Table Of Contents

Feedback

User Guide

First time using the AWS CLI? See the User Guide for help getting started.

[ aws . cognito-idp ]

describe-risk-configuration

Description

Describes the risk configuration.

See also: AWS API Documentation

See 'aws help' for descriptions of global parameters.

Synopsis

  describe-risk-configuration
--user-pool-id <value>
[--client-id <value>]
[--cli-input-json <value>]
[--generate-cli-skeleton <value>]

Options

--user-pool-id (string)

The user pool ID.

--client-id (string)

The app client ID.

--cli-input-json (string) Performs service operation based on the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton. If other arguments are provided on the command line, the CLI values will override the JSON-provided values.

--generate-cli-skeleton (string) Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input, prints a sample input JSON that can be used as an argument for --cli-input-json. If provided with the value output, it validates the command inputs and returns a sample output JSON for that command.

See 'aws help' for descriptions of global parameters.

Output

RiskConfiguration -> (structure)

The risk configuration.

UserPoolId -> (string)

The user pool ID.

ClientId -> (string)

The app client ID.

CompromisedCredentialsRiskConfiguration -> (structure)

The compromised credentials risk configuration object including the EventFilter and the EventAction

EventFilter -> (list)

Perform the action for these events. The default is to perform all events if no event filter is specified.

(string)

Actions -> (structure)

The compromised credentials risk configuration actions.

EventAction -> (string)

The event action.

AccountTakeoverRiskConfiguration -> (structure)

The account takeover risk configuration object including the NotifyConfiguration object and Actions to take in the case of an account takeover.

NotifyConfiguration -> (structure)

The notify configuration used to construct email notifications.

From -> (string)

The email address that is sending the email. It must be either individually verified with Amazon SES, or from a domain that has been verified with Amazon SES.

ReplyTo -> (string)

The destination to which the receiver of an email should reply to.

SourceArn -> (string)

The Amazon Resource Name (ARN) of the identity that is associated with the sending authorization policy. It permits Amazon Cognito to send for the email address specified in the From parameter.

BlockEmail -> (structure)

Email template used when a detected risk event is blocked.

Subject -> (string)

The subject.

HtmlBody -> (string)

The HTML body.

TextBody -> (string)

The text body.

NoActionEmail -> (structure)

The email template used when a detected risk event is allowed.

Subject -> (string)

The subject.

HtmlBody -> (string)

The HTML body.

TextBody -> (string)

The text body.

MfaEmail -> (structure)

The MFA email template used when MFA is challenged as part of a detected risk.

Subject -> (string)

The subject.

HtmlBody -> (string)

The HTML body.

TextBody -> (string)

The text body.

Actions -> (structure)

Account takeover risk configuration actions

LowAction -> (structure)

Action to take for a low risk.

Notify -> (boolean)

Flag specifying whether to send a notification.

EventAction -> (string)

The event action.

  • BLOCK Choosing this action will block the request.
  • MFA_IF_CONFIGURED Throw MFA challenge if user has configured it, else allow the request.
  • MFA_REQUIRED Throw MFA challenge if user has configured it, else block the request.
  • NO_ACTION Allow the user sign-in.

MediumAction -> (structure)

Action to take for a medium risk.

Notify -> (boolean)

Flag specifying whether to send a notification.

EventAction -> (string)

The event action.

  • BLOCK Choosing this action will block the request.
  • MFA_IF_CONFIGURED Throw MFA challenge if user has configured it, else allow the request.
  • MFA_REQUIRED Throw MFA challenge if user has configured it, else block the request.
  • NO_ACTION Allow the user sign-in.

HighAction -> (structure)

Action to take for a high risk.

Notify -> (boolean)

Flag specifying whether to send a notification.

EventAction -> (string)

The event action.

  • BLOCK Choosing this action will block the request.
  • MFA_IF_CONFIGURED Throw MFA challenge if user has configured it, else allow the request.
  • MFA_REQUIRED Throw MFA challenge if user has configured it, else block the request.
  • NO_ACTION Allow the user sign-in.

RiskExceptionConfiguration -> (structure)

The configuration to override the risk decision.

BlockedIPRangeList -> (list)

Overrides the risk decision to always block the pre-authentication requests. The IP range is in CIDR notation: a compact representation of an IP address and its associated routing prefix.

(string)

SkippedIPRangeList -> (list)

Risk detection is not performed on the IP addresses in the range list. The IP range is in CIDR notation.

(string)

LastModifiedDate -> (timestamp)

The last modified date.