check_point.mgmt.cp_mgmt_domain_permissions_profile module – Manages domain-permissions-profile objects on Checkpoint over Web Services API
Note
This module is part of the check_point.mgmt collection (version 4.0.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install check\_point.mgmt
.
To use it in a playbook, specify: check_point.mgmt.cp_mgmt_domain_permissions_profile
.
New in check_point.mgmt 3.0.0
Synopsis
Manages domain-permissions-profile objects on Checkpoint devices including creating, updating and removing objects.
All operations are performed over Web Services API.
Parameters
Parameter |
Comments |
---|---|
Access Control permissions.<br>Only a ‘Customized’ permission-type profile can edit these permissions. |
|
Allow editing of the following objet types, VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings. Choices:
|
|
Install Application and URL Filtering updates. Choices:
|
|
Configure DLP rules and Policies. Choices:
|
|
Work with Access Control rules that control traffic to and from specified countries. Choices:
|
|
Install Access Control Policies. Choices:
|
|
Work with NAT in Access Control rules. Choices:
|
|
Layer editing permissions.<br>Available only if show-policy is set to true. |
|
Use Application and URL Filtering in Access Control rules.<br>Available only if edit-layers is set to “By Software Blades”. Choices:
|
|
Use specified data types in Access Control rules.<br>Available only if edit-layers is set to “By Software Blades”. Choices:
|
|
a “By Software Blades” - Edit Access Control layers that contain the blades enabled in the Permissions Profile.<br>”By Selected Profile In A Layer Editor” - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles. Choices:
|
|
Work with Access Control and other Software Blades that do not have their own Policies.<br>Available only if edit-layers is set to “By Software Blades”. Choices:
|
|
Work with Mobile Access rules.<br>Available only if edit-layers is set to “By Software Blades”. Choices:
|
|
Work with QoS Policies and rules. Choices:
|
|
Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules. Choices:
|
|
Publish the current session if changes have been performed after task completes. Choices:
|
|
Color of the object. Should be one of existing colors. Choices:
|
|
Comments string. |
|
The level of detail for some of the fields in the response can vary from showing only the UID value of the object to a fully detailed representation of the object. Choices:
|
|
Define and manage objects in the Check Point database, Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.<br>Only a ‘Customized’ permission-type profile can edit this permission. Choices:
|
|
Endpoint permissions. Not supported for Multi-Domain Servers.<br>Only a ‘Customized’ permission-type profile can edit these permissions. |
|
The administrator can start operations that the Security Management Server pushes directly to client computers with no policy installation required. Choices:
|
|
The administrator can add and remove the users who are permitted to log on to Endpoint Security client computers with Full Disk Encryption. Choices:
|
|
Available only if manage-policies-and-software-deployment is set to true. Choices:
|
|
The administrator can define deployment rules, create packages for export, and configure advanced package settings.<br>Available only if manage-policies-and-software-deployment is set to true. Choices:
|
|
The administrator can work with policies, rules and actions. Choices:
|
|
The administrator can install policies on endpoint computers. Choices:
|
|
The administrator can create recovery media on endpoint computers and devices. Choices:
|
|
The administrator can use the Remote Help feature to reset user passwords and give access to locked out users. Choices:
|
|
The administrator can reset a computer, which deletes all information about the computer from the Security Management Server. Choices:
|
|
The administrator can deploy packages and install endpoint clients. Choices:
|
|
Events and Reports permissions.<br>Only a ‘Customized’ permission-type profile can edit these permissions. |
|
Work with event queries on the Events tab. Create custom event queries.<br>Available only if smart-event is set to ‘Custom’. Choices:
|
|
Configure SmartEvent Policy rules and install SmartEvent Policies.<br>Available only if smart-event is set to ‘Custom’. Choices:
|
|
Create and run SmartEvent reports.<br>Available only if smart-event is set to ‘Custom’. Choices:
|
|
a ‘Custom’ - Configure SmartEvent permissions. Choices:
|
|
Gateways permissions. <br>Only a ‘Customized’ permission-type profile can edit these permissions. |
|
Access to objects defined in LSM gateway tables. These objects are managed in the SmartProvisioning GUI or LSMcli command-line.<br>Note, ‘Write’ permission on lsm-gw-db allows administrator to run a script on SmartLSM gateway in Expert mode. Choices:
|
|
Administrator can add, edit, delete, and assign provisioning profiles to gateways (both LSM and non-LSM).<br>Available for edit only if lsm-gw-db is set with ‘Write’ permission.<br>Note, ‘Read’ permission on lsm-gw-db enables ‘Read’ permission for manage-provisioning-profiles. Choices:
|
|
Add, change and remove scripts in the repository. Choices:
|
|
Use the SmartConsole CLI to run commands. Choices:
