cisco.ise.active_directory_add_groups module – Resource module for Active Directory Add Groups
Note
This module is part of the cisco.ise collection (version 1.2.1).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install cisco.ise
.
To use it in a playbook, specify: cisco.ise.active_directory_add_groups
.
New in version 1.0.0: of cisco.ise
Synopsis
Manage operation update of the resource Active Directory Add Groups.
Note
This module has a corresponding action plugin.
Requirements
The below requirements are needed on the host that executes this module.
ciscoisesdk >= 1.1.0
python >= 3.5
Parameters
Parameter |
Comments |
---|---|
Holds list of AD Attributes. |
|
List of Attributes. |
|
Required for each attribute in the attribute list. Can contain an empty string. All characters are allowed except <%”. |
|
Required for each attribute in the attribute list. All characters are allowed except <%”. |
|
Required for each attribute in the attribute list with no duplication between attributes. All characters are allowed except <%”. |
|
Required for each group in the group list. Allowed values STRING, IP, BOOLEAN, INT, OCTET_STRING. |
|
Holds list of AD Groups. |
|
List of Groups. |
|
Required for each group in the group list with no duplication between groups. All characters are allowed except %. |
|
Cisco ISE uses security identifiers (SIDs) for optimization of group membership evaluation. SIDs are useful for efficiency (speed) when the groups are evaluated. All characters are allowed except %. |
|
No character restriction. |
|
String that contains the names of the scopes that the active directory belongs to. Names are separated by comma. Alphanumeric, underscore (_) characters are allowed. |
|
Active Directory Add Groups’s advancedSettings. |
|
Range 1-8760 hours. |
|
Enable prevent AD account lockout. Allowed values - WIRELESS, - WIRED, - BOTH. |
|
User info attribute. All characters are allowed except %. |
|
User info attribute. All characters are allowed except %. |
|
User info attribute. All characters are allowed except %. |
|
EnableCallbackForDialinClient flag. Choices:
|
|
EnableDialinPermissionCheck flag. Choices:
|
|
Enable prevent AD account lockout due to too many bad password attempts. Choices:
|
|
EnableMachineAccess flag. Choices:
|
|
EnableMachineAuth flag. Choices:
|
|
EnablePassChange flag. Choices:
|
|
EnableRewrites flag. Choices:
|
|
Number of bad password attempts. |
|
User info attribute. All characters are allowed except %. |
|
Allowed values REJECT, SEARCH_JOINED_FOREST, SEARCH_ALL. |
|
User info attribute. All characters are allowed except %. |
|
User info attribute. All characters are allowed except %. |
|
User info attribute. All characters are allowed except %. |
|
User info attribute. All characters are allowed except %. |
|
PlaintextAuth flag. Choices:
|
|
Identity rewrite is an advanced feature that directs Cisco ISE to manipulate the identity before it is passed to the external Active Directory system. You can create rules to change the identity to a desired format that includes or excludes a domain prefix and/or suffix or other additional markup of your choice. |
|
Required for each rule in the list with no duplication between rules. All characters are allowed except %”. |
|
Required for each rule in the list. All characters are allowed except %”. |
|
Required for each rule in the list in serial order. |
|
Allowed values ACTIVE_DIRECTORY, CUSTOM. Choose ACTIVE_DIRECTORY schema when the AD attributes defined in AD can be copied to relevant attributes in Cisco ISE. If customization is needed, choose CUSTOM schema. All User info attributes are always set to default value if schema is ACTIVE_DIRECTORY. Values can be changed only for CUSTOM schema. |
|
User info attribute. All characters are allowed except %. |
|
User info attribute. All characters are allowed except %. |
|
User info attribute. All characters are allowed except %. |
|
Allowed values PROCEED, DROP. |
|
No character restriction. |
|
The AD domain. Alphanumeric, hyphen (-) and dot (.) characters are allowed. |
|
EnableDomainWhiteList flag. Choices:
|
|
Resource UUID value. |
|
Flag for Identity Services Engine SDK to enable debugging. Choices:
|
|
The Identity Services Engine hostname. |
|
The Identity Services Engine password to authenticate. |
|
The Identity Services Engine username to authenticate. |
|
Flag that informs the SDK whether to use the Identity Services Engine’s API Gateway to send requests. If it is true, it uses the ISE’s API Gateway and sends requests to https://{{ise_hostname}}. If it is false, it sends the requests to https://{{ise_hostname}}:{{port}}, where the port value depends on the Service used (ERS, Mnt, UI, PxGrid). Choices:
|
|
Flag to enable or disable SSL certificate verification. Choices:
|
|
Informs the SDK which version of Identity Services Engine to use. Default: “3.1.0” |
|
Flag for Identity Services Engine SDK to enable automatic rate-limit handling. Choices:
|
|
Resource Name. Maximum 32 characters allowed. Allowed characters are alphanumeric and .-_/\ characters. |
See Also
See also
- Active Directory Add Groups reference
Complete reference of the Active Directory Add Groups object model.
Examples
- name: Update all
cisco.ise.active_directory_add_groups:
ise_hostname: "{{ise_hostname}}"
ise_username: "{{ise_username}}"
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
adAttributes:
attributes:
- defaultValue: string
internalName: string
name: string
type: string
adScopesNames: string
adgroups:
groups:
- name: string
sid: string
type: string
advancedSettings:
agingTime: 0
authProtectionType: string
country: string
department: string
email: string
enableCallbackForDialinClient: true
enableDialinPermissionCheck: true
enableFailedAuthProtection: true
enableMachineAccess: true
enableMachineAuth: true
enablePassChange: true
enableRewrites: true
failedAuthThreshold: 0
firstName: string
identityNotInAdBehaviour: string
jobTitle: string
lastName: string
locality: string
organizationalUnit: string
plaintextAuth: true
rewriteRules:
- rewriteMatch: string
rewriteResult: string
rowId: 0
schema: string
stateOrProvince: string
streetAddress: string
telephone: string
unreachableDomainsBehaviour: string
description: string
domain: string
enableDomainWhiteList: true
id: string
name: string
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
A dictionary or list with the response returned by the Cisco ISE Python SDK Returned: always Sample: “{}\n” |
Authors
Rafael Campos (@racampos)