@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class TlsConfig extends Object implements Serializable, Cloneable, StructuredPojo
Specifies the TLS configuration for an integration.
| Constructor and Description |
|---|
TlsConfig() |
| Modifier and Type | Method and Description |
|---|---|
TlsConfig |
clone() |
boolean |
equals(Object obj) |
Boolean |
getInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
int |
hashCode() |
Boolean |
isInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller. |
void |
setInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
String |
toString()
Returns a string representation of this object.
|
TlsConfig |
withInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
public void setInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP and HTTP_PROXY
integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification, you increase the risk of man-in-the-middle
attacks.
insecureSkipVerification - Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint
is issued by a supported certificate authority. This isn’t recommended, but it enables you to use
certificates that are signed by private certificate authorities, or certificates that are self-signed. If
enabled, API Gateway still performs basic certificate validation, which includes checking the
certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for
HTTP and HTTP_PROXY integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification, you increase the risk of
man-in-the-middle attacks.
public Boolean getInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP and HTTP_PROXY
integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification, you increase the risk of man-in-the-middle
attacks.
HTTP and HTTP_PROXY integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification, you increase the risk of
man-in-the-middle attacks.
public TlsConfig withInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP and HTTP_PROXY
integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification, you increase the risk of man-in-the-middle
attacks.
insecureSkipVerification - Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint
is issued by a supported certificate authority. This isn’t recommended, but it enables you to use
certificates that are signed by private certificate authorities, or certificates that are self-signed. If
enabled, API Gateway still performs basic certificate validation, which includes checking the
certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for
HTTP and HTTP_PROXY integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification, you increase the risk of
man-in-the-middle attacks.
public Boolean isInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP and HTTP_PROXY
integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification, you increase the risk of man-in-the-middle
attacks.
HTTP and HTTP_PROXY integrations.
Enabling insecureSkipVerification isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification, you increase the risk of
man-in-the-middle attacks.
public String toString()
toString in class ObjectObject.toString()public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojoProtocolMarshaller.marshall in interface StructuredPojoprotocolMarshaller - Implementation of ProtocolMarshaller used to marshall this object's data.