{ "version":"2.0", "metadata":{ "apiVersion":"2018-11-05", "endpointPrefix":"transfer", "jsonVersion":"1.1", "protocol":"json", "serviceAbbreviation":"AWS Transfer", "serviceFullName":"AWS Transfer Family", "serviceId":"Transfer", "signatureVersion":"v4", "signingName":"transfer", "targetPrefix":"TransferService", "uid":"transfer-2018-11-05" }, "operations":{ "CreateAccess":{ "name":"CreateAccess", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"CreateAccessRequest"}, "output":{"shape":"CreateAccessResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceExistsException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Used by administrators to choose which groups in the directory should have access to upload and download files over the enabled protocols using Amazon Web Services Transfer Family. For example, a Microsoft Active Directory might contain 50,000 users, but only a small fraction might need the ability to transfer files to the server. An administrator can use CreateAccess to limit the access to the correct set of users who need this ability.

" }, "CreateServer":{ "name":"CreateServer", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"CreateServerRequest"}, "output":{"shape":"CreateServerResponse"}, "errors":[ {"shape":"AccessDeniedException"}, {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceExistsException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Instantiates an auto-scaling virtual server based on the selected file transfer protocol in Amazon Web Services. When you make updates to your file transfer protocol-enabled server or when you work with users, use the service-generated ServerId property that is assigned to the newly created server.

" }, "CreateUser":{ "name":"CreateUser", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"CreateUserRequest"}, "output":{"shape":"CreateUserResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceExistsException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Creates a user and associates them with an existing file transfer protocol-enabled server. You can only create and associate users with servers that have the IdentityProviderType set to SERVICE_MANAGED. Using parameters for CreateUser, you can specify the user name, set the home directory, store the user's public key, and assign the user's Amazon Web Services Identity and Access Management (IAM) role. You can also optionally add a session policy, and assign metadata with tags that can be used to group and search for users.

" }, "CreateWorkflow":{ "name":"CreateWorkflow", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"CreateWorkflowRequest"}, "output":{"shape":"CreateWorkflowResponse"}, "errors":[ {"shape":"AccessDeniedException"}, {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceExistsException"}, {"shape":"ThrottlingException"} ], "documentation":"

Allows you to create a workflow with specified steps and step details the workflow invokes after file transfer completes. After creating a workflow, you can associate the workflow created with any transfer servers by specifying the workflow-details field in CreateServer and UpdateServer operations.

" }, "DeleteAccess":{ "name":"DeleteAccess", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DeleteAccessRequest"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Allows you to delete the access specified in the ServerID and ExternalID parameters.

" }, "DeleteServer":{ "name":"DeleteServer", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DeleteServerRequest"}, "errors":[ {"shape":"AccessDeniedException"}, {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Deletes the file transfer protocol-enabled server that you specify.

No response returns from this operation.

" }, "DeleteSshPublicKey":{ "name":"DeleteSshPublicKey", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DeleteSshPublicKeyRequest"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Deletes a user's Secure Shell (SSH) public key.

" }, "DeleteUser":{ "name":"DeleteUser", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DeleteUserRequest"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Deletes the user belonging to a file transfer protocol-enabled server you specify.

No response returns from this operation.

When you delete a user from a server, the user's information is lost.

" }, "DeleteWorkflow":{ "name":"DeleteWorkflow", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DeleteWorkflowRequest"}, "errors":[ {"shape":"AccessDeniedException"}, {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Deletes the specified workflow.

" }, "DescribeAccess":{ "name":"DescribeAccess", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DescribeAccessRequest"}, "output":{"shape":"DescribeAccessResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Describes the access that is assigned to the specific file transfer protocol-enabled server, as identified by its ServerId property and its ExternalID.

The response from this call returns the properties of the access that is associated with the ServerId value that was specified.

" }, "DescribeExecution":{ "name":"DescribeExecution", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DescribeExecutionRequest"}, "output":{"shape":"DescribeExecutionResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

You can use DescribeExecution to check the details of the execution of the specified workflow.

" }, "DescribeSecurityPolicy":{ "name":"DescribeSecurityPolicy", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DescribeSecurityPolicyRequest"}, "output":{"shape":"DescribeSecurityPolicyResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Describes the security policy that is attached to your file transfer protocol-enabled server. The response contains a description of the security policy's properties. For more information about security policies, see Working with security policies.

" }, "DescribeServer":{ "name":"DescribeServer", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DescribeServerRequest"}, "output":{"shape":"DescribeServerResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Describes a file transfer protocol-enabled server that you specify by passing the ServerId parameter.

The response contains a description of a server's properties. When you set EndpointType to VPC, the response will contain the EndpointDetails.

" }, "DescribeUser":{ "name":"DescribeUser", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DescribeUserRequest"}, "output":{"shape":"DescribeUserResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Describes the user assigned to the specific file transfer protocol-enabled server, as identified by its ServerId property.

The response from this call returns the properties of the user associated with the ServerId value that was specified.

" }, "DescribeWorkflow":{ "name":"DescribeWorkflow", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"DescribeWorkflowRequest"}, "output":{"shape":"DescribeWorkflowResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Describes the specified workflow.

" }, "ImportSshPublicKey":{ "name":"ImportSshPublicKey", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ImportSshPublicKeyRequest"}, "output":{"shape":"ImportSshPublicKeyResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceExistsException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Adds a Secure Shell (SSH) public key to a user account identified by a UserName value assigned to the specific file transfer protocol-enabled server, identified by ServerId.

The response returns the UserName value, the ServerId value, and the name of the SshPublicKeyId.

" }, "ListAccesses":{ "name":"ListAccesses", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ListAccessesRequest"}, "output":{"shape":"ListAccessesResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidNextTokenException"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Lists the details for all the accesses you have on your server.

" }, "ListExecutions":{ "name":"ListExecutions", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ListExecutionsRequest"}, "output":{"shape":"ListExecutionsResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidNextTokenException"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Lists all executions for the specified workflow.

" }, "ListSecurityPolicies":{ "name":"ListSecurityPolicies", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ListSecurityPoliciesRequest"}, "output":{"shape":"ListSecurityPoliciesResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidNextTokenException"}, {"shape":"InvalidRequestException"} ], "documentation":"

Lists the security policies that are attached to your file transfer protocol-enabled servers.

" }, "ListServers":{ "name":"ListServers", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ListServersRequest"}, "output":{"shape":"ListServersResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidNextTokenException"}, {"shape":"InvalidRequestException"} ], "documentation":"

Lists the file transfer protocol-enabled servers that are associated with your Amazon Web Services account.

" }, "ListTagsForResource":{ "name":"ListTagsForResource", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ListTagsForResourceRequest"}, "output":{"shape":"ListTagsForResourceResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidNextTokenException"}, {"shape":"InvalidRequestException"} ], "documentation":"

Lists all of the tags associated with the Amazon Resource Name (ARN) that you specify. The resource can be a user, server, or role.

" }, "ListUsers":{ "name":"ListUsers", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ListUsersRequest"}, "output":{"shape":"ListUsersResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidNextTokenException"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Lists the users for a file transfer protocol-enabled server that you specify by passing the ServerId parameter.

" }, "ListWorkflows":{ "name":"ListWorkflows", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"ListWorkflowsRequest"}, "output":{"shape":"ListWorkflowsResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidNextTokenException"}, {"shape":"InvalidRequestException"} ], "documentation":"

Lists all of your workflows.

" }, "SendWorkflowStepState":{ "name":"SendWorkflowStepState", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"SendWorkflowStepStateRequest"}, "output":{"shape":"SendWorkflowStepStateResponse"}, "errors":[ {"shape":"AccessDeniedException"}, {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Sends a callback for asynchronous custom steps.

The ExecutionId, WorkflowId, and Token are passed to the target resource during execution of a custom step of a workflow. You must include those with their callback as well as providing a status.

" }, "StartServer":{ "name":"StartServer", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"StartServerRequest"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Changes the state of a file transfer protocol-enabled server from OFFLINE to ONLINE. It has no impact on a server that is already ONLINE. An ONLINE server can accept and process file transfer jobs.

The state of STARTING indicates that the server is in an intermediate state, either not fully able to respond, or not fully online. The values of START_FAILED can indicate an error condition.

No response is returned from this call.

" }, "StopServer":{ "name":"StopServer", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"StopServerRequest"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Changes the state of a file transfer protocol-enabled server from ONLINE to OFFLINE. An OFFLINE server cannot accept and process file transfer jobs. Information tied to your server, such as server and user properties, are not affected by stopping your server.

Stopping the server will not reduce or impact your file transfer protocol endpoint billing; you must delete the server to stop being billed.

The state of STOPPING indicates that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of STOP_FAILED can indicate an error condition.

No response is returned from this call.

" }, "TagResource":{ "name":"TagResource", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"TagResourceRequest"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Attaches a key-value pair to a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities.

There is no response returned from this call.

" }, "TestIdentityProvider":{ "name":"TestIdentityProvider", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"TestIdentityProviderRequest"}, "output":{"shape":"TestIdentityProviderResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

If the IdentityProviderType of a file transfer protocol-enabled server is AWS_DIRECTORY_SERVICE or API_Gateway, tests whether your identity provider is set up successfully. We highly recommend that you call this operation to test your authentication method as soon as you create your server. By doing so, you can troubleshoot issues with the identity provider integration to ensure that your users can successfully use the service.

The ServerId and UserName parameters are required. The ServerProtocol, SourceIp, and UserPassword are all optional.

You cannot use TestIdentityProvider if the IdentityProviderType of your server is SERVICE_MANAGED.

" }, "UntagResource":{ "name":"UntagResource", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"UntagResourceRequest"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Detaches a key-value pair from a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities.

No response is returned from this call.

" }, "UpdateAccess":{ "name":"UpdateAccess", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"UpdateAccessRequest"}, "output":{"shape":"UpdateAccessResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceExistsException"}, {"shape":"ResourceNotFoundException"} ], "documentation":"

Allows you to update parameters for the access specified in the ServerID and ExternalID parameters.

" }, "UpdateServer":{ "name":"UpdateServer", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"UpdateServerRequest"}, "output":{"shape":"UpdateServerResponse"}, "errors":[ {"shape":"AccessDeniedException"}, {"shape":"ServiceUnavailableException"}, {"shape":"ConflictException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceExistsException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Updates the file transfer protocol-enabled server's properties after that server has been created.

