, manage, and deploy your server certificates. For more information
  about IAM server certificates, [Working with server certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*.

  A tag consists of a key name and an associated value. By assigning tags to your
  resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only a server
  certificate that has a specified tag attached. For examples of policies that
  show how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in the
  *IAM User Guide*.

    * **Cost allocation** - Use tags to help track which individuals and
  teams are using which Amazon Web Services resources.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.
  """
  def tag_server_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagServerCertificate", input, options)
  end

  @doc """
  Adds one or more tags to an IAM user.

  If a tag with the same key name already exists, then that tag is overwritten
  with the new value.

  A tag consists of a key name and an associated value. By assigning tags to your
  resources, you can do the following:

    * **Administrative grouping and discovery** - Attach tags to
  resources to aid in organization and search. For example, you could search for
  all resources with the key name *Project* and the value *MyImportantProject*. Or
  search for all resources with the key name *Cost Center* and the value *41200*.

    * **Access control** - Include tags in IAM user-based and
  resource-based policies. You can use tags to restrict access to only an IAM
  requesting user that has a specified tag attached. You can also restrict access
  to only those resources that have a certain tag attached. For examples of
  policies that show how to use tags to control access, see [Control access using IAM tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html) in
  the *IAM User Guide*.

    * **Cost allocation** - Use tags to help track which individuals and
  teams are using which Amazon Web Services resources.

     If any one of the tags is invalid or if you exceed the allowed
  maximum number of tags, then the entire request fails and the resource is not
  created. For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

     Amazon Web Services always interprets the tag `Value` as a single
  string. If you need to store an array, you can store comma-separated values in
  the string. However, you must interpret the value in your code.

  For more information about tagging, see [Tagging IAM identities](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in
  the *IAM User Guide*.
  """
  def tag_user(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "TagUser", input, options)
  end

  @doc """
  Removes the specified tags from the IAM instance profile.

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def untag_instance_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagInstanceProfile", input, options)
  end

  @doc """
  Removes the specified tags from the IAM virtual multi-factor authentication
  (MFA) device.

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def untag_mfa_device(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagMFADevice", input, options)
  end

  @doc """
  Removes the specified tags from the specified OpenID Connect (OIDC)-compatible
  identity provider in IAM.

  For more information about OIDC providers, see [About web identity federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html).
  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def untag_open_id_connect_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagOpenIDConnectProvider", input, options)
  end

  @doc """
  Removes the specified tags from the customer managed policy.

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def untag_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagPolicy", input, options)
  end

  @doc """
  Removes the specified tags from the role.

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def untag_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagRole", input, options)
  end

  @doc """
  Removes the specified tags from the specified Security Assertion Markup Language
  (SAML) identity provider in IAM.

  For more information about these providers, see [About web identity federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html).
  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def untag_saml_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagSAMLProvider", input, options)
  end

  @doc """
  Removes the specified tags from the IAM server certificate.

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.

  For certificates in a Region supported by Certificate Manager (ACM), we
  recommend that you don't use IAM server certificates. Instead, use ACM to
  provision, manage, and deploy your server certificates. For more information
  about IAM server certificates, [Working with server certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*.
  """
  def untag_server_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagServerCertificate", input, options)
  end

  @doc """
  Removes the specified tags from the user.

  For more information about tagging, see [Tagging IAM resources](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html) in the
  *IAM User Guide*.
  """
  def untag_user(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UntagUser", input, options)
  end

  @doc """
  Changes the status of the specified access key from Active to Inactive, or vice
  versa.

  This operation can be used to disable a user's key as part of a key rotation
  workflow.

  If the `UserName` is not specified, the user name is determined implicitly based
  on the Amazon Web Services access key ID used to sign the request. This
  operation works for access keys under the Amazon Web Services account.
  Consequently, you can use this operation to manage Amazon Web Services account
  root user credentials even if the Amazon Web Services account has no associated
  users.

  For information about rotating keys, see [Managing keys and certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingCredentials.html)
  in the *IAM User Guide*.
  """
  def update_access_key(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateAccessKey", input, options)
  end

  @doc """
  Updates the password policy settings for the Amazon Web Services account.

     This operation does not support partial updates. No parameters are
  required, but if you do not specify a parameter, that parameter's value reverts
  to its default value. See the **Request Parameters** section for each
  parameter's default value. Also note that some parameters do not allow the
  default parameter to be explicitly set. Instead, to invoke the default value, do
  not include that parameter when you invoke the operation.

  For more information about using a password policy, see [Managing an IAM password
  policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingPasswordPolicies.html)
  in the *IAM User Guide*.
  """
  def update_account_password_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateAccountPasswordPolicy", input, options)
  end

  @doc """
  Updates the policy that grants an IAM entity permission to assume a role.

