1 /**
2  * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3  * SPDX-License-Identifier: Apache-2.0.
4  */
5 
6 #pragma once
7 #include <aws/mq/MQ_EXPORTS.h>
8 #include <aws/core/utils/memory/stl/AWSVector.h>
9 #include <aws/core/utils/memory/stl/AWSString.h>
10 #include <utility>
11 
12 namespace Aws
13 {
14 namespace Utils
15 {
16 namespace Json
17 {
18   class JsonValue;
19   class JsonView;
20 } // namespace Json
21 } // namespace Utils
22 namespace MQ
23 {
24 namespace Model
25 {
26 
27   /**
28    * <p>Optional. The metadata of the LDAP server used to authenticate and authorize
29    * connections to the broker.</p><p><h3>See Also:</h3>   <a
30    * href="http://docs.aws.amazon.com/goto/WebAPI/mq-2017-11-27/LdapServerMetadataOutput">AWS
31    * API Reference</a></p>
32    */
33   class AWS_MQ_API LdapServerMetadataOutput
34   {
35   public:
36     LdapServerMetadataOutput();
37     LdapServerMetadataOutput(Aws::Utils::Json::JsonView jsonValue);
38     LdapServerMetadataOutput& operator=(Aws::Utils::Json::JsonView jsonValue);
39     Aws::Utils::Json::JsonValue Jsonize() const;
40 
41 
42     /**
43      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
44      * Microsoft Active Directory . Optional failover server.</p>
45      */
GetHosts()46     inline const Aws::Vector<Aws::String>& GetHosts() const{ return m_hosts; }
47 
48     /**
49      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
50      * Microsoft Active Directory . Optional failover server.</p>
51      */
HostsHasBeenSet()52     inline bool HostsHasBeenSet() const { return m_hostsHasBeenSet; }
53 
54     /**
55      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
56      * Microsoft Active Directory . Optional failover server.</p>
57      */
SetHosts(const Aws::Vector<Aws::String> & value)58     inline void SetHosts(const Aws::Vector<Aws::String>& value) { m_hostsHasBeenSet = true; m_hosts = value; }
59 
60     /**
61      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
62      * Microsoft Active Directory . Optional failover server.</p>
63      */
SetHosts(Aws::Vector<Aws::String> && value)64     inline void SetHosts(Aws::Vector<Aws::String>&& value) { m_hostsHasBeenSet = true; m_hosts = std::move(value); }
65 
66     /**
67      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
68      * Microsoft Active Directory . Optional failover server.</p>
69      */
WithHosts(const Aws::Vector<Aws::String> & value)70     inline LdapServerMetadataOutput& WithHosts(const Aws::Vector<Aws::String>& value) { SetHosts(value); return *this;}
71 
72     /**
73      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
74      * Microsoft Active Directory . Optional failover server.</p>
75      */
WithHosts(Aws::Vector<Aws::String> && value)76     inline LdapServerMetadataOutput& WithHosts(Aws::Vector<Aws::String>&& value) { SetHosts(std::move(value)); return *this;}
77 
78     /**
79      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
80      * Microsoft Active Directory . Optional failover server.</p>
81      */
AddHosts(const Aws::String & value)82     inline LdapServerMetadataOutput& AddHosts(const Aws::String& value) { m_hostsHasBeenSet = true; m_hosts.push_back(value); return *this; }
83 
84     /**
85      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
86      * Microsoft Active Directory . Optional failover server.</p>
87      */
AddHosts(Aws::String && value)88     inline LdapServerMetadataOutput& AddHosts(Aws::String&& value) { m_hostsHasBeenSet = true; m_hosts.push_back(std::move(value)); return *this; }
89 
90     /**
91      * <p>Specifies the location of the LDAP server such as AWS Directory Service for
92      * Microsoft Active Directory . Optional failover server.</p>
93      */
AddHosts(const char * value)94     inline LdapServerMetadataOutput& AddHosts(const char* value) { m_hostsHasBeenSet = true; m_hosts.push_back(value); return *this; }
95 
96 
97     /**
98      * <p>The distinguished name of the node in the directory information tree (DIT) to
99      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
100 
101      *       dc=example, dc=com.</p>
102      */
GetRoleBase()103     inline const Aws::String& GetRoleBase() const{ return m_roleBase; }
104 
105     /**
106      * <p>The distinguished name of the node in the directory information tree (DIT) to
107      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
108 
109      *       dc=example, dc=com.</p>
110      */
RoleBaseHasBeenSet()111     inline bool RoleBaseHasBeenSet() const { return m_roleBaseHasBeenSet; }
112 
113     /**
114      * <p>The distinguished name of the node in the directory information tree (DIT) to
115      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
116 
117      *       dc=example, dc=com.</p>
118      */
SetRoleBase(const Aws::String & value)119     inline void SetRoleBase(const Aws::String& value) { m_roleBaseHasBeenSet = true; m_roleBase = value; }