The UpdateServer call returns the ServerId of the server you updated.

" }, "UpdateUser":{ "name":"UpdateUser", "http":{ "method":"POST", "requestUri":"/" }, "input":{"shape":"UpdateUserRequest"}, "output":{"shape":"UpdateUserResponse"}, "errors":[ {"shape":"ServiceUnavailableException"}, {"shape":"InternalServiceError"}, {"shape":"InvalidRequestException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ThrottlingException"} ], "documentation":"

Assigns new properties to a user. Parameters you pass modify any or all of the following: the home directory, role, and policy for the UserName and ServerId you specify.

The response returns the ServerId and the UserName for the updated user.

" } }, "shapes":{ "AccessDeniedException":{ "type":"structure", "members":{ "Message":{"shape":"ServiceErrorMessage"} }, "documentation":"

You do not have sufficient access to perform this action.

", "exception":true, "synthetic":true }, "AddressAllocationId":{"type":"string"}, "AddressAllocationIds":{ "type":"list", "member":{"shape":"AddressAllocationId"} }, "Arn":{ "type":"string", "max":1600, "min":20, "pattern":"arn:.*" }, "CallbackToken":{ "type":"string", "max":64, "min":1, "pattern":"\\w+" }, "Certificate":{ "type":"string", "max":1600 }, "ConflictException":{ "type":"structure", "required":["Message"], "members":{ "Message":{"shape":"Message"} }, "documentation":"

This exception is thrown when the UpdateServer is called for a file transfer protocol-enabled server that has VPC as the endpoint type and the server's VpcEndpointID is not in the available state.

", "exception":true }, "CopyStepDetails":{ "type":"structure", "members":{ "Name":{ "shape":"WorkflowStepName", "documentation":"

The name of the step, used as an identifier.

" }, "DestinationFileLocation":{"shape":"InputFileLocation"}, "OverwriteExisting":{ "shape":"OverwriteExisting", "documentation":"

A flag that indicates whether or not to overwrite an existing file of the same name. The default is FALSE.

" } }, "documentation":"

Each step type has its own StepDetails structure.

" }, "CreateAccessRequest":{ "type":"structure", "required":[ "Role", "ServerId", "ExternalId" ], "members":{ "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "HomeDirectoryMappings":{ "shape":"HomeDirectoryMappings", "documentation":"

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Amazon Web Services Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.

The following is an Entry and Target pair example.

[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

In most cases, you can use this value instead of the session policy to lock down your user to the designated home directory (\"chroot\"). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.

The following is an Entry and Target pair example for chroot.

[ { \"Entry:\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

If the target of a logical directory entry does not exist in Amazon S3 or EFS, the entry is ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0 byte objects as place holders for your directory. If using the CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you use the following: aws s3api put-object --bucket bucketname --key path/to/folder/. Make sure that the end of the key name ends in a / for it to be considered a folder.

" }, "Policy":{ "shape":"Policy", "documentation":"

A session policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.

This only applies when the domain of ServerId is S3. EFS does not use session policies.

For session policies, Amazon Web Services Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.

For an example of a session policy, see Example session policy.

For more information, see AssumeRole in the Amazon Web Services Security Token Service API Reference.

" }, "PosixProfile":{"shape":"PosixProfile"}, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web Services Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.

Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid

In that command, replace YourGroupName with the name of your Active Directory group.

The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-

" } } }, "CreateAccessResponse":{ "type":"structure", "required":[ "ServerId", "ExternalId" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

The ID of the server that the user is attached to.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

The external ID of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web Services Transfer Family.

" } } }, "CreateServerRequest":{ "type":"structure", "members":{ "Certificate":{ "shape":"Certificate", "documentation":"

The Amazon Resource Name (ARN) of the Amazon Web Services Certificate Manager (ACM) certificate. Required when Protocols is set to FTPS.

To request a new public certificate, see Request a public certificate in the Amazon Web Services Certificate Manager User Guide.

To import an existing certificate into ACM, see Importing certificates into ACM in the Amazon Web Services Certificate Manager User Guide.

To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the Amazon Web Services Certificate Manager User Guide.

Certificates with the following cryptographic algorithms and key sizes are supported:

The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.

" }, "Domain":{ "shape":"Domain", "documentation":"

The domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.

After the server is created, the domain cannot be changed.

" }, "EndpointDetails":{ "shape":"EndpointDetails", "documentation":"

The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make it accessible only to resources within your VPC, or you can attach Elastic IP addresses and make it accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.

" }, "EndpointType":{ "shape":"EndpointType", "documentation":"

The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.

After May 19, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT in your Amazon Web Services account if your account hasn't already done so before May 19, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT in your Amazon Web Services account on or before May 19, 2021, you will not be affected. After this date, use EndpointType=VPC.

For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.

It is recommended that you use VPC as the EndpointType. With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with EndpointType set to VPC_ENDPOINT.

" }, "HostKey":{ "shape":"HostKey", "documentation":"

The RSA private key as generated by the ssh-keygen -N \"\" -m PEM -f my-new-server-key command.

If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive.

For more information, see Change the host key for your SFTP-enabled server in the Amazon Web Services Transfer Family User Guide.

" }, "IdentityProviderDetails":{ "shape":"IdentityProviderDetails", "documentation":"

Required when IdentityProviderType is set to AWS_DIRECTORY_SERVICE or API_GATEWAY. Accepts an array containing all of the information required to use a directory in AWS_DIRECTORY_SERVICE or invoke a customer-supplied authentication API, including the API Gateway URL. Not required when IdentityProviderType is set to SERVICE_MANAGED.

" }, "IdentityProviderType":{ "shape":"IdentityProviderType", "documentation":"

Specifies the mode of authentication for a server. The default value is SERVICE_MANAGED, which allows you to store and access user credentials within the Amazon Web Services Transfer Family service.

Use AWS_DIRECTORY_SERVICE to provide access to Active Directory groups in Amazon Web Services Managed Active Directory or Microsoft Active Directory in your on-premises environment or in Amazon Web Services using AD Connectors. This option also requires you to provide a Directory ID using the IdentityProviderDetails parameter.

Use the API_GATEWAY value to integrate with an identity provider of your choosing. The API_GATEWAY setting requires you to provide an API Gateway endpoint URL to call for authentication using the IdentityProviderDetails parameter.

" }, "LoggingRole":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the Amazon Web Services Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFS events. When set, user activity can be viewed in your CloudWatch logs.

" }, "Protocols":{ "shape":"Protocols", "documentation":"

Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:

If you select FTPS, you must choose a certificate stored in Amazon Web Services Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS.

If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY.

If Protocol includes FTP, then AddressAllocationIds cannot be associated.

If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set to SERVICE_MANAGED.

" }, "SecurityPolicyName":{ "shape":"SecurityPolicyName", "documentation":"

Specifies the name of the security policy that is attached to the server.

" }, "Tags":{ "shape":"Tags", "documentation":"

Key-value pairs that can be used to group and search for servers.

" }, "WorkflowDetails":{ "shape":"WorkflowDetails", "documentation":"

Specifies the workflow ID for the workflow to assign and the execution role used for executing the workflow.

" } } }, "CreateServerResponse":{ "type":"structure", "required":["ServerId"], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

The service-assigned ID of the server that is created.

" } } }, "CreateUserRequest":{ "type":"structure", "required":[ "Role", "ServerId", "UserName" ], "members":{ "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "HomeDirectoryMappings":{ "shape":"HomeDirectoryMappings", "documentation":"

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Amazon Web Services Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.

The following is an Entry and Target pair example.

[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory (\"chroot\"). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.

The following is an Entry and Target pair example for chroot.

[ { \"Entry:\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

If the target of a logical directory entry does not exist in Amazon S3 or EFS, the entry is ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0 byte objects as place holders for your directory. If using the CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you use the following: aws s3api put-object --bucket bucketname --key path/to/folder/. Make sure that the end of the key name ends in a / for it to be considered a folder.

" }, "Policy":{ "shape":"Policy", "documentation":"

A session policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.

This only applies when the domain of ServerId is S3. EFS does not use session policies.

For session policies, Amazon Web Services Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.

For an example of a session policy, see Example session policy.

For more information, see AssumeRole in the Amazon Web Services Security Token Service API Reference.

" }, "PosixProfile":{ "shape":"PosixProfile", "documentation":"

Specifies the full POSIX identity, including user ID (Uid), group ID (Gid), and any secondary groups IDs (SecondaryGids), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in Amazon EFS determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.

" }, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.

" }, "SshPublicKeyBody":{ "shape":"SshPublicKeyBody", "documentation":"

The public portion of the Secure Shell (SSH) key used to authenticate the user to the server.

" }, "Tags":{ "shape":"Tags", "documentation":"

Key-value pairs that can be used to group and search for users. Tags are metadata attached to users for any purpose.

" }, "UserName":{ "shape":"UserName", "documentation":"

A unique string that identifies a user and is associated with a ServerId. This user name must be a minimum of 3 and a maximum of 100 characters long. The following are valid characters: a-z, A-Z, 0-9, underscore '_', hyphen '-', period '.', and at sign '@'. The user name can't start with a hyphen, period, or at sign.

" } } }, "CreateUserResponse":{ "type":"structure", "required":[ "ServerId", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

The ID of the server that the user is attached to.

" }, "UserName":{ "shape":"UserName", "documentation":"

A unique string that identifies a user account associated with a server.

" } } }, "CreateWorkflowRequest":{ "type":"structure", "required":["Steps"], "members":{ "Description":{ "shape":"WorkflowDescription", "documentation":"

A textual description for the workflow.

" }, "Steps":{ "shape":"WorkflowSteps", "documentation":"

Specifies the details for the steps that are in the specified workflow.

The TYPE specifies which of the following actions is being taken for this step.

Currently, copying and tagging are supported only on S3.

For file location, you specify either the S3 bucket and key, or the EFS filesystem ID and path.

" }, "OnExceptionSteps":{ "shape":"WorkflowSteps", "documentation":"

Specifies the steps (actions) to take if errors are encountered during execution of the workflow.

For custom steps, the lambda function needs to send FAILURE to the call back API to kick off the exception steps. Additionally, if the lambda does not send SUCCESS before it times out, the exception steps are executed.

