public class CommitCertificateInformationRequest extends AbstractModel
header, skipSign
Constructor and Description |
---|
CommitCertificateInformationRequest() |
CommitCertificateInformationRequest(CommitCertificateInformationRequest source)
NOTE: Any ambiguous key set via .set("AnyKey", "value") will be a shallow copy,
and any explicit key, i.e Foo, set via .setFoo("value") will be a deep copy.
|
Modifier and Type | Method and Description |
---|---|
String |
getCertificateId()
Get Paid certificate id of materials to be submitted.
|
String |
getVerifyType()
Get Certificate domain name verification method:.
|
void |
setCertificateId(String CertificateId)
Set Paid certificate id of materials to be submitted.
|
void |
setVerifyType(String VerifyType)
Set Certificate domain name verification method:.
|
void |
toMap(HashMap<String,String> map,
String prefix)
Internal implementation, normal users should not use it.
|
any, fromJsonString, getBinaryParams, GetHeader, getMultipartRequestParams, getSkipSign, isStream, set, SetHeader, setParamArrayObj, setParamArraySimple, setParamObj, setParamSimple, setSkipSign, toJsonString
public CommitCertificateInformationRequest()
public CommitCertificateInformationRequest(CommitCertificateInformationRequest source)
public String getCertificateId()
public void setCertificateId(String CertificateId)
CertificateId
- Paid certificate id of materials to be submitted.public String getVerifyType()
public void setVerifyType(String VerifyType)
VerifyType
- Certificate domain name verification method:.
DNS_AUTO: automatically adds domain dns verification, requiring user domain name resolution to be hosted on [cloud dns](https://console.cloud.tencent.com/cns) and under the same tencent cloud account as the certificate application.
DNS: manually add domain dns verification, which requires users to manually add verification values to the domain resolution service provider.
FILE: manual addition of domain name file verification. requires the user to manually add a specified path file in the root directory of the domain site for file verification, and either http or https passing is acceptable; the domain site needs to be accessible by overseas ca institutions, with the specific access allowlist being: 64.78.193.238, 216.168.247.9, 216.168.249.9, 54.189.196.217.Copyright © 2025. All rights reserved.