120 
121     /**
122      * <p>The distinguished name of the node in the directory information tree (DIT) to
123      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
124 
125      *       dc=example, dc=com.</p>
126      */
SetRoleBase(Aws::String && value)127     inline void SetRoleBase(Aws::String&& value) { m_roleBaseHasBeenSet = true; m_roleBase = std::move(value); }
128 
129     /**
130      * <p>The distinguished name of the node in the directory information tree (DIT) to
131      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
132 
133      *       dc=example, dc=com.</p>
134      */
SetRoleBase(const char * value)135     inline void SetRoleBase(const char* value) { m_roleBaseHasBeenSet = true; m_roleBase.assign(value); }
136 
137     /**
138      * <p>The distinguished name of the node in the directory information tree (DIT) to
139      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
140 
141      *       dc=example, dc=com.</p>
142      */
WithRoleBase(const Aws::String & value)143     inline LdapServerMetadataOutput& WithRoleBase(const Aws::String& value) { SetRoleBase(value); return *this;}
144 
145     /**
146      * <p>The distinguished name of the node in the directory information tree (DIT) to
147      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
148 
149      *       dc=example, dc=com.</p>
150      */
WithRoleBase(Aws::String && value)151     inline LdapServerMetadataOutput& WithRoleBase(Aws::String&& value) { SetRoleBase(std::move(value)); return *this;}
152 
153     /**
154      * <p>The distinguished name of the node in the directory information tree (DIT) to
155      * search for roles or groups. For example, ou=group, ou=corp, dc=corp,
156 
157      *       dc=example, dc=com.</p>
158      */
WithRoleBase(const char * value)159     inline LdapServerMetadataOutput& WithRoleBase(const char* value) { SetRoleBase(value); return *this;}
160 
161 
162     /**
163      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
164      * object returned from the group membership query.</p>
165      */
GetRoleName()166     inline const Aws::String& GetRoleName() const{ return m_roleName; }
167 
168     /**
169      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
170      * object returned from the group membership query.</p>
171      */
RoleNameHasBeenSet()172     inline bool RoleNameHasBeenSet() const { return m_roleNameHasBeenSet; }
173 
174     /**
175      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
176      * object returned from the group membership query.</p>
177      */
SetRoleName(const Aws::String & value)178     inline void SetRoleName(const Aws::String& value) { m_roleNameHasBeenSet = true; m_roleName = value; }
179 
180     /**
181      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
182      * object returned from the group membership query.</p>
183      */
SetRoleName(Aws::String && value)184     inline void SetRoleName(Aws::String&& value) { m_roleNameHasBeenSet = true; m_roleName = std::move(value); }
185 
186     /**
187      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
188      * object returned from the group membership query.</p>
189      */
SetRoleName(const char * value)190     inline void SetRoleName(const char* value) { m_roleNameHasBeenSet = true; m_roleName.assign(value); }
191 
192     /**
193      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
194      * object returned from the group membership query.</p>
195      */
WithRoleName(const Aws::String & value)196     inline LdapServerMetadataOutput& WithRoleName(const Aws::String& value) { SetRoleName(value); return *this;}
197 
198     /**
199      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
200      * object returned from the group membership query.</p>
201      */
WithRoleName(Aws::String && value)202     inline LdapServerMetadataOutput& WithRoleName(Aws::String&& value) { SetRoleName(std::move(value)); return *this;}
203 
204     /**
205      * <p>Specifies the LDAP attribute that identifies the group name attribute in the
206      * object returned from the group membership query.</p>
207      */
WithRoleName(const char * value)208     inline LdapServerMetadataOutput& WithRoleName(const char* value) { SetRoleName(value); return *this;}
209 
210 
211     /**
212      * <p>The LDAP search filter used to find roles within the roleBase. The
213      * distinguished name of the user matched by userSearchMatching is substituted into
214      * the {0} placeholder in the search filter. The client's username is substituted
215      * into the {1} placeholder. For example, if you set this option to
216      * (member=uid={1})for the user janedoe, the search filter becomes
217      * (member=uid=janedoe) after string substitution. It matches all role entries that
218      * have a member attribute equal to uid=janedoe under the subtree selected by the