" }, "Tags":{ "shape":"Tags", "documentation":"

Key-value pairs that can be used to group and search for workflows. Tags are metadata attached to workflows for any purpose.

" } } }, "CreateWorkflowResponse":{ "type":"structure", "required":["WorkflowId"], "members":{ "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" } } }, "CustomStepDetails":{ "type":"structure", "members":{ "Name":{ "shape":"WorkflowStepName", "documentation":"

The name of the step, used as an identifier.

" }, "Target":{ "shape":"CustomStepTarget", "documentation":"

The ARN for the lambda function that is being called.

" }, "TimeoutSeconds":{ "shape":"CustomStepTimeoutSeconds", "documentation":"

Timeout, in seconds, for the step.

" } }, "documentation":"

Each step type has its own StepDetails structure.

" }, "CustomStepStatus":{ "type":"string", "enum":[ "SUCCESS", "FAILURE" ] }, "CustomStepTarget":{ "type":"string", "max":170, "pattern":"arn:[a-z-]+:lambda:.*$" }, "CustomStepTimeoutSeconds":{ "type":"integer", "max":1800, "min":1 }, "DateImported":{"type":"timestamp"}, "DeleteAccessRequest":{ "type":"structure", "required":[ "ServerId", "ExternalId" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has this user assigned.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web Services Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.

Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid

In that command, replace YourGroupName with the name of your Active Directory group.

The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-

" } } }, "DeleteServerRequest":{ "type":"structure", "required":["ServerId"], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A unique system-assigned identifier for a server instance.

" } } }, "DeleteSshPublicKeyRequest":{ "type":"structure", "required":[ "ServerId", "SshPublicKeyId", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a file transfer protocol-enabled server instance that has the user assigned to it.

" }, "SshPublicKeyId":{ "shape":"SshPublicKeyId", "documentation":"

A unique identifier used to reference your user's specific SSH key.

" }, "UserName":{ "shape":"UserName", "documentation":"

A unique string that identifies a user whose public key is being deleted.

" } } }, "DeleteStepDetails":{ "type":"structure", "members":{ "Name":{ "shape":"WorkflowStepName", "documentation":"

The name of the step, used as an identifier.

" } }, "documentation":"

The name of the step, used to identify the delete step.

" }, "DeleteUserRequest":{ "type":"structure", "required":[ "ServerId", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server instance that has the user assigned to it.

" }, "UserName":{ "shape":"UserName", "documentation":"

A unique string that identifies a user that is being deleted from a server.

" } } }, "DeleteWorkflowRequest":{ "type":"structure", "required":["WorkflowId"], "members":{ "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" } } }, "DescribeAccessRequest":{ "type":"structure", "required":[ "ServerId", "ExternalId" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has this access assigned.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web Services Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.

Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid

In that command, replace YourGroupName with the name of your Active Directory group.

The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-

" } } }, "DescribeAccessResponse":{ "type":"structure", "required":[ "ServerId", "Access" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has this access assigned.

" }, "Access":{ "shape":"DescribedAccess", "documentation":"

The external ID of the server that the access is attached to.

" } } }, "DescribeExecutionRequest":{ "type":"structure", "required":[ "ExecutionId", "WorkflowId" ], "members":{ "ExecutionId":{ "shape":"ExecutionId", "documentation":"

A unique identifier for the execution of a workflow.

" }, "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" } } }, "DescribeExecutionResponse":{ "type":"structure", "required":[ "WorkflowId", "Execution" ], "members":{ "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" }, "Execution":{ "shape":"DescribedExecution", "documentation":"

The structure that contains the details of the workflow' execution.

" } } }, "DescribeSecurityPolicyRequest":{ "type":"structure", "required":["SecurityPolicyName"], "members":{ "SecurityPolicyName":{ "shape":"SecurityPolicyName", "documentation":"

Specifies the name of the security policy that is attached to the server.

" } } }, "DescribeSecurityPolicyResponse":{ "type":"structure", "required":["SecurityPolicy"], "members":{ "SecurityPolicy":{ "shape":"DescribedSecurityPolicy", "documentation":"

An array containing the properties of the security policy.

" } } }, "DescribeServerRequest":{ "type":"structure", "required":["ServerId"], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server.

" } } }, "DescribeServerResponse":{ "type":"structure", "required":["Server"], "members":{ "Server":{ "shape":"DescribedServer", "documentation":"

An array containing the properties of a server with the ServerID you specified.

" } } }, "DescribeUserRequest":{ "type":"structure", "required":[ "ServerId", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has this user assigned.

" }, "UserName":{ "shape":"UserName", "documentation":"

The name of the user assigned to one or more servers. User names are part of the sign-in credentials to use the Amazon Web Services Transfer Family service and perform file transfer tasks.

" } } }, "DescribeUserResponse":{ "type":"structure", "required":[ "ServerId", "User" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has this user assigned.

" }, "User":{ "shape":"DescribedUser", "documentation":"

An array containing the properties of the user account for the ServerID value that you specified.

" } } }, "DescribeWorkflowRequest":{ "type":"structure", "required":["WorkflowId"], "members":{ "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" } } }, "DescribeWorkflowResponse":{ "type":"structure", "required":["Workflow"], "members":{ "Workflow":{ "shape":"DescribedWorkflow", "documentation":"

The structure that contains the details of the workflow.

" } } }, "DescribedAccess":{ "type":"structure", "members":{ "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryMappings":{ "shape":"HomeDirectoryMappings", "documentation":"

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Amazon Web Services Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.

In most cases, you can use this value instead of the session policy to lock down the associated access to the designated home directory (\"chroot\"). To do this, you can set Entry to '/' and set Target to the HomeDirectory parameter value.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "Policy":{ "shape":"Policy", "documentation":"

A session policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.

" }, "PosixProfile":{"shape":"PosixProfile"}, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web Services Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.

Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid

In that command, replace YourGroupName with the name of your Active Directory group.

The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-

" } }, "documentation":"

Describes the properties of the access that was specified.

" }, "DescribedExecution":{ "type":"structure", "members":{ "ExecutionId":{ "shape":"ExecutionId", "documentation":"

A unique identifier for the execution of a workflow.

" }, "InitialFileLocation":{ "shape":"FileLocation", "documentation":"

A structure that describes the Amazon S3 or EFS file location. This is the file location when the execution begins: if the file is being copied, this is the initial (as opposed to destination) file location.

" }, "ServiceMetadata":{ "shape":"ServiceMetadata", "documentation":"

A container object for the session details associated with a workflow.

" }, "ExecutionRole":{ "shape":"Role", "documentation":"

The IAM role associated with the execution.

" }, "LoggingConfiguration":{ "shape":"LoggingConfiguration", "documentation":"

The IAM logging role associated with the execution.

" }, "PosixProfile":{"shape":"PosixProfile"}, "Status":{ "shape":"ExecutionStatus", "documentation":"

The status is one of the execution. Can be in progress, completed, exception encountered, or handling the exception.

" }, "Results":{ "shape":"ExecutionResults", "documentation":"

A structure that describes the execution results. This includes a list of the steps along with the details of each step, error type and message (if any), and the OnExceptionSteps structure.

" } }, "documentation":"

The details for an execution object.

" }, "DescribedSecurityPolicy":{ "type":"structure", "required":["SecurityPolicyName"], "members":{ "Fips":{ "shape":"Fips", "documentation":"

Specifies whether this policy enables Federal Information Processing Standards (FIPS).

" }, "SecurityPolicyName":{ "shape":"SecurityPolicyName", "documentation":"

Specifies the name of the security policy that is attached to the server.

" }, "SshCiphers":{ "shape":"SecurityPolicyOptions", "documentation":"

Specifies the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server.

" }, "SshKexs":{ "shape":"SecurityPolicyOptions", "documentation":"

Specifies the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server.

" }, "SshMacs":{ "shape":"SecurityPolicyOptions", "documentation":"

Specifies the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server.

" }, "TlsCiphers":{ "shape":"SecurityPolicyOptions", "documentation":"

Specifies the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.

" } }, "documentation":"

Describes the properties of a security policy that was specified. For more information about security policies, see Working with security policies.

" }, "DescribedServer":{ "type":"structure", "required":["Arn"], "members":{ "Arn":{ "shape":"Arn", "documentation":"

Specifies the unique Amazon Resource Name (ARN) of the server.

" }, "Certificate":{ "shape":"Certificate", "documentation":"

Specifies the ARN of the Amazon Web ServicesCertificate Manager (ACM) certificate. Required when Protocols is set to FTPS.

" }, "ProtocolDetails":{ "shape":"ProtocolDetails", "documentation":"

The protocol settings that are configured for your server.

Use the PassiveIp parameter to indicate passive mode. Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer.

" }, "Domain":{ "shape":"Domain", "documentation":"

Specifies the domain of the storage system that is used for file transfers.

" }, "EndpointDetails":{ "shape":"EndpointDetails", "documentation":"

The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make it accessible only to resources within your VPC, or you can attach Elastic IP addresses and make it accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.

" }, "EndpointType":{ "shape":"EndpointType", "documentation":"

Defines the type of endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.

" }, "HostKeyFingerprint":{ "shape":"HostKeyFingerprint", "documentation":"

Specifies the Base64-encoded SHA256 fingerprint of the server's host key. This value is equivalent to the output of the ssh-keygen -l -f my-new-server-key command.

" }, "IdentityProviderDetails":{ "shape":"IdentityProviderDetails", "documentation":"

Specifies information to call a customer-supplied authentication API. This field is not populated when the IdentityProviderType of a server is AWS_DIRECTORY_SERVICE or SERVICE_MANAGED.

" }, "IdentityProviderType":{ "shape":"IdentityProviderType", "documentation":"

Specifies the mode of authentication for a server. The default value is SERVICE_MANAGED, which allows you to store and access user credentials within the Amazon Web Services Transfer Family service.

Use AWS_DIRECTORY_SERVICE to provide access to Active Directory groups in Amazon Web Services Managed Active Directory or Microsoft Active Directory in your on-premises environment or in Amazon Web Services using AD Connectors. This option also requires you to provide a Directory ID using the IdentityProviderDetails parameter.

Use the API_GATEWAY value to integrate with an identity provider of your choosing. The API_GATEWAY setting requires you to provide an API Gateway endpoint URL to call for authentication using the IdentityProviderDetails parameter.

