Interface DescribedSecurityPolicy.Builder
- All Superinterfaces:
Buildable
,CopyableBuilder<DescribedSecurityPolicy.Builder,
,DescribedSecurityPolicy> SdkBuilder<DescribedSecurityPolicy.Builder,
,DescribedSecurityPolicy> SdkPojo
- Enclosing class:
DescribedSecurityPolicy
-
Method Summary
Modifier and TypeMethodDescriptionSpecifies whether this policy enables Federal Information Processing Standards (FIPS).protocols
(Collection<SecurityPolicyProtocol> protocols) Lists the file transfer protocols that the security policy applies to.protocols
(SecurityPolicyProtocol... protocols) Lists the file transfer protocols that the security policy applies to.protocolsWithStrings
(String... protocols) Lists the file transfer protocols that the security policy applies to.protocolsWithStrings
(Collection<String> protocols) Lists the file transfer protocols that the security policy applies to.securityPolicyName
(String securityPolicyName) The text name of the specified security policy.sshCiphers
(String... sshCiphers) Lists the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server or connector.sshCiphers
(Collection<String> sshCiphers) Lists the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server or connector.sshHostKeyAlgorithms
(String... sshHostKeyAlgorithms) Lists the host key algorithms for the security policy.sshHostKeyAlgorithms
(Collection<String> sshHostKeyAlgorithms) Lists the host key algorithms for the security policy.Lists the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server or connector.sshKexs
(Collection<String> sshKexs) Lists the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server or connector.Lists the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server or connector.sshMacs
(Collection<String> sshMacs) Lists the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server or connector.tlsCiphers
(String... tlsCiphers) Lists the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.tlsCiphers
(Collection<String> tlsCiphers) Lists the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.The resource type to which the security policy applies, either server or connector.The resource type to which the security policy applies, either server or connector.Methods inherited from interface software.amazon.awssdk.utils.builder.CopyableBuilder
copy
Methods inherited from interface software.amazon.awssdk.utils.builder.SdkBuilder
applyMutation, build
Methods inherited from interface software.amazon.awssdk.core.SdkPojo
equalsBySdkFields, sdkFields
-
Method Details
-
fips
Specifies whether this policy enables Federal Information Processing Standards (FIPS). This parameter applies to both server and connector security policies.
- Parameters:
fips
- Specifies whether this policy enables Federal Information Processing Standards (FIPS). This parameter applies to both server and connector security policies.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
securityPolicyName
The text name of the specified security policy.
- Parameters:
securityPolicyName
- The text name of the specified security policy.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshCiphers
Lists the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
- Parameters:
sshCiphers
- Lists the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshCiphers
Lists the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
- Parameters:
sshCiphers
- Lists the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshKexs
Lists the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
- Parameters:
sshKexs
- Lists the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshKexs
Lists the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
- Parameters:
sshKexs
- Lists the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshMacs
Lists the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
- Parameters:
sshMacs
- Lists the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshMacs
Lists the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
- Parameters:
sshMacs
- Lists the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
tlsCiphers
Lists the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.
This parameter only applies to security policies for servers.
- Parameters:
tlsCiphers
- Lists the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.This parameter only applies to security policies for servers.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
tlsCiphers
Lists the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.
This parameter only applies to security policies for servers.
- Parameters:
tlsCiphers
- Lists the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.This parameter only applies to security policies for servers.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshHostKeyAlgorithms
Lists the host key algorithms for the security policy.
This parameter only applies to security policies for connectors.
- Parameters:
sshHostKeyAlgorithms
- Lists the host key algorithms for the security policy.This parameter only applies to security policies for connectors.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sshHostKeyAlgorithms
Lists the host key algorithms for the security policy.
This parameter only applies to security policies for connectors.
- Parameters:
sshHostKeyAlgorithms
- Lists the host key algorithms for the security policy.This parameter only applies to security policies for connectors.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
type
The resource type to which the security policy applies, either server or connector.
- Parameters:
type
- The resource type to which the security policy applies, either server or connector.- Returns:
- Returns a reference to this object so that method calls can be chained together.
- See Also:
-
type
The resource type to which the security policy applies, either server or connector.
- Parameters:
type
- The resource type to which the security policy applies, either server or connector.- Returns:
- Returns a reference to this object so that method calls can be chained together.
- See Also:
-
protocolsWithStrings
Lists the file transfer protocols that the security policy applies to.
- Parameters:
protocols
- Lists the file transfer protocols that the security policy applies to.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
protocolsWithStrings
Lists the file transfer protocols that the security policy applies to.
- Parameters:
protocols
- Lists the file transfer protocols that the security policy applies to.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
protocols
Lists the file transfer protocols that the security policy applies to.
- Parameters:
protocols
- Lists the file transfer protocols that the security policy applies to.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
protocols
Lists the file transfer protocols that the security policy applies to.
- Parameters:
protocols
- Lists the file transfer protocols that the security policy applies to.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-