@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class TlsConfig extends Object implements Serializable, Cloneable, StructuredPojo
Specifies the TLS configuration for an integration.
Constructor and Description |
---|
TlsConfig() |
Modifier and Type | Method and Description |
---|---|
TlsConfig |
clone() |
boolean |
equals(Object obj) |
Boolean |
getInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
int |
hashCode() |
Boolean |
isInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
String |
toString()
Returns a string representation of this object.
|
TlsConfig |
withInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority.
|
public void setInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification
, you increase the risk of man-in-the-middle
attacks.
insecureSkipVerification
- Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint
is issued by a supported certificate authority. This isn’t recommended, but it enables you to use
certificates that are signed by private certificate authorities, or certificates that are self-signed. If
enabled, API Gateway still performs basic certificate validation, which includes checking the
certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for
HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification
, you increase the risk of
man-in-the-middle attacks.
public Boolean getInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification
, you increase the risk of man-in-the-middle
attacks.
HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification
, you increase the risk of
man-in-the-middle attacks.
public TlsConfig withInsecureSkipVerification(Boolean insecureSkipVerification)
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification
, you increase the risk of man-in-the-middle
attacks.
insecureSkipVerification
- Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint
is issued by a supported certificate authority. This isn’t recommended, but it enables you to use
certificates that are signed by private certificate authorities, or certificates that are self-signed. If
enabled, API Gateway still performs basic certificate validation, which includes checking the
certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for
HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification
, you increase the risk of
man-in-the-middle attacks.
public Boolean isInsecureSkipVerification()
Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is
issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that
are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway
still performs basic certificate validation, which includes checking the certificate's expiration date, hostname,
and presence of a root certificate authority. Supported only for HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public HTTPS
endpoints. If you enable insecureSkipVerification
, you increase the risk of man-in-the-middle
attacks.
HTTP
and HTTP_PROXY
integrations.
Enabling insecureSkipVerification
isn't recommended, especially for integrations with public
HTTPS endpoints. If you enable insecureSkipVerification
, you increase the risk of
man-in-the-middle attacks.
public String toString()
toString
in class Object
Object.toString()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.