:doc:`CognitoIdentityProvider <../../cognito-idp>` / Client / update_auth_event_feedback

**************************
update_auth_event_feedback
**************************



.. py:method:: CognitoIdentityProvider.Client.update_auth_event_feedback(**kwargs)

  

  Provides the feedback for an authentication event generated by threat protection features. The user's response indicates that you think that the event either was from a valid user or was an unwanted authentication attempt. This feedback improves the risk evaluation decision for the user pool as part of Amazon Cognito threat protection. To activate this setting, your user pool must be on the `Plus tier <https://docs.aws.amazon.com/cognito/latest/developerguide/feature-plans-features-plus.html>`__.

   

  This operation requires a ``FeedbackToken`` that Amazon Cognito generates and adds to notification emails when users have potentially suspicious authentication events. Users invoke this operation when they select the link that corresponds to ``{one-click-link-valid}`` or ``{one-click-link-invalid}`` in your notification template. Because ``FeedbackToken`` is a required parameter, you can't make requests to ``UpdateAuthEventFeedback`` without the contents of the notification email message.

   

  .. note::

    

    Amazon Cognito doesn't evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can't use IAM credentials to authorize requests, and you can't grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see `Using the Amazon Cognito user pools API and user pool endpoints <https://docs.aws.amazon.com/cognito/latest/developerguide/user-pools-API-operations.html>`__.

    

  

  See also: `AWS API Documentation <https://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/UpdateAuthEventFeedback>`_  


  **Request Syntax**
  ::

    response = client.update_auth_event_feedback(
        UserPoolId='string',
        Username='string',
        EventId='string',
        FeedbackToken='string',
        FeedbackValue='Valid'|'Invalid'
    )
    
  :type UserPoolId: string
  :param UserPoolId: **[REQUIRED]** 

    The ID of the user pool where you want to update auth event feedback.

    

  
  :type Username: string
  :param Username: **[REQUIRED]** 

    The name of the user that you want to query or modify. The value of this parameter is typically your user's username, but it can be any of their alias attributes. If ``username`` isn't an alias attribute in your user pool, this value must be the ``sub`` of a local user or the username of a user from a third-party IdP.

    

  
  :type EventId: string
  :param EventId: **[REQUIRED]** 

    The ID of the authentication event that you want to submit feedback for.

    

  
  :type FeedbackToken: string
  :param FeedbackToken: **[REQUIRED]** 

    The feedback token, an encrypted object generated by Amazon Cognito and passed to your user in the notification email message from the event.

    

  
  :type FeedbackValue: string
  :param FeedbackValue: **[REQUIRED]** 

    Your feedback to the authentication event. When you provide a ``FeedbackValue`` value of ``valid``, you tell Amazon Cognito that you trust a user session where Amazon Cognito has evaluated some level of risk. When you provide a ``FeedbackValue`` value of ``invalid``, you tell Amazon Cognito that you don't trust a user session, or you don't believe that Amazon Cognito evaluated a high-enough risk level.

    

  
  
  :rtype: dict
  :returns: 
    
    **Response Syntax**

    
    ::

      {}
      
    **Response Structure**

    

    - *(dict) --* 
  
  **Exceptions**
  
  *   :py:class:`CognitoIdentityProvider.Client.exceptions.InvalidParameterException`

  
  *   :py:class:`CognitoIdentityProvider.Client.exceptions.ResourceNotFoundException`

  
  *   :py:class:`CognitoIdentityProvider.Client.exceptions.TooManyRequestsException`

  
  *   :py:class:`CognitoIdentityProvider.Client.exceptions.NotAuthorizedException`

  
  *   :py:class:`CognitoIdentityProvider.Client.exceptions.UserNotFoundException`

  
  *   :py:class:`CognitoIdentityProvider.Client.exceptions.UserPoolAddOnNotEnabledException`

  
  *   :py:class:`CognitoIdentityProvider.Client.exceptions.InternalErrorException`

  