/AWS1/IF_CGP=>ADMINDISABLEPROVIDERFORUSER()¶
About AdminDisableProviderForUser¶
Prevents the user from signing in with the specified external (SAML or social)
identity provider (IdP). If the user that you want to deactivate is a Amazon Cognito user pools
native username + password user, they can't use their password to sign in. If the user
to deactivate is a linked external IdP user, any link between that user and an existing
user is removed. When the external user signs in again, and the user is no longer
attached to the previously linked DestinationUser, the user must create a
new user account.
The value of ProviderName must match the name of a user pool IdP.
To deactivate a local user, set ProviderName to Cognito and
the ProviderAttributeName to Cognito_Subject. The
ProviderAttributeValue must be user's local username.
The ProviderAttributeName must always be Cognito_Subject for
social IdPs. The ProviderAttributeValue must always be the exact subject
that was used when the user was originally linked as a source user.
For de-linking a SAML identity, there are two scenarios. If the linked identity has
not yet been used to sign in, the ProviderAttributeName and
ProviderAttributeValue must be the same values that were used for the
SourceUser when the identities were originally linked using
AdminLinkProviderForUser call. This is also true if the linking was done with
ProviderAttributeName set to Cognito_Subject. If the user
has already signed in, the ProviderAttributeName must be
Cognito_Subject and ProviderAttributeValue must be the
NameID from their SAML assertion.
Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
Learn more
Method Signature¶
METHODS /AWS1/IF_CGP~ADMINDISABLEPROVIDERFORUSER
IMPORTING
!IV_USERPOOLID TYPE /AWS1/CGPSTRINGTYPE OPTIONAL
!IO_USER TYPE REF TO /AWS1/CL_CGPPROVIDERUSERIDTYPE OPTIONAL
RETURNING
VALUE(OO_OUTPUT) TYPE REF TO /aws1/cl_cgpadmindsbpvdrforu01
RAISING
/AWS1/CX_CGPALIASEXISTSEX
/AWS1/CX_CGPINTERNALERROREX
/AWS1/CX_CGPINVALIDPARAMETEREX
/AWS1/CX_CGPNOTAUTHORIZEDEX
/AWS1/CX_CGPRESOURCENOTFOUNDEX
/AWS1/CX_CGPTOOMANYREQUESTSEX
/AWS1/CX_CGPUSERNOTFOUNDEX
/AWS1/CX_CGPCLIENTEXC
/AWS1/CX_CGPSERVEREXC
/AWS1/CX_RT_TECHNICAL_GENERIC
/AWS1/CX_RT_SERVICE_GENERIC.
IMPORTING¶
Required arguments:¶
iv_userpoolid TYPE /AWS1/CGPSTRINGTYPE /AWS1/CGPSTRINGTYPE¶
The ID of the user pool where you want to delete the user's linked identities.
io_user TYPE REF TO /AWS1/CL_CGPPROVIDERUSERIDTYPE /AWS1/CL_CGPPROVIDERUSERIDTYPE¶
The user profile that you want to delete a linked identity from.
RETURNING¶
oo_output TYPE REF TO /aws1/cl_cgpadmindsbpvdrforu01 /AWS1/CL_CGPADMINDSBPVDRFORU01¶
Domain /AWS1/RT_ACCOUNT_ID Primitive Type NUMC
Examples¶
Syntax Example¶
This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.
DATA(lo_result) = lo_client->admindisableproviderforuser(
io_user = new /aws1/cl_cgpprovideruseridtype(
iv_providerattributename = |string|
iv_providerattributevalue = |string|
iv_providername = |string|
)
iv_userpoolid = |string|
).
This is an example of reading all possible response values
lo_result = lo_result.
IF lo_result IS NOT INITIAL.
ENDIF.