1 /** 2 * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. 3 * SPDX-License-Identifier: Apache-2.0. 4 */ 5 6 #pragma once 7 #include <aws/mq/MQ_EXPORTS.h> 8 #include <aws/core/utils/memory/stl/AWSVector.h> 9 #include <aws/core/utils/memory/stl/AWSString.h> 10 #include <utility> 11 12 namespace Aws 13 { 14 namespace Utils 15 { 16 namespace Json 17 { 18 class JsonValue; 19 class JsonView; 20 } // namespace Json 21 } // namespace Utils 22 namespace MQ 23 { 24 namespace Model 25 { 26 27 /** 28 * <p>Optional. The metadata of the LDAP server used to authenticate and authorize 29 * connections to the broker.</p><p><h3>See Also:</h3> <a 30 * href="http://docs.aws.amazon.com/goto/WebAPI/mq-2017-11-27/LdapServerMetadataOutput">AWS 31 * API Reference</a></p> 32 */ 33 class AWS_MQ_API LdapServerMetadataOutput 34 { 35 public: 36 LdapServerMetadataOutput(); 37 LdapServerMetadataOutput(Aws::Utils::Json::JsonView jsonValue); 38 LdapServerMetadataOutput& operator=(Aws::Utils::Json::JsonView jsonValue); 39 Aws::Utils::Json::JsonValue Jsonize() const; 40 41 42 /** 43 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 44 * Microsoft Active Directory . Optional failover server.</p> 45 */ GetHosts()46 inline const Aws::Vector<Aws::String>& GetHosts() const{ return m_hosts; } 47 48 /** 49 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 50 * Microsoft Active Directory . Optional failover server.</p> 51 */ HostsHasBeenSet()52 inline bool HostsHasBeenSet() const { return m_hostsHasBeenSet; } 53 54 /** 55 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 56 * Microsoft Active Directory . Optional failover server.</p> 57 */ SetHosts(const Aws::Vector<Aws::String> & value)58 inline void SetHosts(const Aws::Vector<Aws::String>& value) { m_hostsHasBeenSet = true; m_hosts = value; } 59 60 /** 61 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 62 * Microsoft Active Directory . Optional failover server.</p> 63 */ SetHosts(Aws::Vector<Aws::String> && value)64 inline void SetHosts(Aws::Vector<Aws::String>&& value) { m_hostsHasBeenSet = true; m_hosts = std::move(value); } 65 66 /** 67 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 68 * Microsoft Active Directory . Optional failover server.</p> 69 */ WithHosts(const Aws::Vector<Aws::String> & value)70 inline LdapServerMetadataOutput& WithHosts(const Aws::Vector<Aws::String>& value) { SetHosts(value); return *this;} 71 72 /** 73 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 74 * Microsoft Active Directory . Optional failover server.</p> 75 */ WithHosts(Aws::Vector<Aws::String> && value)76 inline LdapServerMetadataOutput& WithHosts(Aws::Vector<Aws::String>&& value) { SetHosts(std::move(value)); return *this;} 77 78 /** 79 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 80 * Microsoft Active Directory . Optional failover server.</p> 81 */ AddHosts(const Aws::String & value)82 inline LdapServerMetadataOutput& AddHosts(const Aws::String& value) { m_hostsHasBeenSet = true; m_hosts.push_back(value); return *this; } 83 84 /** 85 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 86 * Microsoft Active Directory . Optional failover server.</p> 87 */ AddHosts(Aws::String && value)88 inline LdapServerMetadataOutput& AddHosts(Aws::String&& value) { m_hostsHasBeenSet = true; m_hosts.push_back(std::move(value)); return *this; } 89 90 /** 91 * <p>Specifies the location of the LDAP server such as AWS Directory Service for 92 * Microsoft Active Directory . Optional failover server.</p> 93 */ AddHosts(const char * value)94 inline LdapServerMetadataOutput& AddHosts(const char* value) { m_hostsHasBeenSet = true; m_hosts.push_back(value); return *this; } 95 96 97 /** 98 * <p>The distinguished name of the node in the directory information tree (DIT) to 99 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 100 101 * dc=example, dc=com.</p> 102 */ GetRoleBase()103 inline const Aws::String& GetRoleBase() const{ return m_roleBase; } 104 105 /** 106 * <p>The distinguished name of the node in the directory information tree (DIT) to 107 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 108 109 * dc=example, dc=com.</p> 110 */ RoleBaseHasBeenSet()111 inline bool RoleBaseHasBeenSet() const { return m_roleBaseHasBeenSet; } 112 113 /** 114 * <p>The distinguished name of the node in the directory information tree (DIT) to 115 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 116 117 * dc=example, dc=com.