219      * roleBase.</p>
220      */
GetRoleSearchMatching()221     inline const Aws::String& GetRoleSearchMatching() const{ return m_roleSearchMatching; }
222 
223     /**
224      * <p>The LDAP search filter used to find roles within the roleBase. The
225      * distinguished name of the user matched by userSearchMatching is substituted into
226      * the {0} placeholder in the search filter. The client's username is substituted
227      * into the {1} placeholder. For example, if you set this option to
228      * (member=uid={1})for the user janedoe, the search filter becomes
229      * (member=uid=janedoe) after string substitution. It matches all role entries that
230      * have a member attribute equal to uid=janedoe under the subtree selected by the
231      * roleBase.</p>
232      */
RoleSearchMatchingHasBeenSet()233     inline bool RoleSearchMatchingHasBeenSet() const { return m_roleSearchMatchingHasBeenSet; }
234 
235     /**
236      * <p>The LDAP search filter used to find roles within the roleBase. The
237      * distinguished name of the user matched by userSearchMatching is substituted into
238      * the {0} placeholder in the search filter. The client's username is substituted
239      * into the {1} placeholder. For example, if you set this option to
240      * (member=uid={1})for the user janedoe, the search filter becomes
241      * (member=uid=janedoe) after string substitution. It matches all role entries that
242      * have a member attribute equal to uid=janedoe under the subtree selected by the
243      * roleBase.</p>
244      */
SetRoleSearchMatching(const Aws::String & value)245     inline void SetRoleSearchMatching(const Aws::String& value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching = value; }
246 
247     /**
248      * <p>The LDAP search filter used to find roles within the roleBase. The
249      * distinguished name of the user matched by userSearchMatching is substituted into
250      * the {0} placeholder in the search filter. The client's username is substituted
251      * into the {1} placeholder. For example, if you set this option to
252      * (member=uid={1})for the user janedoe, the search filter becomes
253      * (member=uid=janedoe) after string substitution. It matches all role entries that
254      * have a member attribute equal to uid=janedoe under the subtree selected by the
255      * roleBase.</p>
256      */
SetRoleSearchMatching(Aws::String && value)257     inline void SetRoleSearchMatching(Aws::String&& value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching = std::move(value); }
258 
259     /**
260      * <p>The LDAP search filter used to find roles within the roleBase. The
261      * distinguished name of the user matched by userSearchMatching is substituted into
262      * the {0} placeholder in the search filter. The client's username is substituted
263      * into the {1} placeholder. For example, if you set this option to
264      * (member=uid={1})for the user janedoe, the search filter becomes
265      * (member=uid=janedoe) after string substitution. It matches all role entries that
266      * have a member attribute equal to uid=janedoe under the subtree selected by the
267      * roleBase.</p>
268      */
SetRoleSearchMatching(const char * value)269     inline void SetRoleSearchMatching(const char* value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching.assign(value); }
270 
271     /**
272      * <p>The LDAP search filter used to find roles within the roleBase. The
273      * distinguished name of the user matched by userSearchMatching is substituted into
274      * the {0} placeholder in the search filter. The client's username is substituted
275      * into the {1} placeholder. For example, if you set this option to
276      * (member=uid={1})for the user janedoe, the search filter becomes
277      * (member=uid=janedoe) after string substitution. It matches all role entries that
278      * have a member attribute equal to uid=janedoe under the subtree selected by the
279      * roleBase.</p>
280      */
WithRoleSearchMatching(const Aws::String & value)281     inline LdapServerMetadataOutput& WithRoleSearchMatching(const Aws::String& value) { SetRoleSearchMatching(value); return *this;}
282 
283     /**
284      * <p>The LDAP search filter used to find roles within the roleBase. The
285      * distinguished name of the user matched by userSearchMatching is substituted into
286      * the {0} placeholder in the search filter. The client's username is substituted
287      * into the {1} placeholder. For example, if you set this option to
288      * (member=uid={1})for the user janedoe, the search filter becomes
289      * (member=uid=janedoe) after string substitution. It matches all role entries that
290      * have a member attribute equal to uid=janedoe under the subtree selected by the
