/AWS1/CL_EC2=>MODIFYVERIFIEDACCTRUSTPVDR()
¶
About ModifyVerifiedAccessTrustProvider¶
Modifies the configuration of the specified Amazon Web Services Verified Access trust provider.
Method Signature¶
IMPORTING¶
Required arguments:¶
iv_verifiedaccesstrustpvdrid
TYPE /AWS1/EC2VERIFIEDACCTRUSTPVD00
/AWS1/EC2VERIFIEDACCTRUSTPVD00
¶
The ID of the Verified Access trust provider.
Optional arguments:¶
io_oidcoptions
TYPE REF TO /AWS1/CL_EC2MODVERIFIEDACCTR01
/AWS1/CL_EC2MODVERIFIEDACCTR01
¶
The options for an OpenID Connect-compatible user-identity trust provider.
io_deviceoptions
TYPE REF TO /AWS1/CL_EC2MODVERIFIEDACCTR03
/AWS1/CL_EC2MODVERIFIEDACCTR03
¶
The options for a device-based trust provider. This parameter is required when the provider type is
device
.
iv_description
TYPE /AWS1/EC2STRING
/AWS1/EC2STRING
¶
A description for the Verified Access trust provider.
iv_dryrun
TYPE /AWS1/EC2BOOLEAN
/AWS1/EC2BOOLEAN
¶
Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is
DryRunOperation
. Otherwise, it isUnauthorizedOperation
.
iv_clienttoken
TYPE /AWS1/EC2STRING
/AWS1/EC2STRING
¶
A unique, case-sensitive token that you provide to ensure idempotency of your modification request. For more information, see Ensuring idempotency.
io_ssespecification
TYPE REF TO /AWS1/CL_EC2VERIFIEDACCSSESP01
/AWS1/CL_EC2VERIFIEDACCSSESP01
¶
The options for server side encryption.
io_nativeapplicationoidcopts
TYPE REF TO /AWS1/CL_EC2MODVERIFIEDACCNA00
/AWS1/CL_EC2MODVERIFIEDACCNA00
¶
The OpenID Connect (OIDC) options.
RETURNING¶
oo_output
TYPE REF TO /aws1/cl_ec2modverifiedacctr02
/AWS1/CL_EC2MODVERIFIEDACCTR02
¶
Domain /AWS1/RT_ACCOUNT_ID Primitive Type NUMC
Examples¶
Syntax Example¶
This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.
DATA(lo_result) = lo_client->/aws1/if_ec2~modifyverifiedacctrustpvdr(
io_deviceoptions = new /aws1/cl_ec2modverifiedacctr03( |string| )
io_nativeapplicationoidcopts = new /aws1/cl_ec2modverifiedaccna00(
iv_authorizationendpoint = |string|
iv_clientid = |string|
iv_clientsecret = |string|
iv_issuer = |string|
iv_publicsigningkeyendpoint = |string|
iv_scope = |string|
iv_tokenendpoint = |string|
iv_userinfoendpoint = |string|
)
io_oidcoptions = new /aws1/cl_ec2modverifiedacctr01(
iv_authorizationendpoint = |string|
iv_clientid = |string|
iv_clientsecret = |string|
iv_issuer = |string|
iv_scope = |string|
iv_tokenendpoint = |string|
iv_userinfoendpoint = |string|
)
io_ssespecification = new /aws1/cl_ec2verifiedaccssesp01(
iv_customermanagedkeyenabled = ABAP_TRUE
iv_kmskeyarn = |string|
)
iv_clienttoken = |string|
iv_description = |string|
iv_dryrun = ABAP_TRUE
iv_verifiedaccesstrustpvdrid = |string|
).
This is an example of reading all possible response values
lo_result = lo_result.
IF lo_result IS NOT INITIAL.
lo_verifiedaccesstrustprov = lo_result->get_verifiedaccesstrustpvdr( ).
IF lo_verifiedaccesstrustprov IS NOT INITIAL.
lv_string = lo_verifiedaccesstrustprov->get_verifiedacctrustpvdrid( ).
lv_string = lo_verifiedaccesstrustprov->get_description( ).
lv_trustprovidertype = lo_verifiedaccesstrustprov->get_trustprovidertype( ).
lv_usertrustprovidertype = lo_verifiedaccesstrustprov->get_usertrustprovidertype( ).
lv_devicetrustprovidertype = lo_verifiedaccesstrustprov->get_devicetrustprovidertype( ).
lo_oidcoptions = lo_verifiedaccesstrustprov->get_oidcoptions( ).
IF lo_oidcoptions IS NOT INITIAL.
lv_string = lo_oidcoptions->get_issuer( ).
lv_string = lo_oidcoptions->get_authorizationendpoint( ).
lv_string = lo_oidcoptions->get_tokenendpoint( ).
lv_string = lo_oidcoptions->get_userinfoendpoint( ).
lv_string = lo_oidcoptions->get_clientid( ).
lv_clientsecrettype = lo_oidcoptions->get_clientsecret( ).
lv_string = lo_oidcoptions->get_scope( ).
ENDIF.
lo_deviceoptions = lo_verifiedaccesstrustprov->get_deviceoptions( ).
IF lo_deviceoptions IS NOT INITIAL.
lv_string = lo_deviceoptions->get_tenantid( ).
lv_string = lo_deviceoptions->get_publicsigningkeyurl( ).
ENDIF.
lv_string = lo_verifiedaccesstrustprov->get_policyreferencename( ).
lv_string = lo_verifiedaccesstrustprov->get_creationtime( ).
lv_string = lo_verifiedaccesstrustprov->get_lastupdatedtime( ).
LOOP AT lo_verifiedaccesstrustprov->get_tags( ) into lo_row.
lo_row_1 = lo_row.
IF lo_row_1 IS NOT INITIAL.
lv_string = lo_row_1->get_key( ).
lv_string = lo_row_1->get_value( ).
ENDIF.
ENDLOOP.
lo_verifiedaccessssespecif = lo_verifiedaccesstrustprov->get_ssespecification( ).
IF lo_verifiedaccessssespecif IS NOT INITIAL.
lv_boolean = lo_verifiedaccessssespecif->get_cusmanagedkeyenabled( ).
lv_kmskeyarn = lo_verifiedaccessssespecif->get_kmskeyarn( ).
ENDIF.
lo_nativeapplicationoidcop = lo_verifiedaccesstrustprov->get_nativeapplicationoidco00( ).
IF lo_nativeapplicationoidcop IS NOT INITIAL.
lv_string = lo_nativeapplicationoidcop->get_publicsigningkeyendpoint( ).
lv_string = lo_nativeapplicationoidcop->get_issuer( ).
lv_string = lo_nativeapplicationoidcop->get_authorizationendpoint( ).
lv_string = lo_nativeapplicationoidcop->get_tokenendpoint( ).
lv_string = lo_nativeapplicationoidcop->get_userinfoendpoint( ).
lv_string = lo_nativeapplicationoidcop->get_clientid( ).
lv_string = lo_nativeapplicationoidcop->get_scope( ).
ENDIF.
ENDIF.
ENDIF.