</p> 118 */ SetRoleBase(const Aws::String & value)119 inline void SetRoleBase(const Aws::String& value) { m_roleBaseHasBeenSet = true; m_roleBase = value; } 120 121 /** 122 * <p>The distinguished name of the node in the directory information tree (DIT) to 123 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 124 125 * dc=example, dc=com.</p> 126 */ SetRoleBase(Aws::String && value)127 inline void SetRoleBase(Aws::String&& value) { m_roleBaseHasBeenSet = true; m_roleBase = std::move(value); } 128 129 /** 130 * <p>The distinguished name of the node in the directory information tree (DIT) to 131 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 132 133 * dc=example, dc=com.</p> 134 */ SetRoleBase(const char * value)135 inline void SetRoleBase(const char* value) { m_roleBaseHasBeenSet = true; m_roleBase.assign(value); } 136 137 /** 138 * <p>The distinguished name of the node in the directory information tree (DIT) to 139 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 140 141 * dc=example, dc=com.</p> 142 */ WithRoleBase(const Aws::String & value)143 inline LdapServerMetadataOutput& WithRoleBase(const Aws::String& value) { SetRoleBase(value); return *this;} 144 145 /** 146 * <p>The distinguished name of the node in the directory information tree (DIT) to 147 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 148 149 * dc=example, dc=com.</p> 150 */ WithRoleBase(Aws::String && value)151 inline LdapServerMetadataOutput& WithRoleBase(Aws::String&& value) { SetRoleBase(std::move(value)); return *this;} 152 153 /** 154 * <p>The distinguished name of the node in the directory information tree (DIT) to 155 * search for roles or groups. For example, ou=group, ou=corp, dc=corp, 156 157 * dc=example, dc=com.</p> 158 */ WithRoleBase(const char * value)159 inline LdapServerMetadataOutput& WithRoleBase(const char* value) { SetRoleBase(value); return *this;} 160 161 162 /** 163 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 164 * object returned from the group membership query.</p> 165 */ GetRoleName()166 inline const Aws::String& GetRoleName() const{ return m_roleName; } 167 168 /** 169 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 170 * object returned from the group membership query.</p> 171 */ RoleNameHasBeenSet()172 inline bool RoleNameHasBeenSet() const { return m_roleNameHasBeenSet; } 173 174 /** 175 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 176 * object returned from the group membership query.</p> 177 */ SetRoleName(const Aws::String & value)178 inline void SetRoleName(const Aws::String& value) { m_roleNameHasBeenSet = true; m_roleName = value; } 179 180 /** 181 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 182 * object returned from the group membership query.</p> 183 */ SetRoleName(Aws::String && value)184 inline void SetRoleName(Aws::String&& value) { m_roleNameHasBeenSet = true; m_roleName = std::move(value); } 185 186 /** 187 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 188 * object returned from the group membership query.</p> 189 */ SetRoleName(const char * value)190 inline void SetRoleName(const char* value) { m_roleNameHasBeenSet = true; m_roleName.assign(value); } 191 192 /** 193 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 194 * object returned from the group membership query.</p> 195 */ WithRoleName(const Aws::String & value)196 inline LdapServerMetadataOutput& WithRoleName(const Aws::String& value) { SetRoleName(value); return *this;} 197 198 /** 199 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 200 * object returned from the group membership query.</p> 201 */ WithRoleName(Aws::String && value)202 inline LdapServerMetadataOutput& WithRoleName(Aws::String&& value) { SetRoleName(std::move(value)); return *this;} 203 204 /** 205 * <p>Specifies the LDAP attribute that identifies the group name attribute in the 206 * object returned from the group membership query.</p> 207 */ WithRoleName(const char * value)208 inline LdapServerMetadataOutput& WithRoleName(const char* value) { SetRoleName(value); return *this;} 209 210 211 /** 212 * <p>The LDAP search filter used to find roles within the roleBase. The 213 * distinguished name of the user matched by userSearchMatching is substituted into 214 * the {0} placeholder in the search filter. The client's username is substituted 215 * into the {1} placeholder. For example, if you set this option to 216 * (member=uid={1})for the user janedoe, the search filter becomes 217 * (member=uid=janedoe) after string substitution. It matches all role entries that 218 * have a member attribute equal to uid=janedoe under the subtree selected by the 219 * roleBase.