291      * roleBase.</p>
292      */
WithRoleSearchMatching(Aws::String && value)293     inline LdapServerMetadataOutput& WithRoleSearchMatching(Aws::String&& value) { SetRoleSearchMatching(std::move(value)); return *this;}
294 
295     /**
296      * <p>The LDAP search filter used to find roles within the roleBase. The
297      * distinguished name of the user matched by userSearchMatching is substituted into
298      * the {0} placeholder in the search filter. The client's username is substituted
299      * into the {1} placeholder. For example, if you set this option to
300      * (member=uid={1})for the user janedoe, the search filter becomes
301      * (member=uid=janedoe) after string substitution. It matches all role entries that
302      * have a member attribute equal to uid=janedoe under the subtree selected by the
303      * roleBase.</p>
304      */
WithRoleSearchMatching(const char * value)305     inline LdapServerMetadataOutput& WithRoleSearchMatching(const char* value) { SetRoleSearchMatching(value); return *this;}
306 
307 
308     /**
309      * <p>The directory search scope for the role. If set to true, scope is to search
310      * the entire subtree.</p>
311      */
GetRoleSearchSubtree()312     inline bool GetRoleSearchSubtree() const{ return m_roleSearchSubtree; }
313 
314     /**
315      * <p>The directory search scope for the role. If set to true, scope is to search
316      * the entire subtree.</p>
317      */
RoleSearchSubtreeHasBeenSet()318     inline bool RoleSearchSubtreeHasBeenSet() const { return m_roleSearchSubtreeHasBeenSet; }
319 
320     /**
321      * <p>The directory search scope for the role. If set to true, scope is to search
322      * the entire subtree.</p>
323      */
SetRoleSearchSubtree(bool value)324     inline void SetRoleSearchSubtree(bool value) { m_roleSearchSubtreeHasBeenSet = true; m_roleSearchSubtree = value; }
325 
326     /**
327      * <p>The directory search scope for the role. If set to true, scope is to search
328      * the entire subtree.</p>
329      */
WithRoleSearchSubtree(bool value)330     inline LdapServerMetadataOutput& WithRoleSearchSubtree(bool value) { SetRoleSearchSubtree(value); return *this;}
331 
332 
333     /**
334      * <p>Service account username. A service account is an account in your LDAP server
335      * that has access to initiate a connection. For example, cn=admin,dc=corp,
336      * dc=example,
337                   dc=com.</p>
338      */
GetServiceAccountUsername()339     inline const Aws::String& GetServiceAccountUsername() const{ return m_serviceAccountUsername; }
340 
341     /**
342      * <p>Service account username. A service account is an account in your LDAP server
343      * that has access to initiate a connection. For example, cn=admin,dc=corp,
344      * dc=example,
345                   dc=com.</p>
346      */
ServiceAccountUsernameHasBeenSet()347     inline bool ServiceAccountUsernameHasBeenSet() const { return m_serviceAccountUsernameHasBeenSet; }
348 
349     /**
350      * <p>Service account username. A service account is an account in your LDAP server
351      * that has access to initiate a connection. For example, cn=admin,dc=corp,
352      * dc=example,
353                   dc=com.</p>
354      */
SetServiceAccountUsername(const Aws::String & value)355     inline void SetServiceAccountUsername(const Aws::String& value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername = value; }
356 
357     /**
358      * <p>Service account username. A service account is an account in your LDAP server
359      * that has access to initiate a connection. For example, cn=admin,dc=corp,
360      * dc=example,
361                   dc=com.</p>
362      */
SetServiceAccountUsername(Aws::String && value)363     inline void SetServiceAccountUsername(Aws::String&& value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername = std::move(value); }
364 
365     /**
366      * <p>Service account username. A service account is an account in your LDAP server
367      * that has access to initiate a connection. For example, cn=admin,dc=corp,
368      * dc=example,
369                   dc=com.</p>
370      */
SetServiceAccountUsername(const char * value)371     inline void SetServiceAccountUsername(const char* value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername.assign(value); }
372 
373     /**
374      * <p>Service account username. A service account is an account in your LDAP server
375      * that has access to initiate a connection. For example, cn=admin,dc=corp,
376      * dc=example,
377                   dc=com.</p>
378      */
WithServiceAccountUsername(const Aws::String & value)379     inline LdapServerMetadataOutput& WithServiceAccountUsername(const Aws::String& value) { SetServiceAccountUsername(value); return *this;}
380 
381     /**
382      * <p>Service account username. A service account is an account in your LDAP server
