ipa_vault – Manage FreeIPA vaults¶
New in version 2.7.
Synopsis¶
Add, modify and delete vaults and secret vaults.
KRA service should be enabled to use this module.
Parameters¶
Parameter | Choices/Defaults | Comments |
---|---|---|
cn
-
/ required
|
Vault name.
Can not be changed as it is the unique identifier.
aliases: name |
|
description
-
|
Description.
|
|
ipa_host
string
|
Default: "ipa.example.com"
|
IP or hostname of IPA server.
If the value is not specified in the task, the value of environment variable
IPA_HOST will be used instead.If both the environment variable
IPA_HOST and the value are not specified in the task, then DNS will be used to try to discover the FreeIPA server.The relevant entry needed in FreeIPA is the 'ipa-ca' entry.
If neither the DNS entry, nor the environment
IPA_HOST , nor the value are available in the task, then the default value will be used.Environment variable fallback mechanism is added in Ansible 2.5.
|
ipa_pass
string
/ required
|
Password of administrative user.
If the value is not specified in the task, the value of environment variable
IPA_PASS will be used instead.Note that if the 'urllib_gssapi' library is available, it is possible to use GSSAPI to authenticate to FreeIPA.
If the environment variable
KRB5CCNAME is available, the module will use this kerberos credentials cache to authenticate to the FreeIPA server.If the environment variable
KRB5_CLIENT_KTNAME is available, and KRB5CCNAME is not; the module will use this kerberos keytab to authenticate.If GSSAPI is not available, the usage of 'ipa_pass' is required.
Environment variable fallback mechanism is added in Ansible 2.5.
|
|
ipa_port
integer
|
Default: 443
|
Port of FreeIPA / IPA server.
If the value is not specified in the task, the value of environment variable
IPA_PORT will be used instead.If both the environment variable
IPA_PORT and the value are not specified in the task, then default value is set.Environment variable fallback mechanism is added in Ansible 2.5.
|
ipa_prot
string
|
|
Protocol used by IPA server.
If the value is not specified in the task, the value of environment variable
IPA_PROT will be used instead.If both the environment variable
IPA_PROT and the value are not specified in the task, then default value is set.Environment variable fallback mechanism is added in Ansible 2.5.
|
ipa_timeout
integer
added in 2.7 |
Default: 10
|
Specifies idle timeout (in seconds) for the connection.
For bulk operations, you may want to increase this in order to avoid timeout from IPA server.
If the value is not specified in the task, the value of environment variable
IPA_TIMEOUT will be used instead.If both the environment variable
IPA_TIMEOUT and the value are not specified in the task, then default value is set. |
ipa_user
string
|
Default: "admin"
|
Administrative account used on IPA server.
If the value is not specified in the task, the value of environment variable
IPA_USER will be used instead.If both the environment variable
IPA_USER and the value are not specified in the task, then default value is set.Environment variable fallback mechanism is added in Ansible 2.5.
|
ipavaultpublickey
-
|
Public key.
aliases: vault_public_key |
|
ipavaultsalt
-
|
Vault Salt.
aliases: vault_salt |
|
ipavaulttype
-
/ required
|
|
Vault types are based on security level.
aliases: vault_type |
replace
boolean
|
|
Force replace the existant vault on IPA server.
|
service
-
|
Any service can own one or more service vaults.
Mutually exclusive with user.
|
|
state
-
|
|
State to ensure.
|
username
-
|
Any user can own one or more user vaults.
Mutually exclusive with service.
aliases: user |
|
validate_certs
boolean
|
|
Validate IPA server certificates.
|
Examples¶
# Ensure vault is present
- ipa_vault:
name: vault01
vault_type: standard
user: user01
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
validate_certs: false
# Ensure vault is present for Admin user
- ipa_vault:
name: vault01
vault_type: standard
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
# Ensure vault is absent
- ipa_vault:
name: vault01
vault_type: standard
user: user01
state: absent
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
# Modify vault if already exists
- ipa_vault:
name: vault01
vault_type: standard
description: "Vault for test"
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
replace: True
# Get vault info if already exists
- ipa_vault:
name: vault01
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
vault
dictionary
|
always |
Vault as returned by IPA API
|
Status¶
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by the Ansible Community. [community]