This repository has been archived by the owner on Aug 19, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
oc-organizations-passwordpolicy.json
108 lines (108 loc) · 5.57 KB
/
oc-organizations-passwordpolicy.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
{
"typeName": "OC::Organizations::PasswordPolicy",
"description": "Resource schema for OC::Organizations::PasswordPolicy.",
"sourceUrl": "https://github.com/eduardomourar/aws-resource-provider-passwordpolicy.git",
"definitions": {},
"properties": {
"ResourceId": {
"description": "AWS CloudFormation generates a unique identifier for the password policy resource.",
"type": "string",
"pattern": "^[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{12}$"
},
"MinimumPasswordLength": {
"description": "The minimum number of characters allowed in an IAM user password. If you do not specify a value for this parameter, then the operation uses the default value of 6.",
"type": "integer",
"default": 6,
"minimum": 6,
"maximum": 128
},
"RequireSymbols": {
"description": "Specifies whether IAM user passwords must contain at least one of the following non-alphanumeric characters: ! @ # $ % ^ & * ( ) _ + - = [ ] { } | ' If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one symbol character.",
"type": "boolean",
"default": false
},
"RequireNumbers": {
"description": "Specifies whether IAM user passwords must contain at least one numeric character (0 to 9). If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one numeric character.",
"type": "boolean",
"default": false
},
"RequireUppercaseCharacters": {
"description": "Specifies whether IAM user passwords must contain at least one uppercase character from the ISO basic Latin alphabet (A to Z). If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one uppercase character.",
"type": "boolean",
"default": false
},
"RequireLowercaseCharacters": {
"description": "Specifies whether IAM user passwords must contain at least one lowercase character from the ISO basic Latin alphabet (a to z). If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that passwords do not require at least one lowercase character.",
"type": "boolean",
"default": false
},
"AllowUsersToChangePassword": {
"description": "Allows all IAM users in your account to use the AWS Management Console to change their own passwords. For more information, see Letting IAM Users Change Their Own Passwords in the IAM User Guide. If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that IAM users in the account do not automatically have permissions to change their own password.",
"type": "boolean",
"default": false
},
"ExpirePasswords": {
"description": "Indicates whether passwords in the account expire. Returns true if MaxPasswordAge contains a value greater than 0. Returns false if MaxPasswordAge is 0 or not present.",
"type": "boolean",
"default": false
},
"MaxPasswordAge": {
"description": "The number of days that an IAM user password is valid. If you do not specify a value for this parameter, then the IAM user passwords never expire.",
"type": "integer",
"minimum": 1,
"maximum": 1095
},
"PasswordReusePrevention": {
"description": "Specifies the number of previous passwords that IAM users are prevented from reusing. If you do not specify a value for this parameter, then the IAM users are not prevented from reusing previous passwords.",
"type": "integer",
"minimum": 1,
"maximum": 24
},
"HardExpiry": {
"description": "Prevents IAM users from setting a new password after their password has expired. The IAM user cannot be accessed until an administrator resets the password. If you do not specify a value for this parameter, then the operation uses the default value of false. The result is that IAM users can change their passwords after they expire and continue to sign in as the user.",
"type": "boolean",
"default": false
}
},
"additionalProperties": false,
"required": [],
"createOnlyProperties": [
"/properties/ResourceId"
],
"readOnlyProperties": [
"/properties/ResourceId",
"/properties/ExpirePasswords"
],
"primaryIdentifier": [
"/properties/ResourceId"
],
"handlers": {
"create": {
"permissions": [
"iam:UpdateAccountPasswordPolicy"
]
},
"read": {
"permissions": [
"iam:GetAccountPasswordPolicy"
]
},
"update": {
"permissions": [
"iam:GetAccountPasswordPolicy",
"iam:UpdateAccountPasswordPolicy"
]
},
"delete": {
"permissions": [
"iam:GetAccountPasswordPolicy",
"iam:DeleteAccountPasswordPolicy"
]
},
"list": {
"permissions": [
"iam:GetAccountPasswordPolicy"
]
}
}
}