383      * that has access to initiate a connection. For example, cn=admin,dc=corp,
384      * dc=example,
385                   dc=com.</p>
386      */
WithServiceAccountUsername(Aws::String && value)387     inline LdapServerMetadataOutput& WithServiceAccountUsername(Aws::String&& value) { SetServiceAccountUsername(std::move(value)); return *this;}
388 
389     /**
390      * <p>Service account username. A service account is an account in your LDAP server
391      * that has access to initiate a connection. For example, cn=admin,dc=corp,
392      * dc=example,
393                   dc=com.</p>
394      */
WithServiceAccountUsername(const char * value)395     inline LdapServerMetadataOutput& WithServiceAccountUsername(const char* value) { SetServiceAccountUsername(value); return *this;}
396 
397 
398     /**
399      * <p>Select a particular subtree of the directory information tree (DIT) to search
400      * for user entries. The subtree is specified by a DN, which specifies the base
401      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
402      * dc=corp,
403                   dc=example, dc=com, the search for user entries is
404      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
405      * dc=com.</p>
406      */
GetUserBase()407     inline const Aws::String& GetUserBase() const{ return m_userBase; }
408 
409     /**
410      * <p>Select a particular subtree of the directory information tree (DIT) to search
411      * for user entries. The subtree is specified by a DN, which specifies the base
412      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
413      * dc=corp,
414                   dc=example, dc=com, the search for user entries is
415      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
416      * dc=com.</p>
417      */
UserBaseHasBeenSet()418     inline bool UserBaseHasBeenSet() const { return m_userBaseHasBeenSet; }
419 
420     /**
421      * <p>Select a particular subtree of the directory information tree (DIT) to search
422      * for user entries. The subtree is specified by a DN, which specifies the base
423      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
424      * dc=corp,
425                   dc=example, dc=com, the search for user entries is
426      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
427      * dc=com.</p>
428      */
SetUserBase(const Aws::String & value)429     inline void SetUserBase(const Aws::String& value) { m_userBaseHasBeenSet = true; m_userBase = value; }
430 
431     /**
432      * <p>Select a particular subtree of the directory information tree (DIT) to search
433      * for user entries. The subtree is specified by a DN, which specifies the base
434      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
435      * dc=corp,
436                   dc=example, dc=com, the search for user entries is
437      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
438      * dc=com.</p>
439      */
SetUserBase(Aws::String && value)440     inline void SetUserBase(Aws::String&& value) { m_userBaseHasBeenSet = true; m_userBase = std::move(value); }
441 
442     /**
443      * <p>Select a particular subtree of the directory information tree (DIT) to search
444      * for user entries. The subtree is specified by a DN, which specifies the base
445      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
446      * dc=corp,
447                   dc=example, dc=com, the search for user entries is
448      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
449      * dc=com.</p>
450      */
SetUserBase(const char * value)451     inline void SetUserBase(const char* value) { m_userBaseHasBeenSet = true; m_userBase.assign(value); }
452 
453     /**
454      * <p>Select a particular subtree of the directory information tree (DIT) to search
455      * for user entries. The subtree is specified by a DN, which specifies the base
456      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
457      * dc=corp,
458                   dc=example, dc=com, the search for user entries is
459      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
460      * dc=com.</p>
461      */
WithUserBase(const Aws::String & value)462     inline LdapServerMetadataOutput& WithUserBase(const Aws::String& value) { SetUserBase(value); return *this;}
463 
464     /**
465      * <p>Select a particular subtree of the directory information tree (DIT) to search
466      * for user entries. The subtree is specified by a DN, which specifies the base
467      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
468      * dc=corp,
469                   dc=example, dc=com, the search for user entries is
470      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
471      * dc=com.</p>
472      */
WithUserBase(Aws::String && value)473     inline LdapServerMetadataOutput& WithUserBase(Aws::String&& value) { SetUserBase(std::move(value)); return *this;}