" }, "LoggingRole":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the Amazon Web Services Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFS events. When set, user activity can be viewed in your CloudWatch logs.

" }, "Protocols":{ "shape":"Protocols", "documentation":"

Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:

" }, "SecurityPolicyName":{ "shape":"SecurityPolicyName", "documentation":"

Specifies the name of the security policy that is attached to the server.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

Specifies the unique system-assigned identifier for a server that you instantiate.

" }, "State":{ "shape":"State", "documentation":"

Specifies the condition of a server for the server that was described. A value of ONLINE indicates that the server can accept jobs and transfer files. A State value of OFFLINE means that the server cannot perform file transfer operations.

The states of STARTING and STOPPING indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED or STOP_FAILED can indicate an error condition.

" }, "Tags":{ "shape":"Tags", "documentation":"

Specifies the key-value pairs that you can use to search for and group servers that were assigned to the server that was described.

" }, "UserCount":{ "shape":"UserCount", "documentation":"

Specifies the number of users that are assigned to a server you specified with the ServerId.

" }, "WorkflowDetails":{ "shape":"WorkflowDetails", "documentation":"

Specifies the workflow ID for the workflow to assign and the execution role used for executing the workflow.

" } }, "documentation":"

Describes the properties of a file transfer protocol-enabled server that was specified.

" }, "DescribedUser":{ "type":"structure", "required":["Arn"], "members":{ "Arn":{ "shape":"Arn", "documentation":"

Specifies the unique Amazon Resource Name (ARN) for the user that was requested to be described.

" }, "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryMappings":{ "shape":"HomeDirectoryMappings", "documentation":"

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Amazon Web Services Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.

In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory (\"chroot\"). To do this, you can set Entry to '/' and set Target to the HomeDirectory parameter value.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "Policy":{ "shape":"Policy", "documentation":"

A session policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.

" }, "PosixProfile":{ "shape":"PosixProfile", "documentation":"

Specifies the full POSIX identity, including user ID (Uid), group ID (Gid), and any secondary groups IDs (SecondaryGids), that controls your users' access to your Amazon Elastic File System (Amazon EFS) file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.

" }, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

" }, "SshPublicKeys":{ "shape":"SshPublicKeys", "documentation":"

Specifies the public key portion of the Secure Shell (SSH) keys stored for the described user.

" }, "Tags":{ "shape":"Tags", "documentation":"

Specifies the key-value pairs for the user requested. Tag can be used to search for and group users for a variety of purposes.

" }, "UserName":{ "shape":"UserName", "documentation":"

Specifies the name of the user that was requested to be described. User names are used for authentication purposes. This is the string that will be used by your user when they log in to your server.

" } }, "documentation":"

Describes the properties of a user that was specified.

" }, "DescribedWorkflow":{ "type":"structure", "required":["Arn"], "members":{ "Arn":{ "shape":"Arn", "documentation":"

Specifies the unique Amazon Resource Name (ARN) for the workflow.

" }, "Description":{ "shape":"WorkflowDescription", "documentation":"

Specifies the text description for the workflow.

" }, "Steps":{ "shape":"WorkflowSteps", "documentation":"

Specifies the details for the steps that are in the specified workflow.

" }, "OnExceptionSteps":{ "shape":"WorkflowSteps", "documentation":"

Specifies the steps (actions) to take if errors are encountered during execution of the workflow.

" }, "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" }, "Tags":{ "shape":"Tags", "documentation":"

Key-value pairs that can be used to group and search for workflows. Tags are metadata attached to workflows for any purpose.

" } }, "documentation":"

Describes the properties of the specified workflow

" }, "DirectoryId":{ "type":"string", "max":12, "min":12, "pattern":"^d-[0-9a-f]{10}$" }, "Domain":{ "type":"string", "enum":[ "S3", "EFS" ] }, "EfsFileLocation":{ "type":"structure", "members":{ "FileSystemId":{ "shape":"EfsFileSystemId", "documentation":"

The ID of the file system, assigned by Amazon EFS.

" }, "Path":{ "shape":"EfsPath", "documentation":"

The pathname for the folder being used by a workflow.

" } }, "documentation":"

Reserved for future use.

" }, "EfsFileSystemId":{ "type":"string", "max":128, "pattern":"^(arn:aws[-a-z]*:elasticfilesystem:[0-9a-z-:]+:(access-point/fsap|file-system/fs)-[0-9a-f]{8,40}|fs(ap)?-[0-9a-f]{8,40})$" }, "EfsPath":{ "type":"string", "max":100, "min":1, "pattern":"^(\\/|(\\/(?!\\.)+[^$#<>;`|&?{}^*/\\n]+){1,4})$" }, "EndpointDetails":{ "type":"structure", "members":{ "AddressAllocationIds":{ "shape":"AddressAllocationIds", "documentation":"

A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.

This property can only be set when EndpointType is set to VPC and it is only valid in the UpdateServer API.

" }, "SubnetIds":{ "shape":"SubnetIds", "documentation":"

A list of subnet IDs that are required to host your server endpoint in your VPC.

This property can only be set when EndpointType is set to VPC.

" }, "VpcEndpointId":{ "shape":"VpcEndpointId", "documentation":"

The ID of the VPC endpoint.

This property can only be set when EndpointType is set to VPC_ENDPOINT.

For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.

" }, "VpcId":{ "shape":"VpcId", "documentation":"

The VPC ID of the VPC in which a server's endpoint will be hosted.

This property can only be set when EndpointType is set to VPC.

" }, "SecurityGroupIds":{ "shape":"SecurityGroupIds", "documentation":"

A list of security groups IDs that are available to attach to your server's endpoint.

This property can only be set when EndpointType is set to VPC.

You can edit the SecurityGroupIds property in the UpdateServer API only if you are changing the EndpointType from PUBLIC or VPC_ENDPOINT to VPC. To change security groups associated with your server's VPC endpoint after creation, use the Amazon EC2 ModifyVpcEndpoint API.

" } }, "documentation":"

The virtual private cloud (VPC) endpoint settings that are configured for your file transfer protocol-enabled server. With a VPC endpoint, you can restrict access to your server and resources only within your VPC. To control incoming internet traffic, invoke the UpdateServer API and attach an Elastic IP address to your server's endpoint.

After May 19, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT in your Amazon Web Servicesaccount if your account hasn't already done so before May 19, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT in your Amazon Web Servicesaccount on or before May 19, 2021, you will not be affected. After this date, use EndpointType=VPC.

For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.

" }, "EndpointType":{ "type":"string", "enum":[ "PUBLIC", "VPC", "VPC_ENDPOINT" ] }, "ExecutionError":{ "type":"structure", "required":[ "Type", "Message" ], "members":{ "Type":{ "shape":"ExecutionErrorType", "documentation":"

Specifies the error type: currently, the only valid value is PERMISSION_DENIED, which occurs if your policy does not contain the correct permissions to complete one or more of the steps in the workflow.

" }, "Message":{ "shape":"ExecutionErrorMessage", "documentation":"

Specifies the descriptive message that corresponds to the ErrorType.

" } }, "documentation":"

Specifies the error message and type, for an error that occurs during the execution of the workflow.

" }, "ExecutionErrorMessage":{"type":"string"}, "ExecutionErrorType":{ "type":"string", "enum":["PERMISSION_DENIED"] }, "ExecutionId":{ "type":"string", "max":36, "min":36, "pattern":"^[0-9a-fA-F]{8}\\-[0-9a-fA-F]{4}\\-[0-9a-fA-F]{4}\\-[0-9a-fA-F]{4}\\-[0-9a-fA-F]{12}$" }, "ExecutionResults":{ "type":"structure", "members":{ "Steps":{ "shape":"ExecutionStepResults", "documentation":"

Specifies the details for the steps that are in the specified workflow.

" }, "OnExceptionSteps":{ "shape":"ExecutionStepResults", "documentation":"

Specifies the steps (actions) to take if errors are encountered during execution of the workflow.

" } }, "documentation":"

Specifies the steps in the workflow, as well as the steps to execute in case of any errors during workflow execution.

" }, "ExecutionStatus":{ "type":"string", "enum":[ "IN_PROGRESS", "COMPLETED", "EXCEPTION", "HANDLING_EXCEPTION" ] }, "ExecutionStepResult":{ "type":"structure", "members":{ "StepType":{ "shape":"WorkflowStepType", "documentation":"

One of the available step types.

" }, "Outputs":{ "shape":"StepResultOutputsJson", "documentation":"

The values for the key/value pair applied as a tag to the file. Only applicable if the step type is TAG.

" }, "Error":{ "shape":"ExecutionError", "documentation":"

Specifies the details for an error, if it occurred during execution of the specified workfow step.

" } }, "documentation":"

Specifies the following details for the step: error (if any), outputs (if any), and the step type.

" }, "ExecutionStepResults":{ "type":"list", "member":{"shape":"ExecutionStepResult"}, "max":50, "min":1 }, "ExternalId":{ "type":"string", "max":256, "min":1, "pattern":"^S-1-[\\d-]+$" }, "FileLocation":{ "type":"structure", "members":{ "S3FileLocation":{ "shape":"S3FileLocation", "documentation":"

Specifies the S3 details for the file being used, such as bucket, Etag, and so forth.

" }, "EfsFileLocation":{ "shape":"EfsFileLocation", "documentation":"

Specifies the Amazon EFS ID and the path for the file being used.

" } }, "documentation":"

Specifies the Amazon S3 or EFS file details to be used in the step.

" }, "Fips":{"type":"boolean"}, "HomeDirectory":{ "type":"string", "max":1024, "pattern":"^$|/.*" }, "HomeDirectoryMapEntry":{ "type":"structure", "required":[ "Entry", "Target" ], "members":{ "Entry":{ "shape":"MapEntry", "documentation":"

Represents an entry for HomeDirectoryMappings.

" }, "Target":{ "shape":"MapTarget", "documentation":"

Represents the map target that is used in a HomeDirectorymapEntry.

" } }, "documentation":"

Represents an object that contains entries and targets for HomeDirectoryMappings.

The following is an Entry and Target pair example for chroot.