</p> 220 */ GetRoleSearchMatching()221 inline const Aws::String& GetRoleSearchMatching() const{ return m_roleSearchMatching; } 222 223 /** 224 * <p>The LDAP search filter used to find roles within the roleBase. The 225 * distinguished name of the user matched by userSearchMatching is substituted into 226 * the {0} placeholder in the search filter. The client's username is substituted 227 * into the {1} placeholder. For example, if you set this option to 228 * (member=uid={1})for the user janedoe, the search filter becomes 229 * (member=uid=janedoe) after string substitution. It matches all role entries that 230 * have a member attribute equal to uid=janedoe under the subtree selected by the 231 * roleBase.</p> 232 */ RoleSearchMatchingHasBeenSet()233 inline bool RoleSearchMatchingHasBeenSet() const { return m_roleSearchMatchingHasBeenSet; } 234 235 /** 236 * <p>The LDAP search filter used to find roles within the roleBase. The 237 * distinguished name of the user matched by userSearchMatching is substituted into 238 * the {0} placeholder in the search filter. The client's username is substituted 239 * into the {1} placeholder. For example, if you set this option to 240 * (member=uid={1})for the user janedoe, the search filter becomes 241 * (member=uid=janedoe) after string substitution. It matches all role entries that 242 * have a member attribute equal to uid=janedoe under the subtree selected by the 243 * roleBase.</p> 244 */ SetRoleSearchMatching(const Aws::String & value)245 inline void SetRoleSearchMatching(const Aws::String& value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching = value; } 246 247 /** 248 * <p>The LDAP search filter used to find roles within the roleBase. The 249 * distinguished name of the user matched by userSearchMatching is substituted into 250 * the {0} placeholder in the search filter. The client's username is substituted 251 * into the {1} placeholder. For example, if you set this option to 252 * (member=uid={1})for the user janedoe, the search filter becomes 253 * (member=uid=janedoe) after string substitution. It matches all role entries that 254 * have a member attribute equal to uid=janedoe under the subtree selected by the 255 * roleBase.</p> 256 */ SetRoleSearchMatching(Aws::String && value)257 inline void SetRoleSearchMatching(Aws::String&& value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching = std::move(value); } 258 259 /** 260 * <p>The LDAP search filter used to find roles within the roleBase. The 261 * distinguished name of the user matched by userSearchMatching is substituted into 262 * the {0} placeholder in the search filter. The client's username is substituted 263 * into the {1} placeholder. For example, if you set this option to 264 * (member=uid={1})for the user janedoe, the search filter becomes 265 * (member=uid=janedoe) after string substitution. It matches all role entries that 266 * have a member attribute equal to uid=janedoe under the subtree selected by the 267 * roleBase.</p> 268 */ SetRoleSearchMatching(const char * value)269 inline void SetRoleSearchMatching(const char* value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching.assign(value); } 270 271 /** 272 * <p>The LDAP search filter used to find roles within the roleBase. The 273 * distinguished name of the user matched by userSearchMatching is substituted into 274 * the {0} placeholder in the search filter. The client's username is substituted 275 * into the {1} placeholder. For example, if you set this option to 276 * (member=uid={1})for the user janedoe, the search filter becomes 277 * (member=uid=janedoe) after string substitution. It matches all role entries that 278 * have a member attribute equal to uid=janedoe under the subtree selected by the 279 * roleBase.</p> 280 */ WithRoleSearchMatching(const Aws::String & value)281 inline LdapServerMetadataOutput& WithRoleSearchMatching(const Aws::String& value) { SetRoleSearchMatching(value); return *this;} 282 283 /** 284 * <p>The LDAP search filter used to find roles within the roleBase. The 285 * distinguished name of the user matched by userSearchMatching is substituted into 286 * the {0} placeholder in the search filter. The client's username is substituted 287 * into the {1} placeholder. For example, if you set this option to 288 * (member=uid={1})for the user janedoe, the search filter becomes 289 * (member=uid=janedoe) after string substitution. It matches all role entries that 290 * have a member attribute equal to uid=janedoe under the subtree selected by the 291 * roleBase.