474 
475     /**
476      * <p>Select a particular subtree of the directory information tree (DIT) to search
477      * for user entries. The subtree is specified by a DN, which specifies the base
478      * node of the subtree. For example, by setting this option to ou=Users,ou=corp,
479      * dc=corp,
480                   dc=example, dc=com, the search for user entries is
481      * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example,
482      * dc=com.</p>
483      */
WithUserBase(const char * value)484     inline LdapServerMetadataOutput& WithUserBase(const char* value) { SetUserBase(value); return *this;}
485 
486 
487     /**
488      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
489      */
GetUserRoleName()490     inline const Aws::String& GetUserRoleName() const{ return m_userRoleName; }
491 
492     /**
493      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
494      */
UserRoleNameHasBeenSet()495     inline bool UserRoleNameHasBeenSet() const { return m_userRoleNameHasBeenSet; }
496 
497     /**
498      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
499      */
SetUserRoleName(const Aws::String & value)500     inline void SetUserRoleName(const Aws::String& value) { m_userRoleNameHasBeenSet = true; m_userRoleName = value; }
501 
502     /**
503      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
504      */
SetUserRoleName(Aws::String && value)505     inline void SetUserRoleName(Aws::String&& value) { m_userRoleNameHasBeenSet = true; m_userRoleName = std::move(value); }
506 
507     /**
508      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
509      */
SetUserRoleName(const char * value)510     inline void SetUserRoleName(const char* value) { m_userRoleNameHasBeenSet = true; m_userRoleName.assign(value); }
511 
512     /**
513      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
514      */
WithUserRoleName(const Aws::String & value)515     inline LdapServerMetadataOutput& WithUserRoleName(const Aws::String& value) { SetUserRoleName(value); return *this;}
516 
517     /**
518      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
519      */
WithUserRoleName(Aws::String && value)520     inline LdapServerMetadataOutput& WithUserRoleName(Aws::String&& value) { SetUserRoleName(std::move(value)); return *this;}
521 
522     /**
523      * <p>Specifies the name of the LDAP attribute for the user group membership.</p>
524      */
WithUserRoleName(const char * value)525     inline LdapServerMetadataOutput& WithUserRoleName(const char* value) { SetUserRoleName(value); return *this;}
526 
527 
528     /**
529      * <p>The LDAP search filter used to find users within the userBase. The client's
530      * username is substituted into the {0} placeholder in the search filter. For
531      * example, if this option is set to (uid={0}) and the received username is
532      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
533      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
534      * dc=example,
535                dc=com.</p>
536      */
GetUserSearchMatching()537     inline const Aws::String& GetUserSearchMatching() const{ return m_userSearchMatching; }
538 
539     /**
540      * <p>The LDAP search filter used to find users within the userBase. The client's
541      * username is substituted into the {0} placeholder in the search filter. For
542      * example, if this option is set to (uid={0}) and the received username is
543      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
544      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
545      * dc=example,
546                dc=com.</p>
547      */
UserSearchMatchingHasBeenSet()548     inline bool UserSearchMatchingHasBeenSet() const { return m_userSearchMatchingHasBeenSet; }
549 
550     /**
551      * <p>The LDAP search filter used to find users within the userBase. The client's
552      * username is substituted into the {0} placeholder in the search filter. For
553      * example, if this option is set to (uid={0}) and the received username is
554      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
555      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
556      * dc=example,
557                dc=com.</p>
558      */
SetUserSearchMatching(const Aws::String & value)559     inline void SetUserSearchMatching(const Aws::String& value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching = value; }
560 
561     /**
562      * <p>The LDAP search filter used to find users within the userBase. The client's
563      * username is substituted into the {0} placeholder in the search filter. For
564      * example, if this option is set to (uid={0}) and the received username is
565      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
566      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
567      * dc=example,
568                dc=com.</p>
