/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include #include #include #include namespace Aws { namespace Transfer { namespace Model { /** */ class CreateAccessRequest : public TransferRequest { public: AWS_TRANSFER_API CreateAccessRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "CreateAccess"; } AWS_TRANSFER_API Aws::String SerializePayload() const override; AWS_TRANSFER_API Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override; /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline const Aws::String& GetHomeDirectory() const{ return m_homeDirectory; } /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline bool HomeDirectoryHasBeenSet() const { return m_homeDirectoryHasBeenSet; } /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline void SetHomeDirectory(const Aws::String& value) { m_homeDirectoryHasBeenSet = true; m_homeDirectory = value; } /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline void SetHomeDirectory(Aws::String&& value) { m_homeDirectoryHasBeenSet = true; m_homeDirectory = std::move(value); } /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline void SetHomeDirectory(const char* value) { m_homeDirectoryHasBeenSet = true; m_homeDirectory.assign(value); } /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline CreateAccessRequest& WithHomeDirectory(const Aws::String& value) { SetHomeDirectory(value); return *this;} /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline CreateAccessRequest& WithHomeDirectory(Aws::String&& value) { SetHomeDirectory(std::move(value)); return *this;} /** *

The landing directory (folder) for a user when they log in to the server * using the client.

A HomeDirectory example is * /bucket_name/home/mydirectory.

*/ inline CreateAccessRequest& WithHomeDirectory(const char* value) { SetHomeDirectory(value); return *this;} /** *

The type of landing directory (folder) that you want your users' home * directory to be when they log in to the server. If you set it to * PATH, the user will see the absolute Amazon S3 bucket or EFS paths * as is in their file transfer protocol clients. If you set it * LOGICAL, you need to provide mappings in the * HomeDirectoryMappings for how you want to make Amazon S3 or Amazon * EFS paths visible to your users.

*/ inline const HomeDirectoryType& GetHomeDirectoryType() const{ return m_homeDirectoryType; } /** *

The type of landing directory (folder) that you want your users' home * directory to be when they log in to the server. If you set it to * PATH, the user will see the absolute Amazon S3 bucket or EFS paths * as is in their file transfer protocol clients. If you set it * LOGICAL, you need to provide mappings in the * HomeDirectoryMappings for how you want to make Amazon S3 or Amazon * EFS paths visible to your users.

*/ inline bool HomeDirectoryTypeHasBeenSet() const { return m_homeDirectoryTypeHasBeenSet; } /** *

The type of landing directory (folder) that you want your users' home * directory to be when they log in to the server. If you set it to * PATH, the user will see the absolute Amazon S3 bucket or EFS paths * as is in their file transfer protocol clients. If you set it * LOGICAL, you need to provide mappings in the * HomeDirectoryMappings for how you want to make Amazon S3 or Amazon * EFS paths visible to your users.

*/ inline void SetHomeDirectoryType(const HomeDirectoryType& value) { m_homeDirectoryTypeHasBeenSet = true; m_homeDirectoryType = value; } /** *

The type of landing directory (folder) that you want your users' home * directory to be when they log in to the server. If you set it to * PATH, the user will see the absolute Amazon S3 bucket or EFS paths * as is in their file transfer protocol clients. If you set it * LOGICAL, you need to provide mappings in the * HomeDirectoryMappings for how you want to make Amazon S3 or Amazon * EFS paths visible to your users.

*/ inline void SetHomeDirectoryType(HomeDirectoryType&& value) { m_homeDirectoryTypeHasBeenSet = true; m_homeDirectoryType = std::move(value); } /** *

The type of landing directory (folder) that you want your users' home * directory to be when they log in to the server. If you set it to * PATH, the user will see the absolute Amazon S3 bucket or EFS paths * as is in their file transfer protocol clients. If you set it * LOGICAL, you need to provide mappings in the * HomeDirectoryMappings for how you want to make Amazon S3 or Amazon * EFS paths visible to your users.

*/ inline CreateAccessRequest& WithHomeDirectoryType(const HomeDirectoryType& value) { SetHomeDirectoryType(value); return *this;} /** *

The type of landing directory (folder) that you want your users' home * directory to be when they log in to the server. If you set it to * PATH, the user will see the absolute Amazon S3 bucket or EFS paths * as is in their file transfer protocol clients. If you set it * LOGICAL, you need to provide mappings in the * HomeDirectoryMappings for how you want to make Amazon S3 or Amazon * EFS paths visible to your users.