  This is typically referred to as the "role trust policy". For more information
  about roles, see [Using roles to delegate permissions and federate identities](https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html).
  """
  def update_assume_role_policy(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateAssumeRolePolicy", input, options)
  end

  @doc """
  Updates the name and/or the path of the specified IAM group.

  You should understand the implications of changing a group's path or name. For
  more information, see [Renaming users and groups](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_WorkingWithGroupsAndUsers.html)
  in the *IAM User Guide*.

  The person making the request (the principal), must have permission to change
  the role group with the old name and the new name. For example, to change the
  group named `Managers` to `MGRs`, the principal must have a policy that allows
  them to update both groups. If the principal has permission to update the
  `Managers` group, but not the `MGRs` group, then the update fails. For more
  information about permissions, see [Access management](https://docs.aws.amazon.com/IAM/latest/UserGuide/access.html).
  """
  def update_group(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateGroup", input, options)
  end

  @doc """
  Changes the password for the specified IAM user.

  You can use the CLI, the Amazon Web Services API, or the **Users** page in the
  IAM console to change the password for any IAM user. Use `ChangePassword` to
  change your own password in the **My Security Credentials** page in the Amazon
  Web Services Management Console.

  For more information about modifying passwords, see [Managing passwords](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html)
  in the *IAM User Guide*.
  """
  def update_login_profile(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateLoginProfile", input, options)
  end

  @doc """
  Replaces the existing list of server certificate thumbprints associated with an
  OpenID Connect (OIDC) provider resource object with a new list of thumbprints.

  The list that you pass with this operation completely replaces the existing list
  of thumbprints. (The lists are not merged.)

  Typically, you need to update a thumbprint only when the identity provider
  certificate changes, which occurs rarely. However, if the provider's certificate
  *does* change, any attempt to assume an IAM role that specifies the OIDC
  provider as a principal fails until the certificate thumbprint is updated.

  Amazon Web Services secures communication with some OIDC identity providers
  (IdPs) through our library of trusted certificate authorities (CAs) instead of
  using a certificate thumbprint to verify your IdP server certificate. These OIDC
  IdPs include Google, and those that use an Amazon S3 bucket to host a JSON Web
  Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your
  configuration, but is no longer used for validation.

  Trust for the OIDC provider is derived from the provider certificate and is
  validated by the thumbprint. Therefore, it is best to limit access to the
  `UpdateOpenIDConnectProviderThumbprint` operation to highly privileged users.
  """
  def update_open_id_connect_provider_thumbprint(%Client{} = client, input, options \\ []) do
    Request.request_post(
      client,
      metadata(),
      "UpdateOpenIDConnectProviderThumbprint",
      input,
      options
    )
  end

  @doc """
  Updates the description or maximum session duration setting of a role.
  """
  def update_role(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateRole", input, options)
  end

  @doc """
  Use `UpdateRole` instead.

  Modifies only the description of a role. This operation performs the same
  function as the `Description` parameter in the `UpdateRole` operation.
  """
  def update_role_description(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateRoleDescription", input, options)
  end

  @doc """
  Updates the metadata document for an existing SAML provider resource object.

  This operation requires [Signature Version 4](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html).
  """
  def update_saml_provider(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateSAMLProvider", input, options)
  end

  @doc """
  Updates the name and/or the path of the specified server certificate stored in
  IAM.

  For more information about working with server certificates, see [Working with server
  certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*. This topic also includes a list of Amazon Web Services
  services that can use the server certificates that you manage with IAM.

  You should understand the implications of changing a server certificate's path
  or name. For more information, see [Renaming a server certificate](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs_manage.html#RenamingServerCerts)
  in the *IAM User Guide*.

  The person making the request (the principal), must have permission to change
  the server certificate with the old name and the new name. For example, to
  change the certificate named `ProductionCert` to `ProdCert`, the principal must
  have a policy that allows them to update both certificates. If the principal has
  permission to update the `ProductionCert` group, but not the `ProdCert`
  certificate, then the update fails. For more information about permissions, see
  [Access management](https://docs.aws.amazon.com/IAM/latest/UserGuide/access.html) in the
  *IAM User Guide*.
  """
  def update_server_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateServerCertificate", input, options)
  end

  @doc """
  Sets the status of a service-specific credential to `Active` or `Inactive`.

  Service-specific credentials that are inactive cannot be used for authentication
  to the service. This operation can be used to disable a user's service-specific
  credential as part of a credential rotation work flow.
  """
  def update_service_specific_credential(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateServiceSpecificCredential", input, options)
  end

  @doc """
  Changes the status of the specified user signing certificate from active to
  disabled, or vice versa.

  This operation can be used to disable an IAM user's signing certificate as part
  of a certificate rotation work flow.