[ { \"Entry:\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

If the target of a logical directory entry does not exist in Amazon S3 or EFS, the entry is ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0 byte objects as place holders for your directory. If using the CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you use the following: aws s3api put-object --bucket bucketname --key path/to/folder/. Make sure that the end of the key name ends in a / for it to be considered a folder.

" }, "HomeDirectoryMappings":{ "type":"list", "member":{"shape":"HomeDirectoryMapEntry"}, "max":50, "min":1 }, "HomeDirectoryType":{ "type":"string", "enum":[ "PATH", "LOGICAL" ] }, "HostKey":{ "type":"string", "max":4096, "sensitive":true }, "HostKeyFingerprint":{"type":"string"}, "IdentityProviderDetails":{ "type":"structure", "members":{ "Url":{ "shape":"Url", "documentation":"

Provides the location of the service endpoint used to authenticate users.

" }, "InvocationRole":{ "shape":"Role", "documentation":"

Provides the type of InvocationRole used to authenticate the user account.

" }, "DirectoryId":{ "shape":"DirectoryId", "documentation":"

The identifier of the Amazon Web ServicesDirectory Service directory that you want to stop sharing.

" } }, "documentation":"

Returns information related to the type of user authentication that is in use for a file transfer protocol-enabled server's users. A server can have only one method of authentication.

" }, "IdentityProviderType":{ "type":"string", "documentation":"

Returns information related to the type of user authentication that is in use for a file transfer protocol-enabled server's users. For AWS_DIRECTORY_SERVICE or SERVICE_MANAGED authentication, the Secure Shell (SSH) public keys are stored with a user on the server instance. For API_GATEWAY authentication, your custom authentication method is implemented by using an API call. The server can have only one method of authentication.

", "enum":[ "SERVICE_MANAGED", "API_GATEWAY", "AWS_DIRECTORY_SERVICE" ] }, "ImportSshPublicKeyRequest":{ "type":"structure", "required":[ "ServerId", "SshPublicKeyBody", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server.

" }, "SshPublicKeyBody":{ "shape":"SshPublicKeyBody", "documentation":"

The public key portion of an SSH key pair.

" }, "UserName":{ "shape":"UserName", "documentation":"

The name of the user account that is assigned to one or more servers.

" } } }, "ImportSshPublicKeyResponse":{ "type":"structure", "required":[ "ServerId", "SshPublicKeyId", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server.

" }, "SshPublicKeyId":{ "shape":"SshPublicKeyId", "documentation":"

The name given to a public key by the system that was imported.

" }, "UserName":{ "shape":"UserName", "documentation":"

A user name assigned to the ServerID value that you specified.

" } }, "documentation":"

Identifies the user, the server they belong to, and the identifier of the SSH public key associated with that user. A user can have more than one key on each server that they are associated with.

" }, "InputFileLocation":{ "type":"structure", "members":{ "S3FileLocation":{ "shape":"S3InputFileLocation", "documentation":"

Specifies the details for the S3 file being copied.

" }, "EfsFileLocation":{ "shape":"EfsFileLocation", "documentation":"

Reserved for future use.

" } }, "documentation":"

Specifies the location for the file being copied. Only applicable for the Copy type of workflow steps.

" }, "InternalServiceError":{ "type":"structure", "required":["Message"], "members":{ "Message":{"shape":"Message"} }, "documentation":"

This exception is thrown when an error occurs in the Amazon Web ServicesTransfer Family service.

", "exception":true, "fault":true }, "InvalidNextTokenException":{ "type":"structure", "required":["Message"], "members":{ "Message":{"shape":"Message"} }, "documentation":"

The NextToken parameter that was passed is invalid.

", "exception":true }, "InvalidRequestException":{ "type":"structure", "required":["Message"], "members":{ "Message":{"shape":"Message"} }, "documentation":"

This exception is thrown when the client submits a malformed request.

", "exception":true }, "ListAccessesRequest":{ "type":"structure", "required":["ServerId"], "members":{ "MaxResults":{ "shape":"MaxResults", "documentation":"

Specifies the maximum number of access SIDs to return.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

When you can get additional results from the ListAccesses call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional accesses.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has users assigned to it.

" } } }, "ListAccessesResponse":{ "type":"structure", "required":[ "ServerId", "Accesses" ], "members":{ "NextToken":{ "shape":"NextToken", "documentation":"

When you can get additional results from the ListAccesses call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional accesses.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has users assigned to it.

" }, "Accesses":{ "shape":"ListedAccesses", "documentation":"

Returns the accesses and their properties for the ServerId value that you specify.

" } } }, "ListExecutionsRequest":{ "type":"structure", "required":["WorkflowId"], "members":{ "MaxResults":{ "shape":"MaxResults", "documentation":"

Specifies the aximum number of executions to return.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

ListExecutions returns the NextToken parameter in the output. You can then pass the NextToken parameter in a subsequent command to continue listing additional executions.

This is useful for pagination, for instance. If you have 100 executions for a workflow, you might only want to list first 10. If so, callthe API by specifing the max-results:

aws transfer list-executions --max-results 10

This returns details for the first 10 executions, as well as the pointer (NextToken) to the eleventh execution. You can now call the API again, suppling the NextToken value you received:

aws transfer list-executions --max-results 10 --next-token $somePointerReturnedFromPreviousListResult

This call returns the next 10 executions, the 11th through the 20th. You can then repeat the call until the details for all 100 executions have been returned.

" }, "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" } } }, "ListExecutionsResponse":{ "type":"structure", "required":[ "WorkflowId", "Executions" ], "members":{ "NextToken":{ "shape":"NextToken", "documentation":"

ListExecutions returns the NextToken parameter in the output. You can then pass the NextToken parameter in a subsequent command to continue listing additional executions.

" }, "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" }, "Executions":{ "shape":"ListedExecutions", "documentation":"

Returns the details for each execution.

" } } }, "ListSecurityPoliciesRequest":{ "type":"structure", "members":{ "MaxResults":{ "shape":"MaxResults", "documentation":"

Specifies the number of security policies to return as a response to the ListSecurityPolicies query.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

When additional results are obtained from the ListSecurityPolicies command, a NextToken parameter is returned in the output. You can then pass the NextToken parameter in a subsequent command to continue listing additional security policies.

" } } }, "ListSecurityPoliciesResponse":{ "type":"structure", "required":["SecurityPolicyNames"], "members":{ "NextToken":{ "shape":"NextToken", "documentation":"

When you can get additional results from the ListSecurityPolicies operation, a NextToken parameter is returned in the output. In a following command, you can pass in the NextToken parameter to continue listing security policies.

" }, "SecurityPolicyNames":{ "shape":"SecurityPolicyNames", "documentation":"

An array of security policies that were listed.

" } } }, "ListServersRequest":{ "type":"structure", "members":{ "MaxResults":{ "shape":"MaxResults", "documentation":"

Specifies the number of servers to return as a response to the ListServers query.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

When additional results are obtained from the ListServers command, a NextToken parameter is returned in the output. You can then pass the NextToken parameter in a subsequent command to continue listing additional servers.

" } } }, "ListServersResponse":{ "type":"structure", "required":["Servers"], "members":{ "NextToken":{ "shape":"NextToken", "documentation":"

When you can get additional results from the ListServers operation, a NextToken parameter is returned in the output. In a following command, you can pass in the NextToken parameter to continue listing additional servers.

" }, "Servers":{ "shape":"ListedServers", "documentation":"

An array of servers that were listed.

" } } }, "ListTagsForResourceRequest":{ "type":"structure", "required":["Arn"], "members":{ "Arn":{ "shape":"Arn", "documentation":"

Requests the tags associated with a particular Amazon Resource Name (ARN). An ARN is an identifier for a specific Amazon Web Services resource, such as a server, user, or role.

" }, "MaxResults":{ "shape":"MaxResults", "documentation":"

Specifies the number of tags to return as a response to the ListTagsForResource request.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

When you request additional results from the ListTagsForResource operation, a NextToken parameter is returned in the input. You can then pass in a subsequent command to the NextToken parameter to continue listing additional tags.

" } } }, "ListTagsForResourceResponse":{ "type":"structure", "members":{ "Arn":{ "shape":"Arn", "documentation":"

The ARN you specified to list the tags of.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

When you can get additional results from the ListTagsForResource call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional tags.

" }, "Tags":{ "shape":"Tags", "documentation":"

Key-value pairs that are assigned to a resource, usually for the purpose of grouping and searching for items. Tags are metadata that you define.

" } } }, "ListUsersRequest":{ "type":"structure", "required":["ServerId"], "members":{ "MaxResults":{ "shape":"MaxResults", "documentation":"

Specifies the number of users to return as a response to the ListUsers request.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

When you can get additional results from the ListUsers call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional users.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that has users assigned to it.

" } } }, "ListUsersResponse":{ "type":"structure", "required":[ "ServerId", "Users" ], "members":{ "NextToken":{ "shape":"NextToken", "documentation":"

When you can get additional results from the ListUsers call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional users.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that the users are assigned to.

" }, "Users":{ "shape":"ListedUsers", "documentation":"

Returns the user accounts and their properties for the ServerId value that you specify.

" } } }, "ListWorkflowsRequest":{ "type":"structure", "members":{ "MaxResults":{ "shape":"MaxResults", "documentation":"

Specifies the maximum number of workflows to return.

" }, "NextToken":{ "shape":"NextToken", "documentation":"

ListWorkflows returns the NextToken parameter in the output. You can then pass the NextToken parameter in a subsequent command to continue listing additional workflows.

" } } }, "ListWorkflowsResponse":{ "type":"structure", "required":["Workflows"], "members":{ "NextToken":{ "shape":"NextToken", "documentation":"

ListWorkflows returns the NextToken parameter in the output. You can then pass the NextToken parameter in a subsequent command to continue listing additional workflows.

" }, "Workflows":{ "shape":"ListedWorkflows", "documentation":"

Returns the Arn, WorkflowId, and Description for each workflow.

" } } }, "ListedAccess":{ "type":"structure", "members":{ "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web Services Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.

Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid

In that command, replace YourGroupName with the name of your Active Directory group.

The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-

" } }, "documentation":"

Lists the properties for one or more specified associated accesses.

" }, "ListedAccesses":{ "type":"list", "member":{"shape":"ListedAccess"} }, "ListedExecution":{ "type":"structure", "members":{ "ExecutionId":{ "shape":"ExecutionId", "documentation":"

A unique identifier for the execution of a workflow.