*/ inline CreateAccessRequest& WithHomeDirectoryType(HomeDirectoryType&& value) { SetHomeDirectoryType(std::move(value)); return *this;} /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline const Aws::Vector& GetHomeDirectoryMappings() const{ return m_homeDirectoryMappings; } /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline bool HomeDirectoryMappingsHasBeenSet() const { return m_homeDirectoryMappingsHasBeenSet; } /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline void SetHomeDirectoryMappings(const Aws::Vector& value) { m_homeDirectoryMappingsHasBeenSet = true; m_homeDirectoryMappings = value; } /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline void SetHomeDirectoryMappings(Aws::Vector&& value) { m_homeDirectoryMappingsHasBeenSet = true; m_homeDirectoryMappings = std::move(value); } /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline CreateAccessRequest& WithHomeDirectoryMappings(const Aws::Vector& value) { SetHomeDirectoryMappings(value); return *this;} /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline CreateAccessRequest& WithHomeDirectoryMappings(Aws::Vector&& value) { SetHomeDirectoryMappings(std::move(value)); return *this;} /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline CreateAccessRequest& AddHomeDirectoryMappings(const HomeDirectoryMapEntry& value) { m_homeDirectoryMappingsHasBeenSet = true; m_homeDirectoryMappings.push_back(value); return *this; } /** *

Logical directory mappings that specify what Amazon S3 or Amazon EFS paths * and keys should be visible to your user and how you want to make them visible. * You must specify the Entry and Target pair, where * Entry shows how the path is made visible and Target is * the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is * displayed as is. You also must ensure that your Identity and Access Management * (IAM) role provides access to paths in Target. This value can be * set only when HomeDirectoryType is set to LOGICAL.

*

The following is an Entry and Target pair * example.

[ { "Entry": "/directory1", "Target": * "/bucket_name/home/mydirectory" } ]

In most cases, you can use * this value instead of the session policy to lock down your user to the * designated home directory ("chroot"). To do this, you can set * Entry to / and set Target to the * HomeDirectory parameter value.

The following is an * Entry and Target pair example for * chroot.

[ { "Entry": "/", "Target": * "/bucket_name/home/mydirectory" } ]

*/ inline CreateAccessRequest& AddHomeDirectoryMappings(HomeDirectoryMapEntry&& value) { m_homeDirectoryMappingsHasBeenSet = true; m_homeDirectoryMappings.push_back(std::move(value)); return *this; } /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline const Aws::String& GetPolicy() const{ return m_policy; } /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline bool PolicyHasBeenSet() const { return m_policyHasBeenSet; } /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline void SetPolicy(const Aws::String& value) { m_policyHasBeenSet = true; m_policy = value; } /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline void SetPolicy(Aws::String&& value) { m_policyHasBeenSet = true; m_policy = std::move(value); } /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline void SetPolicy(const char* value) { m_policyHasBeenSet = true; m_policy.assign(value); } /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline CreateAccessRequest& WithPolicy(const Aws::String& value) { SetPolicy(value); return *this;} /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline CreateAccessRequest& WithPolicy(Aws::String&& value) { SetPolicy(std::move(value)); return *this;} /** *

A session policy for your user so that you can use the same Identity and * Access Management (IAM) role across multiple users. This policy scopes down a * user's access to portions of their Amazon S3 bucket. Variables that you can use * inside this policy include ${Transfer:UserName}, * ${Transfer:HomeDirectory}, and * ${Transfer:HomeBucket}.

This policy applies only when * the domain of ServerId is Amazon S3. Amazon EFS does not use * session policies.

For session policies, Transfer Family stores the policy * as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You * save the policy as a JSON blob and pass it in the Policy * argument.

For an example of a session policy, see Example * session policy.

For more information, see AssumeRole * in the Security Token Service API Reference.

