/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include <aws/cloudfront/CloudFront_EXPORTS.h> #include <aws/core/utils/memory/stl/AWSString.h> #include <aws/cloudfront/model/SSLSupportMethod.h> #include <aws/cloudfront/model/MinimumProtocolVersion.h> #include <utility> namespace Aws { namespace Utils { namespace Xml { class XmlNode; } // namespace Xml } // namespace Utils namespace CloudFront { namespace Model { /** * <p>A complex type that determines the distribution's SSL/TLS configuration for * communicating with viewers.</p> <p>If the distribution doesn't use * <code>Aliases</code> (also known as alternate domain names or CNAMEs)—that is, * if the distribution uses the CloudFront domain name such as * <code>d111111abcdef8.cloudfront.net</code>—set * <code>CloudFrontDefaultCertificate</code> to <code>true</code> and leave all * other fields empty.</p> <p>If the distribution uses <code>Aliases</code> * (alternate domain names or CNAMEs), use the fields in this type to specify the * following settings:</p> <ul> <li> <p>Which viewers the distribution accepts * HTTPS connections from: only viewers that support <a * href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name * indication (SNI)</a> (recommended), or all viewers including those that don't * support SNI.</p> <ul> <li> <p>To accept HTTPS connections from only viewers that * support SNI, set <code>SSLSupportMethod</code> to <code>sni-only</code>. This is * recommended. Most browsers and clients support SNI. </p> </li> <li> <p>To accept * HTTPS connections from all viewers, including those that don't support SNI, set * <code>SSLSupportMethod</code> to <code>vip</code>. This is not recommended, and * results in additional monthly charges from CloudFront.</p> </li> </ul> </li> * <li> <p>The minimum SSL/TLS protocol version that the distribution can use to * communicate with viewers. To specify a minimum version, choose a value for * <code>MinimumProtocolVersion</code>. For more information, see <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security * Policy</a> in the <i>Amazon CloudFront Developer Guide</i>.</p> </li> <li> * <p>The location of the SSL/TLS certificate, <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a> (recommended) or <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>. You specify the location by setting a value in * one of the following fields (not both):</p> <ul> <li> <p> * <code>ACMCertificateArn</code> </p> </li> <li> <p> <code>IAMCertificateId</code> * </p> </li> </ul> </li> </ul> <p>All distributions support HTTPS connections from * viewers. To require viewers to use HTTPS only, or to redirect them from HTTP to * HTTPS, use <code>ViewerProtocolPolicy</code> in the <code>CacheBehavior</code> * or <code>DefaultCacheBehavior</code>. To specify how CloudFront should use * SSL/TLS to communicate with your custom origin, use * <code>CustomOriginConfig</code>.</p> <p>For more information, see <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https.html">Using * HTTPS with CloudFront</a> and <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-alternate-domain-names.html"> * Using Alternate Domain Names and HTTPS</a> in the <i>Amazon CloudFront Developer * Guide</i>.</p><p><h3>See Also:</h3> <a * href="http://docs.aws.amazon.com/goto/WebAPI/cloudfront-2020-05-31/ViewerCertificate">AWS * API Reference</a></p> */ class ViewerCertificate { public: AWS_CLOUDFRONT_API ViewerCertificate(); AWS_CLOUDFRONT_API ViewerCertificate(const Aws::Utils::Xml::XmlNode& xmlNode); AWS_CLOUDFRONT_API ViewerCertificate& operator=(const Aws::Utils::Xml::XmlNode& xmlNode); AWS_CLOUDFRONT_API void AddToNode(Aws::Utils::Xml::XmlNode& parentNode) const; /** * <p>If the distribution uses the CloudFront domain name such as * <code>d111111abcdef8.cloudfront.net</code>, set this field to * <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code> * (alternate domain names or CNAMEs), set this field to <code>false</code> and * specify values for the following fields:</p> <ul> <li> <p> * <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value * for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p> * </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul> */ inline bool GetCloudFrontDefaultCertificate() const{ return m_cloudFrontDefaultCertificate; } /** * <p>If the distribution uses the CloudFront domain name such as * <code>d111111abcdef8.cloudfront.net</code>, set this field to * <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code> * (alternate domain names or CNAMEs), set this field to <code>false</code> and * specify values for the following fields:</p> <ul> <li> <p> * <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value * for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p> * </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul> */ inline bool CloudFrontDefaultCertificateHasBeenSet() const { return m_cloudFrontDefaultCertificateHasBeenSet; } /** * <p>If the distribution uses the CloudFront domain name such