Create Authorizer
| apigateway_create_authorizer | R Documentation | 
Adds a new Authorizer resource to an existing RestApi resource
Description
Adds a new Authorizer resource to an existing RestApi resource.
Usage
apigateway_create_authorizer(restApiId, name, type, providerARNs,
  authType, authorizerUri, authorizerCredentials, identitySource,
  identityValidationExpression, authorizerResultTtlInSeconds)
Arguments
| restApiId | [required] The string identifier of the associated
RestApi. | 
| name | [required] The name of the authorizer. | 
| type | [required] The authorizer type. Valid values are
TOKENfor a Lambda function using a single authorization
token submitted in a custom header,REQUESTfor a Lambda
function using incoming request parameters, andCOGNITO_USER_POOLSfor using an Amazon Cognito user
pool. | 
| providerARNs | A list of the Amazon Cognito user pool ARNs for the
COGNITO_USER_POOLSauthorizer. Each element is of this
format:arn:aws:cognito-idp:{region}:{account_id}:userpool/{user_pool_id}.
For aTOKENorREQUESTauthorizer, this is not
defined. | 
| authType | Optional customer-defined field, used in OpenAPI imports and
exports without functional impact. | 
| authorizerUri | Specifies the authorizer's Uniform Resource Identifier (URI). For
TOKENorREQUESTauthorizers, this must be a
well-formed Lambda function URI, for example,arn:aws:apigateway:us-west-2:lambda:path/2015-03-31/functions/arn:aws:lambda:us-west-2:{account_id}:function:{lambda_function_name}/invocations.
In general, the URI has this formarn:aws:apigateway:{region}:lambda:path/{service_api},
where{region}is the same as the region hosting the Lambda
function,pathindicates that the remaining substring in
the URI should be treated as the path to the resource, including the
initial/. For Lambda functions, this is usually of the
form/2015-03-31/functions/[FunctionARN]/invocations. | 
| authorizerCredentials | Specifies the required credentials as an IAM role for API Gateway
to invoke the authorizer. To specify an IAM role for API Gateway to
assume, use the role's Amazon Resource Name (ARN). To use resource-based
permissions on the Lambda function, specify null. | 
| identitySource | The identity source for which authorization is requested. For a
TOKENorCOGNITO_USER_POOLSauthorizer, this
is required and specifies the request header mapping expression for the
custom header holding the authorization token submitted by the client.
For example, if the token header name isAuth, the header
mapping expression ismethod.request.header.Auth. For theREQUESTauthorizer, this is required when authorization
caching is enabled. The value is a comma-separated string of one or more
mapping expressions of the specified request parameters. For example, if
anAuthheader, aNamequery string parameter
are defined as identity sources, this value ismethod.request.header.Auth, method.request.querystring.Name.
These parameters will be used to derive the authorization caching key
and to perform runtime validation of theREQUESTauthorizer
by verifying all of the identity-related request parameters are present,
not null and non-empty. Only when this is true does the authorizer
invoke the authorizer Lambda function, otherwise, it returns a 401
Unauthorized response without calling the Lambda function. The valid
value is a string of comma-separated mapping expressions of the
specified request parameters. When the authorization caching is not
enabled, this property is optional. | 
| identityValidationExpression | A validation expression for the incoming identity token. For
TOKENauthorizers, this value is a regular expression. ForCOGNITO_USER_POOLSauthorizers, API Gateway will match theaudfield of the incoming token from the client against the
specified regular expression. It will invoke the authorizer's Lambda
function when there is a match. Otherwise, it will return a 401
Unauthorized response without calling the Lambda function. The
validation expression does not apply to theREQUESTauthorizer. | 
| authorizerResultTtlInSeconds | The TTL in seconds of cached authorizer results. If it equals 0,
authorization caching is disabled. If it is greater than 0, API Gateway
will cache authorizer responses. If this field is not set, the default
value is 300. The maximum value is 3600, or 1 hour. | 
Value
A list with the following syntax:
list(
  id = "string",
  name = "string",
  type = "TOKEN"|"REQUEST"|"COGNITO_USER_POOLS",
  providerARNs = list(
    "string"
  ),
  authType = "string",
  authorizerUri = "string",
  authorizerCredentials = "string",
  identitySource = "string",
  identityValidationExpression = "string",
  authorizerResultTtlInSeconds = 123
)
Request syntax
svc$create_authorizer(
  restApiId = "string",
  name = "string",
  type = "TOKEN"|"REQUEST"|"COGNITO_USER_POOLS",
  providerARNs = list(
    "string"
  ),
  authType = "string",
  authorizerUri = "string",
  authorizerCredentials = "string",
  identitySource = "string",
  identityValidationExpression = "string",
  authorizerResultTtlInSeconds = 123
)