569      */
SetUserSearchMatching(Aws::String && value)570     inline void SetUserSearchMatching(Aws::String&& value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching = std::move(value); }
571 
572     /**
573      * <p>The LDAP search filter used to find users within the userBase. The client's
574      * username is substituted into the {0} placeholder in the search filter. For
575      * example, if this option is set to (uid={0}) and the received username is
576      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
577      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
578      * dc=example,
579                dc=com.</p>
580      */
SetUserSearchMatching(const char * value)581     inline void SetUserSearchMatching(const char* value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching.assign(value); }
582 
583     /**
584      * <p>The LDAP search filter used to find users within the userBase. The client's
585      * username is substituted into the {0} placeholder in the search filter. For
586      * example, if this option is set to (uid={0}) and the received username is
587      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
588      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
589      * dc=example,
590                dc=com.</p>
591      */
WithUserSearchMatching(const Aws::String & value)592     inline LdapServerMetadataOutput& WithUserSearchMatching(const Aws::String& value) { SetUserSearchMatching(value); return *this;}
593 
594     /**
595      * <p>The LDAP search filter used to find users within the userBase. The client's
596      * username is substituted into the {0} placeholder in the search filter. For
597      * example, if this option is set to (uid={0}) and the received username is
598      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
599      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
600      * dc=example,
601                dc=com.</p>
602      */
WithUserSearchMatching(Aws::String && value)603     inline LdapServerMetadataOutput& WithUserSearchMatching(Aws::String&& value) { SetUserSearchMatching(std::move(value)); return *this;}
604 
605     /**
606      * <p>The LDAP search filter used to find users within the userBase. The client's
607      * username is substituted into the {0} placeholder in the search filter. For
608      * example, if this option is set to (uid={0}) and the received username is
609      * janedoe, the search filter becomes (uid=janedoe) after string substitution. It
610      * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp,
611      * dc=example,
612                dc=com.</p>
613      */
WithUserSearchMatching(const char * value)614     inline LdapServerMetadataOutput& WithUserSearchMatching(const char* value) { SetUserSearchMatching(value); return *this;}
615 
616 
617     /**
618      * <p>The directory search scope for the user. If set to true, scope is to search
619      * the entire subtree.</p>
620      */
GetUserSearchSubtree()621     inline bool GetUserSearchSubtree() const{ return m_userSearchSubtree; }
622 
623     /**
624      * <p>The directory search scope for the user. If set to true, scope is to search
625      * the entire subtree.</p>
626      */
UserSearchSubtreeHasBeenSet()627     inline bool UserSearchSubtreeHasBeenSet() const { return m_userSearchSubtreeHasBeenSet; }
628 
629     /**
630      * <p>The directory search scope for the user. If set to true, scope is to search
631      * the entire subtree.</p>
632      */
SetUserSearchSubtree(bool value)633     inline void SetUserSearchSubtree(bool value) { m_userSearchSubtreeHasBeenSet = true; m_userSearchSubtree = value; }
634 
635     /**
636      * <p>The directory search scope for the user. If set to true, scope is to search
637      * the entire subtree.</p>
638      */
WithUserSearchSubtree(bool value)639     inline LdapServerMetadataOutput& WithUserSearchSubtree(bool value) { SetUserSearchSubtree(value); return *this;}
640 
641   private:
642 
643     Aws::Vector<Aws::String> m_hosts;
644     bool m_hostsHasBeenSet;
645 
646     Aws::String m_roleBase;
647     bool m_roleBaseHasBeenSet;
648 
649     Aws::String m_roleName;
650     bool m_roleNameHasBeenSet;
651 
652     Aws::String m_roleSearchMatching;
653     bool m_roleSearchMatchingHasBeenSet;
654 
655     bool m_roleSearchSubtree;
656     bool m_roleSearchSubtreeHasBeenSet;
657 
658     Aws::String m_serviceAccountUsername;
659     bool m_serviceAccountUsernameHasBeenSet;
660 
661     Aws::String m_userBase;
662     bool m_userBaseHasBeenSet;
663 
664     Aws::String m_userRoleName;
665     bool m_userRoleNameHasBeenSet;
666 
667     Aws::String m_userSearchMatching;
668     bool m_userSearchMatchingHasBeenSet;
669 
670     bool m_userSearchSubtree;
671     bool m_userSearchSubtreeHasBeenSet;
672   };
673 
674 } // namespace Model
675 } // namespace MQ
676 } // namespace Aws
677