</p> 292 */ WithRoleSearchMatching(Aws::String && value)293 inline LdapServerMetadataOutput& WithRoleSearchMatching(Aws::String&& value) { SetRoleSearchMatching(std::move(value)); return *this;} 294 295 /** 296 * <p>The LDAP search filter used to find roles within the roleBase. The 297 * distinguished name of the user matched by userSearchMatching is substituted into 298 * the {0} placeholder in the search filter. The client's username is substituted 299 * into the {1} placeholder. For example, if you set this option to 300 * (member=uid={1})for the user janedoe, the search filter becomes 301 * (member=uid=janedoe) after string substitution. It matches all role entries that 302 * have a member attribute equal to uid=janedoe under the subtree selected by the 303 * roleBase.</p> 304 */ WithRoleSearchMatching(const char * value)305 inline LdapServerMetadataOutput& WithRoleSearchMatching(const char* value) { SetRoleSearchMatching(value); return *this;} 306 307 308 /** 309 * <p>The directory search scope for the role. If set to true, scope is to search 310 * the entire subtree.</p> 311 */ GetRoleSearchSubtree()312 inline bool GetRoleSearchSubtree() const{ return m_roleSearchSubtree; } 313 314 /** 315 * <p>The directory search scope for the role. If set to true, scope is to search 316 * the entire subtree.</p> 317 */ RoleSearchSubtreeHasBeenSet()318 inline bool RoleSearchSubtreeHasBeenSet() const { return m_roleSearchSubtreeHasBeenSet; } 319 320 /** 321 * <p>The directory search scope for the role. If set to true, scope is to search 322 * the entire subtree.</p> 323 */ SetRoleSearchSubtree(bool value)324 inline void SetRoleSearchSubtree(bool value) { m_roleSearchSubtreeHasBeenSet = true; m_roleSearchSubtree = value; } 325 326 /** 327 * <p>The directory search scope for the role. If set to true, scope is to search 328 * the entire subtree.</p> 329 */ WithRoleSearchSubtree(bool value)330 inline LdapServerMetadataOutput& WithRoleSearchSubtree(bool value) { SetRoleSearchSubtree(value); return *this;} 331 332 333 /** 334 * <p>Service account username. A service account is an account in your LDAP server 335 * that has access to initiate a connection. For example, cn=admin,dc=corp, 336 * dc=example, 337 dc=com.</p> 338 */ GetServiceAccountUsername()339 inline const Aws::String& GetServiceAccountUsername() const{ return m_serviceAccountUsername; } 340 341 /** 342 * <p>Service account username. A service account is an account in your LDAP server 343 * that has access to initiate a connection. For example, cn=admin,dc=corp, 344 * dc=example, 345 dc=com.</p> 346 */ ServiceAccountUsernameHasBeenSet()347 inline bool ServiceAccountUsernameHasBeenSet() const { return m_serviceAccountUsernameHasBeenSet; } 348 349 /** 350 * <p>Service account username. A service account is an account in your LDAP server 351 * that has access to initiate a connection. For example, cn=admin,dc=corp, 352 * dc=example, 353 dc=com.</p> 354 */ SetServiceAccountUsername(const Aws::String & value)355 inline void SetServiceAccountUsername(const Aws::String& value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername = value; } 356 357 /** 358 * <p>Service account username. A service account is an account in your LDAP server 359 * that has access to initiate a connection. For example, cn=admin,dc=corp, 360 * dc=example, 361 dc=com.</p> 362 */ SetServiceAccountUsername(Aws::String && value)363 inline void SetServiceAccountUsername(Aws::String&& value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername = std::move(value); } 364 365 /** 366 * <p>Service account username. A service account is an account in your LDAP server 367 * that has access to initiate a connection. For example, cn=admin,dc=corp, 368 * dc=example, 369 dc=com.</p> 370 */ SetServiceAccountUsername(const char * value)371 inline void SetServiceAccountUsername(const char* value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername.assign(value); } 372 373 /** 374 * <p>Service account username. A service account is an account in your LDAP server 375 * that has access to initiate a connection. For example, cn=admin,dc=corp, 376 * dc=example, 377 dc=com.