as * <code>d111111abcdef8.cloudfront.net</code>, set this field to * <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code> * (alternate domain names or CNAMEs), set this field to <code>false</code> and * specify values for the following fields:</p> <ul> <li> <p> * <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value * for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p> * </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul> */ inline void SetCloudFrontDefaultCertificate(bool value) { m_cloudFrontDefaultCertificateHasBeenSet = true; m_cloudFrontDefaultCertificate = value; } /** * <p>If the distribution uses the CloudFront domain name such as * <code>d111111abcdef8.cloudfront.net</code>, set this field to * <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code> * (alternate domain names or CNAMEs), set this field to <code>false</code> and * specify values for the following fields:</p> <ul> <li> <p> * <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value * for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p> * </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul> */ inline ViewerCertificate& WithCloudFrontDefaultCertificate(bool value) { SetCloudFrontDefaultCertificate(value); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline const Aws::String& GetIAMCertificateId() const{ return m_iAMCertificateId; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline bool IAMCertificateIdHasBeenSet() const { return m_iAMCertificateIdHasBeenSet; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline void SetIAMCertificateId(const Aws::String& value) { m_iAMCertificateIdHasBeenSet = true; m_iAMCertificateId = value; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline void SetIAMCertificateId(Aws::String&& value) { m_iAMCertificateIdHasBeenSet = true; m_iAMCertificateId = std::move(value); } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline void SetIAMCertificateId(const char* value) { m_iAMCertificateIdHasBeenSet = true; m_iAMCertificateId.assign(value); } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline ViewerCertificate& WithIAMCertificateId(const Aws::String& value) { SetIAMCertificateId(value); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline ViewerCertificate& WithIAMCertificateId(Aws::String&& value) { SetIAMCertificateId(std::move(value)); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">Identity * and Access Management (IAM)</a>, provide the ID of the IAM certificate.</p> * <p>If you specify an IAM certificate ID, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>. </p> */ inline ViewerCertificate& WithIAMCertificateId(const char* value) { SetIAMCertificateId(value); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline const Aws::String& GetACMCertificateArn() const{ return m_aCMCertificateArn; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline bool ACMCertificateArnHasBeenSet() const { return m_aCMCertificateArnHasBeenSet; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline void SetACMCertificateArn(const Aws::String& value) { m_aCMCertificateArnHasBeenSet = true; m_aCMCertificateArn = value; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline void SetACMCertificateArn(Aws::String&& value) { m_aCMCertificateArnHasBeenSet = true; m_aCMCertificateArn = std::move(value); } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline void SetACMCertificateArn(const char* value) { m_aCMCertificateArnHasBeenSet = true; m_aCMCertificateArn.assign(value); } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline ViewerCertificate& WithACMCertificateArn(const Aws::String& value) { SetACMCertificateArn(value); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline ViewerCertificate& WithACMCertificateArn(Aws::String&& value) { SetACMCertificateArn(std::move(value)); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs) and the SSL/TLS certificate is stored in <a * href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">Certificate * Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM * certificate. CloudFront only supports ACM certificates in the US East (N. * Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM * certificate ARN, you must also specify values for * <code>MinimumProtocolVersion</code> and <code>SSLSupportMethod</code>.</p> */ inline ViewerCertificate& WithACMCertificateArn(const char* value) { SetACMCertificateArn(value); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify which viewers the distribution accepts HTTPS connections * from.</p> <ul> <li> <p> <code>sni-only</code> – The distribution accepts HTTPS * connections from only viewers that support <a * href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name * indication (SNI)</a>. This is recommended. Most browsers and clients support * SNI.</p> </li> <li> <p> <code>vip</code> – The distribution accepts HTTPS * connections from all viewers including those that don't support SNI. This is not * recommended, and results in additional monthly charges from CloudFront.