  If the `UserName` field is not specified, the user name is determined implicitly
  based on the Amazon Web Services access key ID used to sign the request. This
  operation works for access keys under the Amazon Web Services account.
  Consequently, you can use this operation to manage Amazon Web Services account
  root user credentials even if the Amazon Web Services account has no associated
  users.
  """
  def update_signing_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateSigningCertificate", input, options)
  end

  @doc """
  Sets the status of an IAM user's SSH public key to active or inactive.

  SSH public keys that are inactive cannot be used for authentication. This
  operation can be used to disable a user's SSH public key as part of a key
  rotation work flow.

  The SSH public key affected by this operation is used only for authenticating
  the associated IAM user to an CodeCommit repository. For more information about
  using SSH keys to authenticate to an CodeCommit repository, see [Set up CodeCommit for SSH
  connections](https://docs.aws.amazon.com/codecommit/latest/userguide/setting-up-credentials-ssh.html)
  in the *CodeCommit User Guide*.
  """
  def update_ssh_public_key(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateSSHPublicKey", input, options)
  end

  @doc """
  Updates the name and/or the path of the specified IAM user.

  You should understand the implications of changing an IAM user's path or name.
  For more information, see [Renaming an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_renaming)
  and [Renaming an IAM group](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_rename.html)
  in the *IAM User Guide*.

  To change a user name, the requester must have appropriate permissions on both
  the source object and the target object. For example, to change Bob to Robert,
  the entity making the request must have permission on Bob and Robert, or must
  have permission on all (*). For more information about permissions, see
  [Permissions and policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/PermissionsAndPolicies.html).
  """
  def update_user(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UpdateUser", input, options)
  end

  @doc """
  Uploads a server certificate entity for the Amazon Web Services account.

  The server certificate entity includes a public key certificate, a private key,
  and an optional certificate chain, which should all be PEM-encoded.

  We recommend that you use [Certificate Manager](https://docs.aws.amazon.com/acm/) to provision, manage, and deploy your
  server certificates. With ACM you can request a certificate, deploy it to Amazon
  Web Services resources, and let ACM handle certificate renewals for you.
  Certificates provided by ACM are free. For more information about using ACM, see
  the [Certificate Manager User Guide](https://docs.aws.amazon.com/acm/latest/userguide/).

  For more information about working with server certificates, see [Working with server
  certificates](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*. This topic includes a list of Amazon Web Services
  services that can use the server certificates that you manage with IAM.

  For information about the number of server certificates you can upload, see [IAM and STS
  quotas](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html)
  in the *IAM User Guide*.

  Because the body of the public key certificate, private key, and the certificate
  chain can be large, you should use POST rather than GET when calling
  `UploadServerCertificate`. For information about setting up signatures and
  authorization through the API, see [Signing Amazon Web Services API requests](https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html)
  in the *Amazon Web Services General Reference*. For general information about
  using the Query API with IAM, see [Calling the API by making HTTP query requests](https://docs.aws.amazon.com/IAM/latest/UserGuide/programming.html) in
  the *IAM User Guide*.
  """
  def upload_server_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UploadServerCertificate", input, options)
  end

  @doc """
  Uploads an X.509 signing certificate and associates it with the specified IAM
  user.

  Some Amazon Web Services services require you to use certificates to validate
  requests that are signed with a corresponding private key. When you upload the
  certificate, its default status is `Active`.

  For information about when you would use an X.509 signing certificate, see
  [Managing server certificates in IAM](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html)
  in the *IAM User Guide*.

  If the `UserName` is not specified, the IAM user name is determined implicitly
  based on the Amazon Web Services access key ID used to sign the request. This
  operation works for access keys under the Amazon Web Services account.
  Consequently, you can use this operation to manage Amazon Web Services account
  root user credentials even if the Amazon Web Services account has no associated
  users.

  Because the body of an X.509 certificate can be large, you should use POST
  rather than GET when calling `UploadSigningCertificate`. For information about
  setting up signatures and authorization through the API, see [Signing Amazon Web Services API
  requests](https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html)
  in the *Amazon Web Services General Reference*. For general information about
  using the Query API with IAM, see [Making query requests](https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html)
  in the *IAM User Guide*.
  """
  def upload_signing_certificate(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UploadSigningCertificate", input, options)
  end

  @doc """
  Uploads an SSH public key and associates it with the specified IAM user.

  The SSH public key uploaded by this operation can be used only for
  authenticating the associated IAM user to an CodeCommit repository. For more
  information about using SSH keys to authenticate to an CodeCommit repository,
  see [Set up CodeCommit for SSH connections](https://docs.aws.amazon.com/codecommit/latest/userguide/setting-up-credentials-ssh.html)
  in the *CodeCommit User Guide*.
  """
  def upload_ssh_public_key(%Client{} = client, input, options \\ []) do
    Request.request_post(client, metadata(), "UploadSSHPublicKey", input, options)
  end
end