</p> 378 */ WithServiceAccountUsername(const Aws::String & value)379 inline LdapServerMetadataOutput& WithServiceAccountUsername(const Aws::String& value) { SetServiceAccountUsername(value); return *this;} 380 381 /** 382 * <p>Service account username. A service account is an account in your LDAP server 383 * that has access to initiate a connection. For example, cn=admin,dc=corp, 384 * dc=example, 385 dc=com.</p> 386 */ WithServiceAccountUsername(Aws::String && value)387 inline LdapServerMetadataOutput& WithServiceAccountUsername(Aws::String&& value) { SetServiceAccountUsername(std::move(value)); return *this;} 388 389 /** 390 * <p>Service account username. A service account is an account in your LDAP server 391 * that has access to initiate a connection. For example, cn=admin,dc=corp, 392 * dc=example, 393 dc=com.</p> 394 */ WithServiceAccountUsername(const char * value)395 inline LdapServerMetadataOutput& WithServiceAccountUsername(const char* value) { SetServiceAccountUsername(value); return *this;} 396 397 398 /** 399 * <p>Select a particular subtree of the directory information tree (DIT) to search 400 * for user entries. The subtree is specified by a DN, which specifies the base 401 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 402 * dc=corp, 403 dc=example, dc=com, the search for user entries is 404 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 405 * dc=com.</p> 406 */ GetUserBase()407 inline const Aws::String& GetUserBase() const{ return m_userBase; } 408 409 /** 410 * <p>Select a particular subtree of the directory information tree (DIT) to search 411 * for user entries. The subtree is specified by a DN, which specifies the base 412 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 413 * dc=corp, 414 dc=example, dc=com, the search for user entries is 415 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 416 * dc=com.</p> 417 */ UserBaseHasBeenSet()418 inline bool UserBaseHasBeenSet() const { return m_userBaseHasBeenSet; } 419 420 /** 421 * <p>Select a particular subtree of the directory information tree (DIT) to search 422 * for user entries. The subtree is specified by a DN, which specifies the base 423 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 424 * dc=corp, 425 dc=example, dc=com, the search for user entries is 426 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 427 * dc=com.</p> 428 */ SetUserBase(const Aws::String & value)429 inline void SetUserBase(const Aws::String& value) { m_userBaseHasBeenSet = true; m_userBase = value; } 430 431 /** 432 * <p>Select a particular subtree of the directory information tree (DIT) to search 433 * for user entries. The subtree is specified by a DN, which specifies the base 434 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 435 * dc=corp, 436 dc=example, dc=com, the search for user entries is 437 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 438 * dc=com.</p> 439 */ SetUserBase(Aws::String && value)440 inline void SetUserBase(Aws::String&& value) { m_userBaseHasBeenSet = true; m_userBase = std::move(value); } 441 442 /** 443 * <p>Select a particular subtree of the directory information tree (DIT) to search 444 * for user entries. The subtree is specified by a DN, which specifies the base 445 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 446 * dc=corp, 447 dc=example, dc=com, the search for user entries is 448 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 449 * dc=com.</p> 450 */ SetUserBase(const char * value)451 inline void SetUserBase(const char* value) { m_userBaseHasBeenSet = true; m_userBase.assign(value); } 452 453 /** 454 * <p>Select a particular subtree of the directory information tree (DIT) to search 455 * for user entries. The subtree is specified by a DN, which specifies the base 456 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 457 * dc=corp, 458 dc=example, dc=com, the search for user entries is 459 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 460 * dc=com.</p> 461 */ WithUserBase(const Aws::String & value)462 inline LdapServerMetadataOutput& WithUserBase(const Aws::String& value) { SetUserBase(value); return *this;} 463 464 /** 465 * <p>Select a particular subtree of the directory information tree (DIT) to search 466 * for user entries. The subtree is specified by a DN, which specifies the base 467 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 468 * dc=corp, 469 dc=example, dc=com, the search for user entries is 470 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 471 * dc=com.