</p> * </li> <li> <p> <code>static-ip</code> - Do not specify this value unless your * distribution has been enabled for this feature by the CloudFront team. If you * have a use case that requires static IP addresses for a distribution, contact * CloudFront through the <a * href="https://console.aws.amazon.com/support/home">Amazon Web Services Support * Center</a>.</p> </li> </ul> <p>If the distribution uses the CloudFront domain * name such as <code>d111111abcdef8.cloudfront.net</code>, don't set a value for * this field.</p> */ inline const SSLSupportMethod& GetSSLSupportMethod() const{ return m_sSLSupportMethod; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify which viewers the distribution accepts HTTPS connections * from.</p> <ul> <li> <p> <code>sni-only</code> – The distribution accepts HTTPS * connections from only viewers that support <a * href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name * indication (SNI)</a>. This is recommended. Most browsers and clients support * SNI.</p> </li> <li> <p> <code>vip</code> – The distribution accepts HTTPS * connections from all viewers including those that don't support SNI. This is not * recommended, and results in additional monthly charges from CloudFront.</p> * </li> <li> <p> <code>static-ip</code> - Do not specify this value unless your * distribution has been enabled for this feature by the CloudFront team. If you * have a use case that requires static IP addresses for a distribution, contact * CloudFront through the <a * href="https://console.aws.amazon.com/support/home">Amazon Web Services Support * Center</a>.</p> </li> </ul> <p>If the distribution uses the CloudFront domain * name such as <code>d111111abcdef8.cloudfront.net</code>, don't set a value for * this field.</p> */ inline bool SSLSupportMethodHasBeenSet() const { return m_sSLSupportMethodHasBeenSet; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify which viewers the distribution accepts HTTPS connections * from.</p> <ul> <li> <p> <code>sni-only</code> – The distribution accepts HTTPS * connections from only viewers that support <a * href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name * indication (SNI)</a>. This is recommended. Most browsers and clients support * SNI.</p> </li> <li> <p> <code>vip</code> – The distribution accepts HTTPS * connections from all viewers including those that don't support SNI. This is not * recommended, and results in additional monthly charges from CloudFront.</p> * </li> <li> <p> <code>static-ip</code> - Do not specify this value unless your * distribution has been enabled for this feature by the CloudFront team. If you * have a use case that requires static IP addresses for a distribution, contact * CloudFront through the <a * href="https://console.aws.amazon.com/support/home">Amazon Web Services Support * Center</a>.</p> </li> </ul> <p>If the distribution uses the CloudFront domain * name such as <code>d111111abcdef8.cloudfront.net</code>, don't set a value for * this field.</p> */ inline void SetSSLSupportMethod(const SSLSupportMethod& value) { m_sSLSupportMethodHasBeenSet = true; m_sSLSupportMethod = value; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify which viewers the distribution accepts HTTPS connections * from.</p> <ul> <li> <p> <code>sni-only</code> – The distribution accepts HTTPS * connections from only viewers that support <a * href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name * indication (SNI)</a>. This is recommended. Most browsers and clients support * SNI.</p> </li> <li> <p> <code>vip</code> – The distribution accepts HTTPS * connections from all viewers including those that don't support SNI. This is not * recommended, and results in additional monthly charges from CloudFront.</p> * </li> <li> <p> <code>static-ip</code> - Do not specify this value unless your * distribution has been enabled for this feature by the CloudFront team. If you * have a use case that requires static IP addresses for a distribution, contact * CloudFront through the <a * href="https://console.aws.amazon.com/support/home">Amazon Web Services Support * Center</a>.</p> </li> </ul> <p>If the distribution uses the CloudFront domain * name such as <code>d111111abcdef8.cloudfront.net</code>, don't set a value for * this field.</p> */ inline void SetSSLSupportMethod(SSLSupportMethod&& value) { m_sSLSupportMethodHasBeenSet = true; m_sSLSupportMethod = std::move(value); } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify which viewers the distribution accepts HTTPS connections * from.</p> <ul> <li> <p> <code>sni-only</code> – The distribution accepts HTTPS * connections from only viewers that support <a * href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name * indication (SNI)</a>. This is recommended. Most browsers and clients support * SNI.</p> </li> <li> <p> <code>vip</code> – The distribution accepts HTTPS * connections from all viewers including those that don't support SNI. This is not * recommended, and results in additional monthly charges from CloudFront.