All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.workspaces.model.SamlProperties Maven / Gradle / Ivy

Go to download

The AWS Java SDK for Amazon WorkSpaces module holds the client classes that are used for communicating with Amazon WorkSpaces Service

There is a newer version: 1.12.778
Show newest version
/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.workspaces.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* Describes the enablement status, user access URL, and relay state parameter name that are used for configuring * federation with an SAML 2.0 identity provider. *

* * @see AWS API * Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class SamlProperties implements Serializable, Cloneable, StructuredPojo { /** *

* Indicates the status of SAML 2.0 authentication. These statuses include the following. *

*
    *
  • *

    * If the setting is DISABLED, end users will be directed to login with their directory credentials. *

    *
  • *
  • *

    * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 authentication will * not be able to connect. *

    *
  • *
  • *

    * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login via the * user access URL on supported client applications, but will not prevent clients that do not support SAML 2.0 * authentication from connecting as if SAML 2.0 authentication was disabled. *

    *
  • *
*/ private String status; /** *

* The SAML 2.0 identity provider (IdP) user access URL is the URL a user would navigate to in their web browser in * order to federate from the IdP and directly access the application, without any SAML 2.0 service provider (SP) * bindings. *

*/ private String userAccessUrl; /** *

* The relay state parameter name supported by the SAML 2.0 identity provider (IdP). When the end user is redirected * to the user access URL from the WorkSpaces client application, this relay state parameter name is appended as a * query parameter to the URL along with the relay state endpoint to return the user to the client application * session. *

*

* To use SAML 2.0 authentication with WorkSpaces, the IdP must support IdP-initiated deep linking for the relay * state URL. Consult your IdP documentation for more information. *

*/ private String relayStateParameterName; /** *

* Indicates the status of SAML 2.0 authentication. These statuses include the following. *

*
    *
  • *

    * If the setting is DISABLED, end users will be directed to login with their directory credentials. *

    *
  • *
  • *

    * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 authentication will * not be able to connect. *

    *
  • *
  • *

    * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login via the * user access URL on supported client applications, but will not prevent clients that do not support SAML 2.0 * authentication from connecting as if SAML 2.0 authentication was disabled. *

    *
  • *
* * @param status * Indicates the status of SAML 2.0 authentication. These statuses include the following.

*
    *
  • *

    * If the setting is DISABLED, end users will be directed to login with their directory * credentials. *

    *
  • *
  • *

    * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 * authentication will not be able to connect. *

    *
  • *
  • *

    * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login * via the user access URL on supported client applications, but will not prevent clients that do not support * SAML 2.0 authentication from connecting as if SAML 2.0 authentication was disabled. *

    *
  • * @see SamlStatusEnum */ public void setStatus(String status) { this.status = status; } /** *

    * Indicates the status of SAML 2.0 authentication. These statuses include the following. *

    *
      *
    • *

      * If the setting is DISABLED, end users will be directed to login with their directory credentials. *

      *
    • *
    • *

      * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 authentication will * not be able to connect. *

      *
    • *
    • *

      * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login via the * user access URL on supported client applications, but will not prevent clients that do not support SAML 2.0 * authentication from connecting as if SAML 2.0 authentication was disabled. *

      *
    • *
    * * @return Indicates the status of SAML 2.0 authentication. These statuses include the following.

    *
      *
    • *

      * If the setting is DISABLED, end users will be directed to login with their directory * credentials. *

      *
    • *
    • *

      * If the setting is ENABLED, end users will be directed to login via the user access URL. * Users attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 * authentication will not be able to connect. *

      *
    • *
    • *

      * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login * via the user access URL on supported client applications, but will not prevent clients that do not * support SAML 2.0 authentication from connecting as if SAML 2.0 authentication was disabled. *

      *
    • * @see SamlStatusEnum */ public String getStatus() { return this.status; } /** *

      * Indicates the status of SAML 2.0 authentication. These statuses include the following. *

      *
        *
      • *

        * If the setting is DISABLED, end users will be directed to login with their directory credentials. *

        *
      • *
      • *

        * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 authentication will * not be able to connect. *

        *
      • *
      • *

        * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login via the * user access URL on supported client applications, but will not prevent clients that do not support SAML 2.0 * authentication from connecting as if SAML 2.0 authentication was disabled. *

        *
      • *
      * * @param status * Indicates the status of SAML 2.0 authentication. These statuses include the following.