|
|
Run user scripts from the command line. Choices:
|
|
Run scripts from the repository. Choices:
|
|
Install, update and delete Check Point licenses. This includes permissions to use SmartUpdate to manage licenses. Choices:
|
|
Backup Security Gateways. Choices:
|
|
Restore Security Gateways from saved backups. Choices:
|
|
Create and configure Virtual Systems and other VSX virtual objects. Choices:
|
|
Apply changes ignoring errors. You won’t be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored. Choices:
|
|
Apply changes ignoring warnings. Choices:
|
|
Management permissions. |
|
Approve / reject other sessions. Choices:
|
|
Permission to read / edit the Cloud Management Extension (CME) configuration.<br>Not supported for Multi-Domain Servers. Choices:
|
|
Configure and work with Domain High Availability.<br>Only a ‘Customized’ permission-type profile can edit this permission. Choices:
|
|
Controls the ability to manage Administrators, Permission Profiles, Trusted clients,API settings and Policy settings.<br>Only a “Read Write All” permission-type profile can edit this permission.<br>Not supported for Multi-Domain Servers. Choices:
|
|
Manage integration with Cloud Services. Choices:
|
|
Lets you disconnect, discard, publish, or take over other administrator sessions.<br>Only a “Read Write All” permission-type profile can edit this permission. Choices:
|
|
Permission to log in to the Security Management Server and run API commands using thesetools, mgmt_cli (Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.<br>Note, This permission is not required to run commands from within the API terminal in SmartConsole.<br>Not supported for Multi-Domain Servers. Choices:
|
|
Allow session publishing without an approval. Choices:
|
|
Monitoring and Logging permissions.<br>’Customized’ permission-type profile can edit all these permissions. “Read Write All” permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions. |
|
Work with Application and URL Filtering logs. Choices:
|
|
Show DLP logs including confidential fields. Choices:
|
|
See logs generated by HTTPS Inspection. Choices:
|
|
Show user and computer identity information in logs. Choices:
|
|
View/Release/Discard DLP messages.<br>Available only if dlp-logs-including-confidential-fields is set to true. Choices:
|
|
See Multi-Domain Server audit logs. Choices:
|
|
See monitoring views and reports. Choices:
|
|
See logs generated by the IPS and Forensics features. Choices:
|
|
Show user and computer identity information in logs by default. Choices:
|
|
Enable packet capture by default. Choices:
|
|
Use the log tracking features in SmartConsole. Choices:
|
|
Object name. |
|
Additional permissions.<br>Only a ‘Customized’ permission-type profile can edit these permissions. |
|
Create and manage client certificates for Mobile Access. Choices:
|
|
Work with user accounts and groups. Choices:
|
|
Enable and configure HTTPS Inspection rules. Choices:
|
|
Work with the LDAP database and user accounts, groups and OUs. Choices:
|
|
Work with Check Point User Authority authentication. Choices:
|
|
Gives access to the UDM (User & Device Management) web-based application that handles security challenges in a “bring your own device” (BYOD) workspace. Choices:
|
|
The type of the Permissions Profile. Choices:
|
|
State of the access rule (present or absent). Defaults to present. Choices:
|
|
Collection of tag identifiers. |
|
Threat Prevention permissions.<br>Only a ‘Customized’ permission-type profile can edit these permissions. |
|
a ‘ALL’ - Gives permission to edit all layers.<br>”By Selected Profile In A Layer Editor” - Administrators can only edit the layer if the Threat Prevention layer editor gives editing permission to their profiles.<br>Available only if policy-layers is set to ‘Write’. Choices:
|
|
Work with general Threat Prevention settings. Choices:
|
|
Install Policies. Choices:
|
|
Update IPS protections.<br>Note, You do not have to log into the User Center to receive IPS updates. Choices:
|
|
Configure exceptions to Threat Prevention rules.<br>Note, To have policy-exceptions you must set the protections permission. Choices:
|
|
Configure Threat Prevention Policy rules.<br>Note, To have policy-layers permissions you must set policy-exceptionsand profiles permissions. To have ‘Write’ permissions for policy-layers, policy-exceptions must be set with ‘Write’ permission as well. Choices:
|
|
Configure Threat Prevention profiles. Choices:
|
|
Work with malware protections. Choices:
|
|
Version of checkpoint. If not given one, the latest version taken. |
|
Wait for the task to end. Such as publish task. Choices:
|
|
How many minutes to wait until throwing a timeout error. Default: |
Examples
- name: add-domain-permissions-profile
cp_mgmt_domain_permissions_profile:
name: customized profile
state: present
- name: set-domain-permissions-profile
cp_mgmt_domain_permissions_profile:
access_control.policy_layers: By Selected Profile In A Layer Editor
name: read profile
permission_type: customized
state: present
- name: delete-domain-permissions-profile
cp_mgmt_domain_permissions_profile:
name: profile
state: absent
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
The checkpoint object created or updated. Returned: always, except when deleting the object. |