</p> * </li> <li> <p> <code>static-ip</code> - Do not specify this value unless your * distribution has been enabled for this feature by the CloudFront team. If you * have a use case that requires static IP addresses for a distribution, contact * CloudFront through the <a * href="https://console.aws.amazon.com/support/home">Amazon Web Services Support * Center</a>.</p> </li> </ul> <p>If the distribution uses the CloudFront domain * name such as <code>d111111abcdef8.cloudfront.net</code>, don't set a value for * this field.</p> */ inline ViewerCertificate& WithSSLSupportMethod(const SSLSupportMethod& value) { SetSSLSupportMethod(value); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify which viewers the distribution accepts HTTPS connections * from.</p> <ul> <li> <p> <code>sni-only</code> – The distribution accepts HTTPS * connections from only viewers that support <a * href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name * indication (SNI)</a>. This is recommended. Most browsers and clients support * SNI.</p> </li> <li> <p> <code>vip</code> – The distribution accepts HTTPS * connections from all viewers including those that don't support SNI. This is not * recommended, and results in additional monthly charges from CloudFront.</p> * </li> <li> <p> <code>static-ip</code> - Do not specify this value unless your * distribution has been enabled for this feature by the CloudFront team. If you * have a use case that requires static IP addresses for a distribution, contact * CloudFront through the <a * href="https://console.aws.amazon.com/support/home">Amazon Web Services Support * Center</a>.</p> </li> </ul> <p>If the distribution uses the CloudFront domain * name such as <code>d111111abcdef8.cloudfront.net</code>, don't set a value for * this field.</p> */ inline ViewerCertificate& WithSSLSupportMethod(SSLSupportMethod&& value) { SetSSLSupportMethod(std::move(value)); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify the security policy that you want CloudFront to use for HTTPS * connections with viewers. The security policy determines two settings:</p> <ul> * <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with * viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the * content that it returns to viewers.</p> </li> </ul> <p>For more information, see * <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security * Policy</a> and <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported * Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon * CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this * setting is called <b>Security Policy</b>.</p> <p>When you're using SNI * only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must * specify <code>TLSv1</code> or higher.</p> <p>If the distribution uses the * CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you * set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront * automatically sets the security policy to <code>TLSv1</code> regardless of the * value that you set here.</p> */ inline const MinimumProtocolVersion& GetMinimumProtocolVersion() const{ return m_minimumProtocolVersion; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify the security policy that you want CloudFront to use for HTTPS * connections with viewers. The security policy determines two settings:</p> <ul> * <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with * viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the * content that it returns to viewers.</p> </li> </ul> <p>For more information, see * <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security * Policy</a> and <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported * Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon * CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this * setting is called <b>Security Policy</b>.</p> <p>When you're using SNI * only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must * specify <code>TLSv1</code> or higher.</p> <p>If the distribution uses the * CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you * set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront * automatically sets the security policy to <code>TLSv1</code> regardless of the * value that you set here.</p> */ inline bool MinimumProtocolVersionHasBeenSet() const { return m_minimumProtocolVersionHasBeenSet; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify the security policy that you want CloudFront to use for HTTPS * connections with viewers. The security policy determines two settings:</p> <ul> * <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with * viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the * content that it returns to viewers.</p> </li> </ul> <p>For more information, see * <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security * Policy</a> and <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported * Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon * CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this * setting is called <b>Security Policy</b>.