*/ inline CreateAccessRequest& WithPolicy(const char* value) { SetPolicy(value); return *this;} inline const PosixProfile& GetPosixProfile() const{ return m_posixProfile; } inline bool PosixProfileHasBeenSet() const { return m_posixProfileHasBeenSet; } inline void SetPosixProfile(const PosixProfile& value) { m_posixProfileHasBeenSet = true; m_posixProfile = value; } inline void SetPosixProfile(PosixProfile&& value) { m_posixProfileHasBeenSet = true; m_posixProfile = std::move(value); } inline CreateAccessRequest& WithPosixProfile(const PosixProfile& value) { SetPosixProfile(value); return *this;} inline CreateAccessRequest& WithPosixProfile(PosixProfile&& value) { SetPosixProfile(std::move(value)); return *this;} /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline const Aws::String& GetRole() const{ return m_role; } /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline bool RoleHasBeenSet() const { return m_roleHasBeenSet; } /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline void SetRole(const Aws::String& value) { m_roleHasBeenSet = true; m_role = value; } /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline void SetRole(Aws::String&& value) { m_roleHasBeenSet = true; m_role = std::move(value); } /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline void SetRole(const char* value) { m_roleHasBeenSet = true; m_role.assign(value); } /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline CreateAccessRequest& WithRole(const Aws::String& value) { SetRole(value); return *this;} /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline CreateAccessRequest& WithRole(Aws::String&& value) { SetRole(std::move(value)); return *this;} /** *

The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) * role that controls your users' access to your Amazon S3 bucket or Amazon EFS * file system. The policies attached to this role determine the level of access * that you want to provide your users when transferring files into and out of your * Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a * trust relationship that allows the server to access your resources when * servicing your users' transfer requests.

*/ inline CreateAccessRequest& WithRole(const char* value) { SetRole(value); return *this;} /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline const Aws::String& GetServerId() const{ return m_serverId; } /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline bool ServerIdHasBeenSet() const { return m_serverIdHasBeenSet; } /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline void SetServerId(const Aws::String& value) { m_serverIdHasBeenSet = true; m_serverId = value; } /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline void SetServerId(Aws::String&& value) { m_serverIdHasBeenSet = true; m_serverId = std::move(value); } /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline void SetServerId(const char* value) { m_serverIdHasBeenSet = true; m_serverId.assign(value); } /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline CreateAccessRequest& WithServerId(const Aws::String& value) { SetServerId(value); return *this;} /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline CreateAccessRequest& WithServerId(Aws::String&& value) { SetServerId(std::move(value)); return *this;} /** *

A system-assigned unique identifier for a server instance. This is the * specific server that you added your user to.

*/ inline CreateAccessRequest& WithServerId(const char* value) { SetServerId(value); return *this;} /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline const Aws::String& GetExternalId() const{ return m_externalId; } /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline bool ExternalIdHasBeenSet() const { return m_externalIdHasBeenSet; } /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline void SetExternalId(const Aws::String& value) { m_externalIdHasBeenSet = true; m_externalId = value; } /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline void SetExternalId(Aws::String&& value) { m_externalIdHasBeenSet = true; m_externalId = std::move(value); } /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline void SetExternalId(const char* value) { m_externalIdHasBeenSet = true; m_externalId.assign(value); } /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline CreateAccessRequest& WithExternalId(const Aws::String& value) { SetExternalId(value); return *this;} /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline CreateAccessRequest& WithExternalId(Aws::String&& value) { SetExternalId(std::move(value)); return *this;} /** *

A unique identifier that is required to identify specific groups within your * directory. The users of the group that you associate have access to your Amazon * S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If * you know the group name, you can view the SID values by running the following * command using Windows PowerShell.

Get-ADGroup -Filter * {samAccountName -like "YourGroupName*"} -Properties * | Select * SamAccountName,ObjectSid

In that command, replace * YourGroupName with the name of your Active Directory group.

The * regular expression used to validate this parameter is a string of characters * consisting of uppercase and lowercase alphanumeric characters with no spaces. * You can also include underscores or any of the following characters: =,.@:/-

*/ inline CreateAccessRequest& WithExternalId(const char* value) { SetExternalId(value); return *this;} private: Aws::String m_homeDirectory; bool m_homeDirectoryHasBeenSet = false; HomeDirectoryType m_homeDirectoryType; bool m_homeDirectoryTypeHasBeenSet = false; Aws::Vector m_homeDirectoryMappings; bool m_homeDirectoryMappingsHasBeenSet = false; Aws::String m_policy; bool m_policyHasBeenSet = false; PosixProfile m_posixProfile; bool m_posixProfileHasBeenSet = false; Aws::String m_role; bool m_roleHasBeenSet = false; Aws::String m_serverId; bool m_serverIdHasBeenSet = false; Aws::String m_externalId; bool m_externalIdHasBeenSet = false; }; } // namespace Model } // namespace Transfer } // namespace Aws