</p> 472 */ WithUserBase(Aws::String && value)473 inline LdapServerMetadataOutput& WithUserBase(Aws::String&& value) { SetUserBase(std::move(value)); return *this;} 474 475 /** 476 * <p>Select a particular subtree of the directory information tree (DIT) to search 477 * for user entries. The subtree is specified by a DN, which specifies the base 478 * node of the subtree. For example, by setting this option to ou=Users,ou=corp, 479 * dc=corp, 480 dc=example, dc=com, the search for user entries is 481 * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, 482 * dc=com.</p> 483 */ WithUserBase(const char * value)484 inline LdapServerMetadataOutput& WithUserBase(const char* value) { SetUserBase(value); return *this;} 485 486 487 /** 488 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 489 */ GetUserRoleName()490 inline const Aws::String& GetUserRoleName() const{ return m_userRoleName; } 491 492 /** 493 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 494 */ UserRoleNameHasBeenSet()495 inline bool UserRoleNameHasBeenSet() const { return m_userRoleNameHasBeenSet; } 496 497 /** 498 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 499 */ SetUserRoleName(const Aws::String & value)500 inline void SetUserRoleName(const Aws::String& value) { m_userRoleNameHasBeenSet = true; m_userRoleName = value; } 501 502 /** 503 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 504 */ SetUserRoleName(Aws::String && value)505 inline void SetUserRoleName(Aws::String&& value) { m_userRoleNameHasBeenSet = true; m_userRoleName = std::move(value); } 506 507 /** 508 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 509 */ SetUserRoleName(const char * value)510 inline void SetUserRoleName(const char* value) { m_userRoleNameHasBeenSet = true; m_userRoleName.assign(value); } 511 512 /** 513 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 514 */ WithUserRoleName(const Aws::String & value)515 inline LdapServerMetadataOutput& WithUserRoleName(const Aws::String& value) { SetUserRoleName(value); return *this;} 516 517 /** 518 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 519 */ WithUserRoleName(Aws::String && value)520 inline LdapServerMetadataOutput& WithUserRoleName(Aws::String&& value) { SetUserRoleName(std::move(value)); return *this;} 521 522 /** 523 * <p>Specifies the name of the LDAP attribute for the user group membership.</p> 524 */ WithUserRoleName(const char * value)525 inline LdapServerMetadataOutput& WithUserRoleName(const char* value) { SetUserRoleName(value); return *this;} 526 527 528 /** 529 * <p>The LDAP search filter used to find users within the userBase. The client's 530 * username is substituted into the {0} placeholder in the search filter. For 531 * example, if this option is set to (uid={0}) and the received username is 532 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 533 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 534 * dc=example, 535 dc=com.</p> 536 */ GetUserSearchMatching()537 inline const Aws::String& GetUserSearchMatching() const{ return m_userSearchMatching; } 538 539 /** 540 * <p>The LDAP search filter used to find users within the userBase. The client's 541 * username is substituted into the {0} placeholder in the search filter. For 542 * example, if this option is set to (uid={0}) and the received username is 543 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 544 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 545 * dc=example, 546 dc=com.</p> 547 */ UserSearchMatchingHasBeenSet()548 inline bool UserSearchMatchingHasBeenSet() const { return m_userSearchMatchingHasBeenSet; } 549 550 /** 551 * <p>The LDAP search filter used to find users within the userBase. The client's 552 * username is substituted into the {0} placeholder in the search filter. For 553 * example, if this option is set to (uid={0}) and the received username is 554 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 555 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 556 * dc=example, 557 dc=com.</p> 558 */ SetUserSearchMatching(const Aws::String & value)559 inline void SetUserSearchMatching(const Aws::String& value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching = value; } 560 561 /** 562 * <p>The LDAP search filter used to find users within the userBase. The client's 563 * username is substituted into the {0} placeholder in the search filter. For 564 * example, if this option is set to (uid={0}) and the received username is 565 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 566 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 567 * dc=example, 568 dc=com.