" }, "InitialFileLocation":{ "shape":"FileLocation", "documentation":"

A structure that describes the Amazon S3 or EFS file location. This is the file location when the execution begins: if the file is being copied, this is the initial (as opposed to destination) file location.

" }, "ServiceMetadata":{ "shape":"ServiceMetadata", "documentation":"

A container object for the session details associated with a workflow.

" }, "Status":{ "shape":"ExecutionStatus", "documentation":"

The status is one of the execution. Can be in progress, completed, exception encountered, or handling the exception.

" } }, "documentation":"

Returns properties of the execution that is specified.

" }, "ListedExecutions":{ "type":"list", "member":{"shape":"ListedExecution"} }, "ListedServer":{ "type":"structure", "required":["Arn"], "members":{ "Arn":{ "shape":"Arn", "documentation":"

Specifies the unique Amazon Resource Name (ARN) for a server to be listed.

" }, "Domain":{ "shape":"Domain", "documentation":"

Specifies the domain of the storage system that is used for file transfers.

" }, "IdentityProviderType":{ "shape":"IdentityProviderType", "documentation":"

Specifies the mode of authentication for a server. The default value is SERVICE_MANAGED, which allows you to store and access user credentials within the Amazon Web Services Transfer Family service.

Use AWS_DIRECTORY_SERVICE to provide access to Active Directory groups in Amazon Web Services Managed Active Directory or Microsoft Active Directory in your on-premises environment or in Amazon Web Services using AD Connectors. This option also requires you to provide a Directory ID using the IdentityProviderDetails parameter.

Use the API_GATEWAY value to integrate with an identity provider of your choosing. The API_GATEWAY setting requires you to provide an API Gateway endpoint URL to call for authentication using the IdentityProviderDetails parameter.

" }, "EndpointType":{ "shape":"EndpointType", "documentation":"

Specifies the type of VPC endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.

" }, "LoggingRole":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the Amazon Web Services Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFS events. When set, user activity can be viewed in your CloudWatch logs.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

Specifies the unique system assigned identifier for the servers that were listed.

" }, "State":{ "shape":"State", "documentation":"

Specifies the condition of a server for the server that was described. A value of ONLINE indicates that the server can accept jobs and transfer files. A State value of OFFLINE means that the server cannot perform file transfer operations.

The states of STARTING and STOPPING indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED or STOP_FAILED can indicate an error condition.

" }, "UserCount":{ "shape":"UserCount", "documentation":"

Specifies the number of users that are assigned to a server you specified with the ServerId.

" } }, "documentation":"

Returns properties of a file transfer protocol-enabled server that was specified.

" }, "ListedServers":{ "type":"list", "member":{"shape":"ListedServer"} }, "ListedUser":{ "type":"structure", "required":["Arn"], "members":{ "Arn":{ "shape":"Arn", "documentation":"

Provides the unique Amazon Resource Name (ARN) for the user that you want to learn about.

" }, "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

The IAM role that controls your users' access to your Amazon S3 bucket for servers with Domain=S3, or your EFS file system for servers with Domain=EFS.

The policies attached to this role determine the level of access you want to provide your users when transferring files into and out of your S3 buckets or EFS file systems.

" }, "SshPublicKeyCount":{ "shape":"SshPublicKeyCount", "documentation":"

Specifies the number of SSH public keys stored for the user you specified.

" }, "UserName":{ "shape":"UserName", "documentation":"

Specifies the name of the user whose ARN was specified. User names are used for authentication purposes.

" } }, "documentation":"

Returns properties of the user that you specify.

" }, "ListedUsers":{ "type":"list", "member":{"shape":"ListedUser"} }, "ListedWorkflow":{ "type":"structure", "members":{ "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" }, "Description":{ "shape":"WorkflowDescription", "documentation":"

Specifies the text description for the workflow.

" }, "Arn":{ "shape":"Arn", "documentation":"

Specifies the unique Amazon Resource Name (ARN) for the workflow.

" } }, "documentation":"

Contains the ID, text description, and Amazon Resource Name (ARN) for the workflow.

" }, "ListedWorkflows":{ "type":"list", "member":{"shape":"ListedWorkflow"} }, "LogGroupName":{ "type":"string", "max":512, "min":1, "pattern":"[\\.\\-_/#A-Za-z0-9]*" }, "LoggingConfiguration":{ "type":"structure", "members":{ "LoggingRole":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the Amazon Web Services Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFS events. When set, user activity can be viewed in your CloudWatch logs.

" }, "LogGroupName":{ "shape":"LogGroupName", "documentation":"

The name of the CloudWatch logging group for the Amazon Web Services Transfer server to which this workflow belongs.

" } }, "documentation":"

Consists of the logging role and the log group name.

" }, "MapEntry":{ "type":"string", "max":1024, "pattern":"^/.*" }, "MapTarget":{ "type":"string", "max":1024, "pattern":"^/.*" }, "MaxResults":{ "type":"integer", "max":1000, "min":1 }, "Message":{"type":"string"}, "NextToken":{ "type":"string", "max":6144, "min":1 }, "NullableRole":{ "type":"string", "max":2048, "pattern":"^$|arn:.*role/.*" }, "OnUploadWorkflowDetails":{ "type":"list", "member":{"shape":"WorkflowDetail"}, "max":1 }, "OverwriteExisting":{ "type":"string", "enum":[ "TRUE", "FALSE" ] }, "PassiveIp":{ "type":"string", "max":15 }, "Policy":{ "type":"string", "max":2048 }, "PosixId":{ "type":"long", "max":4294967295, "min":0 }, "PosixProfile":{ "type":"structure", "required":[ "Uid", "Gid" ], "members":{ "Uid":{ "shape":"PosixId", "documentation":"

The POSIX user ID used for all EFS operations by this user.

" }, "Gid":{ "shape":"PosixId", "documentation":"

The POSIX group ID used for all EFS operations by this user.

" }, "SecondaryGids":{ "shape":"SecondaryGids", "documentation":"

The secondary POSIX group IDs used for all EFS operations by this user.

" } }, "documentation":"

The full POSIX identity, including user ID (Uid), group ID (Gid), and any secondary groups IDs (SecondaryGids), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.

" }, "Protocol":{ "type":"string", "enum":[ "SFTP", "FTP", "FTPS" ] }, "ProtocolDetails":{ "type":"structure", "members":{ "PassiveIp":{ "shape":"PassiveIp", "documentation":"

Indicates passive mode, for FTP and FTPS protocols. Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer. For example:

aws transfer update-server --protocol-details PassiveIp=0.0.0.0

Replace 0.0.0.0 in the example above with the actual IP address you want to use.

If you change the PassiveIp value, you must stop and then restart your Transfer server for the change to take effect. For details on using Passive IP (PASV) in a NAT environment, see Configuring your FTPS server behind a firewall or NAT with Amazon Web Services Transfer Family.

" } }, "documentation":"

The protocol settings that are configured for your server.

This type is only valid in the UpdateServer API.

" }, "Protocols":{ "type":"list", "member":{"shape":"Protocol"}, "max":3, "min":1 }, "Resource":{"type":"string"}, "ResourceExistsException":{ "type":"structure", "required":[ "Message", "Resource", "ResourceType" ], "members":{ "Message":{"shape":"Message"}, "Resource":{"shape":"Resource"}, "ResourceType":{"shape":"ResourceType"} }, "documentation":"

The requested resource does not exist.

", "exception":true }, "ResourceNotFoundException":{ "type":"structure", "required":[ "Message", "Resource", "ResourceType" ], "members":{ "Message":{"shape":"Message"}, "Resource":{"shape":"Resource"}, "ResourceType":{"shape":"ResourceType"} }, "documentation":"

This exception is thrown when a resource is not found by the Amazon Web ServicesTransfer Family service.

", "exception":true }, "ResourceType":{"type":"string"}, "Response":{"type":"string"}, "RetryAfterSeconds":{"type":"string"}, "Role":{ "type":"string", "max":2048, "min":20, "pattern":"arn:.*role/.*" }, "S3Bucket":{ "type":"string", "max":63, "min":3, "pattern":"^[a-z0-9][\\.\\-a-z0-9]{1,61}[a-z0-9]$" }, "S3Etag":{ "type":"string", "max":65536, "min":1, "pattern":"^.+$" }, "S3FileLocation":{ "type":"structure", "members":{ "Bucket":{ "shape":"S3Bucket", "documentation":"

Specifies the S3 bucket that contains the file being used.

" }, "Key":{ "shape":"S3Key", "documentation":"

The name assigned to the file when it was created in S3. You use the object key to retrieve the object.

" }, "VersionId":{ "shape":"S3VersionId", "documentation":"

Specifies the file version.

" }, "Etag":{ "shape":"S3Etag", "documentation":"

The entity tag is a hash of the object. The ETag reflects changes only to the contents of an object, not its metadata.

" } }, "documentation":"

Specifies the details for the file location for the file being used in the workflow. Only applicable if you are using S3 storage.

" }, "S3InputFileLocation":{ "type":"structure", "members":{ "Bucket":{ "shape":"S3Bucket", "documentation":"

Specifies the S3 bucket for the customer input file.

" }, "Key":{ "shape":"S3Key", "documentation":"

The name assigned to the file when it was created in S3. You use the object key to retrieve the object.

" } }, "documentation":"

Specifies the customer input S3 file location. If it is used inside copyStepDetails.DestinationFileLocation, it should be the S3 copy destination.

You need to provide the bucket and key. The key can represent either a path or a file. This is determined by whether or not you end the key value with the forward slash (/) character. If the final character is \"/\", then your file is copied to the folder, and its name does not change. If, rather, the final character is alphanumeric, your uploaded file is renamed to the path value. In this case, if a file with that name already exists, it is overwritten.

For example, if your path is shared-files/bob/, your uploaded files are copied to the shared-files/bob/, folder. If your path is shared-files/today, each uploaded file is copied to the shared-files folder and named today: each upload overwrites the previous version of the bob file.

" }, "S3Key":{ "type":"string", "max":1024, "pattern":"[\\P{M}\\p{M}]*" }, "S3Tag":{ "type":"structure", "required":[ "Key", "Value" ], "members":{ "Key":{ "shape":"S3TagKey", "documentation":"

The name assigned to the tag that you create.