</p> <p>When you're using SNI * only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must * specify <code>TLSv1</code> or higher.</p> <p>If the distribution uses the * CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you * set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront * automatically sets the security policy to <code>TLSv1</code> regardless of the * value that you set here.</p> */ inline void SetMinimumProtocolVersion(const MinimumProtocolVersion& value) { m_minimumProtocolVersionHasBeenSet = true; m_minimumProtocolVersion = value; } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify the security policy that you want CloudFront to use for HTTPS * connections with viewers. The security policy determines two settings:</p> <ul> * <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with * viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the * content that it returns to viewers.</p> </li> </ul> <p>For more information, see * <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security * Policy</a> and <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported * Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon * CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this * setting is called <b>Security Policy</b>.</p> <p>When you're using SNI * only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must * specify <code>TLSv1</code> or higher.</p> <p>If the distribution uses the * CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you * set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront * automatically sets the security policy to <code>TLSv1</code> regardless of the * value that you set here.</p> */ inline void SetMinimumProtocolVersion(MinimumProtocolVersion&& value) { m_minimumProtocolVersionHasBeenSet = true; m_minimumProtocolVersion = std::move(value); } /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify the security policy that you want CloudFront to use for HTTPS * connections with viewers. The security policy determines two settings:</p> <ul> * <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with * viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the * content that it returns to viewers.</p> </li> </ul> <p>For more information, see * <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security * Policy</a> and <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported * Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon * CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this * setting is called <b>Security Policy</b>.</p> <p>When you're using SNI * only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must * specify <code>TLSv1</code> or higher.</p> <p>If the distribution uses the * CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you * set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront * automatically sets the security policy to <code>TLSv1</code> regardless of the * value that you set here.</p> */ inline ViewerCertificate& WithMinimumProtocolVersion(const MinimumProtocolVersion& value) { SetMinimumProtocolVersion(value); return *this;} /** * <p>If the distribution uses <code>Aliases</code> (alternate domain names or * CNAMEs), specify the security policy that you want CloudFront to use for HTTPS * connections with viewers. The security policy determines two settings:</p> <ul> * <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with * viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the * content that it returns to viewers.</p> </li> </ul> <p>For more information, see * <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security * Policy</a> and <a * href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported * Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon * CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this * setting is called <b>Security Policy</b>.</p> <p>When you're using SNI * only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must * specify <code>TLSv1</code> or higher.</p> <p>If the distribution uses the * CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you * set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront * automatically sets the security policy to <code>TLSv1</code> regardless of the * value that you set here.</p> */ inline ViewerCertificate& WithMinimumProtocolVersion(MinimumProtocolVersion&& value) { SetMinimumProtocolVersion(std::move(value)); return *this;} private: bool m_cloudFrontDefaultCertificate; bool m_cloudFrontDefaultCertificateHasBeenSet = false; Aws::String m_iAMCertificateId; bool m_iAMCertificateIdHasBeenSet = false; Aws::String m_aCMCertificateArn; bool m_aCMCertificateArnHasBeenSet = false; SSLSupportMethod m_sSLSupportMethod; bool m_sSLSupportMethodHasBeenSet = false; MinimumProtocolVersion m_minimumProtocolVersion; bool m_minimumProtocolVersionHasBeenSet = false; }; } // namespace Model } // namespace CloudFront } // namespace Aws