</p> 569 */ SetUserSearchMatching(Aws::String && value)570 inline void SetUserSearchMatching(Aws::String&& value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching = std::move(value); } 571 572 /** 573 * <p>The LDAP search filter used to find users within the userBase. The client's 574 * username is substituted into the {0} placeholder in the search filter. For 575 * example, if this option is set to (uid={0}) and the received username is 576 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 577 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 578 * dc=example, 579 dc=com.</p> 580 */ SetUserSearchMatching(const char * value)581 inline void SetUserSearchMatching(const char* value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching.assign(value); } 582 583 /** 584 * <p>The LDAP search filter used to find users within the userBase. The client's 585 * username is substituted into the {0} placeholder in the search filter. For 586 * example, if this option is set to (uid={0}) and the received username is 587 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 588 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 589 * dc=example, 590 dc=com.</p> 591 */ WithUserSearchMatching(const Aws::String & value)592 inline LdapServerMetadataOutput& WithUserSearchMatching(const Aws::String& value) { SetUserSearchMatching(value); return *this;} 593 594 /** 595 * <p>The LDAP search filter used to find users within the userBase. The client's 596 * username is substituted into the {0} placeholder in the search filter. For 597 * example, if this option is set to (uid={0}) and the received username is 598 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 599 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 600 * dc=example, 601 dc=com.</p> 602 */ WithUserSearchMatching(Aws::String && value)603 inline LdapServerMetadataOutput& WithUserSearchMatching(Aws::String&& value) { SetUserSearchMatching(std::move(value)); return *this;} 604 605 /** 606 * <p>The LDAP search filter used to find users within the userBase. The client's 607 * username is substituted into the {0} placeholder in the search filter. For 608 * example, if this option is set to (uid={0}) and the received username is 609 * janedoe, the search filter becomes (uid=janedoe) after string substitution. It 610 * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, 611 * dc=example, 612 dc=com.</p> 613 */ WithUserSearchMatching(const char * value)614 inline LdapServerMetadataOutput& WithUserSearchMatching(const char* value) { SetUserSearchMatching(value); return *this;} 615 616 617 /** 618 * <p>The directory search scope for the user. If set to true, scope is to search 619 * the entire subtree.</p> 620 */ GetUserSearchSubtree()621 inline bool GetUserSearchSubtree() const{ return m_userSearchSubtree; } 622 623 /** 624 * <p>The directory search scope for the user. If set to true, scope is to search 625 * the entire subtree.</p> 626 */ UserSearchSubtreeHasBeenSet()627 inline bool UserSearchSubtreeHasBeenSet() const { return m_userSearchSubtreeHasBeenSet; } 628 629 /** 630 * <p>The directory search scope for the user. If set to true, scope is to search 631 * the entire subtree.</p> 632 */ SetUserSearchSubtree(bool value)633 inline void SetUserSearchSubtree(bool value) { m_userSearchSubtreeHasBeenSet = true; m_userSearchSubtree = value; } 634 635 /** 636 * <p>The directory search scope for the user. If set to true, scope is to search 637 * the entire subtree.</p> 638 */ WithUserSearchSubtree(bool value)639 inline LdapServerMetadataOutput& WithUserSearchSubtree(bool value) { SetUserSearchSubtree(value); return *this;} 640 641 private: 642 643 Aws::Vector<Aws::String> m_hosts; 644 bool m_hostsHasBeenSet; 645 646 Aws::String m_roleBase; 647 bool m_roleBaseHasBeenSet; 648 649 Aws::String m_roleName; 650 bool m_roleNameHasBeenSet; 651 652 Aws::String m_roleSearchMatching; 653 bool m_roleSearchMatchingHasBeenSet; 654 655 bool m_roleSearchSubtree; 656 bool m_roleSearchSubtreeHasBeenSet; 657 658 Aws::String m_serviceAccountUsername; 659 bool m_serviceAccountUsernameHasBeenSet; 660 661 Aws::String m_userBase; 662 bool m_userBaseHasBeenSet; 663 664 Aws::String m_userRoleName; 665 bool m_userRoleNameHasBeenSet; 666 667 Aws::String m_userSearchMatching; 668 bool m_userSearchMatchingHasBeenSet; 669 670 bool m_userSearchSubtree; 671 bool m_userSearchSubtreeHasBeenSet; 672 }; 673 674 } // namespace Model 675 } // namespace MQ 676 } // namespace Aws 677