      *
        *
      • *

        * If the setting is DISABLED, end users will be directed to login with their directory * credentials. *

        *
      • *
      • *

        * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 * authentication will not be able to connect. *

        *
      • *
      • *

        * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login * via the user access URL on supported client applications, but will not prevent clients that do not support * SAML 2.0 authentication from connecting as if SAML 2.0 authentication was disabled. *

        *
      • * @return Returns a reference to this object so that method calls can be chained together. * @see SamlStatusEnum */ public SamlProperties withStatus(String status) { setStatus(status); return this; } /** *

        * Indicates the status of SAML 2.0 authentication. These statuses include the following. *

        *
          *
        • *

          * If the setting is DISABLED, end users will be directed to login with their directory credentials. *

          *
        • *
        • *

          * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 authentication will * not be able to connect. *

          *
        • *
        • *

          * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login via the * user access URL on supported client applications, but will not prevent clients that do not support SAML 2.0 * authentication from connecting as if SAML 2.0 authentication was disabled. *

          *
        • *
        * * @param status * Indicates the status of SAML 2.0 authentication. These statuses include the following.

        *
          *
        • *

          * If the setting is DISABLED, end users will be directed to login with their directory * credentials. *

          *
        • *
        • *

          * If the setting is ENABLED, end users will be directed to login via the user access URL. Users * attempting to connect to WorkSpaces from a client application that does not support SAML 2.0 * authentication will not be able to connect. *

          *
        • *
        • *

          * If the setting is ENABLED_WITH_DIRECTORY_LOGIN_FALLBACK, end users will be directed to login * via the user access URL on supported client applications, but will not prevent clients that do not support * SAML 2.0 authentication from connecting as if SAML 2.0 authentication was disabled. *

          *
        • * @return Returns a reference to this object so that method calls can be chained together. * @see SamlStatusEnum */ public SamlProperties withStatus(SamlStatusEnum status) { this.status = status.toString(); return this; } /** *

          * The SAML 2.0 identity provider (IdP) user access URL is the URL a user would navigate to in their web browser in * order to federate from the IdP and directly access the application, without any SAML 2.0 service provider (SP) * bindings. *

          * * @param userAccessUrl * The SAML 2.0 identity provider (IdP) user access URL is the URL a user would navigate to in their web * browser in order to federate from the IdP and directly access the application, without any SAML 2.0 * service provider (SP) bindings. */ public void setUserAccessUrl(String userAccessUrl) { this.userAccessUrl = userAccessUrl; } /** *

          * The SAML 2.0 identity provider (IdP) user access URL is the URL a user would navigate to in their web browser in * order to federate from the IdP and directly access the application, without any SAML 2.0 service provider (SP) * bindings. *

          * * @return The SAML 2.0 identity provider (IdP) user access URL is the URL a user would navigate to in their web * browser in order to federate from the IdP and directly access the application, without any SAML 2.0 * service provider (SP) bindings. */ public String getUserAccessUrl() { return this.userAccessUrl; } /** *

          * The SAML 2.0 identity provider (IdP) user access URL is the URL a user would navigate to in their web browser in * order to federate from the IdP and directly access the application, without any SAML 2.0 service provider (SP) * bindings. *

          * * @param userAccessUrl * The SAML 2.0 identity provider (IdP) user access URL is the URL a user would navigate to in their web * browser in order to federate from the IdP and directly access the application, without any SAML 2.0 * service provider (SP) bindings. * @return Returns a reference to this object so that method calls can be chained together. */ public SamlProperties withUserAccessUrl(String userAccessUrl) { setUserAccessUrl(userAccessUrl); return this; } /** *

          * The relay state parameter name supported by the SAML 2.0 identity provider (IdP). When the end user is redirected * to the user access URL from the WorkSpaces client application, this relay state parameter name is appended as a * query parameter to the URL along with the relay state endpoint to return the user to the client application * session. *

          *

          * To use SAML 2.0 authentication with WorkSpaces, the IdP must support IdP-initiated deep linking for the relay * state URL. Consult your IdP documentation for more information. *

          * * @param relayStateParameterName * The relay state parameter name supported by the SAML 2.0 identity provider (IdP). When the end user is * redirected to the user access URL from the WorkSpaces client application, this relay state parameter name * is appended as a query parameter to the URL along with the relay state endpoint to return the user to the * client application session.