" }, "Value":{ "shape":"S3TagValue", "documentation":"

The value that corresponds to the key.

" } }, "documentation":"

Specifies the key-value pair that are assigned to a file during the execution of a Tagging step.

" }, "S3TagKey":{ "type":"string", "max":128, "min":1, "pattern":"^([\\p{L}\\p{Z}\\p{N}_.:/=+\\-@]*)$" }, "S3TagValue":{ "type":"string", "max":256, "pattern":"^([\\p{L}\\p{Z}\\p{N}_.:/=+\\-@]*)$" }, "S3Tags":{ "type":"list", "member":{"shape":"S3Tag"}, "max":10, "min":1 }, "S3VersionId":{ "type":"string", "max":1024, "min":1, "pattern":"^.+$" }, "SecondaryGids":{ "type":"list", "member":{"shape":"PosixId"}, "max":16, "min":0 }, "SecurityGroupId":{ "type":"string", "max":20, "min":11, "pattern":"^sg-[0-9a-f]{8,17}$" }, "SecurityGroupIds":{ "type":"list", "member":{"shape":"SecurityGroupId"} }, "SecurityPolicyName":{ "type":"string", "max":100, "pattern":"TransferSecurityPolicy-.+" }, "SecurityPolicyNames":{ "type":"list", "member":{"shape":"SecurityPolicyName"} }, "SecurityPolicyOption":{ "type":"string", "max":50 }, "SecurityPolicyOptions":{ "type":"list", "member":{"shape":"SecurityPolicyOption"} }, "SendWorkflowStepStateRequest":{ "type":"structure", "required":[ "WorkflowId", "ExecutionId", "Token", "Status" ], "members":{ "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" }, "ExecutionId":{ "shape":"ExecutionId", "documentation":"

A unique identifier for the execution of a workflow.

" }, "Token":{ "shape":"CallbackToken", "documentation":"

Used to distinguish between multiple callbacks for multiple Lambda steps within the same execution.

" }, "Status":{ "shape":"CustomStepStatus", "documentation":"

Indicates whether the specified step succeeded or failed.

" } } }, "SendWorkflowStepStateResponse":{ "type":"structure", "members":{ } }, "ServerId":{ "type":"string", "max":19, "min":19, "pattern":"^s-([0-9a-f]{17})$" }, "ServiceErrorMessage":{"type":"string"}, "ServiceMetadata":{ "type":"structure", "required":["UserDetails"], "members":{ "UserDetails":{ "shape":"UserDetails", "documentation":"

The Server ID (ServerId), Session ID (SessionId) and user (UserName) make up the UserDetails.

" } }, "documentation":"

A container object for the session details associated with a workflow.

" }, "ServiceUnavailableException":{ "type":"structure", "members":{ "Message":{"shape":"ServiceErrorMessage"} }, "documentation":"

The request has failed because the Amazon Web ServicesTransfer Family service is not available.

", "exception":true, "fault":true, "synthetic":true }, "SessionId":{ "type":"string", "max":32, "min":3, "pattern":"^[\\w-]*$" }, "SourceIp":{ "type":"string", "max":32, "pattern":"^\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}$" }, "SshPublicKey":{ "type":"structure", "required":[ "DateImported", "SshPublicKeyBody", "SshPublicKeyId" ], "members":{ "DateImported":{ "shape":"DateImported", "documentation":"

Specifies the date that the public key was added to the user account.

" }, "SshPublicKeyBody":{ "shape":"SshPublicKeyBody", "documentation":"

Specifies the content of the SSH public key as specified by the PublicKeyId.

" }, "SshPublicKeyId":{ "shape":"SshPublicKeyId", "documentation":"

Specifies the SshPublicKeyId parameter contains the identifier of the public key.

" } }, "documentation":"

Provides information about the public Secure Shell (SSH) key that is associated with a user account for the specific file transfer protocol-enabled server (as identified by ServerId). The information returned includes the date the key was imported, the public key contents, and the public key ID. A user can store more than one SSH public key associated with their user name on a specific server.

" }, "SshPublicKeyBody":{ "type":"string", "max":2048, "pattern":"^ssh-rsa\\s+[A-Za-z0-9+/]+[=]{0,3}(\\s+.+)?\\s*$" }, "SshPublicKeyCount":{"type":"integer"}, "SshPublicKeyId":{ "type":"string", "max":21, "min":21, "pattern":"^key-[0-9a-f]{17}$" }, "SshPublicKeys":{ "type":"list", "member":{"shape":"SshPublicKey"}, "max":5 }, "StartServerRequest":{ "type":"structure", "required":["ServerId"], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that you start.

" } } }, "State":{ "type":"string", "documentation":"

Describes the condition of a file transfer protocol-enabled server with respect to its ability to perform file operations. There are six possible states: OFFLINE, ONLINE, STARTING, STOPPING, START_FAILED, and STOP_FAILED.

OFFLINE indicates that the server exists, but that it is not available for file operations. ONLINE indicates that the server is available to perform file operations. STARTING indicates that the server's was instantiated, but the server is not yet available to perform file operations. Under normal conditions, it can take a couple of minutes for the server to be completely operational. Both START_FAILED and STOP_FAILED are error conditions.

", "enum":[ "OFFLINE", "ONLINE", "STARTING", "STOPPING", "START_FAILED", "STOP_FAILED" ] }, "StatusCode":{"type":"integer"}, "StepResultOutputsJson":{ "type":"string", "max":65536 }, "StopServerRequest":{ "type":"structure", "required":["ServerId"], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that you stopped.

" } } }, "SubnetId":{"type":"string"}, "SubnetIds":{ "type":"list", "member":{"shape":"SubnetId"} }, "Tag":{ "type":"structure", "required":[ "Key", "Value" ], "members":{ "Key":{ "shape":"TagKey", "documentation":"

The name assigned to the tag that you create.

" }, "Value":{ "shape":"TagValue", "documentation":"

Contains one or more values that you assigned to the key name you create.

" } }, "documentation":"

Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.

" }, "TagKey":{ "type":"string", "max":128 }, "TagKeys":{ "type":"list", "member":{"shape":"TagKey"}, "max":50, "min":1 }, "TagResourceRequest":{ "type":"structure", "required":[ "Arn", "Tags" ], "members":{ "Arn":{ "shape":"Arn", "documentation":"

An Amazon Resource Name (ARN) for a specific Amazon Web Services resource, such as a server, user, or role.

" }, "Tags":{ "shape":"Tags", "documentation":"

Key-value pairs assigned to ARNs that you can use to group and search for resources by type. You can attach this metadata to user accounts for any purpose.

" } } }, "TagStepDetails":{ "type":"structure", "members":{ "Name":{ "shape":"WorkflowStepName", "documentation":"

The name of the step, used as an identifier.

" }, "Tags":{ "shape":"S3Tags", "documentation":"

Array that contains from 1 to 10 key/value pairs.

" } }, "documentation":"

Each step type has its own StepDetails structure.

The key/value pairs used to tag a file during the execution of a workflow step.

" }, "TagValue":{ "type":"string", "max":256 }, "Tags":{ "type":"list", "member":{"shape":"Tag"}, "max":50, "min":1 }, "TestIdentityProviderRequest":{ "type":"structure", "required":[ "ServerId", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned identifier for a specific server. That server's user authentication method is tested with a user name and password.

" }, "ServerProtocol":{ "shape":"Protocol", "documentation":"

The type of file transfer protocol to be tested.

The available protocols are:

" }, "SourceIp":{ "shape":"SourceIp", "documentation":"

The source IP address of the user account to be tested.

" }, "UserName":{ "shape":"UserName", "documentation":"

The name of the user account to be tested.

" }, "UserPassword":{ "shape":"UserPassword", "documentation":"

The password of the user account to be tested.

" } } }, "TestIdentityProviderResponse":{ "type":"structure", "required":[ "StatusCode", "Url" ], "members":{ "Response":{ "shape":"Response", "documentation":"

The response that is returned from your API Gateway.

" }, "StatusCode":{ "shape":"StatusCode", "documentation":"

The HTTP status code that is the response from your API Gateway.

" }, "Message":{ "shape":"Message", "documentation":"

A message that indicates whether the test was successful or not.

" }, "Url":{ "shape":"Url", "documentation":"

The endpoint of the service used to authenticate a user.

" } } }, "ThrottlingException":{ "type":"structure", "members":{ "RetryAfterSeconds":{"shape":"RetryAfterSeconds"} }, "documentation":"

The request was denied due to request throttling.

HTTP Status Code: 400

", "exception":true }, "UntagResourceRequest":{ "type":"structure", "required":[ "Arn", "TagKeys" ], "members":{ "Arn":{ "shape":"Arn", "documentation":"

The value of the resource that will have the tag removed. An Amazon Resource Name (ARN) is an identifier for a specific Amazon Web Services resource, such as a server, user, or role.

" }, "TagKeys":{ "shape":"TagKeys", "documentation":"

TagKeys are key-value pairs assigned to ARNs that can be used to group and search for resources by type. This metadata can be attached to resources for any purpose.

" } } }, "UpdateAccessRequest":{ "type":"structure", "required":[ "ServerId", "ExternalId" ], "members":{ "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "HomeDirectoryMappings":{ "shape":"HomeDirectoryMappings", "documentation":"

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Amazon Web Services Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.

The following is an Entry and Target pair example.

[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

In most cases, you can use this value instead of the session policy to lock down your user to the designated home directory (\"chroot\"). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.

The following is an Entry and Target pair example for chroot.

[ { \"Entry:\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

If the target of a logical directory entry does not exist in Amazon S3 or EFS, the entry is ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0 byte objects as place holders for your directory. If using the CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you use the following: aws s3api put-object --bucket bucketname --key path/to/folder/. Make sure that the end of the key name ends in a / for it to be considered a folder.

" }, "Policy":{ "shape":"Policy", "documentation":"

A session policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.

This only applies when the domain of ServerId is S3. EFS does not use session policies.

For session policies, Amazon Web Services Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.

For an example of a session policy, see Example session policy.

For more information, see AssumeRole in the Amazon Web ServicesSecurity Token Service API Reference.

" }, "PosixProfile":{"shape":"PosixProfile"}, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web Services Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.

Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid

In that command, replace YourGroupName with the name of your Active Directory group.

