/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include Optional. The metadata of the LDAP server used to authenticate and authorize
* connections to the broker. Does not apply to RabbitMQ
* brokers.See Also:
AWS
* API Reference
Specifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline const Aws::VectorSpecifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline bool HostsHasBeenSet() const { return m_hostsHasBeenSet; } /** *Specifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline void SetHosts(const Aws::VectorSpecifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline void SetHosts(Aws::VectorSpecifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline LdapServerMetadataInput& WithHosts(const Aws::VectorSpecifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline LdapServerMetadataInput& WithHosts(Aws::VectorSpecifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline LdapServerMetadataInput& AddHosts(const Aws::String& value) { m_hostsHasBeenSet = true; m_hosts.push_back(value); return *this; } /** *Specifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline LdapServerMetadataInput& AddHosts(Aws::String&& value) { m_hostsHasBeenSet = true; m_hosts.push_back(std::move(value)); return *this; } /** *Specifies the location of the LDAP server such as Directory Service for * Microsoft Active Directory. Optional failover server.
*/ inline LdapServerMetadataInput& AddHosts(const char* value) { m_hostsHasBeenSet = true; m_hosts.push_back(value); return *this; } /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline const Aws::String& GetRoleBase() const{ return m_roleBase; } /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline bool RoleBaseHasBeenSet() const { return m_roleBaseHasBeenSet; } /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline void SetRoleBase(const Aws::String& value) { m_roleBaseHasBeenSet = true; m_roleBase = value; } /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline void SetRoleBase(Aws::String&& value) { m_roleBaseHasBeenSet = true; m_roleBase = std::move(value); } /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline void SetRoleBase(const char* value) { m_roleBaseHasBeenSet = true; m_roleBase.assign(value); } /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithRoleBase(const Aws::String& value) { SetRoleBase(value); return *this;} /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithRoleBase(Aws::String&& value) { SetRoleBase(std::move(value)); return *this;} /** *The distinguished name of the node in the directory information tree (DIT) to * search for roles or groups. For example, ou=group, ou=corp, dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithRoleBase(const char* value) { SetRoleBase(value); return *this;} /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline const Aws::String& GetRoleName() const{ return m_roleName; } /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline bool RoleNameHasBeenSet() const { return m_roleNameHasBeenSet; } /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline void SetRoleName(const Aws::String& value) { m_roleNameHasBeenSet = true; m_roleName = value; } /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline void SetRoleName(Aws::String&& value) { m_roleNameHasBeenSet = true; m_roleName = std::move(value); } /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline void SetRoleName(const char* value) { m_roleNameHasBeenSet = true; m_roleName.assign(value); } /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline LdapServerMetadataInput& WithRoleName(const Aws::String& value) { SetRoleName(value); return *this;} /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline LdapServerMetadataInput& WithRoleName(Aws::String&& value) { SetRoleName(std::move(value)); return *this;} /** *Specifies the LDAP attribute that identifies the group name attribute in the * object returned from the group membership query.
*/ inline LdapServerMetadataInput& WithRoleName(const char* value) { SetRoleName(value); return *this;} /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline const Aws::String& GetRoleSearchMatching() const{ return m_roleSearchMatching; } /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline bool RoleSearchMatchingHasBeenSet() const { return m_roleSearchMatchingHasBeenSet; } /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline void SetRoleSearchMatching(const Aws::String& value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching = value; } /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline void SetRoleSearchMatching(Aws::String&& value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching = std::move(value); } /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline void SetRoleSearchMatching(const char* value) { m_roleSearchMatchingHasBeenSet = true; m_roleSearchMatching.assign(value); } /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline LdapServerMetadataInput& WithRoleSearchMatching(const Aws::String& value) { SetRoleSearchMatching(value); return *this;} /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline LdapServerMetadataInput& WithRoleSearchMatching(Aws::String&& value) { SetRoleSearchMatching(std::move(value)); return *this;} /** *The LDAP search filter used to find roles within the roleBase. The * distinguished name of the user matched by userSearchMatching is substituted into * the {0} placeholder in the search filter. The client's username is substituted * into the {1} placeholder. For example, if you set this option to * (member=uid={1})for the user janedoe, the search filter becomes * (member=uid=janedoe) after string substitution. It matches all role entries that * have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase.
*/ inline LdapServerMetadataInput& WithRoleSearchMatching(const char* value) { SetRoleSearchMatching(value); return *this;} /** *The directory search scope for the role. If set to true, scope is to search * the entire subtree.
*/ inline bool GetRoleSearchSubtree() const{ return m_roleSearchSubtree; } /** *The directory search scope for the role. If set to true, scope is to search * the entire subtree.
*/ inline bool RoleSearchSubtreeHasBeenSet() const { return m_roleSearchSubtreeHasBeenSet; } /** *The directory search scope for the role. If set to true, scope is to search * the entire subtree.
*/ inline void SetRoleSearchSubtree(bool value) { m_roleSearchSubtreeHasBeenSet = true; m_roleSearchSubtree = value; } /** *The directory search scope for the role. If set to true, scope is to search * the entire subtree.