          *

          * To use SAML 2.0 authentication with WorkSpaces, the IdP must support IdP-initiated deep linking for the * relay state URL. Consult your IdP documentation for more information. */ public void setRelayStateParameterName(String relayStateParameterName) { this.relayStateParameterName = relayStateParameterName; } /** *

          * The relay state parameter name supported by the SAML 2.0 identity provider (IdP). When the end user is redirected * to the user access URL from the WorkSpaces client application, this relay state parameter name is appended as a * query parameter to the URL along with the relay state endpoint to return the user to the client application * session. *

          *

          * To use SAML 2.0 authentication with WorkSpaces, the IdP must support IdP-initiated deep linking for the relay * state URL. Consult your IdP documentation for more information. *

          * * @return The relay state parameter name supported by the SAML 2.0 identity provider (IdP). When the end user is * redirected to the user access URL from the WorkSpaces client application, this relay state parameter name * is appended as a query parameter to the URL along with the relay state endpoint to return the user to the * client application session.

          *

          * To use SAML 2.0 authentication with WorkSpaces, the IdP must support IdP-initiated deep linking for the * relay state URL. Consult your IdP documentation for more information. */ public String getRelayStateParameterName() { return this.relayStateParameterName; } /** *

          * The relay state parameter name supported by the SAML 2.0 identity provider (IdP). When the end user is redirected * to the user access URL from the WorkSpaces client application, this relay state parameter name is appended as a * query parameter to the URL along with the relay state endpoint to return the user to the client application * session. *

          *

          * To use SAML 2.0 authentication with WorkSpaces, the IdP must support IdP-initiated deep linking for the relay * state URL. Consult your IdP documentation for more information. *

          * * @param relayStateParameterName * The relay state parameter name supported by the SAML 2.0 identity provider (IdP). When the end user is * redirected to the user access URL from the WorkSpaces client application, this relay state parameter name * is appended as a query parameter to the URL along with the relay state endpoint to return the user to the * client application session.

          *

          * To use SAML 2.0 authentication with WorkSpaces, the IdP must support IdP-initiated deep linking for the * relay state URL. Consult your IdP documentation for more information. * @return Returns a reference to this object so that method calls can be chained together. */ public SamlProperties withRelayStateParameterName(String relayStateParameterName) { setRelayStateParameterName(relayStateParameterName); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getStatus() != null) sb.append("Status: ").append(getStatus()).append(","); if (getUserAccessUrl() != null) sb.append("UserAccessUrl: ").append(getUserAccessUrl()).append(","); if (getRelayStateParameterName() != null) sb.append("RelayStateParameterName: ").append(getRelayStateParameterName()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof SamlProperties == false) return false; SamlProperties other = (SamlProperties) obj; if (other.getStatus() == null ^ this.getStatus() == null) return false; if (other.getStatus() != null && other.getStatus().equals(this.getStatus()) == false) return false; if (other.getUserAccessUrl() == null ^ this.getUserAccessUrl() == null) return false; if (other.getUserAccessUrl() != null && other.getUserAccessUrl().equals(this.getUserAccessUrl()) == false) return false; if (other.getRelayStateParameterName() == null ^ this.getRelayStateParameterName() == null) return false; if (other.getRelayStateParameterName() != null && other.getRelayStateParameterName().equals(this.getRelayStateParameterName()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getStatus() == null) ? 0 : getStatus().hashCode()); hashCode = prime * hashCode + ((getUserAccessUrl() == null) ? 0 : getUserAccessUrl().hashCode()); hashCode = prime * hashCode + ((getRelayStateParameterName() == null) ? 0 : getRelayStateParameterName().hashCode()); return hashCode; } @Override public SamlProperties clone() { try { return (SamlProperties) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.workspaces.model.transform.SamlPropertiesMarshaller.getInstance().marshall(this, protocolMarshaller); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy