community.zabbix.zabbix_authentication module – Update Zabbix authentication
Note
This module is part of the community.zabbix collection (version 1.7.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install community.zabbix
.
To use it in a playbook, specify: community.zabbix.zabbix_authentication
.
New in version 1.6.0: of community.zabbix
Requirements
The below requirements are needed on the host that executes this module.
zabbix-api >= 0.5.4
Parameters
Parameter |
Comments |
---|---|
Choose default authentication type. Choices:
|
|
HTTP authentication will be enabled if Choices:
|
|
Case sensitive login for HTTP authentication will be enabled if Choices:
|
|
Choose default login form. Choices:
|
|
Basic Auth password |
|
Basic Auth login |
|
A list of domain names that should be removed from the username. |
|
Base DN of LDAP. This setting is required if current value of ldap_configured is |
|
Bind DN of LDAP. |
|
Bind password of LDAP. |
|
case sensitive login for LDAP authentication will be enabled if Choices:
|
|
LDAP authentication will be enabled if Choices:
|
|
LDAP server name. e.g. This setting is required if current value of ldap_configured is |
|
A port number of LDAP server. This setting is required if current value of ldap_configured is |
|
Search attribute of LDAP. This setting is required if current value of ldap_configured is |
|
Zabbix user password. If not set the environment variable |
|
Zabbix user name. If not set the environment variable |
|
Checking password rules. Select multiple from This parameter is available since Zabbix 6.0. |
|
Minimal length of password. Choose from 1-70. This parameter is available since Zabbix 6.0. |
|
SAML authentication will be enabled if Choices:
|
|
Case sensitive login for SAML authentication will be enabled if Choices:
|
|
SAML encrypt assertions will be enabled if Choices:
|
|
SAML encrypt name ID will be enabled if Choices:
|
|
SAML identify provider’s entity ID. This setting is required if current value of saml_auth_enabled is |
|
Name identifier format of SAML service provider. |
|
SAML sign assertions will be enabled if Choices:
|
|
SAML sign AuthN requests will be enabled if Choices:
|
|
SAML sign logout requests will be enabled if Choices:
|
|
SAML sign logout responses will be enabled if Choices:
|
|
SAML sign messages will be enabled if Choices:
|
|
URL for SAML single logout service. |
|
Entity ID of SAML service provider. This setting is required if current value of saml_auth_enabled is |
|
URL for single sign on service of SAML. This setting is required if current value of saml_auth_enabled is |
|
User name attribute of SAML. This setting is required if current value of saml_auth_enabled is |
|
URL of Zabbix server, with protocol (http or https). If not set the environment variable |
|
The timeout of API request (seconds). Default: 10 |
|
If set to False, SSL certificates will not be validated. This should only be used on personally controlled sites using self-signed certificates. If not set the environment variable Choices:
|
Notes
Note
Zabbix 5.4 version and higher are supported.
If you use login_password=zabbix, the word “zabbix” is replaced by “****” in all module output, because login_password uses
no_log
. See this FAQ for more information.
Examples
- name: Update all authentication setting
zabbix_authentication:
server_url: "http://zabbix.example.com/zabbix/"
login_user: Admin
login_password: secret
authentication_type: internal
http_auth_enabled: true
http_login_form: zabbix_login_form
http_strip_domains:
- comp
- any
http_case_sensitive: true
ldap_configured: true
ldap_host: 'ldap://localhost'
ldap_port: 389
ldap_base_dn: 'ou=Users,ou=system'
ldap_search_attribute: 'uid'
ldap_bind_dn: 'uid=ldap_search,ou=system'
ldap_case_sensitive: true
ldap_bind_password: 'password'
saml_auth_enabled: true
saml_idp_entityid: ''
saml_sso_url: 'https://localhost/SAML2/SSO'
saml_slo_url: 'https://localhost/SAML2/SLO'
saml_username_attribute: 'uid'
saml_sp_entityid: 'https://localhost'
saml_nameid_format: 'urn:oasis:names:tc:SAML:2.0:nameid-format:entity'
saml_sign_messages: true
saml_sign_assertions: true
saml_sign_authn_requests: true
saml_sign_logout_requests: true
saml_sign_logout_responses: true
saml_encrypt_nameid: true
saml_encrypt_assertions: true
saml_case_sensitive: true
passwd_min_length: 70
passwd_check_rules:
- contain_uppercase_and_lowercase_letters
- contain_digits
- contain_special_characters
- avoid_easy_to_guess
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
The result of the operation Returned: success Sample: “Successfully update authentication setting” |
Authors
ONODERA Masaru(@masa-orca)