*/ inline LdapServerMetadataInput& WithRoleSearchSubtree(bool value) { SetRoleSearchSubtree(value); return *this;} /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline const Aws::String& GetServiceAccountPassword() const{ return m_serviceAccountPassword; } /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline bool ServiceAccountPasswordHasBeenSet() const { return m_serviceAccountPasswordHasBeenSet; } /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline void SetServiceAccountPassword(const Aws::String& value) { m_serviceAccountPasswordHasBeenSet = true; m_serviceAccountPassword = value; } /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline void SetServiceAccountPassword(Aws::String&& value) { m_serviceAccountPasswordHasBeenSet = true; m_serviceAccountPassword = std::move(value); } /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline void SetServiceAccountPassword(const char* value) { m_serviceAccountPasswordHasBeenSet = true; m_serviceAccountPassword.assign(value); } /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithServiceAccountPassword(const Aws::String& value) { SetServiceAccountPassword(value); return *this;} /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithServiceAccountPassword(Aws::String&& value) { SetServiceAccountPassword(std::move(value)); return *this;} /** *Service account password. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithServiceAccountPassword(const char* value) { SetServiceAccountPassword(value); return *this;} /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline const Aws::String& GetServiceAccountUsername() const{ return m_serviceAccountUsername; } /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline bool ServiceAccountUsernameHasBeenSet() const { return m_serviceAccountUsernameHasBeenSet; } /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline void SetServiceAccountUsername(const Aws::String& value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername = value; } /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline void SetServiceAccountUsername(Aws::String&& value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername = std::move(value); } /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline void SetServiceAccountUsername(const char* value) { m_serviceAccountUsernameHasBeenSet = true; m_serviceAccountUsername.assign(value); } /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithServiceAccountUsername(const Aws::String& value) { SetServiceAccountUsername(value); return *this;} /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithServiceAccountUsername(Aws::String&& value) { SetServiceAccountUsername(std::move(value)); return *this;} /** *Service account username. A service account is an account in your LDAP server * that has access to initiate a connection. For example, cn=admin,dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithServiceAccountUsername(const char* value) { SetServiceAccountUsername(value); return *this;} /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline const Aws::String& GetUserBase() const{ return m_userBase; } /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline bool UserBaseHasBeenSet() const { return m_userBaseHasBeenSet; } /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline void SetUserBase(const Aws::String& value) { m_userBaseHasBeenSet = true; m_userBase = value; } /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline void SetUserBase(Aws::String&& value) { m_userBaseHasBeenSet = true; m_userBase = std::move(value); } /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline void SetUserBase(const char* value) { m_userBaseHasBeenSet = true; m_userBase.assign(value); } /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline LdapServerMetadataInput& WithUserBase(const Aws::String& value) { SetUserBase(value); return *this;} /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline LdapServerMetadataInput& WithUserBase(Aws::String&& value) { SetUserBase(std::move(value)); return *this;} /** *Select a particular subtree of the directory information tree (DIT) to search * for user entries. The subtree is specified by a DN, which specifies the base * node of the subtree. For example, by setting this option to ou=Users,ou=corp, * dc=corp, dc=example, dc=com, the search for user entries is * restricted to the subtree beneath ou=Users, ou=corp, dc=corp, dc=example, * dc=com.
*/ inline LdapServerMetadataInput& WithUserBase(const char* value) { SetUserBase(value); return *this;} /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline const Aws::String& GetUserRoleName() const{ return m_userRoleName; } /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline bool UserRoleNameHasBeenSet() const { return m_userRoleNameHasBeenSet; } /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline void SetUserRoleName(const Aws::String& value) { m_userRoleNameHasBeenSet = true; m_userRoleName = value; } /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline void SetUserRoleName(Aws::String&& value) { m_userRoleNameHasBeenSet = true; m_userRoleName = std::move(value); } /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline void SetUserRoleName(const char* value) { m_userRoleNameHasBeenSet = true; m_userRoleName.assign(value); } /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline LdapServerMetadataInput& WithUserRoleName(const Aws::String& value) { SetUserRoleName(value); return *this;} /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline LdapServerMetadataInput& WithUserRoleName(Aws::String&& value) { SetUserRoleName(std::move(value)); return *this;} /** *Specifies the name of the LDAP attribute for the user group membership.
*/ inline LdapServerMetadataInput& WithUserRoleName(const char* value) { SetUserRoleName(value); return *this;} /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline const Aws::String& GetUserSearchMatching() const{ return m_userSearchMatching; } /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline bool UserSearchMatchingHasBeenSet() const { return m_userSearchMatchingHasBeenSet; } /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline void SetUserSearchMatching(const Aws::String& value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching = value; } /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline void SetUserSearchMatching(Aws::String&& value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching = std::move(value); } /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline void SetUserSearchMatching(const char* value) { m_userSearchMatchingHasBeenSet = true; m_userSearchMatching.assign(value); } /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithUserSearchMatching(const Aws::String& value) { SetUserSearchMatching(value); return *this;} /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithUserSearchMatching(Aws::String&& value) { SetUserSearchMatching(std::move(value)); return *this;} /** *The LDAP search filter used to find users within the userBase. The client's * username is substituted into the {0} placeholder in the search filter. For * example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It * will result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, * dc=example, dc=com.
*/ inline LdapServerMetadataInput& WithUserSearchMatching(const char* value) { SetUserSearchMatching(value); return *this;} /** *The directory search scope for the user. If set to true, scope is to search * the entire subtree.
*/ inline bool GetUserSearchSubtree() const{ return m_userSearchSubtree; } /** *The directory search scope for the user. If set to true, scope is to search * the entire subtree.
*/ inline bool UserSearchSubtreeHasBeenSet() const { return m_userSearchSubtreeHasBeenSet; } /** *The directory search scope for the user. If set to true, scope is to search * the entire subtree.
*/ inline void SetUserSearchSubtree(bool value) { m_userSearchSubtreeHasBeenSet = true; m_userSearchSubtree = value; } /** *The directory search scope for the user. If set to true, scope is to search * the entire subtree.
*/ inline LdapServerMetadataInput& WithUserSearchSubtree(bool value) { SetUserSearchSubtree(value); return *this;} private: Aws::Vector