paws.security.identity (version 0.1.0)

iam_list_signing_certificates: Returns information about the signing certificates associated with the specified IAM user

Description

Returns information about the signing certificates associated with the specified IAM user. If there none exists, the operation returns an empty list.

Usage

iam_list_signing_certificates(UserName, Marker, MaxItems)

Arguments

UserName

The name of the IAM user whose signing certificates you want to examine.

This parameter allows (through its regex pattern) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: \_+=,.@-

Marker

Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the Marker element in the response that you received to indicate where the next call should start.

MaxItems

Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the IsTruncated response element is true.

If you do not include this parameter, the number of items defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the IsTruncated response element returns true, and Marker contains a value to include in the subsequent call that tells the service where to continue from.

Request syntax

svc$list_signing_certificates(
  UserName = "string",
  Marker = "string",
  MaxItems = 123
)

Details

Although each user is limited to a small number of signing certificates, you can still paginate the results using the MaxItems and Marker parameters.

If the UserName field is not specified, the user name is determined implicitly based on the AWS access key ID used to sign the request for this API. This operation works for access keys under the AWS account. Consequently, you can use this operation to manage AWS account root user credentials even if the AWS account has no associated users.

Examples

Run this code
# NOT RUN {
# The following command lists the signing certificates for the IAM user
# named Bob.
# }
# NOT RUN {
svc$list_signing_certificates(
  UserName = "Bob"
)
# }
# NOT RUN {
# }

Run the code above in your browser using DataCamp Workspace