community.general.ipa_vault module – Manage FreeIPA vaults
Note
This module is part of the community.general collection (version 10.7.5).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install community.general.
To use it in a playbook, specify: community.general.ipa_vault.
Synopsis
- Add, modify and delete vaults and secret vaults. 
- KRA service should be enabled to use this module. 
Parameters
| Parameter | Comments | 
|---|---|
| Vault name. Can not be changed as it is the unique identifier. | |
| Description. | |
| IP or hostname of IPA server. If the value is not specified in the task, the value of environment variable  If both the environment variable  The relevant entry needed in FreeIPA is the  If neither the DNS entry, nor the environment  Default:  | |
| Password of administrative user. If the value is not specified in the task, the value of environment variable  Note that if the  If the environment variable  If the environment variable  If GSSAPI is not available, the usage of  | |
| Port of FreeIPA / IPA server. If the value is not specified in the task, the value of environment variable  If both the environment variable  Default:  | |
| Protocol used by IPA server. If the value is not specified in the task, the value of environment variable  If both the environment variable  Choices: 
 | |
| Specifies idle timeout (in seconds) for the connection. For bulk operations, you may want to increase this in order to avoid timeout from IPA server. If the value is not specified in the task, the value of environment variable  If both the environment variable  Default:  | |
| Administrative account used on IPA server. If the value is not specified in the task, the value of environment variable  If both the environment variable  Default:  | |
| Public key. | |
| Vault Salt. | |
| Vault types are based on security level. Choices: 
 | |
| Force replace the existent vault on IPA server. Choices: 
 | |
| Any service can own one or more service vaults. Mutually exclusive with  | |
| State to ensure. Choices: 
 | |
| Any user can own one or more user vaults. Mutually exclusive with  | |
| Validate IPA server certificates. Choices: 
 | 
Attributes
| Attribute | Support | Description | 
|---|---|---|
| Support: full | Can run in  | |
| Support: none | Will return details on what has changed (or possibly needs changing in  | 
Notes
Note
- This module uses JSON-RPC over HTTP(S) to communicate with the FreeIPA server. If you need to enroll the managed node into FreeIPA realm, you might want to consider using the collection freeipa.ansible_freeipa, but shell access to one node from the realm is required to manage the deployment. 
Examples
- name: Ensure vault is present
  community.general.ipa_vault:
    name: vault01
    vault_type: standard
    user: user01
    ipa_host: ipa.example.com
    ipa_user: admin
    ipa_pass: topsecret
- name: Ensure vault is present for Admin user
  community.general.ipa_vault:
    name: vault01
    vault_type: standard
    ipa_host: ipa.example.com
    ipa_user: admin
    ipa_pass: topsecret
- name: Ensure vault is absent
  community.general.ipa_vault:
    name: vault01
    vault_type: standard
    user: user01
    state: absent
    ipa_host: ipa.example.com
    ipa_user: admin
    ipa_pass: topsecret
- name: Modify vault if already exists
  community.general.ipa_vault:
    name: vault01
    vault_type: standard
    description: "Vault for test"
    ipa_host: ipa.example.com
    ipa_user: admin
    ipa_pass: topsecret
    replace: true
- name: Get vault info if already exists
  community.general.ipa_vault:
    name: vault01
    ipa_host: ipa.example.com
    ipa_user: admin
    ipa_pass: topsecret
Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Description | 
|---|---|
| Vault as returned by IPA API. Returned: always | 