The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-

" } } }, "UpdateAccessResponse":{ "type":"structure", "required":[ "ServerId", "ExternalId" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

The ID of the server that the user is attached to.

" }, "ExternalId":{ "shape":"ExternalId", "documentation":"

The external ID of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web ServicesTransfer Family.

" } } }, "UpdateServerRequest":{ "type":"structure", "required":["ServerId"], "members":{ "Certificate":{ "shape":"Certificate", "documentation":"

The Amazon Resource Name (ARN) of the Amazon Web ServicesCertificate Manager (ACM) certificate. Required when Protocols is set to FTPS.

To request a new public certificate, see Request a public certificate in the Amazon Web ServicesCertificate Manager User Guide.

To import an existing certificate into ACM, see Importing certificates into ACM in the Amazon Web ServicesCertificate Manager User Guide.

To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the Amazon Web ServicesCertificate Manager User Guide.

Certificates with the following cryptographic algorithms and key sizes are supported:

The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.

" }, "ProtocolDetails":{ "shape":"ProtocolDetails", "documentation":"

The protocol settings that are configured for your server.

Use the PassiveIp parameter to indicate passive mode (for FTP and FTPS protocols). Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer.

" }, "EndpointDetails":{ "shape":"EndpointDetails", "documentation":"

The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make it accessible only to resources within your VPC, or you can attach Elastic IP addresses and make it accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.

" }, "EndpointType":{ "shape":"EndpointType", "documentation":"

The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.

After May 19, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT in your Amazon Web Servicesaccount if your account hasn't already done so before May 19, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT in your Amazon Web Servicesaccount on or before May 19, 2021, you will not be affected. After this date, use EndpointType=VPC.

For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.

It is recommended that you use VPC as the EndpointType. With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with EndpointType set to VPC_ENDPOINT.

" }, "HostKey":{ "shape":"HostKey", "documentation":"

The RSA private key as generated by ssh-keygen -N \"\" -m PEM -f my-new-server-key.

If you aren't planning to migrate existing users from an existing server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive.

For more information, see Change the host key for your SFTP-enabled server in the Amazon Web ServicesTransfer Family User Guide.

" }, "IdentityProviderDetails":{ "shape":"IdentityProviderDetails", "documentation":"

An array containing all of the information required to call a customer's authentication API method.

" }, "LoggingRole":{ "shape":"NullableRole", "documentation":"

Specifies the Amazon Resource Name (ARN) of the Amazon Web Services Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFS events. When set, user activity can be viewed in your CloudWatch logs.

" }, "Protocols":{ "shape":"Protocols", "documentation":"

Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:

If you select FTPS, you must choose a certificate stored in Amazon Web ServicesCertificate Manager (ACM) which will be used to identify your server when clients connect to it over FTPS.

If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY.

If Protocol includes FTP, then AddressAllocationIds cannot be associated.

If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set to SERVICE_MANAGED.

" }, "SecurityPolicyName":{ "shape":"SecurityPolicyName", "documentation":"

Specifies the name of the security policy that is attached to the server.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server instance that the user account is assigned to.

" }, "WorkflowDetails":{ "shape":"WorkflowDetails", "documentation":"

Specifies the workflow ID for the workflow to assign and the execution role used for executing the workflow.

" } } }, "UpdateServerResponse":{ "type":"structure", "required":["ServerId"], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server that the user account is assigned to.

" } } }, "UpdateUserRequest":{ "type":"structure", "required":[ "ServerId", "UserName" ], "members":{ "HomeDirectory":{ "shape":"HomeDirectory", "documentation":"

The landing directory (folder) for a user when they log in to the server using the client.

A HomeDirectory example is /bucket_name/home/mydirectory.

" }, "HomeDirectoryType":{ "shape":"HomeDirectoryType", "documentation":"

The type of landing directory (folder) you want your users' home directory to be when they log into the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL, you need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.

" }, "HomeDirectoryMappings":{ "shape":"HomeDirectoryMappings", "documentation":"

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Amazon Web Services Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.

The following is an Entry and Target pair example.

[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

In most cases, you can use this value instead of the session policy to lock down your user to the designated home directory (\"chroot\"). To do this, you can set Entry to '/' and set Target to the HomeDirectory parameter value.

The following is an Entry and Target pair example for chroot.

[ { \"Entry:\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]

If the target of a logical directory entry does not exist in Amazon S3 or EFS, the entry is ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0 byte objects as place holders for your directory. If using the CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you use the following: aws s3api put-object --bucket bucketname --key path/to/folder/. Make sure that the end of the key name ends in a / for it to be considered a folder.

" }, "Policy":{ "shape":"Policy", "documentation":"

A session policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.

This only applies when the domain of ServerId is S3. EFS does not use session policies.

For session policies, Amazon Web Services Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.

For an example of a session policy, see Creating a session policy.

For more information, see AssumeRole in the Amazon Web Services Security Token Service API Reference.

" }, "PosixProfile":{ "shape":"PosixProfile", "documentation":"

Specifies the full POSIX identity, including user ID (Uid), group ID (Gid), and any secondary groups IDs (SecondaryGids), that controls your users' access to your Amazon Elastic File Systems (Amazon EFS). The POSIX permissions that are set on files and directories in your file system determines the level of access your users get when transferring files into and out of your Amazon EFS file systems.

" }, "Role":{ "shape":"Role", "documentation":"

Specifies the Amazon Resource Name (ARN) of the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server instance that the user account is assigned to.

" }, "UserName":{ "shape":"UserName", "documentation":"

A unique string that identifies a user and is associated with a server as specified by the ServerId. This user name must be a minimum of 3 and a maximum of 100 characters long. The following are valid characters: a-z, A-Z, 0-9, underscore '_', hyphen '-', period '.', and at sign '@'. The user name can't start with a hyphen, period, or at sign.

" } } }, "UpdateUserResponse":{ "type":"structure", "required":[ "ServerId", "UserName" ], "members":{ "ServerId":{ "shape":"ServerId", "documentation":"

A system-assigned unique identifier for a server instance that the user account is assigned to.

" }, "UserName":{ "shape":"UserName", "documentation":"

The unique identifier for a user that is assigned to a server instance that was specified in the request.

" } }, "documentation":"

UpdateUserResponse returns the user name and identifier for the request to update a user's properties.

" }, "Url":{ "type":"string", "max":255 }, "UserCount":{"type":"integer"}, "UserDetails":{ "type":"structure", "required":[ "UserName", "ServerId" ], "members":{ "UserName":{ "shape":"UserName", "documentation":"

A unique string that identifies a user account associated with a server.

" }, "ServerId":{ "shape":"ServerId", "documentation":"

The system-assigned unique identifier for a Transfer server instance.

" }, "SessionId":{ "shape":"SessionId", "documentation":"

The system-assigned unique identifier for a session that corresponds to the workflow.

" } }, "documentation":"

Specifies the user name, server ID, and session ID for a workflow.

" }, "UserName":{ "type":"string", "max":100, "min":3, "pattern":"^[\\w][\\w@.-]{2,99}$" }, "UserPassword":{ "type":"string", "max":1024, "sensitive":true }, "VpcEndpointId":{ "type":"string", "max":22, "min":22, "pattern":"^vpce-[0-9a-f]{17}$" }, "VpcId":{"type":"string"}, "WorkflowDescription":{ "type":"string", "max":256, "pattern":"^[\\w- ]*$" }, "WorkflowDetail":{ "type":"structure", "required":[ "WorkflowId", "ExecutionRole" ], "members":{ "WorkflowId":{ "shape":"WorkflowId", "documentation":"

A unique identifier for the workflow.

" }, "ExecutionRole":{ "shape":"Role", "documentation":"

Includes the necessary permissions for S3, EFS, and Lambda operations that Transfer can assume, so that all workflow steps can operate on the required resources

" } }, "documentation":"

Specifies the workflow ID for the workflow to assign and the execution role used for executing the workflow.

" }, "WorkflowDetails":{ "type":"structure", "required":["OnUpload"], "members":{ "OnUpload":{ "shape":"OnUploadWorkflowDetails", "documentation":"

A trigger that starts a workflow: the workflow begins to execute after a file is uploaded.

" } }, "documentation":"

Container for the WorkflowDetail data type. It is used by actions that trigger a workflow to begin execution.

" }, "WorkflowId":{ "type":"string", "max":19, "min":19, "pattern":"^w-([a-z0-9]{17})$" }, "WorkflowStep":{ "type":"structure", "members":{ "Type":{ "shape":"WorkflowStepType", "documentation":"

Currently, the following step types are supported.

" }, "CopyStepDetails":{ "shape":"CopyStepDetails", "documentation":"

Details for a step that performs a file copy.

Consists of the following values:

" }, "CustomStepDetails":{ "shape":"CustomStepDetails", "documentation":"

Details for a step that invokes a lambda function.

Consists of the lambda function name, target, and timeout (in seconds).

" }, "DeleteStepDetails":{ "shape":"DeleteStepDetails", "documentation":"

Details for a step that deletes the file.

" }, "TagStepDetails":{ "shape":"TagStepDetails", "documentation":"

Details for a step that creates one or more tags.

You specify one or more tags: each tag contains a key/value pair.

" } }, "documentation":"

The basic building block of a workflow.

" }, "WorkflowStepName":{ "type":"string", "max":30, "pattern":"^[\\w-]*$" }, "WorkflowStepType":{ "type":"string", "enum":[ "COPY", "CUSTOM", "TAG", "DELETE" ] }, "WorkflowSteps":{ "type":"list", "member":{"shape":"WorkflowStep"}, "max":8 } }, "documentation":"

Amazon Web Services Transfer Family is a fully managed service that enables the transfer of files over the File Transfer Protocol (FTP), File Transfer Protocol over SSL (FTPS), or Secure Shell (SSH) File Transfer Protocol (SFTP) directly into and out of Amazon Simple Storage Service (Amazon S3). Amazon Web Services helps you seamlessly migrate your file transfer workflows to Amazon Web Services Transfer Family by integrating with existing authentication systems, and providing DNS routing with Amazon Route 53 so nothing changes for your customers and partners, or their applications. With your data in Amazon S3, you can use it with Amazon Web Services services for processing, analytics, machine learning, and archiving. Getting started with Amazon Web Services Transfer Family is easy since there is no infrastructure to buy and set up.

" }